首页 > 最新文献

Proceedings of the 1st International Conference on Information Science and Systems最新文献

英文 中文
Music recommendation model by analysis of listener's musical preference factor of K-pop 基于听众音乐偏好因素分析的K-pop音乐推荐模型
J. Chung, Myoung-Jun Kim
Recently, the popularity of Korean pop music (or K-pop) has been increasing, due to technological developments in digital devices. According to the IFPI, 59% of Koreans regularly listen to music on their smartphones and other related devices [1]. Thus, the present study proposes a music recommendation model that predicts listeners' music preferences and recommends customized music lists. For this purpose, two pilot tests (with one participant in each test) were conducted and linear regression analysis was performed by using the Tensorflow application. The first test determined the participant's song preferences, based on a sample of 200 K-pop songs, while the second test added a neutral response option when considering a sample of 200 additional K-pop songs. The results indicate that the prediction accuracy of the participant's song preferences in the first test was 71.5%. However, after adding the neutral response option in the second pilot test, the prediction accuracy increased to 84.0%. This model can be used to predict the music preferences of listeners on a wider scale.
最近,由于数码设备的技术发展,韩国流行音乐(K-pop)的受欢迎程度越来越高。根据IFPI的数据,59%的韩国人经常在智能手机和其他相关设备上听音乐[1]。因此,本研究提出了一个音乐推荐模型,预测听众的音乐偏好,并推荐定制的音乐列表。为此,进行了两次试点测试(每次测试有一名参与者),并使用Tensorflow应用程序进行了线性回归分析。第一个测试基于200首韩国流行歌曲的样本来确定参与者的歌曲偏好,而第二个测试在考虑另外200首韩国流行歌曲的样本时增加了一个中立的回答选项。结果表明,在第一次测试中,被试对歌曲偏好的预测准确率为71.5%。然而,在第二次先导试验中加入中性反应选项后,预测准确率提高到84.0%。这个模型可以用来预测听众在更大范围内的音乐偏好。
{"title":"Music recommendation model by analysis of listener's musical preference factor of K-pop","authors":"J. Chung, Myoung-Jun Kim","doi":"10.1145/3209914.3209932","DOIUrl":"https://doi.org/10.1145/3209914.3209932","url":null,"abstract":"Recently, the popularity of Korean pop music (or K-pop) has been increasing, due to technological developments in digital devices. According to the IFPI, 59% of Koreans regularly listen to music on their smartphones and other related devices [1]. Thus, the present study proposes a music recommendation model that predicts listeners' music preferences and recommends customized music lists. For this purpose, two pilot tests (with one participant in each test) were conducted and linear regression analysis was performed by using the Tensorflow application. The first test determined the participant's song preferences, based on a sample of 200 K-pop songs, while the second test added a neutral response option when considering a sample of 200 additional K-pop songs. The results indicate that the prediction accuracy of the participant's song preferences in the first test was 71.5%. However, after adding the neutral response option in the second pilot test, the prediction accuracy increased to 84.0%. This model can be used to predict the music preferences of listeners on a wider scale.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122523327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on Port Efficiency Measurement Based on Three-stage Cascade Data Envelopment Analysis Control Strategy 基于三级级联数据包络分析控制策略的港口效率测量研究
Xiaoling Huang, Huanping Chen, Yawei Wang, Huishu Piao
In order to measure the port efficiency, this paper uses the three stage DEA cascade control strategy to measure the relative efficiency of the port.First, the original input-output value is used to measure the port efficiency. Secondly, the stochastic frontier analysis method is used to analyze the influence of random error and environmental variables on the input difference value. Then, the result of the model is used to adjust the input value. Finally, the adjusted input value is used to re-measure the relative efficiency. Compared with the traditional DEA, this method eliminates the influence of random errors in the DEA model and the different external environmental factors in the port so as to make the measured efficiency more objective and accurate. At the same time, it analyzes the influence of different environmental factors on the port efficiency impact.
为了测量港口效率,本文采用三级DEA级联控制策略来测量港口的相对效率。首先,使用原始输入输出值来衡量端口效率。其次,采用随机前沿分析法分析随机误差和环境变量对输入差值的影响。然后,利用模型的结果来调整输入值。最后,调整后的输入值用于重新测量相对效率。与传统的DEA相比,该方法消除了DEA模型随机误差和港口不同外部环境因素的影响,使测量效率更加客观准确。同时,分析了不同环境因素对港口效率的影响。
{"title":"Research on Port Efficiency Measurement Based on Three-stage Cascade Data Envelopment Analysis Control Strategy","authors":"Xiaoling Huang, Huanping Chen, Yawei Wang, Huishu Piao","doi":"10.1145/3209914.3209915","DOIUrl":"https://doi.org/10.1145/3209914.3209915","url":null,"abstract":"In order to measure the port efficiency, this paper uses the three stage DEA cascade control strategy to measure the relative efficiency of the port.First, the original input-output value is used to measure the port efficiency. Secondly, the stochastic frontier analysis method is used to analyze the influence of random error and environmental variables on the input difference value. Then, the result of the model is used to adjust the input value. Finally, the adjusted input value is used to re-measure the relative efficiency. Compared with the traditional DEA, this method eliminates the influence of random errors in the DEA model and the different external environmental factors in the port so as to make the measured efficiency more objective and accurate. At the same time, it analyzes the influence of different environmental factors on the port efficiency impact.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121787667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Approach for Information Discovery Using Ontology In Semantic Web Content 基于本体的语义Web内容信息发现方法
Ayhan Akgün, S. Ayvaz
Information searching techniques are rapidly developing as the World Wide Web (WWW) evolves. Along with the development of information technologies, the need for acquiring domain knowledge bases, accessing data sources and discovering insights increases. The advancements in knowledge discovery, information management and artificial intelligence require faster data processing, storing more data and developing more intelligent applications. This study provides an information discovery and data integration approach for linked open data in the semantic web. Using semantics embedded in ontologies, data available in knowledge bases can be enhanced to better serve the information needs of users. The entity relationships between resources and resource hierarchies represented as linked open data in semantic web provide semantically rich insights about the data and facilitates knowledge discovery. Graph theory methods can be utilized to enrich the features of data sets in semantic web. In this study, we propose an approach for integrating isolated data sources with semantic web by using ontologies to make them available for information discovery and enhancing the features of semantic data by using graph theory techniques.
随着万维网的发展,信息搜索技术得到了迅速发展。随着信息技术的发展,获取领域知识库、访问数据源和发现见解的需求也在增加。知识发现、信息管理和人工智能的进步要求更快的数据处理、存储更多的数据和开发更智能的应用程序。本研究为语义网中链接开放数据提供了一种信息发现和数据集成方法。使用嵌入在本体中的语义,可以增强知识库中可用的数据,以更好地满足用户的信息需求。在语义网络中,将资源之间的实体关系和资源层次表示为链接的开放数据,提供了丰富的数据语义洞察,促进了知识发现。利用图论方法可以丰富语义网中数据集的特征。在这项研究中,我们提出了一种方法,通过使用本体将孤立的数据源与语义网集成,使其可用于信息发现,并通过使用图论技术增强语义数据的特征。
{"title":"An Approach for Information Discovery Using Ontology In Semantic Web Content","authors":"Ayhan Akgün, S. Ayvaz","doi":"10.1145/3209914.3209940","DOIUrl":"https://doi.org/10.1145/3209914.3209940","url":null,"abstract":"Information searching techniques are rapidly developing as the World Wide Web (WWW) evolves. Along with the development of information technologies, the need for acquiring domain knowledge bases, accessing data sources and discovering insights increases. The advancements in knowledge discovery, information management and artificial intelligence require faster data processing, storing more data and developing more intelligent applications. This study provides an information discovery and data integration approach for linked open data in the semantic web. Using semantics embedded in ontologies, data available in knowledge bases can be enhanced to better serve the information needs of users. The entity relationships between resources and resource hierarchies represented as linked open data in semantic web provide semantically rich insights about the data and facilitates knowledge discovery. Graph theory methods can be utilized to enrich the features of data sets in semantic web. In this study, we propose an approach for integrating isolated data sources with semantic web by using ontologies to make them available for information discovery and enhancing the features of semantic data by using graph theory techniques.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115271604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Modular Quality Transfer Effect of Service-oriented Manufacturing Network 服务型制造网络的模块化质量传递效应
Liangqing Feng, Yu Yin, Kunkun Zeng
The goal of this study is to research the relations on quality among the productive service module(PSM), service production module (SPM)and customer effect module(CEM) in service-oriented manufacturing network(SMN). The relationships among the modules are explored according to a structural equation model (SEM) put forward by this paper. The empirical data of the SEM were collected from a service-oriented manufacturing enterprise in China. PSM and SPM both have obvious interaction on quality, PSM and SPM have obvious positive quality transfer effect on service integration module(SIM) and CEM, SIM also has positive quality relationship with CEM. And in the whole, the interaction effect between PSM and SPM is the most obvious. This study contributes a new perspective which will help the service-oriented manufacturing enterprise to better understand the quality influence and the function relationship among the different value quality in a SMN, and find out its advantages and disadvantages to improve competitiveness.
本研究的目的是研究服务型制造网络(SMN)中生产服务模块(PSM)、服务生产模块(SPM)和顾客效应模块(CEM)三者之间的质量关系。根据本文提出的结构方程模型(SEM),探讨了各模块之间的关系。SEM的实证数据来源于中国一家服务型制造企业。PSM和SPM对质量均有显著的交互作用,PSM和SPM对服务集成模块(SIM)和CEM有显著的正向质量转移效应,SIM与CEM也有正向质量关系。从整体上看,PSM和SPM的相互作用效应最为明显。本研究提供了一个新的视角,有助于服务型制造企业更好地了解SMN中不同价值质量之间的质量影响和作用关系,找出其优缺点,从而提高竞争力。
{"title":"The Modular Quality Transfer Effect of Service-oriented Manufacturing Network","authors":"Liangqing Feng, Yu Yin, Kunkun Zeng","doi":"10.1145/3209914.3209920","DOIUrl":"https://doi.org/10.1145/3209914.3209920","url":null,"abstract":"The goal of this study is to research the relations on quality among the productive service module(PSM), service production module (SPM)and customer effect module(CEM) in service-oriented manufacturing network(SMN). The relationships among the modules are explored according to a structural equation model (SEM) put forward by this paper. The empirical data of the SEM were collected from a service-oriented manufacturing enterprise in China. PSM and SPM both have obvious interaction on quality, PSM and SPM have obvious positive quality transfer effect on service integration module(SIM) and CEM, SIM also has positive quality relationship with CEM. And in the whole, the interaction effect between PSM and SPM is the most obvious. This study contributes a new perspective which will help the service-oriented manufacturing enterprise to better understand the quality influence and the function relationship among the different value quality in a SMN, and find out its advantages and disadvantages to improve competitiveness.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126320282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Extended Virtual Network Functions Manager Architecture to Support Container 支持容器的扩展虚拟网络功能管理器体系结构
C. Hoang, N. Dinh, Younghan Kim
Network function virtualization (NFV) is a network architecture concept that decouples network functions from hardware. With NFV, virtual network functions (VNFs) can easily be instantiated and deployed on standard servers using virtual machines (VMs). To facilitate VNFs' deployment and management, Tacker is developed as a NFV manager (NFVM) and orchestrator (NFVO) in OpenStack environments. Recently, container is proposed as a promising virtualization technology for deploying and running distributed applications without launching an entire VM for each application, which helps increase cloud agility and accelerate the deployments of cloud technologies and VNFs. Unfortunately, the current VNF manager and orchestrator, Tacker, do not support container-based VNFs, thus introduces limitations to integrate container-based VNFs to the current NFV infrastructure (NFVI). In this paper, we design an extended Tacker architecture to support managing and orchestrating container-based VNFs. The Kubernetes cluster is integrated to support launching container-based VNFs and provide high availability for VNFs. Through test-bed results, we show the advantages of container-based VNFs using our architecture compared to VM-based VNFs in terms of instantiation time in Tacker.
网络功能虚拟化(NFV)是一种将网络功能与硬件分离的网络架构概念。通过NFV,可以使用虚拟机(vm)在标准服务器上轻松地实例化和部署虚拟网络功能(VNFs)。为了方便VNFs的部署和管理,在OpenStack环境中,作为NFV管理器(NFVM)和编排器(NFVO)开发了Tacker。最近,容器被提出作为一种很有前途的虚拟化技术,用于部署和运行分布式应用程序,而无需为每个应用程序启动整个VM,这有助于提高云敏捷性并加速云技术和vnf的部署。不幸的是,当前的VNF管理器和编排器Tacker不支持基于容器的VNFs,因此在将基于容器的VNFs集成到当前的NFV基础设施(NFVI)时引入了一些限制。在本文中,我们设计了一个扩展的Tacker架构来支持管理和编排基于容器的VNFs。集成了Kubernetes集群以支持启动基于容器的VNFs,并为VNFs提供高可用性。通过测试平台的结果,我们展示了使用我们的体系结构的基于容器的VNFs与基于vm的VNFs在tack中的实例化时间方面的优势。
{"title":"An Extended Virtual Network Functions Manager Architecture to Support Container","authors":"C. Hoang, N. Dinh, Younghan Kim","doi":"10.1145/3209914.3209934","DOIUrl":"https://doi.org/10.1145/3209914.3209934","url":null,"abstract":"Network function virtualization (NFV) is a network architecture concept that decouples network functions from hardware. With NFV, virtual network functions (VNFs) can easily be instantiated and deployed on standard servers using virtual machines (VMs). To facilitate VNFs' deployment and management, Tacker is developed as a NFV manager (NFVM) and orchestrator (NFVO) in OpenStack environments. Recently, container is proposed as a promising virtualization technology for deploying and running distributed applications without launching an entire VM for each application, which helps increase cloud agility and accelerate the deployments of cloud technologies and VNFs. Unfortunately, the current VNF manager and orchestrator, Tacker, do not support container-based VNFs, thus introduces limitations to integrate container-based VNFs to the current NFV infrastructure (NFVI). In this paper, we design an extended Tacker architecture to support managing and orchestrating container-based VNFs. The Kubernetes cluster is integrated to support launching container-based VNFs and provide high availability for VNFs. Through test-bed results, we show the advantages of container-based VNFs using our architecture compared to VM-based VNFs in terms of instantiation time in Tacker.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126579508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Network Traffic Detection Based on Histogram and Self-similarity Matrix 基于直方图和自相似矩阵的网络流量检测
Penglin Yang, Limin Tao, Haitao Wang
This paper introduces a new network traffic detection method to detect network malicious traffic in different network architectures. In most network traffic data sets, training data and testing data have the same network architecture and traffic features, like the same IP address distribution, the same IP port utilization, etc. But in real network detection, feature differences between training data sets and target network cannot be ignored. In this paper, we use histogram and self-similarity matrix to express these feature differences and keep the traffic features in use at the same time.This method could learn from anomaly network samples and detect real network traffic with feature drift, zoom, and other variants.
本文介绍了一种新的网络流量检测方法,用于检测不同网络架构下的网络恶意流量。在大多数网络流量数据集中,训练数据和测试数据具有相同的网络架构和流量特征,如相同的IP地址分布,相同的IP端口利用率等。但在实际的网络检测中,训练数据集与目标网络之间的特征差异是不可忽视的。在本文中,我们使用直方图和自相似矩阵来表达这些特征的差异,同时保持使用的交通特征。该方法可以从异常网络样本中学习,检测具有漂移、变焦等特征的真实网络流量。
{"title":"Network Traffic Detection Based on Histogram and Self-similarity Matrix","authors":"Penglin Yang, Limin Tao, Haitao Wang","doi":"10.1145/3209914.3236336","DOIUrl":"https://doi.org/10.1145/3209914.3236336","url":null,"abstract":"This paper introduces a new network traffic detection method to detect network malicious traffic in different network architectures. In most network traffic data sets, training data and testing data have the same network architecture and traffic features, like the same IP address distribution, the same IP port utilization, etc. But in real network detection, feature differences between training data sets and target network cannot be ignored. In this paper, we use histogram and self-similarity matrix to express these feature differences and keep the traffic features in use at the same time.This method could learn from anomaly network samples and detect real network traffic with feature drift, zoom, and other variants.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125991115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Long-Range Traversability Awareness and Low-Lying Obstacle Negotiation with RealSense for the Visually Impaired 视障人士的远距离穿越意识与低洼障碍物协商
Kailun Yang, Kaiwei Wang, Shufei Lin, J. Bai, L. Bergasa, R. Arroyo
The application of RGB-D sensors provides a revolutionary force in the research field of computer vision, where traversable area detection and obstacle avoidance are the fundamental topics to aid visually impaired people. However, the detection using RGB-D sensors is limited by the sparse depth map and the narrow field of view, which hampers longer traversability awareness and lower obstacle negotiation. This paper proposes an effective approach to combine a pair of wearable smart glasses and a waist-worn pathfinder to assist the visually impaired. Traversable lines are generated to feedback the visually impaired through real-time stereo sound after real-world coordinates adjustment with a RealSense R200 (RGB-D sensor) and an IMU integrated in the pair of smart glasses. Low-lying obstacles are detected by using another RGB-D sensor of RealSense, the RS410, as the waist-worn pathfinder to provide early warning. Indoor and outdoor detection results as well as a field test demonstrate the usefulness and effectiveness of our approach.
RGB-D传感器的应用为计算机视觉领域的研究提供了革命性的力量,而可穿越区域的检测和避障是辅助视障人士的基础课题。然而,RGB-D传感器的检测受到深度图稀疏和视场狭窄的限制,阻碍了较长的可穿越性感知和较低的障碍物通过。本文提出了一种有效的方法,将一副可穿戴智能眼镜和一种腰戴式探路者结合起来,帮助视障人士。通过RealSense R200 (RGB-D传感器)和集成在智能眼镜中的IMU对真实世界的坐标进行调整后,生成可穿越的线条,通过实时立体声反馈视障人士。使用RealSense的另一款RGB-D传感器RS410检测低洼障碍物,作为腰戴式探路者,提供早期预警。室内和室外的检测结果以及现场测试证明了我们的方法的实用性和有效性。
{"title":"Long-Range Traversability Awareness and Low-Lying Obstacle Negotiation with RealSense for the Visually Impaired","authors":"Kailun Yang, Kaiwei Wang, Shufei Lin, J. Bai, L. Bergasa, R. Arroyo","doi":"10.1145/3209914.3209943","DOIUrl":"https://doi.org/10.1145/3209914.3209943","url":null,"abstract":"The application of RGB-D sensors provides a revolutionary force in the research field of computer vision, where traversable area detection and obstacle avoidance are the fundamental topics to aid visually impaired people. However, the detection using RGB-D sensors is limited by the sparse depth map and the narrow field of view, which hampers longer traversability awareness and lower obstacle negotiation. This paper proposes an effective approach to combine a pair of wearable smart glasses and a waist-worn pathfinder to assist the visually impaired. Traversable lines are generated to feedback the visually impaired through real-time stereo sound after real-world coordinates adjustment with a RealSense R200 (RGB-D sensor) and an IMU integrated in the pair of smart glasses. Low-lying obstacles are detected by using another RGB-D sensor of RealSense, the RS410, as the waist-worn pathfinder to provide early warning. Indoor and outdoor detection results as well as a field test demonstrate the usefulness and effectiveness of our approach.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126250463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
New Location Recommendation Technique on Social Network 基于社交网络的新位置推荐技术
Sutarat Choenaksorn, Saranya Maneeroj
With the availability of current modern technologies, decisions making in an everyday life can be assist in many different ways. Many researches in the past decade has studied about recommendation systems. Recommendation systems can base on different variables with location-based services is one of the more interesting factor to a recommendation system. Recommendations on Location based Network is a service for assisting people to locate locations of their interests. A large number of recorded checked-in histories was gathered to make the prediction according to the desired preferences of each user. Furthermore, determinations have shown a social relationship leading to availability of information will assist in making better recommendations based on the locations. Recently, the recommendation system on location-based domain usually combines either content-based technique and collaborative technique, or collaborative technique and social-based techniques. It is difficult to find the way to combine those three techniques. So there is no research that combine those techniques on location-based recommendation system. This study proposes a new method that combines content-based technique, collaborative technique, and social-based techniques; to produce more efficient result results than location-based RS methods. The evaluation results show that the proposed method provide higher accuracy and coverage than two current location methods by measuring with the Normalized Discounted Cumulative Gain (NDCG) and coverage matrix.
随着当前现代技术的可用性,日常生活中的决策可以通过许多不同的方式得到帮助。在过去的十年里,许多研究都是关于推荐系统的。推荐系统可以基于不同的变量,基于位置的服务是推荐系统更有趣的因素之一。基于位置的网络推荐是一项帮助人们定位他们感兴趣的位置的服务。收集了大量记录的签入历史,以便根据每个用户的期望偏好进行预测。此外,所作的决定表明一种社会关系导致资料的可得性,这将有助于根据地点提出更好的建议。目前,基于位置领域的推荐系统通常是将基于内容的推荐技术与协作技术相结合,或者将协作技术与基于社交的推荐技术相结合。很难找到将这三种技术结合起来的方法。因此,目前还没有研究将这些技术结合到基于位置的推荐系统中。本研究提出了一种结合基于内容的技术、协作技术和基于社会的技术的新方法;产生比基于位置的RS方法更有效的结果。通过对归一化贴现累积增益(NDCG)和覆盖矩阵的测量,评价结果表明,该方法比现有的两种定位方法具有更高的精度和覆盖范围。
{"title":"New Location Recommendation Technique on Social Network","authors":"Sutarat Choenaksorn, Saranya Maneeroj","doi":"10.1145/3209914.3209933","DOIUrl":"https://doi.org/10.1145/3209914.3209933","url":null,"abstract":"With the availability of current modern technologies, decisions making in an everyday life can be assist in many different ways. Many researches in the past decade has studied about recommendation systems. Recommendation systems can base on different variables with location-based services is one of the more interesting factor to a recommendation system. Recommendations on Location based Network is a service for assisting people to locate locations of their interests. A large number of recorded checked-in histories was gathered to make the prediction according to the desired preferences of each user. Furthermore, determinations have shown a social relationship leading to availability of information will assist in making better recommendations based on the locations. Recently, the recommendation system on location-based domain usually combines either content-based technique and collaborative technique, or collaborative technique and social-based techniques. It is difficult to find the way to combine those three techniques. So there is no research that combine those techniques on location-based recommendation system. This study proposes a new method that combines content-based technique, collaborative technique, and social-based techniques; to produce more efficient result results than location-based RS methods. The evaluation results show that the proposed method provide higher accuracy and coverage than two current location methods by measuring with the Normalized Discounted Cumulative Gain (NDCG) and coverage matrix.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127510673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Parallel Dynamic Encryption Transmission Algorithm on VoIP 基于VoIP的并行动态加密传输算法研究
Aidong Fang, Zhiwei Zhang
Aiming to the current lack of VoIP voice encryption, a dynamic encryption method on grouping voice encryption and parallel encrypted is proposed in this paper. Though dynamic selection of encryption algorithms and dynamic distribution of key to increase the complexity of the encryption, at the same time reduce the time complexity of asymmetric encryption algorithm by using parallel encryption to ensure the real-time of the voice and improve call security.
针对目前VoIP语音加密的不足,提出了一种分组语音加密并行加密的动态加密方法。通过动态选择加密算法和动态分发密钥来增加加密的复杂度,同时通过采用并行加密来降低非对称加密算法的时间复杂度,保证语音的实时性,提高通话安全性。
{"title":"Research on Parallel Dynamic Encryption Transmission Algorithm on VoIP","authors":"Aidong Fang, Zhiwei Zhang","doi":"10.1145/3209914.3226169","DOIUrl":"https://doi.org/10.1145/3209914.3226169","url":null,"abstract":"Aiming to the current lack of VoIP voice encryption, a dynamic encryption method on grouping voice encryption and parallel encrypted is proposed in this paper. Though dynamic selection of encryption algorithms and dynamic distribution of key to increase the complexity of the encryption, at the same time reduce the time complexity of asymmetric encryption algorithm by using parallel encryption to ensure the real-time of the voice and improve call security.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128782968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BlockSight: A Mobile Image Encryption Using Advanced Encryption Standard and Least Significant Bit Algorithm BlockSight:一种使用高级加密标准和最低有效位算法的移动图像加密
Reynaldo E. Castillo, G. Cayabyab, Paula Jean M. Castro, M. Aton
In this paper, we developed a new mobile application designed to protect your images stored on your mobile phone using Advanced Encryption Standard algorithm to secure images by encrypting it and Least Significant Bit algorithm to process the encrypted image and embed it into another image. To achieve high level of encryption, a 256 bit length key of Advance Encryption Standard is used to maximize protection and Diffie-Hellman algorithm to secure the processed key to both parties without interference from outside. In steganography, the encrypted image will be invisible into the cover image in which potential hackers do not have any idea about the original image embedded inside of the cover image, and with this even if the hacker got the image it will still need the correct key to decrypt it or else the image will be deleted The study used Rapid Application Development Model as the project development methodology, which allows the preceding phase to iterate until the application is refined, requirements are gathered and allows early testing of the prototypes during every iteration to reduce the risk of any major issues in the final deployment of the application. With the use of ISO/IEC/IEEE 29119 Testing Standards, the application was evaluated in terms of its security, usability and reliability. Based on the evaluation results, the application satisfied the respondents and possible users with an overall mean rating 4.17 or acceptable.
在本文中,我们开发了一个新的移动应用程序,旨在保护您的图像存储在您的手机使用先进的加密标准算法来保护图像,通过加密和最低有效位算法来处理加密图像并将其嵌入到另一个图像。为了实现高水平的加密,采用高级加密标准的256位密钥来最大限度地保护和Diffie-Hellman算法来确保处理后的密钥对双方都不受外界干扰。在速记式加密,加密后的图像将被看不见的潜在黑客的封面图片不知道原始图像嵌入的封面图片,和这即使黑客得到图像仍然需要正确的密钥才能解密,否则将被删除的图片研究使用快速应用程序开发模型随着项目的开发方法,它允许前阶段进行迭代,直到应用程序精制,收集需求,并允许在每次迭代期间对原型进行早期测试,以减少应用程序最终部署中出现任何主要问题的风险。使用ISO/IEC/IEEE 29119测试标准,对应用程序的安全性,可用性和可靠性进行了评估。根据评估结果,该应用程序对受访者和潜在用户满意,总体平均评分为4.17或可接受。
{"title":"BlockSight: A Mobile Image Encryption Using Advanced Encryption Standard and Least Significant Bit Algorithm","authors":"Reynaldo E. Castillo, G. Cayabyab, Paula Jean M. Castro, M. Aton","doi":"10.1145/3209914.3209922","DOIUrl":"https://doi.org/10.1145/3209914.3209922","url":null,"abstract":"In this paper, we developed a new mobile application designed to protect your images stored on your mobile phone using Advanced Encryption Standard algorithm to secure images by encrypting it and Least Significant Bit algorithm to process the encrypted image and embed it into another image. To achieve high level of encryption, a 256 bit length key of Advance Encryption Standard is used to maximize protection and Diffie-Hellman algorithm to secure the processed key to both parties without interference from outside. In steganography, the encrypted image will be invisible into the cover image in which potential hackers do not have any idea about the original image embedded inside of the cover image, and with this even if the hacker got the image it will still need the correct key to decrypt it or else the image will be deleted The study used Rapid Application Development Model as the project development methodology, which allows the preceding phase to iterate until the application is refined, requirements are gathered and allows early testing of the prototypes during every iteration to reduce the risk of any major issues in the final deployment of the application. With the use of ISO/IEC/IEEE 29119 Testing Standards, the application was evaluated in terms of its security, usability and reliability. Based on the evaluation results, the application satisfied the respondents and possible users with an overall mean rating 4.17 or acceptable.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130607124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
Proceedings of the 1st International Conference on Information Science and Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1