首页 > 最新文献

Proceedings of the 1st International Conference on Information Science and Systems最新文献

英文 中文
Metamodel for The Development of Geometrical Modelling Languages 几何建模语言发展的元模型
V. Mezhuyev, V. Lavrik, R. Samikannu, Y. Gunchenko
Paper discusses a potential of the metamodelling technology to improve computer-based methods of geometrical modelling. The meta-metamodel for the development of the geometrical modelling languages is proposed. It is defined as a formal system, which consists of geometrical metatypes, grammar and operations. The grammar rules are expressed as logical formulas, setting constraints on the geometric structure of a model. Paper proposes an additional system of relations for constructing the grammatical rules of geometrical languages. It is shown that use of the metamodeling makes the process of a geometrical design more effective.
本文讨论了元建模技术在改进基于计算机的几何建模方法方面的潜力。提出了几何建模语言发展的元模型。它被定义为一个由几何元类型、语法和运算组成的形式系统。语法规则表示为逻辑公式,对模型的几何结构设置约束。本文提出了构建几何语言语法规则的附加关系体系。结果表明,元模型的使用使几何设计过程更加有效。
{"title":"Metamodel for The Development of Geometrical Modelling Languages","authors":"V. Mezhuyev, V. Lavrik, R. Samikannu, Y. Gunchenko","doi":"10.1145/3209914.3209926","DOIUrl":"https://doi.org/10.1145/3209914.3209926","url":null,"abstract":"Paper discusses a potential of the metamodelling technology to improve computer-based methods of geometrical modelling. The meta-metamodel for the development of the geometrical modelling languages is proposed. It is defined as a formal system, which consists of geometrical metatypes, grammar and operations. The grammar rules are expressed as logical formulas, setting constraints on the geometric structure of a model. Paper proposes an additional system of relations for constructing the grammatical rules of geometrical languages. It is shown that use of the metamodeling makes the process of a geometrical design more effective.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123665577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Learning Convolutional Neural Network Using Data from Other Domains in case of Insufficient Data 在数据不足的情况下,利用其他领域的数据学习卷积神经网络
Jeonghyo Ha, Jung Eun, Pyunghwan Ahn, Dong-Hoon Shin, Junmo Kim
In this paper, we describe a training methodology of convolutional neural networks(CNNs) using data from a different domain when the number of training data in the test domain is small. Training a CNN for classification without enough data might lead to serious problems of overfitting and thus fail to generalize. In this case, if large data of the same object categories is available in another domain, this problem can be alleviated. We propose a method to train a CNN with small data in the test domain and large data in another. Since training a single network using data from different domains could lead to performance degradation, we consider this problem as cross-domain image similarity learning. In our experiment, we train a Siamese network to compute similarity between a pair of images from different domains, which are natural photos and 3D model projections. We design the network to output the probability that the input image pair belongs to the same category. Thus, the network can calculate similarity between the input pair and also classify a natural photo by comparing it with each images in the 3D model database. Since the network output represents similarity, we can greatly reduce testing time for classification compared to other methods (such as NN classification) in which distances between feature vectors must be calculated for every pair of images.
在本文中,我们描述了一种卷积神经网络(cnn)的训练方法,当测试域中的训练数据数量很少时,使用来自不同域的数据。在没有足够数据的情况下训练CNN进行分类可能会导致严重的过拟合问题,从而无法泛化。在这种情况下,如果在另一个域中存在相同对象类别的大数据,则可以缓解此问题。我们提出了一种在测试域中使用小数据而在另一个域中使用大数据训练CNN的方法。由于使用来自不同领域的数据训练单个网络可能导致性能下降,因此我们将此问题视为跨领域图像相似性学习。在我们的实验中,我们训练了一个Siamese网络来计算来自不同领域的一对图像之间的相似性,这些图像是自然照片和3D模型投影。我们设计网络来输出输入图像对属于同一类别的概率。因此,该网络可以计算输入对之间的相似度,并通过将自然照片与3D模型数据库中的每张图像进行比较来对其进行分类。由于网络输出表示相似性,与其他必须为每对图像计算特征向量之间距离的方法(如NN分类)相比,我们可以大大减少分类的测试时间。
{"title":"Learning Convolutional Neural Network Using Data from Other Domains in case of Insufficient Data","authors":"Jeonghyo Ha, Jung Eun, Pyunghwan Ahn, Dong-Hoon Shin, Junmo Kim","doi":"10.1145/3209914.3209927","DOIUrl":"https://doi.org/10.1145/3209914.3209927","url":null,"abstract":"In this paper, we describe a training methodology of convolutional neural networks(CNNs) using data from a different domain when the number of training data in the test domain is small. Training a CNN for classification without enough data might lead to serious problems of overfitting and thus fail to generalize. In this case, if large data of the same object categories is available in another domain, this problem can be alleviated. We propose a method to train a CNN with small data in the test domain and large data in another. Since training a single network using data from different domains could lead to performance degradation, we consider this problem as cross-domain image similarity learning. In our experiment, we train a Siamese network to compute similarity between a pair of images from different domains, which are natural photos and 3D model projections. We design the network to output the probability that the input image pair belongs to the same category. Thus, the network can calculate similarity between the input pair and also classify a natural photo by comparing it with each images in the 3D model database. Since the network output represents similarity, we can greatly reduce testing time for classification compared to other methods (such as NN classification) in which distances between feature vectors must be calculated for every pair of images.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126456896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Network-based VM Migration Architecture in Edge Computing 边缘计算中基于网络的虚拟机迁移架构
Kyoungjae Sun, Younghan Kim
In this paper, we consider network-based VM migration in the Edge Computing environment, which provides minimized downtime and user processing load. The architecture and interfaces for network-based VM migration in an edge computing environment are defined based on 3-tiered network architecture to support various VM migration scenarios depending on network capability and stateful application. We classify the possible migration scenarios in the edge computing architecture and design the functional blocks required for the edge devices to support them.
在本文中,我们考虑在边缘计算环境中基于网络的虚拟机迁移,这提供了最小的停机时间和用户处理负载。边缘计算环境下基于网络迁移虚拟机的架构和接口是基于三层网络架构定义的,可以根据网络能力和状态应用的不同,支持多种虚拟机迁移场景。我们对边缘计算架构中可能的迁移场景进行了分类,并设计了边缘设备支持它们所需的功能块。
{"title":"Network-based VM Migration Architecture in Edge Computing","authors":"Kyoungjae Sun, Younghan Kim","doi":"10.1145/3209914.3209930","DOIUrl":"https://doi.org/10.1145/3209914.3209930","url":null,"abstract":"In this paper, we consider network-based VM migration in the Edge Computing environment, which provides minimized downtime and user processing load. The architecture and interfaces for network-based VM migration in an edge computing environment are defined based on 3-tiered network architecture to support various VM migration scenarios depending on network capability and stateful application. We classify the possible migration scenarios in the edge computing architecture and design the functional blocks required for the edge devices to support them.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131037308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Predicting Basketball Results Using Cascading Algorithm 用级联算法预测篮球比赛结果
Jasmin A. Caliwag, M. C. Aragon, Reynaldo E. Castillo, Ellizer Mikko S. Colantes
Anybody can guess the winners of a basket game. The question is how big the chances are in predicting the real winners. Relying only on the experts' experiences and intuition could not discover all the value and potential of the collected data. Driven by the increasing comprehensive data in sports datasets and data mining technique successfully used in different areas, sports data mining technique emerges and enables us to find hidden knowledge to impact the sports industry. A more scientific approach is needed to use for these data that are collected. Some predictors based only on winning records and some based only on statistical records of both teams. There are also predictors which use both types of data, but the accuracy of applying different individual algorithms is only ranging about 60% - 70%. To achieve better prediction rates and deal with that complexity, a lot of machine learning methods have been implemented over these data. This paper presents an improved technique for predicting basketball game results implementing cascading algorithm. The researchers combined Naive Bayes, Four Factor Analysis, and Fuzzy Logic Algorithms to predict basketball game result in an acceptable level of 69% - 70% accuracy. The researchers tested several times using data sets from NBA game Season 2015-2016, and the cascading algorithm result manages to reach 70% prediction accuracy. The result of this system can be used to assist basketball coaches in making plans for possible team developments. Also, the forecasted results can serve as an aid in building effective gameplay.
任何人都能猜出篮球赛的赢家。问题是预测真正赢家的机会有多大。仅仅依靠专家的经验和直觉并不能发现所收集数据的全部价值和潜力。随着体育数据集中的数据越来越全面,以及数据挖掘技术在不同领域的成功应用,体育数据挖掘技术应运而生,并使我们能够发现隐藏的知识来影响体育产业。需要对收集到的这些数据采用更科学的方法。有些预测仅基于获胜记录,有些仅基于两支球队的统计记录。也有使用两种类型数据的预测器,但应用不同的单个算法的准确性仅在60% - 70%之间。为了获得更好的预测率并处理这种复杂性,在这些数据上实现了许多机器学习方法。本文提出了一种基于级联算法的篮球比赛结果预测改进技术。研究人员结合朴素贝叶斯、四因素分析和模糊逻辑算法来预测篮球比赛结果,准确率达到69% - 70%的可接受水平。研究人员使用2015-2016赛季NBA比赛的数据集进行了多次测试,级联算法的结果达到了70%的预测准确率。该系统的结果可以用来帮助篮球教练制定可能的球队发展计划。此外,预测结果还可以帮助我们构建有效的游戏玩法。
{"title":"Predicting Basketball Results Using Cascading Algorithm","authors":"Jasmin A. Caliwag, M. C. Aragon, Reynaldo E. Castillo, Ellizer Mikko S. Colantes","doi":"10.1145/3209914.3209921","DOIUrl":"https://doi.org/10.1145/3209914.3209921","url":null,"abstract":"Anybody can guess the winners of a basket game. The question is how big the chances are in predicting the real winners. Relying only on the experts' experiences and intuition could not discover all the value and potential of the collected data. Driven by the increasing comprehensive data in sports datasets and data mining technique successfully used in different areas, sports data mining technique emerges and enables us to find hidden knowledge to impact the sports industry. A more scientific approach is needed to use for these data that are collected. Some predictors based only on winning records and some based only on statistical records of both teams. There are also predictors which use both types of data, but the accuracy of applying different individual algorithms is only ranging about 60% - 70%. To achieve better prediction rates and deal with that complexity, a lot of machine learning methods have been implemented over these data. This paper presents an improved technique for predicting basketball game results implementing cascading algorithm. The researchers combined Naive Bayes, Four Factor Analysis, and Fuzzy Logic Algorithms to predict basketball game result in an acceptable level of 69% - 70% accuracy. The researchers tested several times using data sets from NBA game Season 2015-2016, and the cascading algorithm result manages to reach 70% prediction accuracy. The result of this system can be used to assist basketball coaches in making plans for possible team developments. Also, the forecasted results can serve as an aid in building effective gameplay.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122393562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Research on Key Data Structure Localization Technology of Buffer Overflow Vulnerability 缓冲区溢出漏洞关键数据结构定位技术研究
Hui Guo, Shuguang Huang, Zulie Pan, Jianliang Hu, Minghong Hu
Buffer overflow vulnerability is one of the most common and harmful vulnerabilities in computer software. This paper analyzed and summarized the general method and process of testing buffer overflow vulnerability in software. And the key data structure localization technology in software buffer overflow vulnerability was also studied in this paper. By constructing special filling data and designing location algorithm, this paper presented a new localization technology based on block localization. The technology can locate key data structure address of buffer overflow vulnerability fleetly and exactly. It can effectively assist testing buffer overflow vulnerabilities in software security.
缓冲区溢出漏洞是计算机软件中最常见、危害最大的漏洞之一。分析和总结了软件中缓冲区溢出漏洞测试的一般方法和过程。并对软件缓冲区溢出漏洞中的关键数据结构定位技术进行了研究。通过构造特殊填充数据和设计定位算法,提出了一种基于块定位的定位技术。该技术可以快速准确地定位缓冲区溢出漏洞的关键数据结构地址。它可以有效地辅助软件安全中缓冲区溢出漏洞的测试。
{"title":"Research on Key Data Structure Localization Technology of Buffer Overflow Vulnerability","authors":"Hui Guo, Shuguang Huang, Zulie Pan, Jianliang Hu, Minghong Hu","doi":"10.1145/3209914.3226150","DOIUrl":"https://doi.org/10.1145/3209914.3226150","url":null,"abstract":"Buffer overflow vulnerability is one of the most common and harmful vulnerabilities in computer software. This paper analyzed and summarized the general method and process of testing buffer overflow vulnerability in software. And the key data structure localization technology in software buffer overflow vulnerability was also studied in this paper. By constructing special filling data and designing location algorithm, this paper presented a new localization technology based on block localization. The technology can locate key data structure address of buffer overflow vulnerability fleetly and exactly. It can effectively assist testing buffer overflow vulnerabilities in software security.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129877774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-target Tracking Based on Motion Estimation and RJ-MCMC Particle Filter 基于运动估计和RJ-MCMC粒子滤波的多目标跟踪
Zhiqian Weng, J. Yang, Qingnian Zhang, Zhiqiang Guo
Aiming at the problems of multi-target tracking, such as occlusion between target and background, similarity of features and random change of the target number, this paper designs a multi-target tracking system which can be used in complex environment. In this thesis, the constraints of scene is added to the target detection algorithm based on the hybrid multiscale deformable model to improve the efficiency. At the same time, the global motion parameter is obtained by using the dual absolute conic constraint. The obtained parameters are used to modify the motion model of target tracking. Then based on the basic particle filter, MCMC (Markov Chain Monte Carlo) improvement strategy and reversibility-jump mechanism (RJ) are added to reduce the computational complexity and solve the stochastic change of target number. Finally, verify the validity of the tracking algorithm in the thesis.
针对多目标跟踪中存在的目标与背景遮挡、特征相似、目标数量随机变化等问题,设计了一种适用于复杂环境的多目标跟踪系统。本文在基于混合多尺度变形模型的目标检测算法中加入了场景约束,提高了算法的效率。同时,利用对偶绝对二次约束得到了整体运动参数。得到的参数用于修改目标跟踪的运动模型。然后在基本粒子滤波的基础上,加入MCMC (Markov Chain Monte Carlo)改进策略和可逆性跳跃机制(reversible -jump mechanism, RJ)来降低计算复杂度,解决目标数的随机变化问题。最后,验证了本文跟踪算法的有效性。
{"title":"Multi-target Tracking Based on Motion Estimation and RJ-MCMC Particle Filter","authors":"Zhiqian Weng, J. Yang, Qingnian Zhang, Zhiqiang Guo","doi":"10.1145/3209914.3209949","DOIUrl":"https://doi.org/10.1145/3209914.3209949","url":null,"abstract":"Aiming at the problems of multi-target tracking, such as occlusion between target and background, similarity of features and random change of the target number, this paper designs a multi-target tracking system which can be used in complex environment. In this thesis, the constraints of scene is added to the target detection algorithm based on the hybrid multiscale deformable model to improve the efficiency. At the same time, the global motion parameter is obtained by using the dual absolute conic constraint. The obtained parameters are used to modify the motion model of target tracking. Then based on the basic particle filter, MCMC (Markov Chain Monte Carlo) improvement strategy and reversibility-jump mechanism (RJ) are added to reduce the computational complexity and solve the stochastic change of target number. Finally, verify the validity of the tracking algorithm in the thesis.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122701221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study on the Application of Cloud Computing Platform in Hospital Information Construction 云计算平台在医院信息化建设中的应用研究
Cheng-Yao Chang, Y. Zhu
With the rapid development of information technology, information and digitalization have entered almost every walk of life, therefore, modern hospital information construction needs to combine various new technologies to improve hospital medical quality, work efficiency and management level. At the same time, the hospital data is becoming more and more intensive and the processing is becoming more and more laborious, so, we need to find new ways to solve those problems. This made the cloud computing which can collect and process large amounts of resources appear in hospital information construction. Based on the author's learning and practical experience, this paper first summarized the related theories of cloud computing, and then analyzed the importance of cloud computing in the process of hospital information, finally put forward some strategies to apply cloud computing technology in hospital information construction.
随着信息技术的飞速发展,信息化、数字化几乎已经进入了各行各业,因此,现代医院信息化建设需要结合各种新技术来提高医院的医疗质量、工作效率和管理水平。同时,医院的数据越来越密集,处理起来也越来越费力,因此,我们需要寻找新的方法来解决这些问题。这使得能够收集和处理大量资源的云计算出现在医院信息化建设中。本文根据笔者的学习和实践经验,首先总结了云计算的相关理论,然后分析了云计算在医院信息化过程中的重要性,最后提出了云计算技术在医院信息化建设中的应用策略。
{"title":"A Study on the Application of Cloud Computing Platform in Hospital Information Construction","authors":"Cheng-Yao Chang, Y. Zhu","doi":"10.1145/3209914.3234642","DOIUrl":"https://doi.org/10.1145/3209914.3234642","url":null,"abstract":"With the rapid development of information technology, information and digitalization have entered almost every walk of life, therefore, modern hospital information construction needs to combine various new technologies to improve hospital medical quality, work efficiency and management level. At the same time, the hospital data is becoming more and more intensive and the processing is becoming more and more laborious, so, we need to find new ways to solve those problems. This made the cloud computing which can collect and process large amounts of resources appear in hospital information construction. Based on the author's learning and practical experience, this paper first summarized the related theories of cloud computing, and then analyzed the importance of cloud computing in the process of hospital information, finally put forward some strategies to apply cloud computing technology in hospital information construction.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"397 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123252498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review on Iris Recognition in Non-Cooperative Environment 非合作环境下虹膜识别研究进展
Nurul Amirah Mashudi, Md. Jan Nordin
Nowadays, researcher is focus in developing reliable iris recognition systems for non-cooperative situations. The demand for iris recognition is increasing due to its reliability, accuracy and uniqueness. There are major factors involved in unconstrained environment such as obstruction by eyelids, eyelashes, glass frames, hair, off-angle, presence of contact lenses, poor illumination, motion blur, lighting and specular reflections, partially eye image, etc. The performance of the iris will be deteriorated and this results in lower recognition rate. In this paper, an overview of iris recognition for noisy imaging environments is presented included various related databases for iris recognition systems.
目前,开发可靠的非合作情况下虹膜识别系统已成为研究热点。由于虹膜识别的可靠性、准确性和唯一性,对虹膜识别的需求越来越大。在不受约束的环境中,主要因素包括眼睑、睫毛、镜框、头发、角度偏离、隐形眼镜、光照不足、运动模糊、灯光和镜面反射、部分眼睛图像等。虹膜的性能会下降,导致识别率降低。本文对噪声环境下的虹膜识别进行了综述,包括虹膜识别系统的各种相关数据库。
{"title":"A Review on Iris Recognition in Non-Cooperative Environment","authors":"Nurul Amirah Mashudi, Md. Jan Nordin","doi":"10.1145/3209914.3209925","DOIUrl":"https://doi.org/10.1145/3209914.3209925","url":null,"abstract":"Nowadays, researcher is focus in developing reliable iris recognition systems for non-cooperative situations. The demand for iris recognition is increasing due to its reliability, accuracy and uniqueness. There are major factors involved in unconstrained environment such as obstruction by eyelids, eyelashes, glass frames, hair, off-angle, presence of contact lenses, poor illumination, motion blur, lighting and specular reflections, partially eye image, etc. The performance of the iris will be deteriorated and this results in lower recognition rate. In this paper, an overview of iris recognition for noisy imaging environments is presented included various related databases for iris recognition systems.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130688928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Reuse of Public Data and Information Property and Building of Knowledge Society 公共数据与信息产权的再利用与知识社会的建设
X. Zhang, Deling Yang
This paper aims to gradually transform the network public data information into a new social public property and to build a future knowledge society through the development of semantic web. In the context that nowadays the network public data information is being transformed into the common property of the whole society, it is of great significance for to building a technical framework for the generation, publication, aggregation, dissemination and reuse of public data by means of the semantic web and data opening, which lays the digital ecological foundation for the economic development of future knowledge society. The core innovation of this research is building up the framework of public property management through public data reuse with semantic web and data opening as the technical basis by taking the data opening policy and measures in France as an example. Open data services enable collaborative innovation and "win-win" mode for public institutions, private enterprises and individuals, encourage young people to lead innovation management and development, and gradually transform the economic model of France and Europe from "scarcity" to "post-scarcity". Compared with previous researches, the innovative part of the paper is the study of the reuse of public data and information property of France, encouraging the role of "sharing" in promoting the "post-scarcity" economic model, and building the future development model of knowledge society for France and Europe. By studying the relevant policies and measures of public data reuse implemented by France and by analyzing the effect, this paper proves that the reuse of public data and information property plays an important role in the construction of knowledge society.
本文旨在通过语义网的发展,将网络公共数据信息逐步转化为一种新的社会公共财产,构建未来的知识社会。在网络公共数据信息正在向全社会共同财产转化的今天,通过语义网和数据开放,构建公共数据的生成、发布、聚合、传播和重用的技术框架,为未来知识社会的经济发展奠定数字生态基础,具有重要意义。本研究的核心创新点在于以语义网和数据开放为技术基础,通过公共数据复用构建公共物业管理框架,并以法国的数据开放政策和措施为例。开放数据服务实现了公共机构、民营企业和个人的协同创新和“共赢”模式,鼓励年轻人引领创新管理和发展,逐步将法国和欧洲的经济模式从“稀缺”转变为“后稀缺”。与以往的研究相比,本文的创新之处在于对法国公共数据和信息属性的再利用研究,鼓励“共享”在推动“后稀缺”经济模式中的作用,为法国和欧洲构建未来知识社会的发展模式。本文通过研究法国实施的公共数据重用的相关政策和措施,并对其效果进行分析,证明公共数据和信息财产的重用在知识社会建设中发挥着重要作用。
{"title":"Reuse of Public Data and Information Property and Building of Knowledge Society","authors":"X. Zhang, Deling Yang","doi":"10.1145/3209914.3226156","DOIUrl":"https://doi.org/10.1145/3209914.3226156","url":null,"abstract":"This paper aims to gradually transform the network public data information into a new social public property and to build a future knowledge society through the development of semantic web. In the context that nowadays the network public data information is being transformed into the common property of the whole society, it is of great significance for to building a technical framework for the generation, publication, aggregation, dissemination and reuse of public data by means of the semantic web and data opening, which lays the digital ecological foundation for the economic development of future knowledge society. The core innovation of this research is building up the framework of public property management through public data reuse with semantic web and data opening as the technical basis by taking the data opening policy and measures in France as an example. Open data services enable collaborative innovation and \"win-win\" mode for public institutions, private enterprises and individuals, encourage young people to lead innovation management and development, and gradually transform the economic model of France and Europe from \"scarcity\" to \"post-scarcity\". Compared with previous researches, the innovative part of the paper is the study of the reuse of public data and information property of France, encouraging the role of \"sharing\" in promoting the \"post-scarcity\" economic model, and building the future development model of knowledge society for France and Europe. By studying the relevant policies and measures of public data reuse implemented by France and by analyzing the effect, this paper proves that the reuse of public data and information property plays an important role in the construction of knowledge society.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126765299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and Device Control Method for Fog Computer using Blockchain 基于区块链的雾机安全与设备控制方法
Junhyeon Jeong, Bo Youn Kim, J. Jang
Fog computing has emerged due to the problem that it becomes difficult to store every data to the cloud system as the number of Internet of Things increases. In this fog computing, a vast amount of data generated from the Internet of Things is transmitted to the cloud system located at a remote place, and is processed by a fog computer such as a sensor or a router located nearby, so that only the necessary data is transmitted to the cloud system. However, the above-mentioned fog computer has some drawbacks like being shut down due to an attack by a malicious user in advance, and a method of processing when a fog computer is down or restored. In this paper we describe a fog computing with blockchain that enables fog computers to share transaction generated by processing transaction information of a device controlled by a blockchain method to a security and device control method of a fog computer utilizing the technology. Furthemore by using security properties of blockchain such as authentication, non-repudiation and data integrity, fog computing using blockchain has advantage of security comparing to previous Cloud and fog computing system using centralized database or P2P networks.
雾计算的出现是因为随着物联网数量的增加,很难将所有数据存储到云系统中。在这种雾计算中,物联网产生的大量数据被传输到位于远处的云系统中,并由位于附近的传感器或路由器等雾机进行处理,从而只将必要的数据传输到云系统中。但是,上述的雾机也有一些缺点,比如被恶意用户提前攻击而关闭,以及雾机宕机或恢复时的处理方法。在本文中,我们描述了一种基于区块链的雾计算,它使雾机能够利用该技术将处理由区块链方法控制的设备的交易信息生成的交易共享给雾机的安全和设备控制方法。此外,通过利用区块链的认证、不可否认性和数据完整性等安全属性,使用区块链的雾计算与以前使用集中式数据库或P2P网络的云和雾计算系统相比,具有安全性优势。
{"title":"Security and Device Control Method for Fog Computer using Blockchain","authors":"Junhyeon Jeong, Bo Youn Kim, J. Jang","doi":"10.1145/3209914.3209917","DOIUrl":"https://doi.org/10.1145/3209914.3209917","url":null,"abstract":"Fog computing has emerged due to the problem that it becomes difficult to store every data to the cloud system as the number of Internet of Things increases. In this fog computing, a vast amount of data generated from the Internet of Things is transmitted to the cloud system located at a remote place, and is processed by a fog computer such as a sensor or a router located nearby, so that only the necessary data is transmitted to the cloud system. However, the above-mentioned fog computer has some drawbacks like being shut down due to an attack by a malicious user in advance, and a method of processing when a fog computer is down or restored. In this paper we describe a fog computing with blockchain that enables fog computers to share transaction generated by processing transaction information of a device controlled by a blockchain method to a security and device control method of a fog computer utilizing the technology. Furthemore by using security properties of blockchain such as authentication, non-repudiation and data integrity, fog computing using blockchain has advantage of security comparing to previous Cloud and fog computing system using centralized database or P2P networks.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124759550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
Proceedings of the 1st International Conference on Information Science and Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1