首页 > 最新文献

World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering最新文献

英文 中文
Application Design to Release Stress 应用程序设计释放压力
M. Watanabe, T. Fujimoto
In this research, we design an application to release user’s daily stress. It is said that contemporary people are in a pretty stressful situation. For example, in recent years, we have suffered from difficulty to meet friends casually and enjoy talking with them to get rid of our daily stress due to the COVID-19 pandemic. In other words, the variation of ways of overcoming stress have been limited. In addition, people have deteriorated relationships with their family members because of the longer stay-at-home time than before. Health problems such as the onset of depression caused by the stress of the pandemic are also becoming more serious. Moreover, people are worrying of increasing the number of suicides. This situation is one of the problems that people consider it important in the society recently. Therefore, there is an urgent need to find solutions to such a situation. In this research, we develop the functions to cope with daily stress easily for the application of the smartphones that anyone has. We include functions in this application we suggest in this research. They are “vent mode”, which is a dynamic de-stressing method by words, “empathy mode”, which is a static de-stressing method, and “physical touch mode”, which is a dynamic de-stressing method that is accompanied with physical exercise. In addition, we design the application for de-stress in order to break through the stressful situation these days.
在本研究中,我们设计了一个应用程序来释放用户的日常压力。据说,现在的人们正处于一个相当紧张的境地。例如,近年来,由于新冠肺炎疫情,我们很难随意地与朋友见面,享受与他们交谈的乐趣,以摆脱日常的压力。换句话说,克服压力的方式的变化是有限的。此外,由于呆在家里的时间比以前长,人们与家人的关系也恶化了。由于大流行病的压力而引起的抑郁症等健康问题也变得越来越严重。此外,人们担心自杀人数的增加。这种情况是最近人们认为很重要的社会问题之一。因此,迫切需要找到解决这种情况的办法。在这项研究中,我们开发的功能,以应对日常压力的应用,任何人都有智能手机。我们在这个应用程序中包含了我们在本研究中建议的功能。“发泄模式”是一种动态的言语减压方式,“共情模式”是一种静态的减压方式,“身体接触模式”是一种伴随着身体锻炼的动态减压方式。此外,我们还设计了减压应用程序,以突破目前的压力状况。
{"title":"Application Design to Release Stress","authors":"M. Watanabe, T. Fujimoto","doi":"10.17706/ijcce.2022.11.1.1-9","DOIUrl":"https://doi.org/10.17706/ijcce.2022.11.1.1-9","url":null,"abstract":"In this research, we design an application to release user’s daily stress. It is said that contemporary people are in a pretty stressful situation. For example, in recent years, we have suffered from difficulty to meet friends casually and enjoy talking with them to get rid of our daily stress due to the COVID-19 pandemic. In other words, the variation of ways of overcoming stress have been limited. In addition, people have deteriorated relationships with their family members because of the longer stay-at-home time than before. Health problems such as the onset of depression caused by the stress of the pandemic are also becoming more serious. Moreover, people are worrying of increasing the number of suicides. This situation is one of the problems that people consider it important in the society recently. Therefore, there is an urgent need to find solutions to such a situation. In this research, we develop the functions to cope with daily stress easily for the application of the smartphones that anyone has. We include functions in this application we suggest in this research. They are “vent mode”, which is a dynamic de-stressing method by words, “empathy mode”, which is a static de-stressing method, and “physical touch mode”, which is a dynamic de-stressing method that is accompanied with physical exercise. In addition, we design the application for de-stress in order to break through the stressful situation these days.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76849269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Pruning Algorithm Based on Optimized Depth Neural Network 基于优化深度神经网络的剪枝算法综述
Qi Song, Xuanze Xia
: In recent years, deep neural network has continuously renewed its best performance in tasks such as computer vision and natural language processing, and has become the most concerned research direction. Although the performance of deep network model is remarkable, it is still difficult to deploy to the embedded or mobile devices with a limited hardware due to the large number of parameters, high storage and computing costs. It has been found by relevant studies that the depth model based on convolutional neural network has parameter redundancy, and there are parameters that are useless to the final result in the model, which provides theoretical support for the pruning of depth network model. Therefore, how to reduce the model size under the condition of ensuring the model accuracy has become a hot issue. This paper classifies and summarizes the achievements of domestic and foreign scholars in model pruning in recent years, selects several new pruning algorithm methods in different directions, analyzes their functionality through experiments and discusses the current problems of different models and the development direction of pruning model optimization in the future.
近年来,深度神经网络在计算机视觉、自然语言处理等任务中不断刷新其最佳性能,成为最受关注的研究方向。虽然深度网络模型的性能显著,但由于参数数量多,存储和计算成本高,在硬件有限的情况下,仍然难以部署到嵌入式或移动设备上。相关研究发现,基于卷积神经网络的深度模型具有参数冗余性,模型中存在对最终结果无用的参数,这为深度网络模型的剪枝提供了理论支持。因此,如何在保证模型精度的前提下减小模型尺寸成为一个热点问题。本文对近年来国内外学者在模型修剪方面的研究成果进行了分类和总结,选取了几种不同方向的新的修剪算法方法,并通过实验对其功能进行了分析,讨论了不同模型目前存在的问题以及未来修剪模型优化的发展方向。
{"title":"A Survey on Pruning Algorithm Based on Optimized Depth Neural Network","authors":"Qi Song, Xuanze Xia","doi":"10.17706/ijcce.2022.11.2.10-23","DOIUrl":"https://doi.org/10.17706/ijcce.2022.11.2.10-23","url":null,"abstract":": In recent years, deep neural network has continuously renewed its best performance in tasks such as computer vision and natural language processing, and has become the most concerned research direction. Although the performance of deep network model is remarkable, it is still difficult to deploy to the embedded or mobile devices with a limited hardware due to the large number of parameters, high storage and computing costs. It has been found by relevant studies that the depth model based on convolutional neural network has parameter redundancy, and there are parameters that are useless to the final result in the model, which provides theoretical support for the pruning of depth network model. Therefore, how to reduce the model size under the condition of ensuring the model accuracy has become a hot issue. This paper classifies and summarizes the achievements of domestic and foreign scholars in model pruning in recent years, selects several new pruning algorithm methods in different directions, analyzes their functionality through experiments and discusses the current problems of different models and the development direction of pruning model optimization in the future.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88586837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Stages Evaluation for 2D Action Game Generated by DC-GAN Based on Artificial Intelligence 基于人工智能的DC-GAN生成2D动作游戏的阶段评估研究
Kotaro Nagahiro, Sho Ooi, Mutsuo Sano
Recently, research on generative adversarial networks (GANs) in deep learning has advanced rapidly. For instance, in the field of image recognition, using a GAN, the number of training data was increased. GAN have also been used to create new similar images using training images, which can help designers such as car designer, character designer, game designer and more. We have been researching a method to automatically generate a game stage based on a dot-picture using GAN. So far, we have been studying game stage generation using GAN. In this study, we consider an evaluation method for generated game stages. Specifically, we consider using the A * search algorithm to evaluate the playability of the generated game stage from the number of jumps and the clear time. As a result, the jumping count of an automatically player using the A * algorithm was 17 times for the original stage, 12 times for stage No.1, 16 times for stage No.2, and 18 times for stage No.3. Next, the clear time was 9 seconds for the original stage, 8 seconds for stage No.1, 10 seconds for stage No.2, and 11 seconds for stage No.3. In other words, we suggest stage No.1 is simpler than the original stage, and stage 2 and stage 3 are a little more difficult than the original stage.
近年来,深度学习中生成对抗网络(GANs)的研究进展迅速。例如,在图像识别领域,使用GAN增加了训练数据的数量。GAN还被用于使用训练图像创建新的类似图像,这可以帮助设计师,如汽车设计师,角色设计师,游戏设计师等。我们一直在研究一种基于GAN的基于点图的自动生成游戏阶段的方法。到目前为止,我们一直在研究使用GAN生成游戏阶段。在本研究中,我们考虑了生成博弈阶段的评估方法。具体来说,我们考虑使用A *搜索算法从跳跃次数和清除时间来评估生成的游戏阶段的可玩性。因此,使用a *算法的自动选手在原阶段的跳跃次数为17次,在第1阶段为12次,在第2阶段为16次,在第3阶段为18次。接下来,原赛段的清净时间为9秒,第一赛段为8秒,第二赛段为10秒,第三赛段为11秒。换句话说,我们建议第1阶段比原阶段简单,第2阶段和第3阶段比原阶段困难一些。
{"title":"Study on Stages Evaluation for 2D Action Game Generated by DC-GAN Based on Artificial Intelligence","authors":"Kotaro Nagahiro, Sho Ooi, Mutsuo Sano","doi":"10.17706/ijcce.2021.10.2.28-36","DOIUrl":"https://doi.org/10.17706/ijcce.2021.10.2.28-36","url":null,"abstract":"Recently, research on generative adversarial networks (GANs) in deep learning has advanced rapidly. For instance, in the field of image recognition, using a GAN, the number of training data was increased. GAN have also been used to create new similar images using training images, which can help designers such as car designer, character designer, game designer and more. We have been researching a method to automatically generate a game stage based on a dot-picture using GAN. So far, we have been studying game stage generation using GAN. In this study, we consider an evaluation method for generated game stages. Specifically, we consider using the A * search algorithm to evaluate the playability of the generated game stage from the number of jumps and the clear time. As a result, the jumping count of an automatically player using the A * algorithm was 17 times for the original stage, 12 times for stage No.1, 16 times for stage No.2, and 18 times for stage No.3. Next, the clear time was 9 seconds for the original stage, 8 seconds for stage No.1, 10 seconds for stage No.2, and 11 seconds for stage No.3. In other words, we suggest stage No.1 is simpler than the original stage, and stage 2 and stage 3 are a little more difficult than the original stage.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88042680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Key Technology of High-Definition Maps Distribution Based on Edge Computing 基于边缘计算的高清地图分发关键技术
Rongbo Zhang, Kaiyu Cai
The High-Definition map (HD map) is a key technology to achieve automatic driving above the grade of L3, with the amount of data comes to more than 105 times that of traditional navigation map. With the arrival of 5G communication and the rapid development of Internet of Things, each autonomous vehicle will request HD map service by accessing the Internet. The service of traditional navigation map under “cloud-end” mode may not be well adapted to future HD map application, so the paper proposes a MEC proposal for HD map application, deploying HD map server under “cloud-edge-end” mode to mitigate the high latency and improve low reliability caused by the faraway physical distance rather than “cloud-end” mode. The HD map is divided according to the latitude and longitude regions, being pushed to local edge computing node servers respectively to realize the interaction between autonomous vehicles and edge servers, which makes more convenient and reliable HD map services available. The experimental results show that the proposed proposal can cut off the communication delay effectively, ensuring the reliability of the HD map service, and providing high-quality HD map service for autonomous vehicles.
高清地图(HD map)是实现L3级以上自动驾驶的关键技术,其数据量达到传统导航地图的105倍以上。随着5G通信的到来和物联网的快速发展,每辆自动驾驶汽车都将通过接入互联网来请求高清地图服务。传统“云端”模式下的导航地图服务可能无法很好地适应未来的高清地图应用,因此本文提出了一种高清地图应用的MEC方案,即在“云端”模式下部署高清地图服务器,以缓解物理距离较远而非“云端”模式带来的高延迟和低可靠性。根据经纬度区域划分高清地图,分别推送到本地边缘计算节点服务器,实现自动驾驶车辆与边缘服务器的交互,提供更加便捷可靠的高清地图服务。实验结果表明,该方案能够有效地切断通信延迟,保证高清地图服务的可靠性,为自动驾驶汽车提供高质量的高清地图服务。
{"title":"The Key Technology of High-Definition Maps Distribution Based on Edge Computing","authors":"Rongbo Zhang, Kaiyu Cai","doi":"10.17706/ijcce.2021.10.3.52-67","DOIUrl":"https://doi.org/10.17706/ijcce.2021.10.3.52-67","url":null,"abstract":"The High-Definition map (HD map) is a key technology to achieve automatic driving above the grade of L3, with the amount of data comes to more than 105 times that of traditional navigation map. With the arrival of 5G communication and the rapid development of Internet of Things, each autonomous vehicle will request HD map service by accessing the Internet. The service of traditional navigation map under “cloud-end” mode may not be well adapted to future HD map application, so the paper proposes a MEC proposal for HD map application, deploying HD map server under “cloud-edge-end” mode to mitigate the high latency and improve low reliability caused by the faraway physical distance rather than “cloud-end” mode. The HD map is divided according to the latitude and longitude regions, being pushed to local edge computing node servers respectively to realize the interaction between autonomous vehicles and edge servers, which makes more convenient and reliable HD map services available. The experimental results show that the proposed proposal can cut off the communication delay effectively, ensuring the reliability of the HD map service, and providing high-quality HD map service for autonomous vehicles.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76888927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep LSTM for Generating Brand Personalities Using Social Media: A Case Study from Higher Education Institutions 利用社交媒体生成品牌个性的深度LSTM:以高等教育机构为例
Piyumini Wijenayake, D. Alahakoon, Daswin De Silva, S. Kirigeeganage
: This paper introduces a novel technique to generate brand personalities for organizations from social media text data using a deep bi - directional Long Short - Term Memory (BiLSTM) neural network model in combination with an accepted brand personality scale model. Brand Personality has evolved into an indispensable element in modern business organizations. Currently brand personality of an organization is generated using traditional techniques such as stakeholder interviews, questionnaires, which are time and resource intensive and limited in efficacy. However, the rise of the internet and social media have provided a platform for stakeholders to frequently and freely express their opinions and experiences related to organizations. Such social media data while now successfully being used for customer analytics have not yet been fully investigated and used to understand brand personalities. Our research investigated how this data can be effectively leveraged by organizations to generate and monitor their brand in near real time. Our technique has been successfully demonstrated on Higher Education Institutes, as Higher Education is an industry that is increasingly being exposed to business competition over the last few decades.
本文介绍了一种利用深度双向长短期记忆(BiLSTM)神经网络模型结合公认的品牌人格量表模型,从社交媒体文本数据中为组织生成品牌人格的新技术。品牌个性已经发展成为现代商业组织中不可或缺的要素。目前,一个组织的品牌个性是通过传统的技术,如利益相关者访谈,问卷调查,这是时间和资源密集,效率有限。然而,互联网和社交媒体的兴起为利益相关者提供了一个平台,他们可以频繁而自由地表达与组织有关的意见和经验。这些社交媒体数据虽然现在已成功地用于客户分析,但尚未被充分调查并用于了解品牌个性。我们的研究调查了组织如何有效地利用这些数据来近乎实时地生成和监控他们的品牌。我们的技术已经在高等教育机构中得到了成功的证明,因为在过去的几十年里,高等教育是一个日益暴露于商业竞争中的行业。
{"title":"Deep LSTM for Generating Brand Personalities Using Social Media: A Case Study from Higher Education Institutions","authors":"Piyumini Wijenayake, D. Alahakoon, Daswin De Silva, S. Kirigeeganage","doi":"10.17706/IJCCE.2021.10.1.17-27","DOIUrl":"https://doi.org/10.17706/IJCCE.2021.10.1.17-27","url":null,"abstract":": This paper introduces a novel technique to generate brand personalities for organizations from social media text data using a deep bi - directional Long Short - Term Memory (BiLSTM) neural network model in combination with an accepted brand personality scale model. Brand Personality has evolved into an indispensable element in modern business organizations. Currently brand personality of an organization is generated using traditional techniques such as stakeholder interviews, questionnaires, which are time and resource intensive and limited in efficacy. However, the rise of the internet and social media have provided a platform for stakeholders to frequently and freely express their opinions and experiences related to organizations. Such social media data while now successfully being used for customer analytics have not yet been fully investigated and used to understand brand personalities. Our research investigated how this data can be effectively leveraged by organizations to generate and monitor their brand in near real time. Our technique has been successfully demonstrated on Higher Education Institutes, as Higher Education is an industry that is increasingly being exposed to business competition over the last few decades.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75555141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent Digital Recognition System Based on Vernier Caliper 基于游标卡尺的智能数字识别系统
Hui Sun, Feng Shan, Xiaoyu Tang, Weiwei Shi, Xiaowei Wang, Xiaofeng Li, Yuan-Chin Cheng, Haiwei Zhang
The detection and recognition of information in natural scenes has always been a difficult problem in computer vision. Digital instrument character recognition is one of the more representative and valuable things. In recent years, there is a lot of research work on this problem, but the solutions rely on string location, character segmentation and other preprocessing processes, the results of these preprocessing processes directly affect the final character recognition results. In contrast, the character recognition method of digital instrument based on convolution neural network (CNN) omits the complex preprocessing process through graph to graph prediction, and the character recognition result is obtaind directly. And has a strong generalization ability, can identify multiple types of instruments. At the same time, through the weighted fusion of muti-scale and multi-level features in the CNN, a better ability of feature extraction and information integration is obtained. The experimental results show that the method can directly and accurately recognize the characters in the Vernier caliper.
自然场景信息的检测与识别一直是计算机视觉领域的一个难题。数字仪表字符识别是其中比较有代表性和价值的东西。近年来,针对这一问题进行了大量的研究工作,但解决方案依赖于字符串定位、字符分割等预处理过程,这些预处理过程的结果直接影响到最终的字符识别结果。相比之下,基于卷积神经网络(CNN)的数字仪表字符识别方法省去了通过图对图预测的复杂预处理过程,直接获得字符识别结果。并具有较强的泛化能力,能识别多种类型的仪器。同时,通过对CNN中多尺度、多层次特征的加权融合,获得了更好的特征提取和信息整合能力。实验结果表明,该方法可以直接准确地识别游标卡尺上的字符。
{"title":"Intelligent Digital Recognition System Based on Vernier Caliper","authors":"Hui Sun, Feng Shan, Xiaoyu Tang, Weiwei Shi, Xiaowei Wang, Xiaofeng Li, Yuan-Chin Cheng, Haiwei Zhang","doi":"10.17706/IJCCE.2021.10.1.1-8","DOIUrl":"https://doi.org/10.17706/IJCCE.2021.10.1.1-8","url":null,"abstract":"The detection and recognition of information in natural scenes has always been a difficult problem in computer vision. Digital instrument character recognition is one of the more representative and valuable things. In recent years, there is a lot of research work on this problem, but the solutions rely on string location, character segmentation and other preprocessing processes, the results of these preprocessing processes directly affect the final character recognition results. In contrast, the character recognition method of digital instrument based on convolution neural network (CNN) omits the complex preprocessing process through graph to graph prediction, and the character recognition result is obtaind directly. And has a strong generalization ability, can identify multiple types of instruments. At the same time, through the weighted fusion of muti-scale and multi-level features in the CNN, a better ability of feature extraction and information integration is obtained. The experimental results show that the method can directly and accurately recognize the characters in the Vernier caliper.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83843418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Communication Characteristics of Projectile-Carried Communication Jamming Object 弹载通信干扰目标通信特性分析
Jie Zhang, Haixia Shao, Haijun Wang
In order to facilitate the construction of projectile-carried communication jamming system model, this paper used the methods of literature search, classification and summary, and details sorting, deeply analyzing the communication characteristics of projectile-carried communication jamming object from seven aspects, including communication modulation mode, antenna type, antenna length, antenna transmission gain, sensitivity calculation, jamming tolerance, initial synchronization process and its characteristics. Then, the boundary conditions of projectile-carried communication jamming object were determined. In other words, the modulation mode of projectile-carried communication jamming object was 2FSK, the antenna type was whip antenna, the antenna length was 2 m or 2.4 m, the short wave antenna transmission gain was -10.5912 dBi, the ultrashort wave antenna transmission gain was -1.383 dBi, the jamming tolerance was 32% of the available frequency, and the initial synchronization time was calculated as 182 ms. The relevant conclusions lay a foundation for the follow-up study of projectile-carried communication jamming performance.
为了便于弹载通信干扰系统模型的构建,本文采用文献检索、分类总结、细节整理等方法,从通信调制方式、天线类型、天线长度、天线传输增益、灵敏度计算、干扰容限、抗干扰能力等7个方面深入分析了弹载通信干扰对象的通信特性。初始同步过程及其特点。然后,确定了弹载通信干扰目标的边界条件。也就是说,弹载通信干扰对象的调制方式为2FSK,天线类型为鞭子状天线,天线长度为2 m或2.4 m,短波天线发射增益为-10.5912 dBi,超短波天线发射增益为-1.383 dBi,干扰容差为可用频率的32%,初始同步时间计算为182 ms。相关结论为后续弹载通信干扰性能研究奠定了基础。
{"title":"Analysis of Communication Characteristics of Projectile-Carried Communication Jamming Object","authors":"Jie Zhang, Haixia Shao, Haijun Wang","doi":"10.17706/IJCCE.2021.10.1.9-16","DOIUrl":"https://doi.org/10.17706/IJCCE.2021.10.1.9-16","url":null,"abstract":"In order to facilitate the construction of projectile-carried communication jamming system model, this paper used the methods of literature search, classification and summary, and details sorting, deeply analyzing the communication characteristics of projectile-carried communication jamming object from seven aspects, including communication modulation mode, antenna type, antenna length, antenna transmission gain, sensitivity calculation, jamming tolerance, initial synchronization process and its characteristics. Then, the boundary conditions of projectile-carried communication jamming object were determined. In other words, the modulation mode of projectile-carried communication jamming object was 2FSK, the antenna type was whip antenna, the antenna length was 2 m or 2.4 m, the short wave antenna transmission gain was -10.5912 dBi, the ultrashort wave antenna transmission gain was -1.383 dBi, the jamming tolerance was 32% of the available frequency, and the initial synchronization time was calculated as 182 ms. The relevant conclusions lay a foundation for the follow-up study of projectile-carried communication jamming performance.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75429258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Critical Review of SQL-Based Mining Relational Database 基于sql的关系数据库挖掘技术综述
Yuexiao Teng
Mining database aims to discover hidden, yet potentially useful knowledge in database and it has many applications. SQL-based mining relational database is one of its branches, which takes advantage of Standard Query Language to mine datasets. However, due to the little survey research emphasis on this very specific area, currently few literature review has been conducted to investigate, summarize or critique this field. In order to fill this existing gap, in this paper, an original critical review has been carried out, which is based on academic research papers since 1990. To author’s best knowledge, it is the first time to conduct such a review in a critical way regarding SQL-based mining relational database. This review highlights a strong point and a point of improvement and organized in a reversely chronologic order. The review result shows that since 1990, there have been some research work done to mine relational database by SQL. Almost all of it was empirical and some of it was based on the extension of the standard SQL, however all of research or proposed systems did not support distributed relational databases.
数据库挖掘的目的是发现数据库中隐藏的、潜在的有用知识,具有广泛的应用前景。基于sql的挖掘关系数据库是其分支之一,它利用标准查询语言对数据集进行挖掘。然而,由于很少有调查研究强调这一非常具体的领域,目前很少有文献综述进行调查,总结或批评这一领域。为了填补这一存在的空白,本文以1990年以来的学术研究论文为基础,进行了一次原创的批判性回顾。据笔者所知,这是第一次对基于sql的关系数据库挖掘进行批判性的回顾。这篇综述突出了一个优点和一个改进点,并以相反的时间顺序组织。回顾结果表明,自1990年以来,已经有一些利用SQL挖掘关系数据库的研究工作。几乎所有这些都是经验的,其中一些是基于标准SQL的扩展,然而所有的研究或提议的系统都不支持分布式关系数据库。
{"title":"A Critical Review of SQL-Based Mining Relational Database","authors":"Yuexiao Teng","doi":"10.17706/ijcce.2021.10.3.68-74","DOIUrl":"https://doi.org/10.17706/ijcce.2021.10.3.68-74","url":null,"abstract":"Mining database aims to discover hidden, yet potentially useful knowledge in database and it has many applications. SQL-based mining relational database is one of its branches, which takes advantage of Standard Query Language to mine datasets. However, due to the little survey research emphasis on this very specific area, currently few literature review has been conducted to investigate, summarize or critique this field. In order to fill this existing gap, in this paper, an original critical review has been carried out, which is based on academic research papers since 1990. To author’s best knowledge, it is the first time to conduct such a review in a critical way regarding SQL-based mining relational database. This review highlights a strong point and a point of improvement and organized in a reversely chronologic order. The review result shows that since 1990, there have been some research work done to mine relational database by SQL. Almost all of it was empirical and some of it was based on the extension of the standard SQL, however all of research or proposed systems did not support distributed relational databases.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84959998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A GAN-Based Data Augmentation Approach for Sensor-Based Human Activity Recognition 一种基于gan的基于传感器的人体活动识别数据增强方法
Wen-Hui Chen, Po-Chuan Cho
Recently, deep learning has emerged as a powerful technique and been successfully employed for various tasks. It has also been applied to human activity recognition and showed better performance than traditional machine learning algorithms. However, the success of deep learning always comes with large labeled datasets when the learning model goes deeper. If the training data is limited, the performance of the classification model may not generally perform well due to overfitting of the networks to the training data, which can be alleviated through data augmentation. Generative adversarial networks (GANs) can be used as a technique to produce data artificially. GAN-based approaches have made rapid progress in generating synthetic data, but they are mostly studied for image data. Comparatively little research has been conducted to examine the effectiveness of generating sensor data using GANs. This study aims to investigate the data scarcity problem by using conditional generative adversarial networks (CGANs) as a data augmentation method. The proposed approach was experimentally evaluated on a benchmark sensor dataset for activity recognition. The experimental results showed that the proposed approach can boost the model accuracy and has better performance when compared with existing approaches.
最近,深度学习已经成为一种强大的技术,并成功地应用于各种任务。它也被应用于人类活动识别,表现出比传统机器学习算法更好的性能。然而,当学习模型深入时,深度学习的成功总是伴随着大量的标记数据集。在训练数据有限的情况下,由于网络对训练数据的过拟合,分类模型的性能一般会表现不佳,这可以通过数据增强来缓解。生成对抗网络(GANs)是一种人工生成数据的技术。基于gan的方法在生成合成数据方面取得了迅速的进展,但它们主要用于图像数据的研究。相对而言,很少有研究来检验使用gan生成传感器数据的有效性。本研究旨在利用条件生成对抗网络(cgan)作为数据增强方法来研究数据稀缺性问题。该方法在一个用于活动识别的基准传感器数据集上进行了实验评估。实验结果表明,与现有方法相比,该方法可以提高模型的精度,并具有更好的性能。
{"title":"A GAN-Based Data Augmentation Approach for Sensor-Based Human Activity Recognition","authors":"Wen-Hui Chen, Po-Chuan Cho","doi":"10.17706/ijcce.2021.10.4.75-84","DOIUrl":"https://doi.org/10.17706/ijcce.2021.10.4.75-84","url":null,"abstract":"Recently, deep learning has emerged as a powerful technique and been successfully employed for various tasks. It has also been applied to human activity recognition and showed better performance than traditional machine learning algorithms. However, the success of deep learning always comes with large labeled datasets when the learning model goes deeper. If the training data is limited, the performance of the classification model may not generally perform well due to overfitting of the networks to the training data, which can be alleviated through data augmentation. Generative adversarial networks (GANs) can be used as a technique to produce data artificially. GAN-based approaches have made rapid progress in generating synthetic data, but they are mostly studied for image data. Comparatively little research has been conducted to examine the effectiveness of generating sensor data using GANs. This study aims to investigate the data scarcity problem by using conditional generative adversarial networks (CGANs) as a data augmentation method. The proposed approach was experimentally evaluated on a benchmark sensor dataset for activity recognition. The experimental results showed that the proposed approach can boost the model accuracy and has better performance when compared with existing approaches.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91145058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identification of DNS Covert Channel Based on Stacking Method 基于叠加法的DNS隐蔽通道识别
Peng Yang, Xinxin Wan, Guangye Shi, Hao Qu, Juan Li, Lixin Yang
A covert channel is an information channel which is used by computer process to exfiltrate data through bypassing security policies. The domain name system (DNS) protocol is one of the important ways to implement a covert channel. DNS covert channels are easily used by attackers for malicious purposes. Therefore, an effective detection of the DNS covert channels is significant for computer system and network security. Aiming at the difficulty of the DNS covert channel identification, we propose a DNS covert channel detection method based on stacking model. The stacking model is evaluated in a campus network and the experimental results show that the detection based on the stacking model can detect the DNS covert channels effectively. Besides, it can also identify unknown covert channel traffic. The area under the curve (AUC) of the proposed method, reaching 0.9901, outperforms the existed methods.
隐蔽通道是计算机进程用来绕过安全策略泄露数据的一种信息通道。域名系统(DNS)协议是实现隐蔽通道的重要途径之一。DNS隐蔽通道很容易被攻击者用于恶意目的。因此,有效检测DNS隐蔽通道对计算机系统和网络安全具有重要意义。针对DNS隐蔽通道识别的难点,提出了一种基于叠加模型的DNS隐蔽通道检测方法。在一个校园网中对堆叠模型进行了评估,实验结果表明,基于堆叠模型的检测可以有效地检测到DNS隐蔽通道。此外,它还可以识别未知的隐蔽信道业务。该方法的曲线下面积(AUC)达到0.9901,优于现有方法。
{"title":"Identification of DNS Covert Channel Based on Stacking Method","authors":"Peng Yang, Xinxin Wan, Guangye Shi, Hao Qu, Juan Li, Lixin Yang","doi":"10.17706/ijcce.2021.10.2.37-51","DOIUrl":"https://doi.org/10.17706/ijcce.2021.10.2.37-51","url":null,"abstract":"A covert channel is an information channel which is used by computer process to exfiltrate data through bypassing security policies. The domain name system (DNS) protocol is one of the important ways to implement a covert channel. DNS covert channels are easily used by attackers for malicious purposes. Therefore, an effective detection of the DNS covert channels is significant for computer system and network security. Aiming at the difficulty of the DNS covert channel identification, we propose a DNS covert channel detection method based on stacking model. The stacking model is evaluated in a campus network and the experimental results show that the detection based on the stacking model can detect the DNS covert channels effectively. Besides, it can also identify unknown covert channel traffic. The area under the curve (AUC) of the proposed method, reaching 0.9901, outperforms the existed methods.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85246511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1