{"title":"2021 IEEE/ACIS 21st International Fall Conference on Computer and Information Science (ICIS 2021–Fall)","authors":"","doi":"10.1109/icisfall51598.2021.9627349","DOIUrl":"https://doi.org/10.1109/icisfall51598.2021.9627349","url":null,"abstract":"2021 IEEE/ACIS 21st International Fall Conference on Computer and Information Science (ICIS 2021–Fall).","PeriodicalId":240142,"journal":{"name":"2021 IEEE/ACIS 20th International Fall Conference on Computer and Information Science (ICIS Fall)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123960474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-13DOI: 10.1109/icisfall51598.2021.9627345
Yongbei Yang, Yuan Zhang, Yang Chen, Jinyao Yan
With increasing popularity on deadline-aware streaming service, how to deliver these multimedia data quickly and efficiently has become critical. Traditional transport protocols and congestion control schemes fail to meet expectations. On one hand, the traditional transport protocols like TCP are far away from minimizing the queuing delay. On the other hand, existing congestion control schemes is limited in transport layer, resulting in the neglect of features and deadline requirements in application layer. To address these issues, we propose a Heuristic Delay-based Adaptive Scheme, namely HDAS, based on Deadline-aware Transport Protocol (DTP). HDAS not only adjusts the window size and sending rate according to the network feedback but also schedules packets to improve the overall Quality of Experience (QoE). The proposed scheme adopts delay-based adaptive adjustment for congestion control and greedy strategy for scheduler. Extensive simulations demonstrate that our scheme outperforms most of the existing schemes on overall QoE.
{"title":"An Adaptive Control Scheme for Deadline-aware Streaming","authors":"Yongbei Yang, Yuan Zhang, Yang Chen, Jinyao Yan","doi":"10.1109/icisfall51598.2021.9627345","DOIUrl":"https://doi.org/10.1109/icisfall51598.2021.9627345","url":null,"abstract":"With increasing popularity on deadline-aware streaming service, how to deliver these multimedia data quickly and efficiently has become critical. Traditional transport protocols and congestion control schemes fail to meet expectations. On one hand, the traditional transport protocols like TCP are far away from minimizing the queuing delay. On the other hand, existing congestion control schemes is limited in transport layer, resulting in the neglect of features and deadline requirements in application layer. To address these issues, we propose a Heuristic Delay-based Adaptive Scheme, namely HDAS, based on Deadline-aware Transport Protocol (DTP). HDAS not only adjusts the window size and sending rate according to the network feedback but also schedules packets to improve the overall Quality of Experience (QoE). The proposed scheme adopts delay-based adaptive adjustment for congestion control and greedy strategy for scheduler. Extensive simulations demonstrate that our scheme outperforms most of the existing schemes on overall QoE.","PeriodicalId":240142,"journal":{"name":"2021 IEEE/ACIS 20th International Fall Conference on Computer and Information Science (ICIS Fall)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131793345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-13DOI: 10.1109/icisfall51598.2021.9627361
Pei-jun Gao, Yana Zhang, Suya Zhang, Zeyu Chen
With the development of new media industry, comments based user interaction is now fairly routine in live broadcasting. User comments usually appear in the form of short text with freestyle and cyber new words. The general word segmentation methods could not adapt to Chinese short text in new media comments. This paper proposes a novel method of Chinese short text segmentation to solve the problem of word segmentation granularity self-adaption. A New Media Comment Short Text Dataset(NMCD) is built for our researches, a word vector text containing cyber new words and entity words as well. Our optimized bidirectional Long Short Term Memory(LSTM) model based on attention mechanism and transfer learning could make number and its unit together after the word segmentation. The experiment results show that the Fl-score is improved by 21.43%. The word segmentation method in this paper could be efficiently applied to the new media comments analysis system later.
{"title":"Research on Chinese Short Text Segmentation for New Media Comments","authors":"Pei-jun Gao, Yana Zhang, Suya Zhang, Zeyu Chen","doi":"10.1109/icisfall51598.2021.9627361","DOIUrl":"https://doi.org/10.1109/icisfall51598.2021.9627361","url":null,"abstract":"With the development of new media industry, comments based user interaction is now fairly routine in live broadcasting. User comments usually appear in the form of short text with freestyle and cyber new words. The general word segmentation methods could not adapt to Chinese short text in new media comments. This paper proposes a novel method of Chinese short text segmentation to solve the problem of word segmentation granularity self-adaption. A New Media Comment Short Text Dataset(NMCD) is built for our researches, a word vector text containing cyber new words and entity words as well. Our optimized bidirectional Long Short Term Memory(LSTM) model based on attention mechanism and transfer learning could make number and its unit together after the word segmentation. The experiment results show that the Fl-score is improved by 21.43%. The word segmentation method in this paper could be efficiently applied to the new media comments analysis system later.","PeriodicalId":240142,"journal":{"name":"2021 IEEE/ACIS 20th International Fall Conference on Computer and Information Science (ICIS Fall)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133341435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-13DOI: 10.1109/icisfall51598.2021.9627468
Hao Yuan, Shaofei Li, Wanzhen Sun, Zheng Li, Xin Steven
Deep learning methods with convolutional neural network (CNN) have achieved significant success in image classification tasks. Meanwhile, adversarial image attack algorithms are also becoming more effective within low-resolution images. However, in high-resolution images, such algorithms are still lacking a way to balance between efficiency and success rate. In this paper, we proposed an efficient attention-based image adversarial attack algorithm with differential evolution on realistic high-resolution images that make changes negligible to human eye but can achieve great success in deceiving Deep Neural Networks (DNNs) such as LeNet and ResNet. This attention-based algorithm uses the theory of Region of Interest (ROI) in the image and reduce the search area accordingly to maximize the attack accuracy. This paper proposed two image perturbation methods: strike-slip attack and Hue-Saturation-Value (HSV) filter attack, which apply changes universally to a given area of pixels to minimize the visual difference between two adjacent pixels. Then, based on population-based metaheuristic search theory, this paper used differential evolution algorithm to find the optimal attack solution. Finally, this paper compared above two attack methods and evaluate their effectiveness when attacking images of different resolutions.
卷积神经网络(CNN)的深度学习方法在图像分类任务中取得了显著的成功。同时,对抗性图像攻击算法在低分辨率图像中也变得越来越有效。然而,在高分辨率图像中,这种算法仍然缺乏一种平衡效率和成功率的方法。在本文中,我们提出了一种高效的基于注意力的差分进化图像对抗攻击算法,该算法可以使人眼忽略变化,但可以在欺骗深度神经网络(dnn)(如LeNet和ResNet)方面取得巨大成功。该算法利用图像中感兴趣区域(Region of Interest, ROI)的理论,相应地缩小搜索区域,使攻击精度最大化。本文提出了两种图像摄动方法:走滑攻击和色调-饱和度-值(HSV)滤波器攻击,这两种方法对给定区域的像素普遍施加变化,以最小化相邻像素之间的视觉差异。然后,基于基于种群的元启发式搜索理论,采用差分进化算法寻找最优攻击解;最后,本文对上述两种攻击方法进行了比较,并评价了它们在攻击不同分辨率图像时的有效性。
{"title":"An Efficient Attention Based Image Adversarial Attack Algorithm with Differential Evolution on Realistic High-Resolution Image","authors":"Hao Yuan, Shaofei Li, Wanzhen Sun, Zheng Li, Xin Steven","doi":"10.1109/icisfall51598.2021.9627468","DOIUrl":"https://doi.org/10.1109/icisfall51598.2021.9627468","url":null,"abstract":"Deep learning methods with convolutional neural network (CNN) have achieved significant success in image classification tasks. Meanwhile, adversarial image attack algorithms are also becoming more effective within low-resolution images. However, in high-resolution images, such algorithms are still lacking a way to balance between efficiency and success rate. In this paper, we proposed an efficient attention-based image adversarial attack algorithm with differential evolution on realistic high-resolution images that make changes negligible to human eye but can achieve great success in deceiving Deep Neural Networks (DNNs) such as LeNet and ResNet. This attention-based algorithm uses the theory of Region of Interest (ROI) in the image and reduce the search area accordingly to maximize the attack accuracy. This paper proposed two image perturbation methods: strike-slip attack and Hue-Saturation-Value (HSV) filter attack, which apply changes universally to a given area of pixels to minimize the visual difference between two adjacent pixels. Then, based on population-based metaheuristic search theory, this paper used differential evolution algorithm to find the optimal attack solution. Finally, this paper compared above two attack methods and evaluate their effectiveness when attacking images of different resolutions.","PeriodicalId":240142,"journal":{"name":"2021 IEEE/ACIS 20th International Fall Conference on Computer and Information Science (ICIS Fall)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123549032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-13DOI: 10.1109/icisfall51598.2021.9627382
Zhao Yangyang, Niu Wei, W. Meinan
Aiming at the problems of large amount of data collected by airborne sensors, lack of data association, and low processing efficiency, this paper proposes a parallel LSTM algorithm model suitable for Spark platform. First, use the Spark platform to complete the traversal scan operation in the memory RDD of all nodes in the distributed cluster, and combine the directed acyclic graph to create a Pipeline pipeline to implement a parallel computing framework. An algorithm model to optimize the parameters of LSTM neural network is proposed, and load balancing processing method is introduced to realize that all nodes of the distributed system can share the computing tasks in a balanced manner. The experimental results show that compared to the stand-alone case, the parallelized LSTM algorithm improves the efficiency. The prediction efficiency of the LSTM algorithm model after load balancing processing is higher, which shows that the distribution of traversal tasks of each node is more balanced and the degree of parallelization is higher.
{"title":"Research on Parallel LSTM Algorithm Based on Spark","authors":"Zhao Yangyang, Niu Wei, W. Meinan","doi":"10.1109/icisfall51598.2021.9627382","DOIUrl":"https://doi.org/10.1109/icisfall51598.2021.9627382","url":null,"abstract":"Aiming at the problems of large amount of data collected by airborne sensors, lack of data association, and low processing efficiency, this paper proposes a parallel LSTM algorithm model suitable for Spark platform. First, use the Spark platform to complete the traversal scan operation in the memory RDD of all nodes in the distributed cluster, and combine the directed acyclic graph to create a Pipeline pipeline to implement a parallel computing framework. An algorithm model to optimize the parameters of LSTM neural network is proposed, and load balancing processing method is introduced to realize that all nodes of the distributed system can share the computing tasks in a balanced manner. The experimental results show that compared to the stand-alone case, the parallelized LSTM algorithm improves the efficiency. The prediction efficiency of the LSTM algorithm model after load balancing processing is higher, which shows that the distribution of traversal tasks of each node is more balanced and the degree of parallelization is higher.","PeriodicalId":240142,"journal":{"name":"2021 IEEE/ACIS 20th International Fall Conference on Computer and Information Science (ICIS Fall)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123716343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-13DOI: 10.1109/icisfall51598.2021.9627399
Peng Li, Wei Niu
With the development of information technology, the goal of complex system maintenance and support is to be scientific prediction and precise logistics. There is an urgent need to build a flexible networked logistics architecture, to utilize the equipment's real-time health information efficiently and to schedule logistics resources successfully in a complex and dynamic logistics environment. In order to establish a precise, dynamic and networked maintenance system, the characteristics of logistics networks are analyzed entirely to improve logistics organization flexibility, a method of state collaborative analysis and intelligent support decision-making is proposed. This method generates test data through offline and online execution of fault test cases; based on online state monitoring and historical data of sensors, the equipment state is estimated and judged, thereby providing intelligent guarantee decision-making services.
{"title":"Research on Complex System Intelligent Maintenance Decision Method","authors":"Peng Li, Wei Niu","doi":"10.1109/icisfall51598.2021.9627399","DOIUrl":"https://doi.org/10.1109/icisfall51598.2021.9627399","url":null,"abstract":"With the development of information technology, the goal of complex system maintenance and support is to be scientific prediction and precise logistics. There is an urgent need to build a flexible networked logistics architecture, to utilize the equipment's real-time health information efficiently and to schedule logistics resources successfully in a complex and dynamic logistics environment. In order to establish a precise, dynamic and networked maintenance system, the characteristics of logistics networks are analyzed entirely to improve logistics organization flexibility, a method of state collaborative analysis and intelligent support decision-making is proposed. This method generates test data through offline and online execution of fault test cases; based on online state monitoring and historical data of sensors, the equipment state is estimated and judged, thereby providing intelligent guarantee decision-making services.","PeriodicalId":240142,"journal":{"name":"2021 IEEE/ACIS 20th International Fall Conference on Computer and Information Science (ICIS Fall)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124046850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-13DOI: 10.1109/icisfall51598.2021.9627489
Shin-Jer Yang, Zi-Ling Lai, Ming-Chin Hung
In recent years, Cloud Computing is one of the more influential technologies. Cloud users do not need to deeply understand the technical knowledge underlying the cloud infrastructure. System developers enable enterprises and organizations to quickly implement systems and deploy applications in the cloud environment, and also reduce the cost from development to maintenance. Hence, many companies have begun to use cloud-based systems. They need to consider related essential requirements during developing a comprehensive cloud-based application system. Therefore, this paper did survey functional and non-functional requirements to be divided into six facets. In the first stage, we invite scholars and experts to interview and fill out the questionnaire, and conduct a reliability analysis through Statistical Product and Service Solutions (SPSS) to make corrections in questionnaire of the first stage, and erase unnecessary influencing factors to select the critical success factors (CSFs). In the second stage, we will calculate the weight ratio and rank the sequence for each of the CSFs through the analytic hierarchy process (AHP). After performing two stages experiments, the final results indicate that Security and Privacy, System Performance, and Processing Features are the top three of the six facets. In the calculation of the overall weights of CSFs across the six facets, the top six ranked CSFs cover Data Accuracy, Reliability, Computing Logic, Robustness, Accessibility, and Data Privacy and Encryption. In the future, the proposed methodology can be applied to IoT and smart factors applications.
云计算是近年来最具影响力的技术之一。云用户不需要深入了解云基础设施背后的技术知识。系统开发人员使企业和组织能够在云环境中快速实现系统和部署应用程序,并降低从开发到维护的成本。因此,许多公司已经开始使用基于云的系统。在开发一个全面的基于云的应用系统时,他们需要考虑相关的基本需求。因此,本文对功能需求和非功能需求进行了调查,并将其分为六个方面。在第一阶段,我们邀请学者和专家进行访谈和填写问卷,并通过SPSS (Statistical Product and Service Solutions)进行信度分析,对第一阶段的问卷进行修正,并删除不必要的影响因素,选择关键成功因素。在第二阶段,我们将通过层次分析法(AHP)计算权重比并对每个CSFs的序列进行排序。经过两个阶段的实验,最终结果表明,安全与隐私、系统性能和处理特性是六个方面中的前三个方面。在计算CSFs在六个方面的总权重时,排名前六的CSFs包括数据准确性、可靠性、计算逻辑、鲁棒性、可访问性和数据隐私和加密。在未来,所提出的方法可以应用于物联网和智能因素应用。
{"title":"An Approach to Critical Success Factors in Designing Cloud-based Application Solutions","authors":"Shin-Jer Yang, Zi-Ling Lai, Ming-Chin Hung","doi":"10.1109/icisfall51598.2021.9627489","DOIUrl":"https://doi.org/10.1109/icisfall51598.2021.9627489","url":null,"abstract":"In recent years, Cloud Computing is one of the more influential technologies. Cloud users do not need to deeply understand the technical knowledge underlying the cloud infrastructure. System developers enable enterprises and organizations to quickly implement systems and deploy applications in the cloud environment, and also reduce the cost from development to maintenance. Hence, many companies have begun to use cloud-based systems. They need to consider related essential requirements during developing a comprehensive cloud-based application system. Therefore, this paper did survey functional and non-functional requirements to be divided into six facets. In the first stage, we invite scholars and experts to interview and fill out the questionnaire, and conduct a reliability analysis through Statistical Product and Service Solutions (SPSS) to make corrections in questionnaire of the first stage, and erase unnecessary influencing factors to select the critical success factors (CSFs). In the second stage, we will calculate the weight ratio and rank the sequence for each of the CSFs through the analytic hierarchy process (AHP). After performing two stages experiments, the final results indicate that Security and Privacy, System Performance, and Processing Features are the top three of the six facets. In the calculation of the overall weights of CSFs across the six facets, the top six ranked CSFs cover Data Accuracy, Reliability, Computing Logic, Robustness, Accessibility, and Data Privacy and Encryption. In the future, the proposed methodology can be applied to IoT and smart factors applications.","PeriodicalId":240142,"journal":{"name":"2021 IEEE/ACIS 20th International Fall Conference on Computer and Information Science (ICIS Fall)","volume":"97 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117297622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-13DOI: 10.1109/icisfall51598.2021.9627469
Xiaofang Deng, Liuyue Shi, Yanlong Li, Liyan Luo, Lin Zheng
Mobile and sparse underwater acoustic sensor networks (MS-UASNs) have attracted much attention due to their wide applications in various fields. However, MS-UASNs comes with intrinsic constraints because it is deployed in the aquatic environment and uses the acoustic signals to communicate. The sparse deployment and topology changes of the network leads to void areas that reduce packet delivery ratio. And the network efficiency is reduced and the lifetime of networks is shortened due to limited energy. Besides, the low speed of the acoustic waves produces high latency. Thereby, our proposed a void-avoidable and reliability-based opportunistic energy efficiency routing (VBOER) protocol is designed to achieve voids avoidance, energy fairness and improve reliability. First, the valid transmission areas (VTA) of the node are divided to avoid unnecessary transmission. Second, the novelty of VBOER is that the qualified forwarding nodes (QFNs) are determined by considering the continual degree (CD) and the life-time of nodes. Then, the VBOER shapes the node energy state prediction model and the node location state prediction model based on Markov chain. Finally, to achieve a balance between the energy efficiency and the network benefits, forward fitness value (FFV) of nodes is proposed, and an opportunistic routing protocol based on FFV is developed to coordinate packet forwarding. The verification of simulation results shows the effectiveness of our proposed VBOER in terms of packet delivery ratio, network lifetime and end-to-end delay in comparison to existing routing protocols.
{"title":"A Void-Avoidable and Reliability-Based Opportunistic Energy Efficiency Routing for Mobile Sparse Underwater Acoustic Sensor Network","authors":"Xiaofang Deng, Liuyue Shi, Yanlong Li, Liyan Luo, Lin Zheng","doi":"10.1109/icisfall51598.2021.9627469","DOIUrl":"https://doi.org/10.1109/icisfall51598.2021.9627469","url":null,"abstract":"Mobile and sparse underwater acoustic sensor networks (MS-UASNs) have attracted much attention due to their wide applications in various fields. However, MS-UASNs comes with intrinsic constraints because it is deployed in the aquatic environment and uses the acoustic signals to communicate. The sparse deployment and topology changes of the network leads to void areas that reduce packet delivery ratio. And the network efficiency is reduced and the lifetime of networks is shortened due to limited energy. Besides, the low speed of the acoustic waves produces high latency. Thereby, our proposed a void-avoidable and reliability-based opportunistic energy efficiency routing (VBOER) protocol is designed to achieve voids avoidance, energy fairness and improve reliability. First, the valid transmission areas (VTA) of the node are divided to avoid unnecessary transmission. Second, the novelty of VBOER is that the qualified forwarding nodes (QFNs) are determined by considering the continual degree (CD) and the life-time of nodes. Then, the VBOER shapes the node energy state prediction model and the node location state prediction model based on Markov chain. Finally, to achieve a balance between the energy efficiency and the network benefits, forward fitness value (FFV) of nodes is proposed, and an opportunistic routing protocol based on FFV is developed to coordinate packet forwarding. The verification of simulation results shows the effectiveness of our proposed VBOER in terms of packet delivery ratio, network lifetime and end-to-end delay in comparison to existing routing protocols.","PeriodicalId":240142,"journal":{"name":"2021 IEEE/ACIS 20th International Fall Conference on Computer and Information Science (ICIS Fall)","volume":"90 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114135081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-13DOI: 10.1109/icisfall51598.2021.9627376
Sanchit Bista, M. Garcia-Ruiz
Video games are an important part of the lives of many people, being a popular entertainment medium, and providing engaging and motivating player experiences. Some types of video games are also played to learn about a particular topic, working as serious games (games that have a purpose beyond pure entertainment). That is the case of cooking games, a hybrid game genre where simulation, casual and other genres are involved. In cooking games, food preparation and presentation isare the central gameplay mechanic. In this paper, we present a review of popular cooking games, and suggestions for analyzing and testing cooking video games, taking into account the games' usability, training and learning components. These components could help designing and developing new cooking games. We conclude that in order to improve cooking games testing, testers should know the basics of cooking shown in the game beforehand, and be aware of the importance of the game's look and feel to evoke meaningful and compelling culinary experiences. Cooking games can help people to learn a life skill such as meal preparation, beyond just playing a casual game.
{"title":"An Overview of Cooking Video Games and Testing Considerations","authors":"Sanchit Bista, M. Garcia-Ruiz","doi":"10.1109/icisfall51598.2021.9627376","DOIUrl":"https://doi.org/10.1109/icisfall51598.2021.9627376","url":null,"abstract":"Video games are an important part of the lives of many people, being a popular entertainment medium, and providing engaging and motivating player experiences. Some types of video games are also played to learn about a particular topic, working as serious games (games that have a purpose beyond pure entertainment). That is the case of cooking games, a hybrid game genre where simulation, casual and other genres are involved. In cooking games, food preparation and presentation isare the central gameplay mechanic. In this paper, we present a review of popular cooking games, and suggestions for analyzing and testing cooking video games, taking into account the games' usability, training and learning components. These components could help designing and developing new cooking games. We conclude that in order to improve cooking games testing, testers should know the basics of cooking shown in the game beforehand, and be aware of the importance of the game's look and feel to evoke meaningful and compelling culinary experiences. Cooking games can help people to learn a life skill such as meal preparation, beyond just playing a casual game.","PeriodicalId":240142,"journal":{"name":"2021 IEEE/ACIS 20th International Fall Conference on Computer and Information Science (ICIS Fall)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133004619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-13DOI: 10.1109/icisfall51598.2021.9627380
Yifeng He, Anzhong Jin, Lei Chen, Shikang Nie, Yi Zhang, Gang Dong
Satellite navigation and positioning systems play a key role in the political, military and economic aspects of a country. With the rapid development of our country's Beidou satellite navigation system, the research on signal receiving technology, especially satellite communication signal acquisition algorithm, has become an important field of navigation system application development. Starting from big data, this paper conducts in-depth research on the acquisition algorithm of high-order BOC modulation satellite communication signals. This article first analyzes the capture performance of the traditional serial capture algorithm, summarizes the relevant characteristics of BPSK-R and BOC modulation signals, designs a double-sideband capture scheme based on matched filters, and gives the design process and parameters of the scheme in detail. In this paper, taking BOC (15, 2.5) modulated satellite signal as an example, the acquisition performance of multi-peak detection time-domain parallel acquisition algorithm is studied. Through simulation and testing, the simulation data shows that when the carrier-to-noise ratio is 40dB. Hz and the false alarm probability is 0.001, the detection probability can reach more than 0.99. Therefore, the multi-peak detection time-domain parallel capture algorithm in this paper is a capture algorithm that can meet performance requirements, improves capture efficiency and reduces resource usage.
{"title":"Acquisition Algorithm of High-Order BOC Modulation Satellite Communication Signal Based on Big Data","authors":"Yifeng He, Anzhong Jin, Lei Chen, Shikang Nie, Yi Zhang, Gang Dong","doi":"10.1109/icisfall51598.2021.9627380","DOIUrl":"https://doi.org/10.1109/icisfall51598.2021.9627380","url":null,"abstract":"Satellite navigation and positioning systems play a key role in the political, military and economic aspects of a country. With the rapid development of our country's Beidou satellite navigation system, the research on signal receiving technology, especially satellite communication signal acquisition algorithm, has become an important field of navigation system application development. Starting from big data, this paper conducts in-depth research on the acquisition algorithm of high-order BOC modulation satellite communication signals. This article first analyzes the capture performance of the traditional serial capture algorithm, summarizes the relevant characteristics of BPSK-R and BOC modulation signals, designs a double-sideband capture scheme based on matched filters, and gives the design process and parameters of the scheme in detail. In this paper, taking BOC (15, 2.5) modulated satellite signal as an example, the acquisition performance of multi-peak detection time-domain parallel acquisition algorithm is studied. Through simulation and testing, the simulation data shows that when the carrier-to-noise ratio is 40dB. Hz and the false alarm probability is 0.001, the detection probability can reach more than 0.99. Therefore, the multi-peak detection time-domain parallel capture algorithm in this paper is a capture algorithm that can meet performance requirements, improves capture efficiency and reduces resource usage.","PeriodicalId":240142,"journal":{"name":"2021 IEEE/ACIS 20th International Fall Conference on Computer and Information Science (ICIS Fall)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133722583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}