首页 > 最新文献

JITeCS Journal of Information Technology and Computer Science最新文献

英文 中文
Research on recommendation method based on tensor similarity 基于张量相似度的推荐方法研究
Pub Date : 2022-12-08 DOI: 10.1117/12.2653749
Beixin Ma, Bin Hao, Fei Zhang, Lu Gao, Xiao-Ying Ren
Traditional recommendation methods model users as vectors in a way that focuses only on single-sided user preferences. In order to compensate for the limitations of this modelling approach, a tensor modelling method is proposed that models the user as a rectangle. Firstly, a recommendation model based on a fusion of collaborative filtering and sequential recommender algorithms is constructed, which integrates the Transformer model and Pooling layer to model the user tensor; secondly, the similarity between the user tensor and the target item is calculated by combining the distance between the user tensor and the target item and the bias. The model is experimentally validated on the MovieLens datasets, and the results show that the model is able to focus on multiple user preferences and outperforms the baseline method in terms of accuracy of recommendation results.
传统的推荐方法将用户建模为向量,只关注片面的用户偏好。为了弥补这种建模方法的局限性,提出了一种将用户建模为矩形的张量建模方法。首先,构建了基于协同过滤和顺序推荐算法融合的推荐模型,该模型集成了Transformer模型和Pooling层,对用户张量进行建模;其次,结合用户张量与目标项的距离和偏差计算用户张量与目标项的相似度;在MovieLens数据集上对该模型进行了实验验证,结果表明该模型能够关注多个用户偏好,并且在推荐结果的准确性方面优于基线方法。
{"title":"Research on recommendation method based on tensor similarity","authors":"Beixin Ma, Bin Hao, Fei Zhang, Lu Gao, Xiao-Ying Ren","doi":"10.1117/12.2653749","DOIUrl":"https://doi.org/10.1117/12.2653749","url":null,"abstract":"Traditional recommendation methods model users as vectors in a way that focuses only on single-sided user preferences. In order to compensate for the limitations of this modelling approach, a tensor modelling method is proposed that models the user as a rectangle. Firstly, a recommendation model based on a fusion of collaborative filtering and sequential recommender algorithms is constructed, which integrates the Transformer model and Pooling layer to model the user tensor; secondly, the similarity between the user tensor and the target item is calculated by combining the distance between the user tensor and the target item and the bias. The model is experimentally validated on the MovieLens datasets, and the results show that the model is able to focus on multiple user preferences and outperforms the baseline method in terms of accuracy of recommendation results.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":"32 1","pages":"1247419 - 1247419-9"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89106240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtual tourism experience of Changbai Mountain scenic spot 长白山景区虚拟旅游体验
Pub Date : 2022-12-08 DOI: 10.1117/12.2653436
Xingrong Guo, Xin Pu, Youai Xia, Haopeng Guo, Yuyang Wang, Lili Wang
Under the high attention of the state, virtual reality technology has moved towards the public vision with its wide application ability. It has been widely concerned and praised by enterprises and users. Virtual reality technology has greatly reduced the tourism cost, solved some difficulties faced by traditional tourism, and brought new opportunities for tourism. This project establishes the virtual scene of Changbai Mountain in Jilin Province by virtual reality technology. Users can connect to the scene by virtual reality equipment and interact with the model in the scene to get a different tourism experience.
在国家的高度重视下,虚拟现实技术以其广泛的应用能力走向了大众视野。受到了企业和用户的广泛关注和好评。虚拟现实技术大大降低了旅游成本,解决了传统旅游面临的一些困难,为旅游业带来了新的机遇。本项目利用虚拟现实技术建立吉林省长白山的虚拟场景。用户可以通过虚拟现实设备连接到场景中,与场景中的模型进行交互,获得不一样的旅游体验。
{"title":"Virtual tourism experience of Changbai Mountain scenic spot","authors":"Xingrong Guo, Xin Pu, Youai Xia, Haopeng Guo, Yuyang Wang, Lili Wang","doi":"10.1117/12.2653436","DOIUrl":"https://doi.org/10.1117/12.2653436","url":null,"abstract":"Under the high attention of the state, virtual reality technology has moved towards the public vision with its wide application ability. It has been widely concerned and praised by enterprises and users. Virtual reality technology has greatly reduced the tourism cost, solved some difficulties faced by traditional tourism, and brought new opportunities for tourism. This project establishes the virtual scene of Changbai Mountain in Jilin Province by virtual reality technology. Users can connect to the scene by virtual reality equipment and interact with the model in the scene to get a different tourism experience.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":"13 1","pages":"124741U - 124741U-5"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87469467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of building crack detection system based convolutional neural network 基于卷积神经网络的建筑裂缝检测系统的设计与实现
Pub Date : 2022-12-08 DOI: 10.1117/12.2653463
Hedan Liu, Xulei Zhao
Buildings are commonly found as important facilities in today's society. How to detect building cracks safely and effectively is a necessary measure to ensure the safety of people's lives and properties. With the emergence of deep learning algorithms, various target detection methods based on convolutional neural network (CNN) models have gradually replaced conventional manual detection methods. In this paper, we design a crack recognition system based on convolutional neural network model for building images collected by UAVs. The experimental structure shows that the system has a good performance and can be further promoted to be applied in the field of safety assessment in the construction industry.
建筑通常被认为是当今社会的重要设施。如何安全有效地检测建筑裂缝,是保障人民生命财产安全的必要措施。随着深度学习算法的出现,各种基于卷积神经网络(CNN)模型的目标检测方法逐渐取代了传统的人工检测方法。本文针对无人机采集的建筑图像,设计了一种基于卷积神经网络模型的裂缝识别系统。实验结构表明,该系统具有良好的性能,可以进一步推广应用于建筑行业的安全评价领域。
{"title":"Design and implementation of building crack detection system based convolutional neural network","authors":"Hedan Liu, Xulei Zhao","doi":"10.1117/12.2653463","DOIUrl":"https://doi.org/10.1117/12.2653463","url":null,"abstract":"Buildings are commonly found as important facilities in today's society. How to detect building cracks safely and effectively is a necessary measure to ensure the safety of people's lives and properties. With the emergence of deep learning algorithms, various target detection methods based on convolutional neural network (CNN) models have gradually replaced conventional manual detection methods. In this paper, we design a crack recognition system based on convolutional neural network model for building images collected by UAVs. The experimental structure shows that the system has a good performance and can be further promoted to be applied in the field of safety assessment in the construction industry.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":"74 1","pages":"124741Y - 124741Y-8"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84505289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Realtime replacement mechanism of internal and external memory in limited resources system applicating 5G communication module in distributed grid terminal 在分布式电网终端中应用5G通信模块的有限资源系统内外部存储器实时替换机制
Pub Date : 2022-12-08 DOI: 10.1117/12.2653791
Lei Chen, S. An
System level software need read and write hardware memory, and some hardware system with limited resources such as 5G communication terminal in distributed grid application could not provide enough memory space for specified system application minimum demand. Some current method such as hardware expansion or software compression, to some extent, take effect, but could not solve the problem. Base on contrast between internal and external memory and single task independence, this article propose a realtime replacement mechanism to face on the situation and solve the problem met in high speeding data transfer distribute gird function as usual between running memory and limited resources. Experiment show that it could support limited resources system to run memory-needing task, and running efficiency is 90.2% about to hardware expansion.
系统级软件需要读写硬件内存,分布式网格应用中一些资源有限的硬件系统如5G通信终端无法为指定的系统应用提供足够的内存空间。目前的一些方法,如硬件扩展或软件压缩,在一定程度上起作用,但不能解决问题。本文在对比内外部内存和单任务独立性的基础上,提出了一种实时替换机制,以面对和解决高速数据传输中分布式网格函数在运行内存和有限资源之间的正常切换所遇到的问题。实验表明,该方法可以支持有限资源系统运行需要内存的任务,在硬件扩展情况下,运行效率高达90.2%。
{"title":"Realtime replacement mechanism of internal and external memory in limited resources system applicating 5G communication module in distributed grid terminal","authors":"Lei Chen, S. An","doi":"10.1117/12.2653791","DOIUrl":"https://doi.org/10.1117/12.2653791","url":null,"abstract":"System level software need read and write hardware memory, and some hardware system with limited resources such as 5G communication terminal in distributed grid application could not provide enough memory space for specified system application minimum demand. Some current method such as hardware expansion or software compression, to some extent, take effect, but could not solve the problem. Base on contrast between internal and external memory and single task independence, this article propose a realtime replacement mechanism to face on the situation and solve the problem met in high speeding data transfer distribute gird function as usual between running memory and limited resources. Experiment show that it could support limited resources system to run memory-needing task, and running efficiency is 90.2% about to hardware expansion.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":"25 1","pages":"1247424 - 1247424-7"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72843335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malicious SQL data injection detection 恶意SQL数据注入检测
Pub Date : 2022-12-08 DOI: 10.1117/12.2653531
Huizi Yan, Jiwei Chen
SQL injection attack could obtain sensitive information in the database, tamper or delete illegally obtained information, etc., which causes immeasurable losses to the system. Aiming at SQL injection attack, this paper proposes a new SQL injection detection scheme that combines traditional detection methods with abstract syntax tree structure judgment based on semantic analysis. The solution includes modules such as data preprocessing, SQL statement pre-assembly, and semantic analysis. By assembling the user input content and the actual SQL template statement to form a complete SQL statement, the statement is subjected to structural judgment and semantic analysis to determine the request and precisely identify malicious injection attack.
SQL注入攻击可以获取数据库中的敏感信息,篡改或删除非法获取的信息等,给系统造成不可估量的损失。针对SQL注入攻击,本文提出了一种新的SQL注入检测方案,将传统的检测方法与基于语义分析的抽象语法树结构判断相结合。该解决方案包括数据预处理、SQL语句预汇编和语义分析等模块。通过将用户输入的内容与实际的SQL模板语句组合成完整的SQL语句,对语句进行结构判断和语义分析,确定请求,准确识别恶意注入攻击。
{"title":"Malicious SQL data injection detection","authors":"Huizi Yan, Jiwei Chen","doi":"10.1117/12.2653531","DOIUrl":"https://doi.org/10.1117/12.2653531","url":null,"abstract":"SQL injection attack could obtain sensitive information in the database, tamper or delete illegally obtained information, etc., which causes immeasurable losses to the system. Aiming at SQL injection attack, this paper proposes a new SQL injection detection scheme that combines traditional detection methods with abstract syntax tree structure judgment based on semantic analysis. The solution includes modules such as data preprocessing, SQL statement pre-assembly, and semantic analysis. By assembling the user input content and the actual SQL template statement to form a complete SQL statement, the statement is subjected to structural judgment and semantic analysis to determine the request and precisely identify malicious injection attack.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":"7 1","pages":"124740B - 124740B-6"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89671367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Functional orientation and effect evaluation of the integration of new generation information technology into the training of new pharmaceutical talents: take the characteristic courses of Internet of things technology as an example 新一代信息技术融入新型制药人才培养的功能定位与效果评价——以物联网技术特色课程为例
Pub Date : 2022-12-08 DOI: 10.1117/12.2653497
Chunxia Dai
The development of new generation information technology service education and teaching is an important hotspot of global development. The cultivation of new pharmaceutical professionals in higher vocational colleges must grasp the opportunity of the development of new generation information technology and realize the innovation and breakthrough of the cultivation of new pharmaceutical professionals. Taking the characteristic course of Internet of things technology as an example, studying the functional orientation and effect evaluation of the new generation of information technology in the training of new pharmaceutical talents can provide reference for higher vocational colleges to realize the integration of the new generation of information technology into professional talent training.
发展新一代信息技术服务教育教学是全球发展的一个重要热点。高职院校新型医药专业人才培养必须抓住新一代信息技术发展的机遇,实现新型医药专业人才培养的创新与突破。以物联网技术特色课程为例,研究新一代信息技术在新医药人才培养中的功能定位与效果评价,可为高职院校实现新一代信息技术融入专业人才培养提供参考。
{"title":"Functional orientation and effect evaluation of the integration of new generation information technology into the training of new pharmaceutical talents: take the characteristic courses of Internet of things technology as an example","authors":"Chunxia Dai","doi":"10.1117/12.2653497","DOIUrl":"https://doi.org/10.1117/12.2653497","url":null,"abstract":"The development of new generation information technology service education and teaching is an important hotspot of global development. The cultivation of new pharmaceutical professionals in higher vocational colleges must grasp the opportunity of the development of new generation information technology and realize the innovation and breakthrough of the cultivation of new pharmaceutical professionals. Taking the characteristic course of Internet of things technology as an example, studying the functional orientation and effect evaluation of the new generation of information technology in the training of new pharmaceutical talents can provide reference for higher vocational colleges to realize the integration of the new generation of information technology into professional talent training.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":"42 1","pages":"1247425 - 1247425-5"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82053012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A curve fitting method for sharp feature preservation 一种锐利特征保存的曲线拟合方法
Pub Date : 2022-12-08 DOI: 10.1117/12.2653867
Feng Jin, Shuyu Zhang, Wei Chen
To address the fact that the traditional curve fitting method based on B-spline basis functions cannot preserve the sharp features in the original data well, a curve fitting method based on a class of orthogonal piecewise polynomial function Vsystem is proposed in this research. Firstly, different types of feature points from the original data are extracted by using the feature extraction algorithm; secondly, the feature points are reparametrized to the locations of different knots in the V-system; finally, the fitting curve is obtained by solving least-squares linear equations with constraints. Different features in the original data can be captured since the V-system contains basis functions with different smoothness. Numerical experimental results show that the proposed method in this research creates a fitted curve reflecting the global shape of the original data and can accurately represent sharp features.
针对传统的基于b样条基函数的曲线拟合方法不能很好地保留原始数据中尖锐特征的问题,本文提出了一种基于一类正交分段多项式函数v系统的曲线拟合方法。首先,利用特征提取算法从原始数据中提取不同类型的特征点;其次,将特征点重新参数化为v系中不同结点的位置;最后,通过求解带约束的最小二乘线性方程得到拟合曲线。由于v系统包含不同平滑度的基函数,因此可以捕获原始数据中的不同特征。数值实验结果表明,本文提出的方法能生成反映原始数据整体形状的拟合曲线,并能准确地表示尖锐特征。
{"title":"A curve fitting method for sharp feature preservation","authors":"Feng Jin, Shuyu Zhang, Wei Chen","doi":"10.1117/12.2653867","DOIUrl":"https://doi.org/10.1117/12.2653867","url":null,"abstract":"To address the fact that the traditional curve fitting method based on B-spline basis functions cannot preserve the sharp features in the original data well, a curve fitting method based on a class of orthogonal piecewise polynomial function Vsystem is proposed in this research. Firstly, different types of feature points from the original data are extracted by using the feature extraction algorithm; secondly, the feature points are reparametrized to the locations of different knots in the V-system; finally, the fitting curve is obtained by solving least-squares linear equations with constraints. Different features in the original data can be captured since the V-system contains basis functions with different smoothness. Numerical experimental results show that the proposed method in this research creates a fitted curve reflecting the global shape of the original data and can accurately represent sharp features.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":"1 1","pages":"124740V - 124740V-7"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90159031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis method of scientific instrument data file format based on clustering idea 基于聚类思想的科学仪器数据文件格式分析方法
Pub Date : 2022-12-08 DOI: 10.1117/12.2653568
Jianhui Zhou, Feng Sun, Hao Shi, Shuai Shen
Aiming at the problem of low analytical efficiency in the current analysis methods of data file format of scientific instruments, a data file format analysis method based on clustering was proposed to improve the efficiency of file format analysis. According to the file storage structure and the characteristics of cluster distribution, the selection principle of file samples in cluster analysis is formulated. At the same time, the corresponding format analysis auxiliary tool software is developed, which can automatically judge the rationality of the selected files and automatically group them, simplifying the corresponding format analysis process. The method and the developed tool are used to analyze the format of MS data generated by a mass spectrometry model. The experimental results show that the format of MS data obtained by this method is accurate and the efficiency is significantly improved. This method can effectively promote the sharing of data resources of large-scale scientific instruments and improve the utilization rate of data resources.
针对目前科学仪器数据文件格式分析方法分析效率低的问题,提出了一种基于聚类的数据文件格式分析方法,以提高文件格式分析的效率。根据文件存储结构和聚类分布的特点,制定了聚类分析中文件样本的选择原则。同时开发了相应的格式分析辅助工具软件,可以自动判断所选文件的合理性并对其进行自动分组,简化了相应的格式分析过程。该方法和开发的工具用于分析质谱模型生成的质谱数据格式。实验结果表明,该方法得到的质谱数据格式准确,效率显著提高。该方法可以有效地促进大型科学仪器数据资源的共享,提高数据资源的利用率。
{"title":"Analysis method of scientific instrument data file format based on clustering idea","authors":"Jianhui Zhou, Feng Sun, Hao Shi, Shuai Shen","doi":"10.1117/12.2653568","DOIUrl":"https://doi.org/10.1117/12.2653568","url":null,"abstract":"Aiming at the problem of low analytical efficiency in the current analysis methods of data file format of scientific instruments, a data file format analysis method based on clustering was proposed to improve the efficiency of file format analysis. According to the file storage structure and the characteristics of cluster distribution, the selection principle of file samples in cluster analysis is formulated. At the same time, the corresponding format analysis auxiliary tool software is developed, which can automatically judge the rationality of the selected files and automatically group them, simplifying the corresponding format analysis process. The method and the developed tool are used to analyze the format of MS data generated by a mass spectrometry model. The experimental results show that the format of MS data obtained by this method is accurate and the efficiency is significantly improved. This method can effectively promote the sharing of data resources of large-scale scientific instruments and improve the utilization rate of data resources.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":"29 1","pages":"124740J - 124740J-8"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78231656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Getting insights from news data mining: a case of BBC's counter-terrorism news text analysis 从新闻数据挖掘中获得启示:以BBC反恐新闻文本分析为例
Pub Date : 2022-12-08 DOI: 10.1117/12.2653824
Jia Li, Miao Jia, Qian Liu, Yong Fu, Qiuyi Chen
Data mining plays an important role in getting insights from news text. This study collected 695,051 English-language news reports on terrorism and counter-terrorism from March 2017 to March 2018 in BBC news and conducted a text analysis with LDA topic modeling. 20 topics and five themes were classified, and it was disclosed that major themes include that: (1) BBC focused on constructing local discourse structure, (2) Comparing the news reports at home and abroad, and (3) Historical origins, the development in ancient and modern times and a trial of strength between different countries.
数据挖掘在获取新闻文本信息中起着重要的作用。本研究收集了2017年3月至2018年3月BBC新闻中695051篇关于恐怖主义和反恐的英语新闻报道,并使用LDA主题建模进行了文本分析。共分为20个话题和5个主题,主要主题包括:(1)BBC注重构建本土话语结构;(2)比较国内外新闻报道;(3)历史渊源、古今发展和各国实力较量。
{"title":"Getting insights from news data mining: a case of BBC's counter-terrorism news text analysis","authors":"Jia Li, Miao Jia, Qian Liu, Yong Fu, Qiuyi Chen","doi":"10.1117/12.2653824","DOIUrl":"https://doi.org/10.1117/12.2653824","url":null,"abstract":"Data mining plays an important role in getting insights from news text. This study collected 695,051 English-language news reports on terrorism and counter-terrorism from March 2017 to March 2018 in BBC news and conducted a text analysis with LDA topic modeling. 20 topics and five themes were classified, and it was disclosed that major themes include that: (1) BBC focused on constructing local discourse structure, (2) Comparing the news reports at home and abroad, and (3) Historical origins, the development in ancient and modern times and a trial of strength between different countries.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":"71 1","pages":"124740I - 124740I-5"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85831964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security analysis of SM2 signature algorithm based on fault attack 基于故障攻击的SM2签名算法安全性分析
Pub Date : 2022-12-08 DOI: 10.1117/12.2653740
ChuiSheng Qian, Yan Wang, Minghua Wang, Ziqi Zhao
SM2 digital signature algorithm (SM2-DSA) is the Chinese version of the elliptic curve digital signature algorithm (ECDSA), which has become one of the international standards of elliptic curve cryptography. Despite its solid theoretical security, SM2-DSA is still prone to a variety of physical attacks. Hence, it is important to research the security of the SM2- DSA implementation. In this paper, we propose a fault attack model for the SM2-DSA based on the weak elliptic curve. Experimental results show that the proposed model can directly calculate the parameters of the fault curve by using the fault signature pair, and if the fault injection location is correct, we only need an error signature pair to recover the 256-bit signature private key within 3 minutes. Compared with the general weak elliptic curve attack, our model is more practical and 20% more efficient in recovering the private key.
SM2数字签名算法(SM2- dsa)是椭圆曲线数字签名算法(ECDSA)的中文版,已成为椭圆曲线密码学的国际标准之一。尽管SM2-DSA在理论上具有坚实的安全性,但它仍然容易受到各种物理攻击。因此,研究SM2- DSA实现的安全性是非常重要的。本文提出了一种基于弱椭圆曲线的SM2-DSA故障攻击模型。实验结果表明,该模型可以利用故障签名对直接计算故障曲线的参数,如果故障注入位置正确,只需一个错误签名对,即可在3分钟内恢复256位签名私钥。与一般的弱椭圆曲线攻击相比,该模型更实用,恢复私钥的效率提高了20%。
{"title":"Security analysis of SM2 signature algorithm based on fault attack","authors":"ChuiSheng Qian, Yan Wang, Minghua Wang, Ziqi Zhao","doi":"10.1117/12.2653740","DOIUrl":"https://doi.org/10.1117/12.2653740","url":null,"abstract":"SM2 digital signature algorithm (SM2-DSA) is the Chinese version of the elliptic curve digital signature algorithm (ECDSA), which has become one of the international standards of elliptic curve cryptography. Despite its solid theoretical security, SM2-DSA is still prone to a variety of physical attacks. Hence, it is important to research the security of the SM2- DSA implementation. In this paper, we propose a fault attack model for the SM2-DSA based on the weak elliptic curve. Experimental results show that the proposed model can directly calculate the parameters of the fault curve by using the fault signature pair, and if the fault injection location is correct, we only need an error signature pair to recover the 256-bit signature private key within 3 minutes. Compared with the general weak elliptic curve attack, our model is more practical and 20% more efficient in recovering the private key.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":"179 1","pages":"1247402 - 1247402-7"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85044670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
JITeCS Journal of Information Technology and Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1