Beixin Ma, Bin Hao, Fei Zhang, Lu Gao, Xiao-Ying Ren
Traditional recommendation methods model users as vectors in a way that focuses only on single-sided user preferences. In order to compensate for the limitations of this modelling approach, a tensor modelling method is proposed that models the user as a rectangle. Firstly, a recommendation model based on a fusion of collaborative filtering and sequential recommender algorithms is constructed, which integrates the Transformer model and Pooling layer to model the user tensor; secondly, the similarity between the user tensor and the target item is calculated by combining the distance between the user tensor and the target item and the bias. The model is experimentally validated on the MovieLens datasets, and the results show that the model is able to focus on multiple user preferences and outperforms the baseline method in terms of accuracy of recommendation results.
{"title":"Research on recommendation method based on tensor similarity","authors":"Beixin Ma, Bin Hao, Fei Zhang, Lu Gao, Xiao-Ying Ren","doi":"10.1117/12.2653749","DOIUrl":"https://doi.org/10.1117/12.2653749","url":null,"abstract":"Traditional recommendation methods model users as vectors in a way that focuses only on single-sided user preferences. In order to compensate for the limitations of this modelling approach, a tensor modelling method is proposed that models the user as a rectangle. Firstly, a recommendation model based on a fusion of collaborative filtering and sequential recommender algorithms is constructed, which integrates the Transformer model and Pooling layer to model the user tensor; secondly, the similarity between the user tensor and the target item is calculated by combining the distance between the user tensor and the target item and the bias. The model is experimentally validated on the MovieLens datasets, and the results show that the model is able to focus on multiple user preferences and outperforms the baseline method in terms of accuracy of recommendation results.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":"32 1","pages":"1247419 - 1247419-9"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89106240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Under the high attention of the state, virtual reality technology has moved towards the public vision with its wide application ability. It has been widely concerned and praised by enterprises and users. Virtual reality technology has greatly reduced the tourism cost, solved some difficulties faced by traditional tourism, and brought new opportunities for tourism. This project establishes the virtual scene of Changbai Mountain in Jilin Province by virtual reality technology. Users can connect to the scene by virtual reality equipment and interact with the model in the scene to get a different tourism experience.
{"title":"Virtual tourism experience of Changbai Mountain scenic spot","authors":"Xingrong Guo, Xin Pu, Youai Xia, Haopeng Guo, Yuyang Wang, Lili Wang","doi":"10.1117/12.2653436","DOIUrl":"https://doi.org/10.1117/12.2653436","url":null,"abstract":"Under the high attention of the state, virtual reality technology has moved towards the public vision with its wide application ability. It has been widely concerned and praised by enterprises and users. Virtual reality technology has greatly reduced the tourism cost, solved some difficulties faced by traditional tourism, and brought new opportunities for tourism. This project establishes the virtual scene of Changbai Mountain in Jilin Province by virtual reality technology. Users can connect to the scene by virtual reality equipment and interact with the model in the scene to get a different tourism experience.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":"13 1","pages":"124741U - 124741U-5"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87469467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Buildings are commonly found as important facilities in today's society. How to detect building cracks safely and effectively is a necessary measure to ensure the safety of people's lives and properties. With the emergence of deep learning algorithms, various target detection methods based on convolutional neural network (CNN) models have gradually replaced conventional manual detection methods. In this paper, we design a crack recognition system based on convolutional neural network model for building images collected by UAVs. The experimental structure shows that the system has a good performance and can be further promoted to be applied in the field of safety assessment in the construction industry.
{"title":"Design and implementation of building crack detection system based convolutional neural network","authors":"Hedan Liu, Xulei Zhao","doi":"10.1117/12.2653463","DOIUrl":"https://doi.org/10.1117/12.2653463","url":null,"abstract":"Buildings are commonly found as important facilities in today's society. How to detect building cracks safely and effectively is a necessary measure to ensure the safety of people's lives and properties. With the emergence of deep learning algorithms, various target detection methods based on convolutional neural network (CNN) models have gradually replaced conventional manual detection methods. In this paper, we design a crack recognition system based on convolutional neural network model for building images collected by UAVs. The experimental structure shows that the system has a good performance and can be further promoted to be applied in the field of safety assessment in the construction industry.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":"74 1","pages":"124741Y - 124741Y-8"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84505289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
System level software need read and write hardware memory, and some hardware system with limited resources such as 5G communication terminal in distributed grid application could not provide enough memory space for specified system application minimum demand. Some current method such as hardware expansion or software compression, to some extent, take effect, but could not solve the problem. Base on contrast between internal and external memory and single task independence, this article propose a realtime replacement mechanism to face on the situation and solve the problem met in high speeding data transfer distribute gird function as usual between running memory and limited resources. Experiment show that it could support limited resources system to run memory-needing task, and running efficiency is 90.2% about to hardware expansion.
{"title":"Realtime replacement mechanism of internal and external memory in limited resources system applicating 5G communication module in distributed grid terminal","authors":"Lei Chen, S. An","doi":"10.1117/12.2653791","DOIUrl":"https://doi.org/10.1117/12.2653791","url":null,"abstract":"System level software need read and write hardware memory, and some hardware system with limited resources such as 5G communication terminal in distributed grid application could not provide enough memory space for specified system application minimum demand. Some current method such as hardware expansion or software compression, to some extent, take effect, but could not solve the problem. Base on contrast between internal and external memory and single task independence, this article propose a realtime replacement mechanism to face on the situation and solve the problem met in high speeding data transfer distribute gird function as usual between running memory and limited resources. Experiment show that it could support limited resources system to run memory-needing task, and running efficiency is 90.2% about to hardware expansion.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":"25 1","pages":"1247424 - 1247424-7"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72843335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
SQL injection attack could obtain sensitive information in the database, tamper or delete illegally obtained information, etc., which causes immeasurable losses to the system. Aiming at SQL injection attack, this paper proposes a new SQL injection detection scheme that combines traditional detection methods with abstract syntax tree structure judgment based on semantic analysis. The solution includes modules such as data preprocessing, SQL statement pre-assembly, and semantic analysis. By assembling the user input content and the actual SQL template statement to form a complete SQL statement, the statement is subjected to structural judgment and semantic analysis to determine the request and precisely identify malicious injection attack.
{"title":"Malicious SQL data injection detection","authors":"Huizi Yan, Jiwei Chen","doi":"10.1117/12.2653531","DOIUrl":"https://doi.org/10.1117/12.2653531","url":null,"abstract":"SQL injection attack could obtain sensitive information in the database, tamper or delete illegally obtained information, etc., which causes immeasurable losses to the system. Aiming at SQL injection attack, this paper proposes a new SQL injection detection scheme that combines traditional detection methods with abstract syntax tree structure judgment based on semantic analysis. The solution includes modules such as data preprocessing, SQL statement pre-assembly, and semantic analysis. By assembling the user input content and the actual SQL template statement to form a complete SQL statement, the statement is subjected to structural judgment and semantic analysis to determine the request and precisely identify malicious injection attack.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":"7 1","pages":"124740B - 124740B-6"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89671367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The development of new generation information technology service education and teaching is an important hotspot of global development. The cultivation of new pharmaceutical professionals in higher vocational colleges must grasp the opportunity of the development of new generation information technology and realize the innovation and breakthrough of the cultivation of new pharmaceutical professionals. Taking the characteristic course of Internet of things technology as an example, studying the functional orientation and effect evaluation of the new generation of information technology in the training of new pharmaceutical talents can provide reference for higher vocational colleges to realize the integration of the new generation of information technology into professional talent training.
{"title":"Functional orientation and effect evaluation of the integration of new generation information technology into the training of new pharmaceutical talents: take the characteristic courses of Internet of things technology as an example","authors":"Chunxia Dai","doi":"10.1117/12.2653497","DOIUrl":"https://doi.org/10.1117/12.2653497","url":null,"abstract":"The development of new generation information technology service education and teaching is an important hotspot of global development. The cultivation of new pharmaceutical professionals in higher vocational colleges must grasp the opportunity of the development of new generation information technology and realize the innovation and breakthrough of the cultivation of new pharmaceutical professionals. Taking the characteristic course of Internet of things technology as an example, studying the functional orientation and effect evaluation of the new generation of information technology in the training of new pharmaceutical talents can provide reference for higher vocational colleges to realize the integration of the new generation of information technology into professional talent training.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":"42 1","pages":"1247425 - 1247425-5"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82053012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To address the fact that the traditional curve fitting method based on B-spline basis functions cannot preserve the sharp features in the original data well, a curve fitting method based on a class of orthogonal piecewise polynomial function Vsystem is proposed in this research. Firstly, different types of feature points from the original data are extracted by using the feature extraction algorithm; secondly, the feature points are reparametrized to the locations of different knots in the V-system; finally, the fitting curve is obtained by solving least-squares linear equations with constraints. Different features in the original data can be captured since the V-system contains basis functions with different smoothness. Numerical experimental results show that the proposed method in this research creates a fitted curve reflecting the global shape of the original data and can accurately represent sharp features.
{"title":"A curve fitting method for sharp feature preservation","authors":"Feng Jin, Shuyu Zhang, Wei Chen","doi":"10.1117/12.2653867","DOIUrl":"https://doi.org/10.1117/12.2653867","url":null,"abstract":"To address the fact that the traditional curve fitting method based on B-spline basis functions cannot preserve the sharp features in the original data well, a curve fitting method based on a class of orthogonal piecewise polynomial function Vsystem is proposed in this research. Firstly, different types of feature points from the original data are extracted by using the feature extraction algorithm; secondly, the feature points are reparametrized to the locations of different knots in the V-system; finally, the fitting curve is obtained by solving least-squares linear equations with constraints. Different features in the original data can be captured since the V-system contains basis functions with different smoothness. Numerical experimental results show that the proposed method in this research creates a fitted curve reflecting the global shape of the original data and can accurately represent sharp features.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":"1 1","pages":"124740V - 124740V-7"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90159031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming at the problem of low analytical efficiency in the current analysis methods of data file format of scientific instruments, a data file format analysis method based on clustering was proposed to improve the efficiency of file format analysis. According to the file storage structure and the characteristics of cluster distribution, the selection principle of file samples in cluster analysis is formulated. At the same time, the corresponding format analysis auxiliary tool software is developed, which can automatically judge the rationality of the selected files and automatically group them, simplifying the corresponding format analysis process. The method and the developed tool are used to analyze the format of MS data generated by a mass spectrometry model. The experimental results show that the format of MS data obtained by this method is accurate and the efficiency is significantly improved. This method can effectively promote the sharing of data resources of large-scale scientific instruments and improve the utilization rate of data resources.
{"title":"Analysis method of scientific instrument data file format based on clustering idea","authors":"Jianhui Zhou, Feng Sun, Hao Shi, Shuai Shen","doi":"10.1117/12.2653568","DOIUrl":"https://doi.org/10.1117/12.2653568","url":null,"abstract":"Aiming at the problem of low analytical efficiency in the current analysis methods of data file format of scientific instruments, a data file format analysis method based on clustering was proposed to improve the efficiency of file format analysis. According to the file storage structure and the characteristics of cluster distribution, the selection principle of file samples in cluster analysis is formulated. At the same time, the corresponding format analysis auxiliary tool software is developed, which can automatically judge the rationality of the selected files and automatically group them, simplifying the corresponding format analysis process. The method and the developed tool are used to analyze the format of MS data generated by a mass spectrometry model. The experimental results show that the format of MS data obtained by this method is accurate and the efficiency is significantly improved. This method can effectively promote the sharing of data resources of large-scale scientific instruments and improve the utilization rate of data resources.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":"29 1","pages":"124740J - 124740J-8"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78231656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Data mining plays an important role in getting insights from news text. This study collected 695,051 English-language news reports on terrorism and counter-terrorism from March 2017 to March 2018 in BBC news and conducted a text analysis with LDA topic modeling. 20 topics and five themes were classified, and it was disclosed that major themes include that: (1) BBC focused on constructing local discourse structure, (2) Comparing the news reports at home and abroad, and (3) Historical origins, the development in ancient and modern times and a trial of strength between different countries.
{"title":"Getting insights from news data mining: a case of BBC's counter-terrorism news text analysis","authors":"Jia Li, Miao Jia, Qian Liu, Yong Fu, Qiuyi Chen","doi":"10.1117/12.2653824","DOIUrl":"https://doi.org/10.1117/12.2653824","url":null,"abstract":"Data mining plays an important role in getting insights from news text. This study collected 695,051 English-language news reports on terrorism and counter-terrorism from March 2017 to March 2018 in BBC news and conducted a text analysis with LDA topic modeling. 20 topics and five themes were classified, and it was disclosed that major themes include that: (1) BBC focused on constructing local discourse structure, (2) Comparing the news reports at home and abroad, and (3) Historical origins, the development in ancient and modern times and a trial of strength between different countries.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":"71 1","pages":"124740I - 124740I-5"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85831964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
SM2 digital signature algorithm (SM2-DSA) is the Chinese version of the elliptic curve digital signature algorithm (ECDSA), which has become one of the international standards of elliptic curve cryptography. Despite its solid theoretical security, SM2-DSA is still prone to a variety of physical attacks. Hence, it is important to research the security of the SM2- DSA implementation. In this paper, we propose a fault attack model for the SM2-DSA based on the weak elliptic curve. Experimental results show that the proposed model can directly calculate the parameters of the fault curve by using the fault signature pair, and if the fault injection location is correct, we only need an error signature pair to recover the 256-bit signature private key within 3 minutes. Compared with the general weak elliptic curve attack, our model is more practical and 20% more efficient in recovering the private key.
{"title":"Security analysis of SM2 signature algorithm based on fault attack","authors":"ChuiSheng Qian, Yan Wang, Minghua Wang, Ziqi Zhao","doi":"10.1117/12.2653740","DOIUrl":"https://doi.org/10.1117/12.2653740","url":null,"abstract":"SM2 digital signature algorithm (SM2-DSA) is the Chinese version of the elliptic curve digital signature algorithm (ECDSA), which has become one of the international standards of elliptic curve cryptography. Despite its solid theoretical security, SM2-DSA is still prone to a variety of physical attacks. Hence, it is important to research the security of the SM2- DSA implementation. In this paper, we propose a fault attack model for the SM2-DSA based on the weak elliptic curve. Experimental results show that the proposed model can directly calculate the parameters of the fault curve by using the fault signature pair, and if the fault injection location is correct, we only need an error signature pair to recover the 256-bit signature private key within 3 minutes. Compared with the general weak elliptic curve attack, our model is more practical and 20% more efficient in recovering the private key.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":"179 1","pages":"1247402 - 1247402-7"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85044670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}