首页 > 最新文献

JITeCS Journal of Information Technology and Computer Science最新文献

英文 中文
On-orbit maintenance and reconfiguration of DSP based on FPGA 基于FPGA的DSP在轨维护与重构
Pub Date : 2022-12-08 DOI: 10.1117/12.2653605
Hongxuan Ren, Han Liu, Qiang Xue, Xiao-qing Ma, Tao Jiang, Baohua Sun
FPGA+DSP architecture is widely used in satellite digital processing systems. The satellite is in an environment where there is a lot of particle radiation and collisions. In order to avoid changes in stored code data brought by SEU (Single Event Upset), improve the system reliability, at the same time meet the current requirements of software on-orbit reconfiguration, the FPGA and DSP in the space-borne core processor need to have the ability of error correction and reconfiguration. To do this, FPGA and DSP programs need to be stored in external, writable memory. Nor Flash, with its high capacity and reliability, is often chosen as the memory for storing code. At present, the on-orbit maintenance of FPGA is usually realized by using Actel FPGA to conduct TMR (Triple Modular Redundancy), refresh and other processing on the FPGA code stored in Flash. Based on this idea, a T-shaped structure is constructed among FPGA, DSP and Flash for the architecture of the space-borne processor. As the master, FPGA controls Flash to complete TMR, error correction and on-orbit reconfiguration of DSP code. This method reduces hardware redundancy, gives consideration to autonomous maintenance and on-orbit reconfiguration, and increases system robustness. This method has been applied and fully verified in orbit.
FPGA+DSP架构在卫星数字处理系统中得到了广泛的应用。卫星处在一个有很多粒子辐射和碰撞的环境中。为了避免SEU (Single Event Upset)给存储的代码数据带来变化,提高系统可靠性,同时满足当前软件在轨重构的要求,星载核心处理器中的FPGA和DSP需要具备纠错和重构能力。为此,需要将FPGA和DSP程序存储在外部可写存储器中。闪存由于其高容量和高可靠性,通常被选择作为存储代码的存储器。目前,FPGA在轨维护通常采用Actel FPGA对存储在Flash中的FPGA代码进行TMR (Triple Modular Redundancy,三模冗余)、刷新等处理来实现。在此基础上,构建了基于FPGA、DSP和Flash的星载处理器的“t”型结构。FPGA作为主控,控制Flash完成DSP代码的TMR、纠错和在轨重构。该方法减少了硬件冗余,兼顾了自主维护和在轨重构,提高了系统的鲁棒性。该方法已在轨道上得到应用和充分验证。
{"title":"On-orbit maintenance and reconfiguration of DSP based on FPGA","authors":"Hongxuan Ren, Han Liu, Qiang Xue, Xiao-qing Ma, Tao Jiang, Baohua Sun","doi":"10.1117/12.2653605","DOIUrl":"https://doi.org/10.1117/12.2653605","url":null,"abstract":"FPGA+DSP architecture is widely used in satellite digital processing systems. The satellite is in an environment where there is a lot of particle radiation and collisions. In order to avoid changes in stored code data brought by SEU (Single Event Upset), improve the system reliability, at the same time meet the current requirements of software on-orbit reconfiguration, the FPGA and DSP in the space-borne core processor need to have the ability of error correction and reconfiguration. To do this, FPGA and DSP programs need to be stored in external, writable memory. Nor Flash, with its high capacity and reliability, is often chosen as the memory for storing code. At present, the on-orbit maintenance of FPGA is usually realized by using Actel FPGA to conduct TMR (Triple Modular Redundancy), refresh and other processing on the FPGA code stored in Flash. Based on this idea, a T-shaped structure is constructed among FPGA, DSP and Flash for the architecture of the space-borne processor. As the master, FPGA controls Flash to complete TMR, error correction and on-orbit reconfiguration of DSP code. This method reduces hardware redundancy, gives consideration to autonomous maintenance and on-orbit reconfiguration, and increases system robustness. This method has been applied and fully verified in orbit.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80217456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of ice and snow tourism based on virtual reality technology 基于虚拟现实技术的冰雪旅游设计与实现
Pub Date : 2022-12-08 DOI: 10.1117/12.2653752
Lidong Zhang, Dongming Liu, J. Zhang, Xin Pu
With the development of science and technology, virtual reality technology has gradually matured. The traditional method of promoting tourist attractions with the help of video cannot meet people's needs, so we build an ice and snow tourism system based on virtual reality technology. By software unity3D, build scenes, add characters, animals, snow scenes, etc. the virtual ice and snow world is present perfectly, provide people with a virtual space, strengthen people's perception of the ice and snow world by means of human-computer interaction, and let people experience ice and snow travel.
随着科学技术的发展,虚拟现实技术逐渐成熟。传统的借助视频宣传旅游景点的方式已经不能满足人们的需求,因此我们构建了一个基于虚拟现实技术的冰雪旅游系统。通过unity3D软件,搭建场景,添加人物、动物、雪景等,将虚拟冰雪世界完美呈现,为人们提供一个虚拟的空间,通过人机交互的方式加强人们对冰雪世界的感知,让人们体验冰雪之旅。
{"title":"Design and implementation of ice and snow tourism based on virtual reality technology","authors":"Lidong Zhang, Dongming Liu, J. Zhang, Xin Pu","doi":"10.1117/12.2653752","DOIUrl":"https://doi.org/10.1117/12.2653752","url":null,"abstract":"With the development of science and technology, virtual reality technology has gradually matured. The traditional method of promoting tourist attractions with the help of video cannot meet people's needs, so we build an ice and snow tourism system based on virtual reality technology. By software unity3D, build scenes, add characters, animals, snow scenes, etc. the virtual ice and snow world is present perfectly, provide people with a virtual space, strengthen people's perception of the ice and snow world by means of human-computer interaction, and let people experience ice and snow travel.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89260689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on network traffic prediction based on spatial feature fusion 基于空间特征融合的网络流量预测研究
Pub Date : 2022-12-08 DOI: 10.1117/12.2653683
Junbo Li, Jianxin Zhou, Ning Zhou
Forecasting network traffic is critical to operators' daily network operating and maintenance decisions. However, nonlinearity, burst, and periodicity of network traffic, as well as the considerable geographical correlation among network nodes, pose significant hurdles to reliable network traffic forecast. Most existing traffic prediction methods use pre-defined graph or node embedding to extract spatial correlation between network nodes. However, neither of these methods may be able to extract this spatial correlation completely. Furthermore, while utilizing LSTM to extract temporal features, intermediate time step output is ignored, resulting in the loss of some temporal features. The network model in the article extracts the spatial correlation by the dual graphic attention module and extracts temporal features by the LSTM-Attention and TCN modules, which can extract spatial and temporal features from the network traffic data better. The network model is trained and predicted on the Abilene data set. The results demonstrate that the prediction performance is significantly improved.
网络流量预测对运营商的日常网络运营和维护决策至关重要。然而,网络流量的非线性、突发性和周期性,以及网络节点之间相当大的地理相关性,给可靠的网络流量预测带来了很大的障碍。现有的流量预测方法大多采用预定义的图或节点嵌入来提取网络节点之间的空间相关性。然而,这两种方法都不能完全提取这种空间相关性。此外,在利用LSTM提取时间特征时,忽略了中间时间步长输出,导致部分时间特征丢失。本文的网络模型通过双图形注意力模块提取空间相关性,通过LSTM-Attention和TCN模块提取时间特征,可以更好地从网络流量数据中提取时空特征。在Abilene数据集上对网络模型进行了训练和预测。结果表明,该方法的预测性能得到了显著提高。
{"title":"Research on network traffic prediction based on spatial feature fusion","authors":"Junbo Li, Jianxin Zhou, Ning Zhou","doi":"10.1117/12.2653683","DOIUrl":"https://doi.org/10.1117/12.2653683","url":null,"abstract":"Forecasting network traffic is critical to operators' daily network operating and maintenance decisions. However, nonlinearity, burst, and periodicity of network traffic, as well as the considerable geographical correlation among network nodes, pose significant hurdles to reliable network traffic forecast. Most existing traffic prediction methods use pre-defined graph or node embedding to extract spatial correlation between network nodes. However, neither of these methods may be able to extract this spatial correlation completely. Furthermore, while utilizing LSTM to extract temporal features, intermediate time step output is ignored, resulting in the loss of some temporal features. The network model in the article extracts the spatial correlation by the dual graphic attention module and extracts temporal features by the LSTM-Attention and TCN modules, which can extract spatial and temporal features from the network traffic data better. The network model is trained and predicted on the Abilene data set. The results demonstrate that the prediction performance is significantly improved.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85823793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of "three elements four dimensions" collaborative education model for accounting majors based on digital intelligence technology 基于数字智能技术的会计专业“三要素四维度”协同教育模式构建
Pub Date : 2022-12-08 DOI: 10.1117/12.2653572
Hua Feng, Fengyang Wang
The development of digital intelligence technology drives the reconstruction of accounting functions and processes, which also puts forward new requirements and challenges for the training of accounting professionals. By analyzing the shortcomings of accounting majors in the context of the development of digital intelligence technology, and through the linkage of schools, industries and enterprises, this paper explores to build a new model of talent training reform driven by digital intelligence technologies such as Big data, artificial intelligence (AI) and blockchain, so as to promote the accounting education chain and talent chain to organically connect with the industrial chain and innovation chain, and meet the needs of the training and transformation of accounting professionals in the digital intelligence era.
数字智能技术的发展推动了会计职能和流程的重构,也对会计人才的培养提出了新的要求和挑战。本文通过分析数字智能技术发展背景下会计专业存在的不足,通过校企联动,探索构建以大数据、人工智能、区块链等数字智能技术为驱动的人才培养改革新模式,促进会计教育链、人才链与产业链、创新链有机衔接。满足数字智能时代会计专业人才培养与转型的需要。
{"title":"Construction of \"three elements four dimensions\" collaborative education model for accounting majors based on digital intelligence technology","authors":"Hua Feng, Fengyang Wang","doi":"10.1117/12.2653572","DOIUrl":"https://doi.org/10.1117/12.2653572","url":null,"abstract":"The development of digital intelligence technology drives the reconstruction of accounting functions and processes, which also puts forward new requirements and challenges for the training of accounting professionals. By analyzing the shortcomings of accounting majors in the context of the development of digital intelligence technology, and through the linkage of schools, industries and enterprises, this paper explores to build a new model of talent training reform driven by digital intelligence technologies such as Big data, artificial intelligence (AI) and blockchain, so as to promote the accounting education chain and talent chain to organically connect with the industrial chain and innovation chain, and meet the needs of the training and transformation of accounting professionals in the digital intelligence era.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80990957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
X-band multi-layer phase gradient metasurface for high efficiency far field subwavelength imaging 高效远场亚波长成像的x波段多层相位梯度超表面
Pub Date : 2022-12-08 DOI: 10.1117/12.2653455
Jinyu Wang, Yaoliang Song, J. Mao, R. Chen
The evanescent wave that can only exist on the surface of the objects is the main reason for diffraction limit, which limits the subwavelength details of the objects to the near field. This paper designs a multi-layer phase gradient metasurface with 10°/mm increment and 69% transmission efficiency in X-band. Evanescent wave can be converted into propagation wave and transmitted to the far field with the help of this metasurface. Through Fourier transform and spectrum analysis, two targets with 10mm subwavelength distance are successfully resolved and imaged around 10GHz.
衍射极限的主要原因是只能存在于物体表面的倏逝波,它将物体的亚波长细节限制在近场。本文设计了一种在x波段具有69%传输效率、增量为10°/mm的多层相位梯度超表面。利用这种超表面,可以将倏逝波转化为传播波,并传输到远场。通过傅里叶变换和频谱分析,成功地分辨出两个亚波长距离为10mm的目标,并在10GHz左右成像。
{"title":"X-band multi-layer phase gradient metasurface for high efficiency far field subwavelength imaging","authors":"Jinyu Wang, Yaoliang Song, J. Mao, R. Chen","doi":"10.1117/12.2653455","DOIUrl":"https://doi.org/10.1117/12.2653455","url":null,"abstract":"The evanescent wave that can only exist on the surface of the objects is the main reason for diffraction limit, which limits the subwavelength details of the objects to the near field. This paper designs a multi-layer phase gradient metasurface with 10°/mm increment and 69% transmission efficiency in X-band. Evanescent wave can be converted into propagation wave and transmitted to the far field with the help of this metasurface. Through Fourier transform and spectrum analysis, two targets with 10mm subwavelength distance are successfully resolved and imaged around 10GHz.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81178491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Acoustic experimental analysis of Yushu Tibetan affricate 玉树藏舌音的声学实验分析
Pub Date : 2022-12-08 DOI: 10.1117/12.2653832
Lingzhen Li, Yonghong Li
This paper takes the affricate of Tibetan Yushu dialect as the research object, and uses the acoustic experimental method to extract, analyze and summarize the acoustic parameters such as duration, center of gravity and dispersion, so as to describe the acoustic characteristics of the affricate of Yushu dialect. Firstly, the experiment uses the recording software Audition3.0 single channel adopts voice signal; Secondly, Matlab voice cutting program is used to generate a voice signal corresponding to a single name and voice; Then Praat is used to extract and analyze the parameters. It is concluded that the mean value of voice onset time can clearly distinguish the aspirated and unaspirated affricate of Yushu dialect; The more backward the pronunciation position is, the smaller the voice onset time duration is; The voice onset time value range of voiced affricate is larger than that of unvoiced affricate, and the voice onset time value range decreases with the back of the pronunciation part; The farther back the pronunciation part is, the longer the affricate time is; Compared with the unvoiced affricate, the center of gravity and dispersion of the voiced fricative spectrum are larger.
本文以藏语玉树方言的分音为研究对象,采用声学实验方法对分音时长、重心、弥散等声学参数进行提取、分析和总结,以描述玉树方言分音的声学特征。首先,实验采用录音软件Audition3.0单通道采用语音信号;其次,利用Matlab语音切割程序生成对应于单个姓名和语音的语音信号;然后使用Praat对参数进行提取和分析。得出的结论是:发声时间的平均值可以很好地区分玉树方言的送气和不送气元音;发音位置越靠后,发声起始时间越短;浊音非浊音的起音时间范围大于浊音非浊音的起音时间范围,且随着发音部分的后移,起音时间范围减小;发音部分越靠后,非闪音时间越长;与不发音的非清擦音相比,浊音摩擦谱的重心和弥散更大。
{"title":"Acoustic experimental analysis of Yushu Tibetan affricate","authors":"Lingzhen Li, Yonghong Li","doi":"10.1117/12.2653832","DOIUrl":"https://doi.org/10.1117/12.2653832","url":null,"abstract":"This paper takes the affricate of Tibetan Yushu dialect as the research object, and uses the acoustic experimental method to extract, analyze and summarize the acoustic parameters such as duration, center of gravity and dispersion, so as to describe the acoustic characteristics of the affricate of Yushu dialect. Firstly, the experiment uses the recording software Audition3.0 single channel adopts voice signal; Secondly, Matlab voice cutting program is used to generate a voice signal corresponding to a single name and voice; Then Praat is used to extract and analyze the parameters. It is concluded that the mean value of voice onset time can clearly distinguish the aspirated and unaspirated affricate of Yushu dialect; The more backward the pronunciation position is, the smaller the voice onset time duration is; The voice onset time value range of voiced affricate is larger than that of unvoiced affricate, and the voice onset time value range decreases with the back of the pronunciation part; The farther back the pronunciation part is, the longer the affricate time is; Compared with the unvoiced affricate, the center of gravity and dispersion of the voiced fricative spectrum are larger.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83350727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Long-term tracking algorithm of soccer player based on kernelized correlation filter 基于核相关滤波的足球运动员长期跟踪算法
Pub Date : 2022-12-08 DOI: 10.1117/12.2653524
Hongke Chen, Liang Lei
The performance of player object tracking in soccer match video is seriously affected by challenges like occlusion, out-of-view, similarity interference, low resolution, etc. To solve this problem, we propose a long-term tracking algorithm based on kernelized correlation filter. Firstly, the algorithm fuses shape, color and grayscale features to enhance the object representation ability and introduces scale filter to realize real-time scale estimation to improve the tracking accuracy and robustness. Secondly, the algorithm monitors tracking status in real time by the tracking result evaluation function. If the status judged good, the multi-peak re-detection of response map is used to review the tracking result. Otherwise, the object is re-detected through sliding windows to realize long-term tracking. The experimental results tested on Benchmark for Soccer Player Tracking (BSPT) demonstrate that the proposed tracker can achieve an accurate, real-time and long-term visual tracking for soccer player while runs at speed near 80 FPS.
足球比赛视频中球员目标跟踪的性能受到遮挡、视野外、相似干扰、低分辨率等挑战的严重影响。为了解决这一问题,我们提出了一种基于核相关滤波器的长期跟踪算法。该算法首先融合形状、颜色和灰度特征增强目标表示能力,引入尺度滤波实现实时尺度估计,提高跟踪精度和鲁棒性;其次,通过跟踪结果评价函数对跟踪状态进行实时监控;如果判断状态良好,则使用响应图的多峰重检测对跟踪结果进行评审。否则,通过滑动窗口重新检测目标,实现长期跟踪。在BSPT测试平台上的实验结果表明,该跟踪器可以在接近80 FPS的速度下实现对足球运动员的准确、实时和长期的视觉跟踪。
{"title":"Long-term tracking algorithm of soccer player based on kernelized correlation filter","authors":"Hongke Chen, Liang Lei","doi":"10.1117/12.2653524","DOIUrl":"https://doi.org/10.1117/12.2653524","url":null,"abstract":"The performance of player object tracking in soccer match video is seriously affected by challenges like occlusion, out-of-view, similarity interference, low resolution, etc. To solve this problem, we propose a long-term tracking algorithm based on kernelized correlation filter. Firstly, the algorithm fuses shape, color and grayscale features to enhance the object representation ability and introduces scale filter to realize real-time scale estimation to improve the tracking accuracy and robustness. Secondly, the algorithm monitors tracking status in real time by the tracking result evaluation function. If the status judged good, the multi-peak re-detection of response map is used to review the tracking result. Otherwise, the object is re-detected through sliding windows to realize long-term tracking. The experimental results tested on Benchmark for Soccer Player Tracking (BSPT) demonstrate that the proposed tracker can achieve an accurate, real-time and long-term visual tracking for soccer player while runs at speed near 80 FPS.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83825806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A stacked ensemble learning model using heterogeneous base-leaners for information security intrusion detection 基于异构基础学习器的信息安全入侵检测的堆叠集成学习模型
Pub Date : 2022-12-08 DOI: 10.1117/12.2653422
Chen Chen, Yajiang Qi, Xiaoyan Ye, Guanghua Wang, Lintao Yang, Haiyue Ji
In network intrusion detection, using a machine learning method alone has blind spots and low detection accuracy. A stacked ensemble learning model using heterogeneous base-leaners for information security intrusion detection is proposed. Firstly, the convolution neural network is used to extract the deep information in the original data set, which is normalized as the input of the model. In constructing base classifiers, different heterogeneous model combinations are used to enhance the diversity of base classifiers. Experiments on NSL-KDD dataset show that the proposed model can comprehensively improve the detection accuracy, accuracy, recall and F1-score.
在网络入侵检测中,单独使用机器学习方法存在盲点,检测精度不高。提出了一种基于异构基础学习器的信息安全入侵检测的堆叠集成学习模型。首先,利用卷积神经网络提取原始数据集中的深度信息,并将其归一化作为模型的输入;在构建基分类器时,采用不同的异构模型组合来增强基分类器的多样性。在NSL-KDD数据集上的实验表明,该模型能全面提高检测准确率、准确率、查全率和f1分数。
{"title":"A stacked ensemble learning model using heterogeneous base-leaners for information security intrusion detection","authors":"Chen Chen, Yajiang Qi, Xiaoyan Ye, Guanghua Wang, Lintao Yang, Haiyue Ji","doi":"10.1117/12.2653422","DOIUrl":"https://doi.org/10.1117/12.2653422","url":null,"abstract":"In network intrusion detection, using a machine learning method alone has blind spots and low detection accuracy. A stacked ensemble learning model using heterogeneous base-leaners for information security intrusion detection is proposed. Firstly, the convolution neural network is used to extract the deep information in the original data set, which is normalized as the input of the model. In constructing base classifiers, different heterogeneous model combinations are used to enhance the diversity of base classifiers. Experiments on NSL-KDD dataset show that the proposed model can comprehensively improve the detection accuracy, accuracy, recall and F1-score.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83030904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network digital media refactoring resource dynamic allocation method 网络数字媒体重构资源动态分配方法
Pub Date : 2022-12-08 DOI: 10.1117/12.2653712
Hongyan Ren, Yan Yang
With the continuous development of new media and network information technology, more and more reconfigurable resources of network digital media are needed to build a reconfigurable resource allocation model in network space. The dynamic allocation method of network digital media reconfigurable resources based on multi-source feature fusion cluster analysis is feasible to a certain extent. Combined with the result of feature extraction, the dynamic allocation of reconfigurable resources is realized. Research on the reconfigurable resource allocation method of network digital media is of great significance in improving the utilization capacity of network resources. Traditional method, the dynamic network reconfigurable digital media resources allocation methods mainly include dynamic allocation method based on the characteristics of correlation analysis, PCA principal component analysis method of dynamic allocation and dynamic allocation of fusion k-means clustering method and so on, USES the statistical features extraction and autocorrelation detection, realize reconfigurable dynamic allocation of resources, However, the traditional method of resource allocation has poor fitness and weak feature identification ability, so it needs to be changed. This paper mainly describes the dynamic allocation method of reconfigurable resources of network digital media, aiming at strengthening the allocation of network digital media resources, so as to further improve the dynamic allocation ability of reconfigurable resources and speed up the application of network digital media.
随着新媒体和网络信息技术的不断发展,需要越来越多的网络数字媒体的可重构资源来构建网络空间的可重构资源配置模型。基于多源特征融合聚类分析的网络数字媒体可重构资源动态分配方法具有一定的可行性。结合特征提取结果,实现了可重构资源的动态分配。研究网络数字媒体的可重构资源分配方法,对提高网络资源的利用能力具有重要意义。传统方法中,动态网络可重构数字媒体资源分配方法主要有基于特征相关性分析的动态分配方法、PCA主成分分析的动态分配方法和融合k均值聚类的动态分配方法等,利用统计特征提取和自相关检测,实现资源的可重构动态分配。传统的资源分配方法适应度差,特征识别能力弱,需要改变。本文主要描述了网络数字媒体可重构资源的动态配置方法,旨在加强网络数字媒体资源的配置,从而进一步提高可重构资源的动态配置能力,加快网络数字媒体的应用。
{"title":"Network digital media refactoring resource dynamic allocation method","authors":"Hongyan Ren, Yan Yang","doi":"10.1117/12.2653712","DOIUrl":"https://doi.org/10.1117/12.2653712","url":null,"abstract":"With the continuous development of new media and network information technology, more and more reconfigurable resources of network digital media are needed to build a reconfigurable resource allocation model in network space. The dynamic allocation method of network digital media reconfigurable resources based on multi-source feature fusion cluster analysis is feasible to a certain extent. Combined with the result of feature extraction, the dynamic allocation of reconfigurable resources is realized. Research on the reconfigurable resource allocation method of network digital media is of great significance in improving the utilization capacity of network resources. Traditional method, the dynamic network reconfigurable digital media resources allocation methods mainly include dynamic allocation method based on the characteristics of correlation analysis, PCA principal component analysis method of dynamic allocation and dynamic allocation of fusion k-means clustering method and so on, USES the statistical features extraction and autocorrelation detection, realize reconfigurable dynamic allocation of resources, However, the traditional method of resource allocation has poor fitness and weak feature identification ability, so it needs to be changed. This paper mainly describes the dynamic allocation method of reconfigurable resources of network digital media, aiming at strengthening the allocation of network digital media resources, so as to further improve the dynamic allocation ability of reconfigurable resources and speed up the application of network digital media.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83191974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Source location privacy protection mechanism against global attackers 针对全局攻击者的源位置隐私保护机制
Pub Date : 2022-12-08 DOI: 10.1117/12.2653558
Ruiqi Ma, Ziyong Li, Yuxiang Hu, Jinchuan Pei
For global attackers with stronger attack capabilities, this paper proposes a source location privacy protection (FS-SLP) mechanism based on pseudo-source nodes. The mechanism uses the global view information of the network and the location information of the current source node to dynamically generate multiple evenly distributed pseudo-source nodes in the network. The pseudo-source node transmits fake data to the sink node when the source node transmits real data packets to the sink node. packets, which greatly increases the difficulty of traffic analysis for attackers; to further enhance the security of the source node, this mechanism generates a dynamically adjustable filtering confusion ring near the sink node, and the nodes in the filtering confusion ring reduce the transmission path. At the same time, the transmission path of true and false data packets is confused, which reduces the energy consumption of nodes near the sink node and further increases the analysis difficulty of the attacker. Simulation experiments show that, compared with the existing scheme, this mechanism greatly prolongs the security period of the network on the premise of increasing a small amount of energy consumption.
针对攻击能力较强的全局攻击者,本文提出了一种基于伪源节点的源位置隐私保护(FS-SLP)机制。该机制利用网络的全局视图信息和当前源节点的位置信息,在网络中动态生成多个均匀分布的伪源节点。当源节点向汇聚节点发送真实数据包时,伪源节点向汇聚节点发送虚假数据。数据包,这大大增加了攻击者流量分析的难度;为了进一步增强源节点的安全性,该机制在汇聚节点附近产生一个动态可调的滤波混淆环,滤波混淆环中的节点减少了传输路径。同时,混淆了真假数据包的传输路径,降低了汇聚节点附近节点的能耗,进一步增加了攻击者的分析难度。仿真实验表明,与现有方案相比,该机制在增加少量能耗的前提下,大大延长了网络的安全周期。
{"title":"Source location privacy protection mechanism against global attackers","authors":"Ruiqi Ma, Ziyong Li, Yuxiang Hu, Jinchuan Pei","doi":"10.1117/12.2653558","DOIUrl":"https://doi.org/10.1117/12.2653558","url":null,"abstract":"For global attackers with stronger attack capabilities, this paper proposes a source location privacy protection (FS-SLP) mechanism based on pseudo-source nodes. The mechanism uses the global view information of the network and the location information of the current source node to dynamically generate multiple evenly distributed pseudo-source nodes in the network. The pseudo-source node transmits fake data to the sink node when the source node transmits real data packets to the sink node. packets, which greatly increases the difficulty of traffic analysis for attackers; to further enhance the security of the source node, this mechanism generates a dynamically adjustable filtering confusion ring near the sink node, and the nodes in the filtering confusion ring reduce the transmission path. At the same time, the transmission path of true and false data packets is confused, which reduces the energy consumption of nodes near the sink node and further increases the analysis difficulty of the attacker. Simulation experiments show that, compared with the existing scheme, this mechanism greatly prolongs the security period of the network on the premise of increasing a small amount of energy consumption.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88297747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
JITeCS Journal of Information Technology and Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1