首页 > 最新文献

Journal of ICT Standardization最新文献

英文 中文
Multi-Path Data Transmission System Based on 5G Communication Technology 基于 5G 通信技术的多路径数据传输系统
Q3 Decision Sciences Pub Date : 2024-03-01 DOI: 10.13052/jicts2245-800X.1214
Jun Lu;Guowei Huang;Dan Hu;Wenke Kuai
Due to the current problems of 5G(5th Generation Mobile Communication Technology) networks such as discontinuous coverage, poor coverage performance, and insufficient uplink rate, the real-time transmission performance of 5G networks has been greatly affected, and cannot meet the growing needs of high-speed communication and applications based on the Internet of Things. This paper aims to improve the transmission effect of 5G communication technology by improving the algorithm. By analyzing the problems of existing 5G bandwidth estimation algorithm, this paper proposes a Westwood-based coupling adaptive bandwidth estimation algorithm, and describes the algorithm ideas involved in the algorithm point-by-point. Moreover, this paper uses adaptive bandwidth estimation algorithm to update the slow start threshold in the fast retransmission phase, which makes the congestion window size of path transmission more reasonable. Simulation results show that the congestion control algorithm proposed in this paper improves the accuracy of link bandwidth estimation to a certain extent, improves the link congestion situation and improves the throughput of multipath transmission links. This article can be applied to the algorithm in multipath data transmission to further improve data processing efficiency and processing speed. Therefore, the improved method in this paper can be used in the practice of 5G communication to further improve the efficiency of 5G communication.
由于目前5G(第五代移动通信技术)网络存在覆盖不连续、覆盖性能差、上行速率不足等问题,5G网络的实时传输性能受到很大影响,无法满足日益增长的高速通信和基于物联网的应用需求。本文旨在通过改进算法来提高 5G 通信技术的传输效果。通过分析现有5G带宽估算算法存在的问题,本文提出了一种基于Westwood耦合的自适应带宽估算算法,并逐点阐述了该算法所涉及的算法思想。此外,本文利用自适应带宽估计算法更新了快速重传阶段的慢启动阈值,使得路径传输的拥塞窗口大小更加合理。仿真结果表明,本文提出的拥塞控制算法在一定程度上提高了链路带宽估计的准确性,改善了链路拥塞状况,提高了多径传输链路的吞吐量。本文可应用于多径数据传输中的算法,进一步提高数据处理效率和处理速度。因此,本文的改进方法可用于 5G 通信的实践中,进一步提高 5G 通信的效率。
{"title":"Multi-Path Data Transmission System Based on 5G Communication Technology","authors":"Jun Lu;Guowei Huang;Dan Hu;Wenke Kuai","doi":"10.13052/jicts2245-800X.1214","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1214","url":null,"abstract":"Due to the current problems of 5G(5th Generation Mobile Communication Technology) networks such as discontinuous coverage, poor coverage performance, and insufficient uplink rate, the real-time transmission performance of 5G networks has been greatly affected, and cannot meet the growing needs of high-speed communication and applications based on the Internet of Things. This paper aims to improve the transmission effect of 5G communication technology by improving the algorithm. By analyzing the problems of existing 5G bandwidth estimation algorithm, this paper proposes a Westwood-based coupling adaptive bandwidth estimation algorithm, and describes the algorithm ideas involved in the algorithm point-by-point. Moreover, this paper uses adaptive bandwidth estimation algorithm to update the slow start threshold in the fast retransmission phase, which makes the congestion window size of path transmission more reasonable. Simulation results show that the congestion control algorithm proposed in this paper improves the accuracy of link bandwidth estimation to a certain extent, improves the link congestion situation and improves the throughput of multipath transmission links. This article can be applied to the algorithm in multipath data transmission to further improve data processing efficiency and processing speed. Therefore, the improved method in this paper can be used in the practice of 5G communication to further improve the efficiency of 5G communication.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10695803","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142324362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Setting Standards for Personal Health Data in the Age of 5G and 6G Networks 制定 5G 和 6G 网络时代的个人健康数据标准
Q3 Decision Sciences Pub Date : 2024-03-01 DOI: 10.13052/jicts2245-800X.1213
Ana Koren;Ramjee Prasad
Electronic health records (EHRs) play a vital role in simplifying thorough and effective patient treatment, promoting smooth exchange of information between medical professionals, and enhancing the process of making clinical decisions. With the increasing adoption of sensor-embedded smart wearables and home automation devices, new opportunities arise for innovative solutions in various sectors, such as eHealth. In the age of 5G and 6G, the potential of utilizing user-collected health data becomes vast, promising significant improvements in people's health and well-being. Realizing continuous healthcare access takes a step closer to reality by equipping EHRs to effectively store and interpret data collected by these sensors. This would result in personalized medical services that adhere to standardized practices. This paper presents a comprehensive review of contemporary advancements in the realm of standardization methods aimed at managing personal health data. The study delves into an extensive analysis of state-of-the-art solutions that have emerged to address the intricate challenges associated with the harmonization and uniformity of personal health information. By systematically examining these cutting-edge approaches, the review elucidates the diverse strategies employed to establish a cohesive framework for organizing, storing, and exchanging personal health data. Furthermore, the review critically evaluates the effectiveness and limitations of each solution in terms of promoting interoperability, safeguarding data privacy, and facilitating seamless data sharing among healthcare stakeholders. Furthermore, this paper then presents an approach to standardize the data by establishing semantic constraints for healthcare data types and proposing a validation procedure to ensure compliance with relevant standards and regulations.
电子健康记录(EHR)在简化病人的全面有效治疗、促进医疗专业人员之间的顺畅信息交流以及加强临床决策过程方面发挥着至关重要的作用。随着嵌入传感器的智能可穿戴设备和家庭自动化设备的日益普及,为电子健康等各领域的创新解决方案带来了新的机遇。在 5G 和 6G 时代,利用用户收集的健康数据的潜力变得巨大,有望显著改善人们的健康和福祉。通过为电子病历配备有效存储和解释这些传感器所收集数据的设备,实现持续的医疗保健就离现实更近了一步。这将带来符合标准化实践的个性化医疗服务。本文全面回顾了旨在管理个人健康数据的标准化方法领域的最新进展。该研究深入广泛地分析了为应对与个人健康信息的协调和统一相关的复杂挑战而出现的最新解决方案。通过系统地研究这些前沿方法,综述阐明了为建立一个组织、存储和交换个人健康数据的统一框架而采用的各种策略。此外,综述还对每种解决方案在促进互操作性、保护数据隐私和促进医疗保健利益相关者之间无缝数据共享方面的有效性和局限性进行了批判性评估。此外,本文还介绍了一种数据标准化方法,即为医疗保健数据类型建立语义约束,并提出一种验证程序,以确保符合相关标准和法规。
{"title":"Setting Standards for Personal Health Data in the Age of 5G and 6G Networks","authors":"Ana Koren;Ramjee Prasad","doi":"10.13052/jicts2245-800X.1213","DOIUrl":"10.13052/jicts2245-800X.1213","url":null,"abstract":"Electronic health records (EHRs) play a vital role in simplifying thorough and effective patient treatment, promoting smooth exchange of information between medical professionals, and enhancing the process of making clinical decisions. With the increasing adoption of sensor-embedded smart wearables and home automation devices, new opportunities arise for innovative solutions in various sectors, such as eHealth. In the age of 5G and 6G, the potential of utilizing user-collected health data becomes vast, promising significant improvements in people's health and well-being. Realizing continuous healthcare access takes a step closer to reality by equipping EHRs to effectively store and interpret data collected by these sensors. This would result in personalized medical services that adhere to standardized practices. This paper presents a comprehensive review of contemporary advancements in the realm of standardization methods aimed at managing personal health data. The study delves into an extensive analysis of state-of-the-art solutions that have emerged to address the intricate challenges associated with the harmonization and uniformity of personal health information. By systematically examining these cutting-edge approaches, the review elucidates the diverse strategies employed to establish a cohesive framework for organizing, storing, and exchanging personal health data. Furthermore, the review critically evaluates the effectiveness and limitations of each solution in terms of promoting interoperability, safeguarding data privacy, and facilitating seamless data sharing among healthcare stakeholders. Furthermore, this paper then presents an approach to standardize the data by establishing semantic constraints for healthcare data types and proposing a validation procedure to ensure compliance with relevant standards and regulations.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10695799","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141117055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Continuous Hidden Markov Algorithm-Based Multimedia Melody Retrieval System for Music Education 基于连续隐马尔可夫算法的音乐教育多媒体旋律检索系统
Q3 Decision Sciences Pub Date : 2024-03-01 DOI: 10.13052/jicts2245-800X.1211
Yingjie Cheng
Education professionals receive instruction in Music Education (ME) to prepare for prospective jobs like secondary or primary music teachers, schools ensembles executives, or ensembles directors at music institutions. In the discipline of music education, educators do original research on different approaches to teaching and studying music. The most accurate and effective method of extracting music from huge music databases has become one of the most frequently discussed participants in contemporary multimedia information retrieval development. The essence of multimedia material is presented within a range of techniques since it is not bound to a single side. These several categories could consist of the song's audio components and lyrics for musical information. Retrieving melodic information, subsequently, becomes the main focus of most recent studies. Aside from being an expensive deviate from academics, music programs are neither a viable profession neither a valid pastime. Therefore, in this study, we offer a Continuous Hidden Markov Algorithm (CHMA) related a novel method for recovering melodies from musical multimedia recordings. CHMA is considered to be the most basic dynamic Bayesian network. Two various types of audio frame features and audio example features are extracted throughout the feature extraction procedure from the audio signal according to unit length. Every music clip receives a unique approach that we implement with concurrently using various CHMA. The initial music gets processed using a trained CHMA that monitors fundamental frequencies, maps states, and generates retrieval outcomes. The training time for Traditional opera reached 455.76 minutes, the testing time for Narration achieved 56.10 minutes, and the recognition accuracy for advertisement reached an impressive 98.02%. A subsequently experimental result validates the applicability of the proposed approach.
教育专业人士接受音乐教育(ME)的指导,为未来的工作做准备,如中学或小学音乐教师、学校乐团执行官或音乐院校的乐团指挥。在音乐教育学科中,教育工作者对不同的音乐教学和研究方法进行原创性研究。从庞大的音乐数据库中提取音乐的最准确、最有效的方法已成为当代多媒体信息检索发展中最常讨论的问题之一。多媒体资料的本质是在一系列技术中呈现出来的,因为它并不局限于一个方面。这些类别可以包括歌曲的音频成分和歌词等音乐信息。因此,检索旋律信息成为近期研究的重点。除了学费昂贵之外,音乐课程既不是一种可行的职业,也不是一种有效的消遣。因此,在本研究中,我们提出了一种与连续隐马尔可夫算法(CHMA)相关的从音乐多媒体录音中恢复旋律的新方法。CHMA 被认为是最基本的动态贝叶斯网络。在整个特征提取过程中,根据单位长度从音频信号中提取两种不同类型的音频帧特征和音频示例特征。每个音乐片段都会采用一种独特的方法,我们同时使用各种 CHMA 来实现这种方法。初始音乐通过训练有素的 CHMA 进行处理,CHMA 监测基频、映射状态并生成检索结果。传统戏曲的训练时间达到了 455.76 分钟,旁白的测试时间达到了 56.10 分钟,广告的识别准确率达到了令人印象深刻的 98.02%。随后的实验结果验证了建议方法的适用性。
{"title":"A Continuous Hidden Markov Algorithm-Based Multimedia Melody Retrieval System for Music Education","authors":"Yingjie Cheng","doi":"10.13052/jicts2245-800X.1211","DOIUrl":"10.13052/jicts2245-800X.1211","url":null,"abstract":"Education professionals receive instruction in Music Education (ME) to prepare for prospective jobs like secondary or primary music teachers, schools ensembles executives, or ensembles directors at music institutions. In the discipline of music education, educators do original research on different approaches to teaching and studying music. The most accurate and effective method of extracting music from huge music databases has become one of the most frequently discussed participants in contemporary multimedia information retrieval development. The essence of multimedia material is presented within a range of techniques since it is not bound to a single side. These several categories could consist of the song's audio components and lyrics for musical information. Retrieving melodic information, subsequently, becomes the main focus of most recent studies. Aside from being an expensive deviate from academics, music programs are neither a viable profession neither a valid pastime. Therefore, in this study, we offer a Continuous Hidden Markov Algorithm (CHMA) related a novel method for recovering melodies from musical multimedia recordings. CHMA is considered to be the most basic dynamic Bayesian network. Two various types of audio frame features and audio example features are extracted throughout the feature extraction procedure from the audio signal according to unit length. Every music clip receives a unique approach that we implement with concurrently using various CHMA. The initial music gets processed using a trained CHMA that monitors fundamental frequencies, maps states, and generates retrieval outcomes. The training time for Traditional opera reached 455.76 minutes, the testing time for Narration achieved 56.10 minutes, and the recognition accuracy for advertisement reached an impressive 98.02%. A subsequently experimental result validates the applicability of the proposed approach.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10695800","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141117611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Task Scheduling for Internet of Things Cloud Computing Based on Improved Chicken Swarm Optimization Algorithm 基于改进鸡群优化算法的物联网云计算任务调度研究
Q3 Decision Sciences Pub Date : 2024-03-01 DOI: 10.13052/jicts2245-800X.1212
Shizheng Liu;Xuan Chen;Feng Cheng
Aiming at the shortcomings of long completion time and high consumption cost of cloud computing batch task scheduling in IoT, an Improved Chicken Swarm Optimization Algorithm (ICSO) for task scheduling in cloud computing scenarios is proposed. Specifically, in order to solve the problems of slow convergence and falling into local optimum of the chicken swarm optimization algorithm, we adopt the nonlinear decreasing technique of the rooster and the weighting technique of the hen, optimize the following coefficients of the chicks, and apply ICSO to cloud computing task scheduling. In simulation experiments, we conducted a large number of experiments using four standard benchmark functions with different number of tasks and the results show that ICSO algorithm reduces 25.8%, 9.3%, 8.8%, 7.5% in small task time compared to CSO, DCSO, GCSO, ABCSO in large task time by 30.8%, 8.3%, 7.8%, 6.3%, 11.8%, 10.3%, 8.8%, 7.5% savings in small task cost and 25.8%, 11.2%, 10.8%, 9.3% savings in large task cost. This method effectively reduces task scheduling time and cost consumption. Meanwhile, we tested it in combination with an IoT-based cloud platform and achieved very satisfying Results.
针对物联网中云计算批量任务调度存在的完成时间长、消耗成本高等缺点,提出了一种适用于云计算场景下任务调度的改进鸡群优化算法(ICSO)。具体来说,为了解决鸡群优化算法收敛慢和陷入局部最优的问题,我们采用了公鸡的非线性递减技术和母鸡的加权技术,优化了小鸡的跟随系数,并将 ICSO 应用于云计算任务调度。在仿真实验中,我们使用四个标准基准函数进行了大量不同任务数的实验,结果表明,与CSO、DCSO、GCSO、ABCSO相比,ICSO算法在小任务时间上分别节省了25.8%、9.3%、8.8%、7.5%,在大任务时间上分别节省了30.8%、8.3%、7.8%、6.3%、11.8%、10.3%、8.8%、7.5%,在小任务成本上分别节省了25.8%、11.2%、10.8%、9.3%,在大任务成本上分别节省了25.8%、11.2%、10.8%、9.3%。这种方法有效地减少了任务调度时间和成本消耗。同时,我们将其与基于物联网的云平台相结合进行了测试,取得了非常令人满意的结果。
{"title":"Research on Task Scheduling for Internet of Things Cloud Computing Based on Improved Chicken Swarm Optimization Algorithm","authors":"Shizheng Liu;Xuan Chen;Feng Cheng","doi":"10.13052/jicts2245-800X.1212","DOIUrl":"10.13052/jicts2245-800X.1212","url":null,"abstract":"Aiming at the shortcomings of long completion time and high consumption cost of cloud computing batch task scheduling in IoT, an Improved Chicken Swarm Optimization Algorithm (ICSO) for task scheduling in cloud computing scenarios is proposed. Specifically, in order to solve the problems of slow convergence and falling into local optimum of the chicken swarm optimization algorithm, we adopt the nonlinear decreasing technique of the rooster and the weighting technique of the hen, optimize the following coefficients of the chicks, and apply ICSO to cloud computing task scheduling. In simulation experiments, we conducted a large number of experiments using four standard benchmark functions with different number of tasks and the results show that ICSO algorithm reduces 25.8%, 9.3%, 8.8%, 7.5% in small task time compared to CSO, DCSO, GCSO, ABCSO in large task time by 30.8%, 8.3%, 7.8%, 6.3%, 11.8%, 10.3%, 8.8%, 7.5% savings in small task cost and 25.8%, 11.2%, 10.8%, 9.3% savings in large task cost. This method effectively reduces task scheduling time and cost consumption. Meanwhile, we tested it in combination with an IoT-based cloud platform and achieved very satisfying Results.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10695802","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141117589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Overview of Information and Cyber Security Standards 信息和网络安全标准概述
Q3 Decision Sciences Pub Date : 2024-03-01 DOI: 10.13052/jicts2245-800X.1215
Hugh Boyes;Matthew D. Higgins
Advances in digitalization, particularly those regarding cyber-physical systems (CPS) have stimulated the adoption of digital capabilities such as Industrial IoT, machine learning, cloud services, and the use of digital twins. The increased digital sophistication of CPS is not without risk, particularly regarding the potential for information/cyber security incidents. Whilst the need for security of enterprise information security is not new, A significant challenge is understanding what security standards may be available and applicable when developing security controls and technical measures to protect CPS. This paper explores what research is available regarding the choice and comparison of information/cyber security standards. It provides a snapshot of the security standards landscape at the start of 2024. Issues relating to development and adoption of security standards are examined, illustrated using inconsistencies in language regarding three key terms: availability, integrity, and confidentiality.
数字化的进步,尤其是网络物理系统(CPS)方面的进步,刺激了工业物联网、机器学习、云服务和数字孪生的使用等数字化能力的采用。CPS 数字功能的日益复杂化并非没有风险,尤其是在潜在的信息/网络安全事件方面。虽然对企业信息安全的需求并不新鲜,但在开发安全控制和技术措施以保护 CPS 时,一项重大挑战是了解哪些安全标准可能可用和适用。本文探讨了有关信息/网络安全标准的选择和比较的现有研究。本文将简要介绍 2024 年初的安全标准情况。本文探讨了与制定和采用安全标准有关的问题,并用三个关键术语(可用性、完整性和保密性)的用语不一致进行了说明。
{"title":"An Overview of Information and Cyber Security Standards","authors":"Hugh Boyes;Matthew D. Higgins","doi":"10.13052/jicts2245-800X.1215","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1215","url":null,"abstract":"Advances in digitalization, particularly those regarding cyber-physical systems (CPS) have stimulated the adoption of digital capabilities such as Industrial IoT, machine learning, cloud services, and the use of digital twins. The increased digital sophistication of CPS is not without risk, particularly regarding the potential for information/cyber security incidents. Whilst the need for security of enterprise information security is not new, A significant challenge is understanding what security standards may be available and applicable when developing security controls and technical measures to protect CPS. This paper explores what research is available regarding the choice and comparison of information/cyber security standards. It provides a snapshot of the security standards landscape at the start of 2024. Issues relating to development and adoption of security standards are examined, illustrated using inconsistencies in language regarding three key terms: availability, integrity, and confidentiality.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10695801","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142324363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Elliptic Curve Cryptosystem with Bitcoin Curves on SECP256k1, NIST256p, NIST521p, and LLL 基于比特币曲线的椭圆曲线密码系统在SECP256k1、NIST256p、NIST521p和ll上的实现
Q3 Decision Sciences Pub Date : 2023-11-22 DOI: 10.13052/jicts2245-800X.1141
Mohammed Mujeer Ulla;Preethi;Md. Sameeruddin Khan;Deepak S. Sakkari
Very recent attacks like ladder leaks demonstrated the feasibility of recovering private keys with side-channel attacks using just one bit of secret nonce. ECDSA nonce bias can be exploited in many ways. Some attacks on ECDSA involve complicated Fourier analysis and lattice mathematics. This paper will enable cryptographers to identify efficient ways in which ECDSA can be cracked on curves NIST256p, SECP256k1, NIST521p, and weak nonce, kind of attacks that can crack ECDSA and how to protect yourself. Initially, we begin with an ECDSA signature to sign a message using the private key and validate the generated signature using the shared public key. Then we use a nonce or a random value to randomize the generated signature. Every time we sign, a new verifiable random nonce value is created, and a way in which the intruder can discover the private key if the signer leaks any one of the nonce values. Then we use Lenstra-Lenstra-Lovasz (LLL) method as a black box, we will try to attack signatures generated from bad nonce or bad random number generator (RAG) on NIST256p, SECP256k1 curves. The combination of nonce generation, post-message signing, and validation in ECDSA helps achieve Uniqueness, Authentication, Integrity, and Non-Repudiation. The analysis is performed by considering all three curves for the implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA). The comparative analysis for each of the selected curves in terms of computational time is done with the leak of nonce and with the Lenstra-Lenstra-Lovasz method to crack ECDSA. The average computational costs to break ECDSA with curves NIST256p, NIST521p, and SECP256k1 are 0.016, 0.34,0.46 respectively which is almost zero depicting the strength of the algorithm. The average computational costs to break ECDSA with curves SECP256K1 and NIST256p using LLL are 2.9 and 3.4 respectively
最近的攻击,如阶梯泄漏,证明了利用侧通道攻击恢复私钥的可行性。ECDSA nonce偏差可以在许多方面被利用。对ECDSA的一些攻击涉及复杂的傅里叶分析和格数学。本文将使密码学家能够识别在曲线NIST256p, SECP256k1, NIST521p和弱nonce上破解ECDSA的有效方法,可以破解ECDSA的攻击类型以及如何保护自己。首先,我们从ECDSA签名开始,使用私钥对消息进行签名,并使用共享公钥验证生成的签名。然后我们使用随机数或随机值来随机化生成的签名。每次我们签名时,都会创建一个新的可验证的随机nonce值,并且如果签名者泄露任何一个nonce值,入侵者可以通过这种方式发现私钥。然后我们使用Lenstra-Lenstra-Lovasz (LLL)方法作为黑盒,我们将尝试攻击由NIST256p, SECP256k1曲线上的坏随机数生成器(RAG)或坏随机数生成器(RAG)生成的签名。ECDSA中nonce生成、消息后签名和验证的组合有助于实现唯一性、身份验证、完整性和不可否认性。通过考虑实现椭圆曲线数字签名算法(ECDSA)的所有三条曲线来进行分析。利用nonce泄漏和Lenstra-Lenstra-Lovasz方法对所选曲线的计算时间进行了比较分析。利用曲线NIST256p、NIST521p和SECP256k1破坏ECDSA的平均计算成本分别为0.016、0.34和0.46,几乎为零,说明了算法的强度。使用LLL破坏SECP256K1和NIST256p曲线的ECDSA的平均计算成本分别为2.9和3.4
{"title":"Implementation of Elliptic Curve Cryptosystem with Bitcoin Curves on SECP256k1, NIST256p, NIST521p, and LLL","authors":"Mohammed Mujeer Ulla;Preethi;Md. Sameeruddin Khan;Deepak S. Sakkari","doi":"10.13052/jicts2245-800X.1141","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1141","url":null,"abstract":"Very recent attacks like ladder leaks demonstrated the feasibility of recovering private keys with side-channel attacks using just one bit of secret nonce. ECDSA nonce bias can be exploited in many ways. Some attacks on ECDSA involve complicated Fourier analysis and lattice mathematics. This paper will enable cryptographers to identify efficient ways in which ECDSA can be cracked on curves NIST256p, SECP256k1, NIST521p, and weak nonce, kind of attacks that can crack ECDSA and how to protect yourself. Initially, we begin with an ECDSA signature to sign a message using the private key and validate the generated signature using the shared public key. Then we use a nonce or a random value to randomize the generated signature. Every time we sign, a new verifiable random nonce value is created, and a way in which the intruder can discover the private key if the signer leaks any one of the nonce values. Then we use Lenstra-Lenstra-Lovasz (LLL) method as a black box, we will try to attack signatures generated from bad nonce or bad random number generator (RAG) on NIST256p, SECP256k1 curves. The combination of nonce generation, post-message signing, and validation in ECDSA helps achieve Uniqueness, Authentication, Integrity, and Non-Repudiation. The analysis is performed by considering all three curves for the implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA). The comparative analysis for each of the selected curves in terms of computational time is done with the leak of nonce and with the Lenstra-Lenstra-Lovasz method to crack ECDSA. The average computational costs to break ECDSA with curves NIST256p, NIST521p, and SECP256k1 are 0.016, 0.34,0.46 respectively which is almost zero depicting the strength of the algorithm. The average computational costs to break ECDSA with curves SECP256K1 and NIST256p using LLL are 2.9 and 3.4 respectively","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10326102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138431209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Models: A Study of English Essay Text Content Feature Extraction and Automatic Scoring 机器学习模型:英语短文文本内容特征提取与自动评分研究
Q3 Decision Sciences Pub Date : 2023-11-22 DOI: 10.13052/jicts2245-800X.1143
Wei Shang;Huihua Men;Xiujie Du
Accurate automatic scoring of English essay is beneficial for both teachers and students in English teaching. This paper briefly introduced an XGBoost-based automated scoring algorithm for English essay. To improve the accuracy of the algorithm, a long short-term memory (LSTM) semantic model was introduced to extract semantic scoring features from essays. Finally, the improved XGBoost algorithm was compared with the traditional XGBoost and LSTM algorithms in a simulation experiment using five types of essay prompts. The results indicate that the improved XGBoost algorithm has the best performance for automatic scoring of English essay and also requires the shortest scoring time.
准确的英语作文自动评分对英语教学中的师生都是有益的。本文简要介绍了一种基于xgboost的英语作文自动评分算法。为了提高算法的准确性,引入了长短期记忆(LSTM)语义模型,从文章中提取语义评分特征。最后,利用五种类型的作文提示,将改进的XGBoost算法与传统的XGBoost和LSTM算法进行了仿真实验比较。结果表明,改进的XGBoost算法在英语作文自动评分中表现最好,且评分时间最短。
{"title":"Machine Learning Models: A Study of English Essay Text Content Feature Extraction and Automatic Scoring","authors":"Wei Shang;Huihua Men;Xiujie Du","doi":"10.13052/jicts2245-800X.1143","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1143","url":null,"abstract":"Accurate automatic scoring of English essay is beneficial for both teachers and students in English teaching. This paper briefly introduced an XGBoost-based automated scoring algorithm for English essay. To improve the accuracy of the algorithm, a long short-term memory (LSTM) semantic model was introduced to extract semantic scoring features from essays. Finally, the improved XGBoost algorithm was compared with the traditional XGBoost and LSTM algorithms in a simulation experiment using five types of essay prompts. The results indicate that the improved XGBoost algorithm has the best performance for automatic scoring of English essay and also requires the shortest scoring time.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10326100","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138431044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on an Intelligent Algorithm for Automatic Test Paper Generation and Scoring in University English Exams 大学英语考试试卷自动生成与评分的智能算法研究
Q3 Decision Sciences Pub Date : 2023-11-22 DOI: 10.13052/jicts2245-800X.1144
Han Yang
This paper mainly studied the automatic test paper generation and scoring problems in university English exams. Firstly, an automatic test paper generation model was established. Then, an improved genetic algorithm (IGA) was designed for intelligent test paper generation, and it was also used to automatically score answers to Chinese-to-English translation questions in terms of syntax and semantics. It was found that compared with the traditional GA and particle swarm optimization algorithm, the IGA method was faster in generating test papers, with an average generation time of 25 s, and had a higher success rate (94%), suggesting higher validity, and the difficulty and differentiation degrees of the test papers were closer to the preset values. The results of automatic scoring also had a correlation of more than 0.8 with the manual scoring results. The results prove the effectiveness of the automatic test paper generation and scoring method. It can be promoted and applied in practice to enhance the security and fairness of large-scale English exams, as well as achieve objectivity and consistency in scoring.
本文主要研究了大学英语考试中的自动出卷及评分问题。首先,建立了试卷自动生成模型;然后,设计了一种改进的遗传算法(IGA)用于智能试卷生成,并将其用于汉英翻译题的语法和语义自动评分。结果发现,与传统的遗传算法和粒子群优化算法相比,遗传算法生成试卷的速度更快,平均生成时间为25 s,成功率更高(94%),表明有效度更高,试卷的难度和分化程度更接近预设值。自动评分结果与人工评分结果的相关性也大于0.8。实验结果证明了该方法的有效性。可以在实践中推广应用,增强大型英语考试的安全性和公平性,实现评分的客观性和一致性。
{"title":"A Study on an Intelligent Algorithm for Automatic Test Paper Generation and Scoring in University English Exams","authors":"Han Yang","doi":"10.13052/jicts2245-800X.1144","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1144","url":null,"abstract":"This paper mainly studied the automatic test paper generation and scoring problems in university English exams. Firstly, an automatic test paper generation model was established. Then, an improved genetic algorithm (IGA) was designed for intelligent test paper generation, and it was also used to automatically score answers to Chinese-to-English translation questions in terms of syntax and semantics. It was found that compared with the traditional GA and particle swarm optimization algorithm, the IGA method was faster in generating test papers, with an average generation time of 25 s, and had a higher success rate (94%), suggesting higher validity, and the difficulty and differentiation degrees of the test papers were closer to the preset values. The results of automatic scoring also had a correlation of more than 0.8 with the manual scoring results. The results prove the effectiveness of the automatic test paper generation and scoring method. It can be promoted and applied in practice to enhance the security and fairness of large-scale English exams, as well as achieve objectivity and consistency in scoring.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10326101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138431045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Elliptic Curve Cryptography & RSA 椭圆曲线密码与RSA分析
Q3 Decision Sciences Pub Date : 2023-11-22 DOI: 10.13052/jicts2245-800X.1142
Mohammad Rafeek Khan;Kamal Upreti;Mohammad Imran Alam;Haneef Khan;Shams Tabrez Siddiqui;Mustafizul Haque;Jyoti Parashar
In today's digital world, the Internet is an essential component of communication networks. It provides a platform for quickly exchanging information among communicating parties. There is a risk of unauthorized persons gaining access to our sensitive information while it is being transmitted. Cryptography is one of the most effective and efficient strategies for protecting our data and it are utilized all around the world. The efficiency of a cryptography algorithm is determined by a number of parameters, one of which is the length of the key. For cryptography, key (public/private) is an essential part. To provide robust security, RSA takes larger key size. If we use larger key size, the processing performance will be slowed. As a result, processing speed will decrease and memory consumption will increase. Due to this, cryptographic algorithms with smaller key size and higher security are becoming more popular. Out of the cryptographic algorithms, Elliptic Curve Cryptography (ECC) provides equivalent level of safety which RSA provides, but it takes smaller key size. On the basis of key size, our work focused on, studied, and compared the efficacy in terms of security among the well-known public key cryptography algorithms, namely ECC (Elliptic Curve Cryptography) and RSA (Rivets Shamir Adelman).
在当今的数字世界中,互联网是通信网络的重要组成部分。它为通信各方之间快速交换信息提供了一个平台。在传输我们的敏感信息时,存在未经授权的人获得访问权限的风险。密码学是保护我们数据的最有效和最有效的策略之一,它在世界各地都被使用。密码算法的效率是由许多参数决定的,其中一个参数就是密钥的长度。对于密码学来说,密钥(公钥/私钥)是一个必不可少的部分。为了提供强大的安全性,RSA采用更大的密钥大小。如果我们使用较大的密钥大小,将会降低处理性能。因此,处理速度会降低,内存消耗会增加。因此,密钥尺寸更小、安全性更高的加密算法越来越受欢迎。在加密算法中,椭圆曲线加密(ECC)提供了与RSA相同的安全级别,但它需要更小的密钥大小。在密钥大小的基础上,我们的工作重点研究和比较了众所周知的公钥加密算法ECC (Elliptic Curve cryptography)和RSA (Rivets Shamir Adelman)在安全性方面的有效性。
{"title":"Analysis of Elliptic Curve Cryptography & RSA","authors":"Mohammad Rafeek Khan;Kamal Upreti;Mohammad Imran Alam;Haneef Khan;Shams Tabrez Siddiqui;Mustafizul Haque;Jyoti Parashar","doi":"10.13052/jicts2245-800X.1142","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1142","url":null,"abstract":"In today's digital world, the Internet is an essential component of communication networks. It provides a platform for quickly exchanging information among communicating parties. There is a risk of unauthorized persons gaining access to our sensitive information while it is being transmitted. Cryptography is one of the most effective and efficient strategies for protecting our data and it are utilized all around the world. The efficiency of a cryptography algorithm is determined by a number of parameters, one of which is the length of the key. For cryptography, key (public/private) is an essential part. To provide robust security, RSA takes larger key size. If we use larger key size, the processing performance will be slowed. As a result, processing speed will decrease and memory consumption will increase. Due to this, cryptographic algorithms with smaller key size and higher security are becoming more popular. Out of the cryptographic algorithms, Elliptic Curve Cryptography (ECC) provides equivalent level of safety which RSA provides, but it takes smaller key size. On the basis of key size, our work focused on, studied, and compared the efficacy in terms of security among the well-known public key cryptography algorithms, namely ECC (Elliptic Curve Cryptography) and RSA (Rivets Shamir Adelman).","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10326103","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138431210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing the Standardization Landscape for Identity Management in Public Services - A Standards Review for the IMPULSE Project 公共服务中身份管理的标准化前景分析- IMPULSE项目标准回顾
Q3 Decision Sciences Pub Date : 2023-11-22 DOI: 10.13052/jicts2245-800X.1145
René Lindner;Madlen Schmudde;Alicia Jiménez González;Jaime Loureiro Acuña;Knut Blind
The digitalization of public services is one of the major challenges that public administrations are currently facing. Electronic identifications play a major role for a variety of these related services. Due to the impact these services will have on the daily life of citizens, organizations, and the public at large, the social dimensions must be considered equally to the technical ones. To ensure the applicability, trust, and compliance of electronic identity for access to public services, it is necessary to take into account relevant standards collected through an analysis of the state-of-the-art. In general, the literature on integrating standardization in research projects is very rare and potential impacts of standards related to electronic identification have not been assessed yet. The European project IMPULSE has integrated standardization as an essential element and assessed the relevant standardization landscape as one activity. The analysis of the standardization landscape resulted in the identification of nine formal and six de-facto standards that have high relevance for IMPULSE. The process for this analysis and the resulting dashboard will support future projects to effectively consider, analyze and use standards for their projects.
公共服务数字化是当前公共管理面临的主要挑战之一。电子身份识别在各种相关服务中发挥着重要作用。由于这些服务将对公民、组织和公众的日常生活产生影响,因此必须将社会层面与技术层面同等考虑。为了确保电子身份在获取公共服务方面的适用性、可信性和合规性,有必要考虑通过分析最新技术收集的相关标准。总体而言,将标准化整合到研究项目中的文献非常少,并且尚未对电子识别相关标准的潜在影响进行评估。欧洲项目IMPULSE将标准化作为一个基本要素,并将相关的标准化景观作为一项活动进行评估。标准化环境的分析导致了与IMPULSE高度相关的9个正式标准和6个事实上的标准的确定。这个分析过程和结果仪表板将支持未来的项目有效地考虑、分析和使用他们项目的标准。
{"title":"Analyzing the Standardization Landscape for Identity Management in Public Services - A Standards Review for the IMPULSE Project","authors":"René Lindner;Madlen Schmudde;Alicia Jiménez González;Jaime Loureiro Acuña;Knut Blind","doi":"10.13052/jicts2245-800X.1145","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1145","url":null,"abstract":"The digitalization of public services is one of the major challenges that public administrations are currently facing. Electronic identifications play a major role for a variety of these related services. Due to the impact these services will have on the daily life of citizens, organizations, and the public at large, the social dimensions must be considered equally to the technical ones. To ensure the applicability, trust, and compliance of electronic identity for access to public services, it is necessary to take into account relevant standards collected through an analysis of the state-of-the-art. In general, the literature on integrating standardization in research projects is very rare and potential impacts of standards related to electronic identification have not been assessed yet. The European project IMPULSE has integrated standardization as an essential element and assessed the relevant standardization landscape as one activity. The analysis of the standardization landscape resulted in the identification of nine formal and six de-facto standards that have high relevance for IMPULSE. The process for this analysis and the resulting dashboard will support future projects to effectively consider, analyze and use standards for their projects.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10326104","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138431211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of ICT Standardization
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1