首页 > 最新文献

Journal of ICT Standardization最新文献

英文 中文
Introducing Privacy Receipts into DLT and eIDAS 在DLT和eIDAS中引入隐私收据
Q3 Decision Sciences Pub Date : 2023-09-28 DOI: 10.13052/jicts2245-800X.1121
Jan Lindquist
The introduction of digital identification (e.g., eIDAS) and wallet standards (e.g., EUDI wallet) require compliance with privacy principles and clear communication of the principles through privacy notice and record of consent in the form of a privacy receipt. Regulation needs standards to help set the bar for reducing the privacy infringement risk. Without a standard-based implementation, solutions will be proprietary and siloed with no concern for interoperability, like privacy labels in Google and Apple app stores. Do existing standards address the gap, or do new ones need to be introduced? This article looks at the standards and regulations in three areas to answer this question: privacy protection standards, blockchain and DLT standards, and digital identification and wallet standards.
数字身份识别(如eIDAS)和钱包标准(如EUDI钱包)的引入要求遵守隐私原则,并通过隐私通知和隐私收据形式的同意记录明确传达这些原则。监管需要标准来帮助设定降低侵犯隐私风险的标准。如果没有基于标准的实施,解决方案将是专有的、孤立的,不关心互操作性,就像谷歌和苹果应用商店中的隐私标签一样。现有的标准是否解决了这一差距,还是需要引入新的标准?本文着眼于三个领域的标准和法规来回答这个问题:隐私保护标准、区块链和DLT标准以及数字识别和钱包标准。
{"title":"Introducing Privacy Receipts into DLT and eIDAS","authors":"Jan Lindquist","doi":"10.13052/jicts2245-800X.1121","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1121","url":null,"abstract":"The introduction of digital identification (e.g., eIDAS) and wallet standards (e.g., EUDI wallet) require compliance with privacy principles and clear communication of the principles through privacy notice and record of consent in the form of a privacy receipt. Regulation needs standards to help set the bar for reducing the privacy infringement risk. Without a standard-based implementation, solutions will be proprietary and siloed with no concern for interoperability, like privacy labels in Google and Apple app stores. Do existing standards address the gap, or do new ones need to be introduced? This article looks at the standards and regulations in three areas to answer this question: privacy protection standards, blockchain and DLT standards, and digital identification and wallet standards.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255407/10266732.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Impulsive Buying Behavior Using Partial Least Squares Algorithm 基于偏最小二乘算法的网上冲动购买行为
Q3 Decision Sciences Pub Date : 2023-09-22 DOI: 10.13052/jicts2245-800X.1131
Dam Tri Cuong
Impulsive purchasing is one of many fascinating subjects to investigate in e-commerce research. Online buying facilitates purchases and provides impulsive buyers with a venue to meet their demands. Impulse buying occurs when a client feels a sudden, overpowering need to make a purchase, which is a common practice among online shoppers. Therefore, the study's purpose is to apply the partial least square (PLS) algorithm to investigate the factors driving online impulsive buying behavior (OIBB). Besides, in this research, the stimulus organism response (SOR) model was used as the research's guiding theory; with the stimulus such as visual appeal and price attributes, the organism comprising perceived enjoyment and perceived usefulness, and response as OIBB. In addition, a non-probability sampling method was employed to collect data from 313 customers who shared their online impulsive purchase experiences through a Google Forms online survey. The collected data was analyzed using the PLS technique to assess the reliability, convergent validity, and discriminant validity of the variables, as well as test the proposed hypotheses. The findings reveal that visual appeal and price attributes were positive connections to perceived enjoyment and perceived usefulness. Likewise, perceived enjoyment and perceived usefulness also impacted positively OIBB. Additionally, the findings disclosed that visual appeal and price attributes also were associated positively with OIBB.
冲动购买是电子商务研究中许多有趣的主题之一。网上购买方便了购买,并为冲动的买家提供了一个满足他们需求的场所。冲动购买发生在客户突然感到强烈的购买需求时,这是网购者的常见做法。因此,本研究的目的是应用偏最小二乘(PLS)算法来研究在线冲动购买行为(OIBB)的驱动因素。此外,本研究以刺激-机体反应(SOR)模型为研究指导理论;在视觉吸引力和价格属性等刺激下,生物体包括感知的享受和感知的有用性,以及作为OIBB的反应。此外,采用非概率抽样方法收集了313名客户的数据,这些客户通过谷歌表单在线调查分享了他们的在线冲动购买体验。使用PLS技术对收集的数据进行分析,以评估变量的可靠性、收敛有效性和判别有效性,并检验所提出的假设。研究结果表明,视觉吸引力和价格属性与感知的乐趣和有用性呈正相关。同样,感知到的乐趣和感知到的有用性也对OIBB产生了积极影响。此外,研究结果显示,视觉吸引力和价格属性也与OIBB呈正相关。
{"title":"Online Impulsive Buying Behavior Using Partial Least Squares Algorithm","authors":"Dam Tri Cuong","doi":"10.13052/jicts2245-800X.1131","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1131","url":null,"abstract":"Impulsive purchasing is one of many fascinating subjects to investigate in e-commerce research. Online buying facilitates purchases and provides impulsive buyers with a venue to meet their demands. Impulse buying occurs when a client feels a sudden, overpowering need to make a purchase, which is a common practice among online shoppers. Therefore, the study's purpose is to apply the partial least square (PLS) algorithm to investigate the factors driving online impulsive buying behavior (OIBB). Besides, in this research, the stimulus organism response (SOR) model was used as the research's guiding theory; with the stimulus such as visual appeal and price attributes, the organism comprising perceived enjoyment and perceived usefulness, and response as OIBB. In addition, a non-probability sampling method was employed to collect data from 313 customers who shared their online impulsive purchase experiences through a Google Forms online survey. The collected data was analyzed using the PLS technique to assess the reliability, convergent validity, and discriminant validity of the variables, as well as test the proposed hypotheses. The findings reveal that visual appeal and price attributes were positive connections to perceived enjoyment and perceived usefulness. Likewise, perceived enjoyment and perceived usefulness also impacted positively OIBB. Additionally, the findings disclosed that visual appeal and price attributes also were associated positively with OIBB.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255391/10255405.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68139276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Adaptive Fault Diagnosis Control System of Audio Management Component Environment of Airborne Electronic Equipment 机载电子设备音频管理组件环境自适应故障诊断控制系统研究
Q3 Decision Sciences Pub Date : 2023-09-22 DOI: 10.13052/jicts2245-800X.1124
Xiaomin Xie;Shuguo Gui;Renwei Dou;Xuanfu Du
The system adopts adaptive control, and the controller of audio management component is directly applied to the controlled object. Through online calculation, the model is identified online by using the dynamic characteristics of the object, and the relationship between input and output variables is expressed. It can be corrected by entering and leaving data, which is actually to correct the controller. The initial rules of the controller are composed of default models. Through continuous self-reasoning learning, the controller is optimized to achieve data tracking, fast convergence, strong anti-interference ability and excellent performance. Combining intelligent control with adaptive technology not only expands the scope of adaptive system, but also provides an effective way for intelligent control. The environmental adaptive diagnostic control system uses adaptive technology to adjust the parameters, data and knowledge base of the controller. The system detects IO signal, AD signal and the status data sent by the sub-unit through the internal CAN bus according to the power-on self-check of the unit, and at the same time, it monitors all the status data in real time during the operation, judges the operation of each sub-component, gives an alarm in time and carries out protection control. Through the design of integrated detection module, the overall installation space of detection sensors is reduced, signal interfaces and connecting cables are reduced, and the overall adaptive diagnosis effect can be improved. Through the data recording and storage function, the system stores the operation information of each subunit, compares it with the built-in health data table, and prompts the maintenance information in time.
系统采用自适应控制,音频管理组件的控制器直接应用于被控对象。通过在线计算,利用对象的动态特性在线识别模型,并表达输入和输出变量之间的关系。它可以通过输入和留下数据来纠正,这实际上是为了纠正控制器。控制器的初始规则由默认模型组成。通过连续的自推理学习,对控制器进行优化,实现数据跟踪、快速收敛、抗干扰能力强、性能优异。将智能控制与自适应技术相结合,不仅扩大了自适应系统的范围,而且为智能控制提供了一条有效的途径。环境自适应诊断控制系统利用自适应技术对控制器的参数、数据和知识库进行调整。系统根据分机的通电自检,检测IO信号、AD信号和分机通过内部CAN总线发送的状态数据,同时实时监控运行过程中的所有状态数据,判断各分机的运行情况,及时报警并进行保护控制。通过集成检测模块的设计,减少了检测传感器的整体安装空间,减少了信号接口和连接电缆,提高了整体自适应诊断效果。系统通过数据记录和存储功能,存储各子单元的运行信息,并与内置的健康数据表进行比较,及时提示维护信息。
{"title":"Research on Adaptive Fault Diagnosis Control System of Audio Management Component Environment of Airborne Electronic Equipment","authors":"Xiaomin Xie;Shuguo Gui;Renwei Dou;Xuanfu Du","doi":"10.13052/jicts2245-800X.1124","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1124","url":null,"abstract":"The system adopts adaptive control, and the controller of audio management component is directly applied to the controlled object. Through online calculation, the model is identified online by using the dynamic characteristics of the object, and the relationship between input and output variables is expressed. It can be corrected by entering and leaving data, which is actually to correct the controller. The initial rules of the controller are composed of default models. Through continuous self-reasoning learning, the controller is optimized to achieve data tracking, fast convergence, strong anti-interference ability and excellent performance. Combining intelligent control with adaptive technology not only expands the scope of adaptive system, but also provides an effective way for intelligent control. The environmental adaptive diagnostic control system uses adaptive technology to adjust the parameters, data and knowledge base of the controller. The system detects IO signal, AD signal and the status data sent by the sub-unit through the internal CAN bus according to the power-on self-check of the unit, and at the same time, it monitors all the status data in real time during the operation, judges the operation of each sub-component, gives an alarm in time and carries out protection control. Through the design of integrated detection module, the overall installation space of detection sensors is reduced, signal interfaces and connecting cables are reduced, and the overall adaptive diagnosis effect can be improved. Through the data recording and storage function, the system stores the operation information of each subunit, compares it with the built-in health data table, and prompts the maintenance information in time.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255407/10255420.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved YOLO for Road and Vehicle Target Detection Model 一种用于道路和车辆目标检测模型的改进YOLO
Q3 Decision Sciences Pub Date : 2023-09-22 DOI: 10.13052/jicts2245-800X.1125
Qinghe Yu;Huaiqin Liu;Qu Wu
The yolo series is the prevalent algorithm for target identification at now. Nevertheless, due to the high real-time, mixed target parity, and obscured target features of vehicle target recognition, missed detection and incorrect detection are common. It enhances the yolo algorithm in order to enhance the network performance of this method while identifying vehicle targets. To properly portray the improvement impact, the yolov4 method is used as the improvement baseline. First, the structure of the DarkNet backbone network is modified, and a more efficient backbone network, FBR-DarkNet, is presented to enhance the effect of feature extraction. In order to better detect obstructed cars, a thin feature layer for focused detection of tiny objects is added to the Neck module to increase the recognition impact. The attention mechanism module CBAM is included to increase the model's precision and speed of convergence. The lightweight network replaces the MISH function with the H-SWISH function, and the improved algorithm improves by 4.76 percentage points over the original network on the BDD100K data set, with the mAP metrics improving by 8 points, 8 points, and 7 points, respectively, for the car, truck, and bus categories. Compared to other newer and better algorithms, it nevertheless maintains a pretty decent performance. It satisfies the criteria for real-time detection and significantly improves the detection accuracy.
yolo序列是目前较为流行的目标识别算法。然而,由于车辆目标识别的实时性高、目标奇偶性混合、目标模糊等特点,漏检和误检是常见的。它对yolo算法进行了改进,以提高该方法在识别车辆目标时的网络性能。为了正确描述改进影响,使用yolov4方法作为改进基线。首先,对DarkNet骨干网络的结构进行了修改,提出了一种更高效的骨干网络FBR-DarkNet,以增强特征提取的效果。为了更好地检测被遮挡的汽车,在Neck模块中添加了一个用于聚焦检测微小物体的薄特征层,以增加识别效果。为了提高模型的精度和收敛速度,引入了注意机制模块CBAM。轻量级网络用H-SWISH函数取代了MISH函数,在BDD100K数据集上,改进的算法比原始网络提高了4.76个百分点,汽车、卡车和公共汽车类别的mAP指标分别提高了8个点、8个点和7个点。与其他更新更好的算法相比,它仍然保持了相当不错的性能。它满足了实时检测的标准,并显著提高了检测精度。
{"title":"An Improved YOLO for Road and Vehicle Target Detection Model","authors":"Qinghe Yu;Huaiqin Liu;Qu Wu","doi":"10.13052/jicts2245-800X.1125","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1125","url":null,"abstract":"The yolo series is the prevalent algorithm for target identification at now. Nevertheless, due to the high real-time, mixed target parity, and obscured target features of vehicle target recognition, missed detection and incorrect detection are common. It enhances the yolo algorithm in order to enhance the network performance of this method while identifying vehicle targets. To properly portray the improvement impact, the yolov4 method is used as the improvement baseline. First, the structure of the DarkNet backbone network is modified, and a more efficient backbone network, FBR-DarkNet, is presented to enhance the effect of feature extraction. In order to better detect obstructed cars, a thin feature layer for focused detection of tiny objects is added to the Neck module to increase the recognition impact. The attention mechanism module CBAM is included to increase the model's precision and speed of convergence. The lightweight network replaces the MISH function with the H-SWISH function, and the improved algorithm improves by 4.76 percentage points over the original network on the BDD100K data set, with the mAP metrics improving by 8 points, 8 points, and 7 points, respectively, for the car, truck, and bus categories. Compared to other newer and better algorithms, it nevertheless maintains a pretty decent performance. It satisfies the criteria for real-time detection and significantly improves the detection accuracy.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255407/10255428.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain-based MQTT Protocol Optimization Algorithm 一种基于区块链的MQTT协议优化算法
Q3 Decision Sciences Pub Date : 2023-09-22 DOI: 10.13052/jicts2245-800X.1122
Wei Gao;Lixia Zhang;Yun Ju
The communication protocol is an important support to realize the communication between equipment and Internet. And it covers all aspects of the IoT (Internet of things) system. To address the security problem of forging or tampering of key data in traditional IoT protocols, this paper designs an improved MQTT (message queue telemetry transmission) protocol that uses blockchain technology to ensure the security of transmitted data in the process of data transmission. Because the information in the blockchain is not tamperable, which in turn ensures that data stored in brokers are not maliciously tampered with. Through simulation experiments, it is proved that this scheme is lightweight, efficient and easy to implement, which helps to protect the security of IoT data.
通信协议是实现设备与互联网通信的重要支撑。它涵盖了物联网系统的各个方面。为了解决传统物联网协议中伪造或篡改关键数据的安全问题,本文设计了一种改进的MQTT(消息队列遥测传输)协议,该协议使用区块链技术来确保数据传输过程中传输数据的安全。因为区块链中的信息是不可篡改的,这反过来又确保了存储在经纪人中的数据不会被恶意篡改。通过仿真实验证明,该方案轻量级、高效、易于实现,有助于保护物联网数据的安全。
{"title":"A Blockchain-based MQTT Protocol Optimization Algorithm","authors":"Wei Gao;Lixia Zhang;Yun Ju","doi":"10.13052/jicts2245-800X.1122","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1122","url":null,"abstract":"The communication protocol is an important support to realize the communication between equipment and Internet. And it covers all aspects of the IoT (Internet of things) system. To address the security problem of forging or tampering of key data in traditional IoT protocols, this paper designs an improved MQTT (message queue telemetry transmission) protocol that uses blockchain technology to ensure the security of transmitted data in the process of data transmission. Because the information in the blockchain is not tamperable, which in turn ensures that data stored in brokers are not maliciously tampered with. Through simulation experiments, it is proved that this scheme is lightweight, efficient and easy to implement, which helps to protect the security of IoT data.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255407/10255408.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Role-Based Access Control (RBAC) Authorization in Kubernetes Kubernetes中基于角色的访问控制(RBAC)授权
Q3 Decision Sciences Pub Date : 2023-09-22 DOI: 10.13052/jicts2245-800X.1132
Garsha Rostami
In computer systems security, role-based access control (RBAC) or role-based security is an approach to restricting system access to authorized users [1]. This paper will describe how the Kubernetes RBAC authorization sub-system works, how to leverage it to secure access to resources in the cluster, and how to validate the set policies through impersonation to ensure users and service accounts are granted the intended rights.
在计算机系统安全中,基于角色的访问控制(RBAC)或基于角色的安全性是一种将系统访问限制为授权用户的方法[1]。本文将描述Kubernetes RBAC授权子系统是如何工作的,如何利用它来安全访问集群中的资源,以及如何通过模拟来验证设置的策略,以确保用户和服务帐户被授予预期的权限。
{"title":"Role-Based Access Control (RBAC) Authorization in Kubernetes","authors":"Garsha Rostami","doi":"10.13052/jicts2245-800X.1132","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1132","url":null,"abstract":"In computer systems security, role-based access control (RBAC) or role-based security is an approach to restricting system access to authorized users [1]. This paper will describe how the Kubernetes RBAC authorization sub-system works, how to leverage it to secure access to resources in the cluster, and how to validate the set policies through impersonation to ensure users and service accounts are granted the intended rights.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255391/10255393.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68142148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fruit Picking Robot Arm Training Solution Based on Reinforcement Learning in Digital Twin 数字孪生中基于强化学习的水果采摘机器人手臂训练解决方案
Q3 Decision Sciences Pub Date : 2023-09-22 DOI: 10.13052/jicts2245-800X.1133
Xinyuan Tian;Bingqin Pan;Liping Bai;Guangbin Wang;Deyun Mo
In the era of Industry 4.0, digital agriculture is developing very rapidly and has achieved considerable results. Nowadays, digital agriculture-based research is more focused on the use of robotic fruit picking technology, and the main research direction of such topics is algorithms for computer vision. However, when computer vision algorithms successfully locate the target object, it is still necessary to use robotic arm movement to reach the object at the physical level, but such path planning has received minimal attention. Based on this research deficiency, we propose to use Unity software as a digital twin platform to plan the robotic arm path and use ML-Agent plug-in as a reinforcement learning means to train the robotic arm path, to improve the accuracy of the robotic arm to reach the fruit, and happily the effect of this method is much improved than the traditional method.
在工业4.0时代,数字农业发展非常迅速,并取得了可观的成果。如今,基于数字农业的研究更多地集中在机器人水果采摘技术的使用上,而这类主题的主要研究方向是计算机视觉算法。然而,当计算机视觉算法成功定位目标物体时,仍然需要在物理层面上使用机械臂运动来到达物体,但这种路径规划受到的关注很少。基于这一研究不足,我们建议使用Unity软件作为数字孪生平台来规划机械臂路径,并使用ML Agent插件作为强化学习手段来训练机械臂路径以提高机械臂到达果实的准确性,令人高兴的是,该方法的效果比传统方法有了很大的提高。
{"title":"Fruit Picking Robot Arm Training Solution Based on Reinforcement Learning in Digital Twin","authors":"Xinyuan Tian;Bingqin Pan;Liping Bai;Guangbin Wang;Deyun Mo","doi":"10.13052/jicts2245-800X.1133","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1133","url":null,"abstract":"In the era of Industry 4.0, digital agriculture is developing very rapidly and has achieved considerable results. Nowadays, digital agriculture-based research is more focused on the use of robotic fruit picking technology, and the main research direction of such topics is algorithms for computer vision. However, when computer vision algorithms successfully locate the target object, it is still necessary to use robotic arm movement to reach the object at the physical level, but such path planning has received minimal attention. Based on this research deficiency, we propose to use Unity software as a digital twin platform to plan the robotic arm path and use ML-Agent plug-in as a reinforcement learning means to train the robotic arm path, to improve the accuracy of the robotic arm to reach the fruit, and happily the effect of this method is much improved than the traditional method.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255391/10255409.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68142149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graphic Design of 3D Animation Scenes Based on Deep Learning and Information Security Technology 基于深度学习和信息安全技术的三维动画场景平面设计
Q3 Decision Sciences Pub Date : 2023-09-22 DOI: 10.13052/jicts2245-800X.1135
Jiao Tang
This paper aims to use the improved Generative Adversarial Network (GAN) model for Three Dimensional (3D) animation graphic design, improve the efficiency of 3D animation graphic design, and promote the accuracy of model recognition. It acquires 3D animated scene color images from different perspectives. This paper performs 3D visualization through point clouds, outputs high-quality point cloud results, and uses Convolutional Neural Network (CNN), Earth-Mover (EM) distance, and Least Squares Method (LSM) to improve the GAN model. Finally, the effectiveness of the improved GAN in the graphic design of 3D animation scenes and the effects of different improved models in generating 3D animation scene images are analyzed. The results show that the computational loss amplitude of the improved GAN model using Label Smoothing processing deep convolutional neural network is between [2], [3]. The generator loss variation is smaller, and the image quality of the generated 3D animation scene is gradually improved. The training process of the LSM-improved model is more stable, and the loss value is lower than that of the EM distance improved model. The loss value of the generator is [0.3,0.5], and the loss value of the discriminator is [0.1,0.2]. The Inception score of the LSM-improved model is 0.0297 higher than that of the CNN-improved model and the EM distance improved model and 0.0198 higher than that of the GAN model.
本文旨在将改进的生成对抗性网络(GAN)模型用于三维动画平面设计,提高三维动画图形设计的效率,提高模型识别的准确性。它从不同的角度获取3D动画场景的彩色图像。本文通过点云进行三维可视化,输出高质量的点云结果,并使用卷积神经网络(CNN)、地球移动器(EM)距离和最小二乘法(LSM)来改进GAN模型。最后,分析了改进的GAN在三维动画场景平面设计中的有效性,以及不同改进模型在生成三维动画场景图像中的效果。结果表明,使用标签平滑处理深度卷积神经网络的改进GAN模型的计算损失幅度在[2]、[3]之间。生成器损失变化较小,生成的3D动画场景的图像质量逐渐提高。LSM改进模型的训练过程更稳定,损失值低于EM距离改进模型。生成器的损失值为[0.3,0.5],鉴别器的损失值是[0.1,0.2]。LSM改进模型的Inception得分比CNN改进模型和EM距离改进模型高0.0297,比GAN模型高0.0198。
{"title":"Graphic Design of 3D Animation Scenes Based on Deep Learning and Information Security Technology","authors":"Jiao Tang","doi":"10.13052/jicts2245-800X.1135","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1135","url":null,"abstract":"This paper aims to use the improved Generative Adversarial Network (GAN) model for Three Dimensional (3D) animation graphic design, improve the efficiency of 3D animation graphic design, and promote the accuracy of model recognition. It acquires 3D animated scene color images from different perspectives. This paper performs 3D visualization through point clouds, outputs high-quality point cloud results, and uses Convolutional Neural Network (CNN), Earth-Mover (EM) distance, and Least Squares Method (LSM) to improve the GAN model. Finally, the effectiveness of the improved GAN in the graphic design of 3D animation scenes and the effects of different improved models in generating 3D animation scene images are analyzed. The results show that the computational loss amplitude of the improved GAN model using Label Smoothing processing deep convolutional neural network is between [2], [3]. The generator loss variation is smaller, and the image quality of the generated 3D animation scene is gradually improved. The training process of the LSM-improved model is more stable, and the loss value is lower than that of the EM distance improved model. The loss value of the generator is [0.3,0.5], and the loss value of the discriminator is [0.1,0.2]. The Inception score of the LSM-improved model is 0.0297 higher than that of the CNN-improved model and the EM distance improved model and 0.0198 higher than that of the GAN model.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255391/10255410.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68142150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Feature Point Image Registration Algorithm with Added Spatial Constraint Model 添加空间约束模型的自适应特征点图像配准算法
Q3 Decision Sciences Pub Date : 2023-09-22 DOI: 10.13052/jicts2245-800X.1123
Xiao Zhou;Songlin Yu;Jijun Wang;Yuhua Chen;Fangyuan Li;Yan Li
Image data with different spectral features contain different attribute information of a target, which is naturally complementary and can provide more comprehensive and detailed features after registration and fusion. Image registration methods based on point features have the advantages of high speed and precision, and have been widely used in visible light image registration. For registration of multiscale images and those with different spectral characteristics, the precision of these methods is affected by such factors as complex gradient variation. To this end, we add a spatial constraint model to point feature image registration, and improve the method from the aspects of feature point selection, registration, and image conversion parameter calculation. The method is applied to different types of image registration programs, and the results show that it can effectively improve the registration accuracy of multiscale images with different spectral characteristics.
具有不同光谱特征的图像数据包含目标的不同属性信息,这是自然互补的,经过配准和融合后可以提供更全面、更详细的特征。基于点特征的图像配准方法具有速度快、精度高的优点,在可见光图像配准中得到了广泛的应用。对于多尺度图像和具有不同光谱特征的图像的配准,这些方法的精度受到复杂梯度变化等因素的影响。为此,我们在点特征图像配准中加入了空间约束模型,并从特征点选择、配准和图像转换参数计算等方面对该方法进行了改进。将该方法应用于不同类型的图像配准程序,结果表明,该方法可以有效地提高不同光谱特征的多尺度图像的配准精度。
{"title":"Adaptive Feature Point Image Registration Algorithm with Added Spatial Constraint Model","authors":"Xiao Zhou;Songlin Yu;Jijun Wang;Yuhua Chen;Fangyuan Li;Yan Li","doi":"10.13052/jicts2245-800X.1123","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1123","url":null,"abstract":"Image data with different spectral features contain different attribute information of a target, which is naturally complementary and can provide more comprehensive and detailed features after registration and fusion. Image registration methods based on point features have the advantages of high speed and precision, and have been widely used in visible light image registration. For registration of multiscale images and those with different spectral characteristics, the precision of these methods is affected by such factors as complex gradient variation. To this end, we add a spatial constraint model to point feature image registration, and improve the method from the aspects of feature point selection, registration, and image conversion parameter calculation. The method is applied to different types of image registration programs, and the results show that it can effectively improve the registration accuracy of multiscale images with different spectral characteristics.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255407/10255435.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovation and Digital Transformation of Media Economy Based on Information Security Technology 基于信息安全技术的媒体经济创新与数字化转型
Q3 Decision Sciences Pub Date : 2023-09-22 DOI: 10.13052/jicts2245-800X.1134
Yan Meng;Jungjin Kim;Hak-chun Lee;Cho Dong Je;Peiyun Cheng
This study aims to analyze the application of information security (IS) technology and blockchain in the media economy, and the impact of cross-border cooperation and value chain reconstruction combined with blockchain technology (BCT) on promoting innovation and digital transformation in the media economy. This study delves into the interplay between cross-border collaboration, value chain reconstruction, and BCT. It constructs a media economic digital platform by amalgamating blockchain and cross-border value chain principles, subsequently evaluating and analyzing its performance. Findings indicate that the proposed model exhibits a reduced block propagation time and enhanced security performance, boasting a 5% improvement. The platform's latency remains stable at approximately 245 ms. Survey analysis reveals an agreement rate exceeding 57.94% across dimensions such as data mining, customer relationship management, and classification effectiveness, contributing to heightened user satisfaction. Consequently, this study offers valuable insights into user relationship security management within cross-border collaborations, shedding light on novel avenues for sustainable development and digital transformation in the realm of the media economy.
本研究旨在分析信息安全(IS)技术和区块链在媒体经济中的应用,以及与区块链技术相结合的跨境合作和价值链重建对促进媒体经济创新和数字化转型的影响。这项研究深入探讨了跨境合作、价值链重建和BCT之间的相互作用。它通过融合区块链和跨境价值链原理,构建了一个媒体经济数字平台,随后对其性能进行评估和分析。研究结果表明,该模型减少了块传播时间,提高了安全性能,提高了5%。该平台的延迟稳定在约245毫秒。调查分析显示,在数据挖掘、客户关系管理和分类有效性等方面,协议率超过57.94%,有助于提高用户满意度。因此,这项研究为跨境合作中的用户关系安全管理提供了宝贵的见解,为媒体经济领域的可持续发展和数字化转型开辟了新的途径。
{"title":"Innovation and Digital Transformation of Media Economy Based on Information Security Technology","authors":"Yan Meng;Jungjin Kim;Hak-chun Lee;Cho Dong Je;Peiyun Cheng","doi":"10.13052/jicts2245-800X.1134","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1134","url":null,"abstract":"This study aims to analyze the application of information security (IS) technology and blockchain in the media economy, and the impact of cross-border cooperation and value chain reconstruction combined with blockchain technology (BCT) on promoting innovation and digital transformation in the media economy. This study delves into the interplay between cross-border collaboration, value chain reconstruction, and BCT. It constructs a media economic digital platform by amalgamating blockchain and cross-border value chain principles, subsequently evaluating and analyzing its performance. Findings indicate that the proposed model exhibits a reduced block propagation time and enhanced security performance, boasting a 5% improvement. The platform's latency remains stable at approximately 245 ms. Survey analysis reveals an agreement rate exceeding 57.94% across dimensions such as data mining, customer relationship management, and classification effectiveness, contributing to heightened user satisfaction. Consequently, this study offers valuable insights into user relationship security management within cross-border collaborations, shedding light on novel avenues for sustainable development and digital transformation in the realm of the media economy.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255391/10255392.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68142151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of ICT Standardization
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1