首页 > 最新文献

Journal of ICT Standardization最新文献

英文 中文
Comparison of Different Machine Learning Algorithms in the Mental Health Assessment of College Students 不同机器学习算法在大学生心理健康评估中的比较
Q3 Decision Sciences Pub Date : 2024-12-01 DOI: 10.13052/jicts2245-800X.1243
Yongsen Cai;Danling Lin;Qing Lu
This paper assesses college students' mental health based on the symptom checklist 90 (SCL-90). In view of the assessment data processing and analysis, the performance of different machine learning algorithms, including random forest (RF), LightGBM3, extreme gradient boosting (XGBoost), in the classification of college students' mental health samples was compared. Moreover, the effect of different hyperparameter optimization methods (grid search, Bayesian optimization, and particle swarm optimization) was compared. The experiment on the SCL-90 assessment dataset found that the optimization effect of grid search was poor, and the highest F1 value and area under the curve (AUC) of the RF algorithm were 0.8914 and 0.9384, respectively, the highest F1 and AUC values of the XGBoost algorithm were 0.9166 and 0.9551, respectively. The LightGBM algorithm optimized by particle swarm optimization showed the best performance in the classification of mental health samples, with an F1 value of 0.9790 and an AUC of 0.9945. It also achieved optimal results when compared to machine learning algorithms such as naive Bayes and the support vector machines. The results prove the reliability and accuracy of the particle swarm optimization-improved Light-GBM algorithm in the analysis of college students' mental health assessment data. The algorithm can be applied in practice to provide an effective tool for the analysis of the mental health assessment data of college students.
采用症状自评量表(SCL-90)对大学生的心理健康状况进行测评。针对评估数据的处理与分析,比较了随机森林(random forest, RF)、LightGBM3、极限梯度提升(extreme gradient boosting, XGBoost)等不同机器学习算法在大学生心理健康样本分类中的表现。对比了不同超参数优化方法(网格搜索、贝叶斯优化和粒子群优化)的效果。在SCL-90评估数据集上的实验发现,网格搜索的优化效果较差,RF算法的最高F1值和曲线下面积(AUC)分别为0.8914和0.9384,XGBoost算法的最高F1值和AUC分别为0.9166和0.9551。采用粒子群算法优化的LightGBM算法对心理健康样本的分类效果最好,F1值为0.9790,AUC为0.9945。与朴素贝叶斯和支持向量机等机器学习算法相比,它也获得了最佳结果。结果证明了粒子群优化改进的Light-GBM算法在大学生心理健康评估数据分析中的可靠性和准确性。该算法可应用于实际,为大学生心理健康评估数据的分析提供有效工具。
{"title":"Comparison of Different Machine Learning Algorithms in the Mental Health Assessment of College Students","authors":"Yongsen Cai;Danling Lin;Qing Lu","doi":"10.13052/jicts2245-800X.1243","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1243","url":null,"abstract":"This paper assesses college students' mental health based on the symptom checklist 90 (SCL-90). In view of the assessment data processing and analysis, the performance of different machine learning algorithms, including random forest (RF), LightGBM3, extreme gradient boosting (XGBoost), in the classification of college students' mental health samples was compared. Moreover, the effect of different hyperparameter optimization methods (grid search, Bayesian optimization, and particle swarm optimization) was compared. The experiment on the SCL-90 assessment dataset found that the optimization effect of grid search was poor, and the highest F1 value and area under the curve (AUC) of the RF algorithm were 0.8914 and 0.9384, respectively, the highest F1 and AUC values of the XGBoost algorithm were 0.9166 and 0.9551, respectively. The LightGBM algorithm optimized by particle swarm optimization showed the best performance in the classification of mental health samples, with an F1 value of 0.9790 and an AUC of 0.9945. It also achieved optimal results when compared to machine learning algorithms such as naive Bayes and the support vector machines. The results prove the reliability and accuracy of the particle swarm optimization-improved Light-GBM algorithm in the analysis of college students' mental health assessment data. The algorithm can be applied in practice to provide an effective tool for the analysis of the mental health assessment data of college students.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"12 4","pages":"409-427"},"PeriodicalIF":0.0,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10916567","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143563978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on the Translation of Spoken English from Speech to Text 英语口语从语篇到语篇的翻译研究
Q3 Decision Sciences Pub Date : 2024-12-01 DOI: 10.13052/jicts2245-800X.1244
Ying Zhang
Rapid translation of spoken English is conducive to international communication. This paper briefly introduces a convolutional neural network (CNN) algorithm for converting English speech to text and a long short-term memory (LSTM) algorithm for machine translation of English text. The two algorithms were combined for spoken English translation. Then, simulation experiments were performed by comparing the speech recognition performance among the CNN algorithm, the hidden Markov model, and the back-propagation neural network algorithm and comparing the machine translation performance with the LSTM algorithm and the recurrent neural network algorithm. Moreover, the performance of the spoken English translation algorithms combining different recognition algorithms was compared. The results showed that the CNN speech recognition algorithm, the LSTM machine translation algorithm and the combined spoken English translation algorithm had the best performance and sufficient anti-noise ability. In conclusion, utilizing a CNN for converting English speech to texts and LSTM for machine translation of the converted English text can effectively enhance the performance of translating spoken English.
快速的英语口语翻译有利于国际交流。本文简要介绍了一种卷积神经网络(CNN)的英语语音文本转换算法和一种长短期记忆(LSTM)的英语文本机器翻译算法。将这两种算法结合起来进行英语口语翻译。然后,通过对比CNN算法、隐马尔可夫模型和反向传播神经网络算法的语音识别性能,对比LSTM算法和递归神经网络算法的机器翻译性能,进行仿真实验。此外,比较了不同识别算法组合的英语口语翻译算法的性能。结果表明,CNN语音识别算法、LSTM机器翻译算法和组合英语口语翻译算法表现最好,抗噪能力足够。综上所述,利用CNN将英语语音转换为文本,利用LSTM对转换后的英语文本进行机器翻译,可以有效地提高英语口语翻译的性能。
{"title":"A Study on the Translation of Spoken English from Speech to Text","authors":"Ying Zhang","doi":"10.13052/jicts2245-800X.1244","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1244","url":null,"abstract":"Rapid translation of spoken English is conducive to international communication. This paper briefly introduces a convolutional neural network (CNN) algorithm for converting English speech to text and a long short-term memory (LSTM) algorithm for machine translation of English text. The two algorithms were combined for spoken English translation. Then, simulation experiments were performed by comparing the speech recognition performance among the CNN algorithm, the hidden Markov model, and the back-propagation neural network algorithm and comparing the machine translation performance with the LSTM algorithm and the recurrent neural network algorithm. Moreover, the performance of the spoken English translation algorithms combining different recognition algorithms was compared. The results showed that the CNN speech recognition algorithm, the LSTM machine translation algorithm and the combined spoken English translation algorithm had the best performance and sufficient anti-noise ability. In conclusion, utilizing a CNN for converting English speech to texts and LSTM for machine translation of the converted English text can effectively enhance the performance of translating spoken English.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"12 4","pages":"429-441"},"PeriodicalIF":0.0,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10916565","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143563917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Meta-Learning Approach for Few-Shot Network Intrusion Detection Using Depthwise Separable Convolution 基于深度可分离卷积的小样本网络入侵检测元学习方法
Q3 Decision Sciences Pub Date : 2024-12-01 DOI: 10.13052/jicts2245-800X.1245
Guo Li;MingHua Wang
As cyberattacks become more frequent and sophisticated, network intrusion detection systems (IDS) play a critical role in safeguarding networks. However, traditional IDS models face challenges in detecting new, unseen attacks and typically require large volumes of labeled data for effective training. To address these issues, we propose a novel intrusion detection model based on meta-learning, integrating depthwise separable convolution (DSC). This model leverages few-shot learning to detect rare and emerging attack types with minimal labeled data. By using meta-learning, our model can rapidly adapt to new tasks, offering greater flexibility and scalability in various network scenarios. Experimental results on the CIC-DDoS2019 and CIC-IDS2017 datasets demonstrate that our model achieves competitive accuracy compared to state-of-the-art methods, even with fewer training samples. It also shows superior performance in terms of both detection accuracy and training efficiency, while being more resource-efficient, making it suitable for deployment in resource-constrained environments. In conclusion, our model offers a promising solution for network intrusion detection, enhancing the ability to detect new and emerging threats while ensuring computational efficiency for real-world applications.
随着网络攻击的日益频繁和复杂,网络入侵检测系统(IDS)在保护网络安全方面发挥着至关重要的作用。然而,传统的IDS模型在检测新的、看不见的攻击方面面临挑战,并且通常需要大量标记数据才能进行有效的训练。为了解决这些问题,我们提出了一种新的基于元学习的入侵检测模型,该模型集成了深度可分离卷积(DSC)。该模型利用少量学习来检测罕见的和新出现的攻击类型,并使用最少的标记数据。通过使用元学习,我们的模型可以快速适应新的任务,在各种网络场景中提供更大的灵活性和可扩展性。在CIC-DDoS2019和CIC-IDS2017数据集上的实验结果表明,即使使用更少的训练样本,我们的模型与最先进的方法相比也具有竞争力的准确性。它在检测精度和训练效率方面都表现出优异的性能,同时更节约资源,适合在资源受限的环境中部署。总之,我们的模型为网络入侵检测提供了一个有前途的解决方案,增强了检测新出现的威胁的能力,同时确保了实际应用的计算效率。
{"title":"A Meta-Learning Approach for Few-Shot Network Intrusion Detection Using Depthwise Separable Convolution","authors":"Guo Li;MingHua Wang","doi":"10.13052/jicts2245-800X.1245","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1245","url":null,"abstract":"As cyberattacks become more frequent and sophisticated, network intrusion detection systems (IDS) play a critical role in safeguarding networks. However, traditional IDS models face challenges in detecting new, unseen attacks and typically require large volumes of labeled data for effective training. To address these issues, we propose a novel intrusion detection model based on meta-learning, integrating depthwise separable convolution (DSC). This model leverages few-shot learning to detect rare and emerging attack types with minimal labeled data. By using meta-learning, our model can rapidly adapt to new tasks, offering greater flexibility and scalability in various network scenarios. Experimental results on the CIC-DDoS2019 and CIC-IDS2017 datasets demonstrate that our model achieves competitive accuracy compared to state-of-the-art methods, even with fewer training samples. It also shows superior performance in terms of both detection accuracy and training efficiency, while being more resource-efficient, making it suitable for deployment in resource-constrained environments. In conclusion, our model offers a promising solution for network intrusion detection, enhancing the ability to detect new and emerging threats while ensuring computational efficiency for real-world applications.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"12 4","pages":"443-470"},"PeriodicalIF":0.0,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10916564","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143563977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Lenstra-Lenstra-Lovasz on Elliptic Curve Cryptosystem Using IOT Sensor Nodes Lenstra-Lenstra-Lovasz在物联网传感器节点椭圆曲线密码系统中的应用
Q3 Decision Sciences Pub Date : 2024-12-01 DOI: 10.13052/jicts2245-800X.1242
Md Sameeruddin Khan;Thomas M. Chen;Mithileysh Sathiyanarayanan;Mohammed Mujeerulla;S. Pravinth Raja
The Internet of Things (IoT) model is presented in this paper with multi-layer security based on the Lenstra-Lenstra-Lovasz (LLL) algorithm. End nodes for the Internet of Things include inexpensive gadgets like the Raspberry Pi and Arduino boards. It is not practical to run rigorous algorithms on them, as opposed to computer systems. Therefore, a cryptography procedure is required that could function on this IOT equipment. Bitcoins and Ethereum are examples of cryptocurrency and Ripple employs techniques such as elliptic curve digital signature, Elliptic-Curve Diffie-Hellman (ECDH), and algorithm to sign any cryptocurrency on SECP256k1 elliptic curves transactions. By using Lenstra-Lenstra-Lovasz on a real-world Bitcoin blockchain and applying it to multiple dimensions, such as nonce leakage and weak nonces across several elliptic curves with different bit sizes on a Raspberry Pi, we can demonstrate the security of elliptic curve cryptosystems. Public key encryption techniques are seriously threatened by the development of quantum computing. Therefore, employing lattice encryption with Nth Degree Truncated Polynomial Ring Units (NTRU-NTH) on the Bitcoin blockchain will increase the resistance of Bitcoin blocks to quantum computing assaults. The execution time taken on SECP256k1 is 131.7 Milli seconds comparatively faster than NIST-224P and NIST-384P.
基于Lenstra-Lenstra-Lovasz (LLL)算法,提出了具有多层安全性的物联网(IoT)模型。物联网的终端节点包括树莓派(Raspberry Pi)和Arduino板等廉价设备。与计算机系统相反,在它们上运行严格的算法是不现实的。因此,需要一个可以在该物联网设备上运行的加密程序。比特币和以太坊是加密货币的例子,Ripple采用椭圆曲线数字签名、椭圆曲线Diffie-Hellman (ECDH)和算法等技术在SECP256k1椭圆曲线交易上签名任何加密货币。通过在现实世界的比特币区块链上使用Lenstra-Lenstra-Lovasz,并将其应用于多个维度,例如树莓派上不同位大小的几个椭圆曲线上的nonce泄漏和弱nonce,我们可以证明椭圆曲线密码系统的安全性。公钥加密技术受到量子计算技术发展的严重威胁。因此,在比特币区块链上采用n度截断多项式环单元(ntrun)的点阵加密将增加比特币块对量子计算攻击的抵抗力。SECP256k1的执行时间为131.7毫秒,相对于NIST-224P和NIST-384P快。
{"title":"Application of Lenstra-Lenstra-Lovasz on Elliptic Curve Cryptosystem Using IOT Sensor Nodes","authors":"Md Sameeruddin Khan;Thomas M. Chen;Mithileysh Sathiyanarayanan;Mohammed Mujeerulla;S. Pravinth Raja","doi":"10.13052/jicts2245-800X.1242","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1242","url":null,"abstract":"The Internet of Things (IoT) model is presented in this paper with multi-layer security based on the Lenstra-Lenstra-Lovasz (LLL) algorithm. End nodes for the Internet of Things include inexpensive gadgets like the Raspberry Pi and Arduino boards. It is not practical to run rigorous algorithms on them, as opposed to computer systems. Therefore, a cryptography procedure is required that could function on this IOT equipment. Bitcoins and Ethereum are examples of cryptocurrency and Ripple employs techniques such as elliptic curve digital signature, Elliptic-Curve Diffie-Hellman (ECDH), and algorithm to sign any cryptocurrency on SECP256k1 elliptic curves transactions. By using Lenstra-Lenstra-Lovasz on a real-world Bitcoin blockchain and applying it to multiple dimensions, such as nonce leakage and weak nonces across several elliptic curves with different bit sizes on a Raspberry Pi, we can demonstrate the security of elliptic curve cryptosystems. Public key encryption techniques are seriously threatened by the development of quantum computing. Therefore, employing lattice encryption with Nth Degree Truncated Polynomial Ring Units (NTRU-NTH) on the Bitcoin blockchain will increase the resistance of Bitcoin blocks to quantum computing assaults. The execution time taken on SECP256k1 is 131.7 Milli seconds comparatively faster than NIST-224P and NIST-384P.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"12 4","pages":"381-407"},"PeriodicalIF":0.0,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10916568","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143563895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Monitoring and Early Warning of Negative Public Opinion on Social Networks Under Deep Learning 基于深度学习的社交网络负面舆情安全监测与预警
Q3 Decision Sciences Pub Date : 2024-12-01 DOI: 10.13052/jicts2245-800X.1241
Haixiang He;Shiqi Ma
With the continuous development of social networks, negative social network public opinion appears frequently, which is particularly important for its safety monitoring and early warning. Taking Sina microblog as an example, this paper crawled texts from the platform, used BERT to generate word vectors, combined the bidirectional gated recurrent unit (BiGRU) and attention mechanism to design an emotion tendency classification method, and realized the classification of positive and negative emotion texts. Then, TCN was used to predict the negative emotion text to realize public opinion safety monitoring and early warning. It was found that BERT had the best performance. Compared with other deep learning methods, BERT-BiGRUA had a P value of 0.9431, an R value of 0.9012, and an F1 value of 0.9217 in the classification of emotion tendency, which were all the best. In the prediction of negative emotion text, TCN obtained a smaller mean square error and a higher $R^{2}$ than long short-term memory and other methods, showing a better prediction effect. The results verify the usability of the approach designed in this paper for practical safety monitoring and early warning of public opinion.
随着社会网络的不断发展,负面社会网络舆情频频出现,对其安全监测预警尤为重要。本文以新浪微博为例,从平台上抓取文本,利用BERT生成词向量,结合双向门通循环单元(BiGRU)和注意机制设计情感倾向分类方法,实现了积极和消极情感文本的分类。然后利用TCN对负面情绪文本进行预测,实现舆情安全监测预警。结果发现BERT的表现最好。与其他深度学习方法相比,BERT-BiGRUA在情绪倾向分类上的P值为0.9431,R值为0.9012,F1值为0.9217,均为最佳。在对负面情绪文本的预测中,TCN比长短期记忆等方法均方误差更小,R^{2}$更高,预测效果更好。结果验证了本文设计的方法在实际安全监测和舆情预警中的可用性。
{"title":"Security Monitoring and Early Warning of Negative Public Opinion on Social Networks Under Deep Learning","authors":"Haixiang He;Shiqi Ma","doi":"10.13052/jicts2245-800X.1241","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1241","url":null,"abstract":"With the continuous development of social networks, negative social network public opinion appears frequently, which is particularly important for its safety monitoring and early warning. Taking Sina microblog as an example, this paper crawled texts from the platform, used BERT to generate word vectors, combined the bidirectional gated recurrent unit (BiGRU) and attention mechanism to design an emotion tendency classification method, and realized the classification of positive and negative emotion texts. Then, TCN was used to predict the negative emotion text to realize public opinion safety monitoring and early warning. It was found that BERT had the best performance. Compared with other deep learning methods, BERT-BiGRUA had a P value of 0.9431, an R value of 0.9012, and an F1 value of 0.9217 in the classification of emotion tendency, which were all the best. In the prediction of negative emotion text, TCN obtained a smaller mean square error and a higher <tex>$R^{2}$</tex> than long short-term memory and other methods, showing a better prediction effect. The results verify the usability of the approach designed in this paper for practical safety monitoring and early warning of public opinion.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"12 4","pages":"365-380"},"PeriodicalIF":0.0,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10916566","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143563938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-Layer Authentication Mechanism Model Combined with 5G Converged Channel Fingerprint 结合 5G 融合信道指纹的跨层认证机制模型
Q3 Decision Sciences Pub Date : 2024-09-01 DOI: 10.13052/jicts2245-800X.1234
Wei Ao;Jian Wei;Yindong Li;Xiaolong Zhang;Bin Yu;Kaiwen Hou
In the actual communication environment, once the attacker successfully steals the legitimate channel information, the key information can be cracked according to the authentication response, so there is a security risk of key leakage. This paper combines the physical layer channel characteristics with the shared key, and combines it into a joint key to design a challenge-response physical layer authentication mechanism based on interpolation polynomial. Then, this method is applied to the EAP-AKA’ authentication protocol of 5G network, and a cross-layer authentication mechanism for 5G converged channel fingerprint is proposed. Finally, using the captured high-level authentication challenge response data, a simulation environment is built in MATLAB and the feasibility and security of the scheme are verified. The experimental results show that the authentication mechanism has better authentication performance and security performance. Compared with the traditional high-level authentication mechanism, it has certain advantages in computing overhead and can meet the 5G application scenarios of large-scale IoT terminals. Moreover, it combines physical layer authentication with high-level authentication, realizes mutual complementarity and mutual enhancement, and enhances the security performance of authentication.
在实际通信环境中,攻击者一旦成功窃取合法信道信息,就可以根据认证响应破解密钥信息,因此存在密钥泄露的安全风险。本文结合物理层信道特性和共享密钥,将其组合成联合密钥,设计了一种基于插值多项式的挑战应答物理层认证机制。然后,将该方法应用于 5G 网络的 "EAP-AKA "认证协议,提出了一种面向 5G 融合信道指纹的跨层认证机制。最后,利用采集到的高层认证挑战响应数据,在 MATLAB 中搭建了仿真环境,验证了方案的可行性和安全性。实验结果表明,该认证机制具有更好的认证性能和安全性能。与传统的高层认证机制相比,它在计算开销方面具有一定的优势,可以满足大规模物联网终端的 5G 应用场景。此外,它将物理层认证与高层认证相结合,实现了相互补充、相互促进,提升了认证的安全性能。
{"title":"Cross-Layer Authentication Mechanism Model Combined with 5G Converged Channel Fingerprint","authors":"Wei Ao;Jian Wei;Yindong Li;Xiaolong Zhang;Bin Yu;Kaiwen Hou","doi":"10.13052/jicts2245-800X.1234","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1234","url":null,"abstract":"In the actual communication environment, once the attacker successfully steals the legitimate channel information, the key information can be cracked according to the authentication response, so there is a security risk of key leakage. This paper combines the physical layer channel characteristics with the shared key, and combines it into a joint key to design a challenge-response physical layer authentication mechanism based on interpolation polynomial. Then, this method is applied to the EAP-AKA’ authentication protocol of 5G network, and a cross-layer authentication mechanism for 5G converged channel fingerprint is proposed. Finally, using the captured high-level authentication challenge response data, a simulation environment is built in MATLAB and the feasibility and security of the scheme are verified. The experimental results show that the authentication mechanism has better authentication performance and security performance. Compared with the traditional high-level authentication mechanism, it has certain advantages in computing overhead and can meet the 5G application scenarios of large-scale IoT terminals. Moreover, it combines physical layer authentication with high-level authentication, realizes mutual complementarity and mutual enhancement, and enhances the security performance of authentication.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"12 3","pages":"311-336"},"PeriodicalIF":0.0,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10770617","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142736642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Communication for People with Autism Through the Design of a Context-Aware Mobile Application for PECS 通过为 PECS 设计情境感知移动应用程序来增强自闭症患者的沟通能力
Q3 Decision Sciences Pub Date : 2024-09-01 DOI: 10.13052/jicts2245-800X.1231
Fatima Ez Zahra El Arbaoui;Kaoutar El Hari;Rajaa Saidi
Autism is a neurodevelopmental condition characterized by difficulties with social skills and communication. Autistic individuals require different types of assistance to cope with these challenges. The Picture Exchange Communication System (PECS) is a commonly used program for teaching nonverbal and symbolic communication skills, particularly for children with limited or no communication abilities. However, despite the development of various technology-based PECS systems, there is a lack of features that can simplify their use by children with autism. In our work, we are developing a design of a personalized and context-aware PECS system. Our system not only presents pictures as content but also adapts and enhances the content using contextual information.
自闭症是一种神经发育疾病,其特点是社交技能和沟通困难。自闭症患者需要不同类型的帮助来应对这些挑战。图像交流系统(PECS)是一种常用的教授非语言和符号交流技能的程序,尤其适用于交流能力有限或没有交流能力的儿童。然而,尽管开发了各种基于技术的 PECS 系统,但仍缺乏简化自闭症儿童使用这些系统的功能。在我们的工作中,我们正在开发一个个性化和情境感知的 PECS 系统。我们的系统不仅能将图片作为内容呈现,还能利用情境信息调整和增强内容。
{"title":"Enhancing Communication for People with Autism Through the Design of a Context-Aware Mobile Application for PECS","authors":"Fatima Ez Zahra El Arbaoui;Kaoutar El Hari;Rajaa Saidi","doi":"10.13052/jicts2245-800X.1231","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1231","url":null,"abstract":"Autism is a neurodevelopmental condition characterized by difficulties with social skills and communication. Autistic individuals require different types of assistance to cope with these challenges. The Picture Exchange Communication System (PECS) is a commonly used program for teaching nonverbal and symbolic communication skills, particularly for children with limited or no communication abilities. However, despite the development of various technology-based PECS systems, there is a lack of features that can simplify their use by children with autism. In our work, we are developing a design of a personalized and context-aware PECS system. Our system not only presents pictures as content but also adapts and enhances the content using contextual information.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"12 3","pages":"243-270"},"PeriodicalIF":0.0,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10770619","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142736397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intelligent Algorithm for Semantic Feature Analysis and Translation of English Texts 英语文本语义特征分析和翻译的智能算法
Q3 Decision Sciences Pub Date : 2024-09-01 DOI: 10.13052/jicts2245-800X.1232
Sha Chen
Accurate and rapid translation is conducive to the cultural communication of different languages. This paper briefly introduces the long short-term memory (LSTM) algorithm. To enhance the performance of the LSTM algorithm, semantic features were introduced, and semantic similarity was used to screen the translations that are more in line with the semantics of the source text. Then, simulation experiments were conducted. The experiments first examined the effects of the quantity of hidden layer nodes and the type of activation function in LSTM on the translation performance. Then, the LSTM algorithm was compared with the recurrent neural network (RNN) and traditional LSTM algorithms. The proposed translation algorithm showed the best performance when there were 512 hidden layer nodes and the activation function was sigmoid, it performed better than the other two translation algorithms, and the obtained result was consistent with the semantic meaning of the source text and smooth.
准确、快速的翻译有利于不同语言的文化交流。本文简要介绍了长短时记忆(LSTM)算法。为了提高 LSTM 算法的性能,本文引入了语义特征,并利用语义相似性筛选出更符合源文本语义的译文。然后,进行了模拟实验。实验首先考察了 LSTM 的隐层节点数量和激活函数类型对翻译性能的影响。然后,将 LSTM 算法与递归神经网络(RNN)和传统 LSTM 算法进行了比较。当隐层节点数为 512 个且激活函数为 sigmoid 时,所提出的翻译算法表现最佳,其性能优于其他两种翻译算法,且得到的结果与源文本的语义一致、流畅。
{"title":"An Intelligent Algorithm for Semantic Feature Analysis and Translation of English Texts","authors":"Sha Chen","doi":"10.13052/jicts2245-800X.1232","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1232","url":null,"abstract":"Accurate and rapid translation is conducive to the cultural communication of different languages. This paper briefly introduces the long short-term memory (LSTM) algorithm. To enhance the performance of the LSTM algorithm, semantic features were introduced, and semantic similarity was used to screen the translations that are more in line with the semantics of the source text. Then, simulation experiments were conducted. The experiments first examined the effects of the quantity of hidden layer nodes and the type of activation function in LSTM on the translation performance. Then, the LSTM algorithm was compared with the recurrent neural network (RNN) and traditional LSTM algorithms. The proposed translation algorithm showed the best performance when there were 512 hidden layer nodes and the activation function was sigmoid, it performed better than the other two translation algorithms, and the obtained result was consistent with the semantic meaning of the source text and smooth.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"12 3","pages":"271-282"},"PeriodicalIF":0.0,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10770620","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142736525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transforming Public Policy in Developing Countries: A Comprehensive Review of Digital Implementation 改革发展中国家的公共政策:全面审查数字化实施情况
Q3 Decision Sciences Pub Date : 2024-09-01 DOI: 10.13052/jicts2245-800X.1235
Asmawa;Abdul Hakim;Hermawan;Ainul Hayat
This article discusses the process of digitization in the implementation of public policy within developing countries, its critical success factors, challenges, and lessons learned from case studies. Public administration can improve efficiencies, transparency, and effectiveness through the infusion of digital technologies into processes implicated in the making, execution, and evaluation of public policies. Key success factors identified include robust digital infrastructure, clear strategic vision and leadership, effective stakeholder engagement, capacity building, and a supportive regulatory framework. In light of these potential benefits, developing countries experience enormous challenges such as inadequate infrastructure, political instability, socio-political resistance, and gaps in digital literacy. Through a review of empirical case studies from countries such as Estonia, South Korea, China, Bangladesh, and Rwanda, the article identifies key lessons that can inform the digital strategies of other developing nations. The discussion addresses the challenges of sustaining digital infrastructure, including ongoing maintenance costs, the need for continuous technology updates, and the risks of obsolescence. Furthermore, the article explores the significance of capacity building, public-private partnerships, and evolving regulatory frameworks in ensuring the long-term viability of digital policies. The future directions proposed underscore the necessity of adopting adaptable, resilient, and well-governed digital infrastructures to fully realize the benefits of digital public policy in the context of developing countries.
本文讨论了发展中国家公共政策执行过程中的数字化进程、其关键成功因素、挑战以及从案例研究中汲取的经验教训。通过将数字技术注入公共政策的制定、执行和评估过程,公共行政可以提高效率、透明度和有效性。成功的关键因素包括强大的数字基础设施、清晰的战略愿景和领导力、利益相关者的有效参与、能力建设和支持性监管框架。鉴于这些潜在的好处,发展中国家面临着巨大的挑战,如基础设施不足、政治不稳定、社会政治阻力和数字扫盲方面的差距。通过对爱沙尼亚、韩国、中国、孟加拉国和卢旺达等国的经验案例研究的回顾,文章指出了可以为其他发展中国家的数字战略提供借鉴的关键经验。文章讨论了维持数字基础设施所面临的挑战,包括持续的维护成本、不断更新技术的必要性以及过时的风险。此外,文章还探讨了能力建设、公私合作伙伴关系和不断发展的监管框架对确保数字政策长期可行性的重要意义。所提出的未来发展方向强调,必须采用适应性强、弹性大、管理完善的数字基础设施,以充分实现发展中国家数字公共政策的益处。
{"title":"Transforming Public Policy in Developing Countries: A Comprehensive Review of Digital Implementation","authors":"Asmawa;Abdul Hakim;Hermawan;Ainul Hayat","doi":"10.13052/jicts2245-800X.1235","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1235","url":null,"abstract":"This article discusses the process of digitization in the implementation of public policy within developing countries, its critical success factors, challenges, and lessons learned from case studies. Public administration can improve efficiencies, transparency, and effectiveness through the infusion of digital technologies into processes implicated in the making, execution, and evaluation of public policies. Key success factors identified include robust digital infrastructure, clear strategic vision and leadership, effective stakeholder engagement, capacity building, and a supportive regulatory framework. In light of these potential benefits, developing countries experience enormous challenges such as inadequate infrastructure, political instability, socio-political resistance, and gaps in digital literacy. Through a review of empirical case studies from countries such as Estonia, South Korea, China, Bangladesh, and Rwanda, the article identifies key lessons that can inform the digital strategies of other developing nations. The discussion addresses the challenges of sustaining digital infrastructure, including ongoing maintenance costs, the need for continuous technology updates, and the risks of obsolescence. Furthermore, the article explores the significance of capacity building, public-private partnerships, and evolving regulatory frameworks in ensuring the long-term viability of digital policies. The future directions proposed underscore the necessity of adopting adaptable, resilient, and well-governed digital infrastructures to fully realize the benefits of digital public policy in the context of developing countries.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"12 3","pages":"337-364"},"PeriodicalIF":0.0,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10770616","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142736398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Distributed Access Simulation of Large-Scale Multi-Source Terminals for 5G 面向 5G 的大规模多源终端分布式接入仿真研究
Q3 Decision Sciences Pub Date : 2024-09-01 DOI: 10.13052/jicts2245-800X.1233
Lihong Ge;Pengyu Zhang;Kaiwen Hou;Wei Ao;Lin Zhou;Yindong Li
Large-scale machine communication scenarios are faced with the characteristics of a large number of terminal devices, small communication packets and frequent transmissions. Traditional multiple access technology can't fully apply to these characteristics, so it needs to be improved and designed. In order to further improve the effect of distributed access strategy formulation of large-scale multi-source terminal for 5G, this paper proposes a distributed access technology for large-scale multi-source terminals for 5G. For distributed access scenarios, antenna units in the distributed system are scattered in the system, and each antenna unit keeps communication with the surrounding terminal equipment, which can expand the number of terminal devices randomly accessed in the same time slot. Then, taking advantage of this inherent advantage and the advantage of time-shifted pilot, this paper proposes a distributed random access scheme based on time-shifted pilot. Finally, through analysis and simulation, this paper proves that this scheme can effectively reduce the pilot collision probability of each antenna element and the average access delay in the system, which provides a technical reference for the subsequent distributed access of large-scale multi-source terminals.
大规模机器通信场景面临着终端设备数量多、通信数据包小、传输频繁等特点。传统的多址接入技术无法完全适用于这些特点,因此需要对其进行改进和设计。为了进一步提高面向 5G 的大规模多源终端分布式接入策略制定的效果,本文提出了面向 5G 的大规模多源终端分布式接入技术。在分布式接入场景下,分布式系统中的天线单元分散在系统中,每个天线单元与周围的终端设备保持通信,可以扩大同一时隙内随机接入的终端设备数量。于是,本文利用这一先天优势和时移先导的优点,提出了一种基于时移先导的分布式随机接入方案。最后,本文通过分析和仿真证明,该方案能有效降低系统中各天线元的先导碰撞概率和平均接入时延,为后续大规模多源终端的分布式接入提供了技术参考。
{"title":"Research on Distributed Access Simulation of Large-Scale Multi-Source Terminals for 5G","authors":"Lihong Ge;Pengyu Zhang;Kaiwen Hou;Wei Ao;Lin Zhou;Yindong Li","doi":"10.13052/jicts2245-800X.1233","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1233","url":null,"abstract":"Large-scale machine communication scenarios are faced with the characteristics of a large number of terminal devices, small communication packets and frequent transmissions. Traditional multiple access technology can't fully apply to these characteristics, so it needs to be improved and designed. In order to further improve the effect of distributed access strategy formulation of large-scale multi-source terminal for 5G, this paper proposes a distributed access technology for large-scale multi-source terminals for 5G. For distributed access scenarios, antenna units in the distributed system are scattered in the system, and each antenna unit keeps communication with the surrounding terminal equipment, which can expand the number of terminal devices randomly accessed in the same time slot. Then, taking advantage of this inherent advantage and the advantage of time-shifted pilot, this paper proposes a distributed random access scheme based on time-shifted pilot. Finally, through analysis and simulation, this paper proves that this scheme can effectively reduce the pilot collision probability of each antenna element and the average access delay in the system, which provides a technical reference for the subsequent distributed access of large-scale multi-source terminals.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"12 3","pages":"283-310"},"PeriodicalIF":0.0,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10770618","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142736526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of ICT Standardization
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1