首页 > 最新文献

Journal of ICT Standardization最新文献

英文 中文
Implementation of Elliptic Curve Cryptosystem with Bitcoin Curves on SECP256k1, NIST256p, NIST521p, and LLL 基于比特币曲线的椭圆曲线密码系统在SECP256k1、NIST256p、NIST521p和ll上的实现
Q3 Decision Sciences Pub Date : 2023-11-22 DOI: 10.13052/jicts2245-800X.1141
Mohammed Mujeer Ulla;Preethi;Md. Sameeruddin Khan;Deepak S. Sakkari
Very recent attacks like ladder leaks demonstrated the feasibility of recovering private keys with side-channel attacks using just one bit of secret nonce. ECDSA nonce bias can be exploited in many ways. Some attacks on ECDSA involve complicated Fourier analysis and lattice mathematics. This paper will enable cryptographers to identify efficient ways in which ECDSA can be cracked on curves NIST256p, SECP256k1, NIST521p, and weak nonce, kind of attacks that can crack ECDSA and how to protect yourself. Initially, we begin with an ECDSA signature to sign a message using the private key and validate the generated signature using the shared public key. Then we use a nonce or a random value to randomize the generated signature. Every time we sign, a new verifiable random nonce value is created, and a way in which the intruder can discover the private key if the signer leaks any one of the nonce values. Then we use Lenstra-Lenstra-Lovasz (LLL) method as a black box, we will try to attack signatures generated from bad nonce or bad random number generator (RAG) on NIST256p, SECP256k1 curves. The combination of nonce generation, post-message signing, and validation in ECDSA helps achieve Uniqueness, Authentication, Integrity, and Non-Repudiation. The analysis is performed by considering all three curves for the implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA). The comparative analysis for each of the selected curves in terms of computational time is done with the leak of nonce and with the Lenstra-Lenstra-Lovasz method to crack ECDSA. The average computational costs to break ECDSA with curves NIST256p, NIST521p, and SECP256k1 are 0.016, 0.34,0.46 respectively which is almost zero depicting the strength of the algorithm. The average computational costs to break ECDSA with curves SECP256K1 and NIST256p using LLL are 2.9 and 3.4 respectively
最近的攻击,如阶梯泄漏,证明了利用侧通道攻击恢复私钥的可行性。ECDSA nonce偏差可以在许多方面被利用。对ECDSA的一些攻击涉及复杂的傅里叶分析和格数学。本文将使密码学家能够识别在曲线NIST256p, SECP256k1, NIST521p和弱nonce上破解ECDSA的有效方法,可以破解ECDSA的攻击类型以及如何保护自己。首先,我们从ECDSA签名开始,使用私钥对消息进行签名,并使用共享公钥验证生成的签名。然后我们使用随机数或随机值来随机化生成的签名。每次我们签名时,都会创建一个新的可验证的随机nonce值,并且如果签名者泄露任何一个nonce值,入侵者可以通过这种方式发现私钥。然后我们使用Lenstra-Lenstra-Lovasz (LLL)方法作为黑盒,我们将尝试攻击由NIST256p, SECP256k1曲线上的坏随机数生成器(RAG)或坏随机数生成器(RAG)生成的签名。ECDSA中nonce生成、消息后签名和验证的组合有助于实现唯一性、身份验证、完整性和不可否认性。通过考虑实现椭圆曲线数字签名算法(ECDSA)的所有三条曲线来进行分析。利用nonce泄漏和Lenstra-Lenstra-Lovasz方法对所选曲线的计算时间进行了比较分析。利用曲线NIST256p、NIST521p和SECP256k1破坏ECDSA的平均计算成本分别为0.016、0.34和0.46,几乎为零,说明了算法的强度。使用LLL破坏SECP256K1和NIST256p曲线的ECDSA的平均计算成本分别为2.9和3.4
{"title":"Implementation of Elliptic Curve Cryptosystem with Bitcoin Curves on SECP256k1, NIST256p, NIST521p, and LLL","authors":"Mohammed Mujeer Ulla;Preethi;Md. Sameeruddin Khan;Deepak S. Sakkari","doi":"10.13052/jicts2245-800X.1141","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1141","url":null,"abstract":"Very recent attacks like ladder leaks demonstrated the feasibility of recovering private keys with side-channel attacks using just one bit of secret nonce. ECDSA nonce bias can be exploited in many ways. Some attacks on ECDSA involve complicated Fourier analysis and lattice mathematics. This paper will enable cryptographers to identify efficient ways in which ECDSA can be cracked on curves NIST256p, SECP256k1, NIST521p, and weak nonce, kind of attacks that can crack ECDSA and how to protect yourself. Initially, we begin with an ECDSA signature to sign a message using the private key and validate the generated signature using the shared public key. Then we use a nonce or a random value to randomize the generated signature. Every time we sign, a new verifiable random nonce value is created, and a way in which the intruder can discover the private key if the signer leaks any one of the nonce values. Then we use Lenstra-Lenstra-Lovasz (LLL) method as a black box, we will try to attack signatures generated from bad nonce or bad random number generator (RAG) on NIST256p, SECP256k1 curves. The combination of nonce generation, post-message signing, and validation in ECDSA helps achieve Uniqueness, Authentication, Integrity, and Non-Repudiation. The analysis is performed by considering all three curves for the implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA). The comparative analysis for each of the selected curves in terms of computational time is done with the leak of nonce and with the Lenstra-Lenstra-Lovasz method to crack ECDSA. The average computational costs to break ECDSA with curves NIST256p, NIST521p, and SECP256k1 are 0.016, 0.34,0.46 respectively which is almost zero depicting the strength of the algorithm. The average computational costs to break ECDSA with curves SECP256K1 and NIST256p using LLL are 2.9 and 3.4 respectively","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"11 4","pages":"329-353"},"PeriodicalIF":0.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10326102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138431209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Models: A Study of English Essay Text Content Feature Extraction and Automatic Scoring 机器学习模型:英语短文文本内容特征提取与自动评分研究
Q3 Decision Sciences Pub Date : 2023-11-22 DOI: 10.13052/jicts2245-800X.1143
Wei Shang;Huihua Men;Xiujie Du
Accurate automatic scoring of English essay is beneficial for both teachers and students in English teaching. This paper briefly introduced an XGBoost-based automated scoring algorithm for English essay. To improve the accuracy of the algorithm, a long short-term memory (LSTM) semantic model was introduced to extract semantic scoring features from essays. Finally, the improved XGBoost algorithm was compared with the traditional XGBoost and LSTM algorithms in a simulation experiment using five types of essay prompts. The results indicate that the improved XGBoost algorithm has the best performance for automatic scoring of English essay and also requires the shortest scoring time.
准确的英语作文自动评分对英语教学中的师生都是有益的。本文简要介绍了一种基于xgboost的英语作文自动评分算法。为了提高算法的准确性,引入了长短期记忆(LSTM)语义模型,从文章中提取语义评分特征。最后,利用五种类型的作文提示,将改进的XGBoost算法与传统的XGBoost和LSTM算法进行了仿真实验比较。结果表明,改进的XGBoost算法在英语作文自动评分中表现最好,且评分时间最短。
{"title":"Machine Learning Models: A Study of English Essay Text Content Feature Extraction and Automatic Scoring","authors":"Wei Shang;Huihua Men;Xiujie Du","doi":"10.13052/jicts2245-800X.1143","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1143","url":null,"abstract":"Accurate automatic scoring of English essay is beneficial for both teachers and students in English teaching. This paper briefly introduced an XGBoost-based automated scoring algorithm for English essay. To improve the accuracy of the algorithm, a long short-term memory (LSTM) semantic model was introduced to extract semantic scoring features from essays. Finally, the improved XGBoost algorithm was compared with the traditional XGBoost and LSTM algorithms in a simulation experiment using five types of essay prompts. The results indicate that the improved XGBoost algorithm has the best performance for automatic scoring of English essay and also requires the shortest scoring time.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"11 4","pages":"379-390"},"PeriodicalIF":0.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10326100","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138431044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on an Intelligent Algorithm for Automatic Test Paper Generation and Scoring in University English Exams 大学英语考试试卷自动生成与评分的智能算法研究
Q3 Decision Sciences Pub Date : 2023-11-22 DOI: 10.13052/jicts2245-800X.1144
Han Yang
This paper mainly studied the automatic test paper generation and scoring problems in university English exams. Firstly, an automatic test paper generation model was established. Then, an improved genetic algorithm (IGA) was designed for intelligent test paper generation, and it was also used to automatically score answers to Chinese-to-English translation questions in terms of syntax and semantics. It was found that compared with the traditional GA and particle swarm optimization algorithm, the IGA method was faster in generating test papers, with an average generation time of 25 s, and had a higher success rate (94%), suggesting higher validity, and the difficulty and differentiation degrees of the test papers were closer to the preset values. The results of automatic scoring also had a correlation of more than 0.8 with the manual scoring results. The results prove the effectiveness of the automatic test paper generation and scoring method. It can be promoted and applied in practice to enhance the security and fairness of large-scale English exams, as well as achieve objectivity and consistency in scoring.
本文主要研究了大学英语考试中的自动出卷及评分问题。首先,建立了试卷自动生成模型;然后,设计了一种改进的遗传算法(IGA)用于智能试卷生成,并将其用于汉英翻译题的语法和语义自动评分。结果发现,与传统的遗传算法和粒子群优化算法相比,遗传算法生成试卷的速度更快,平均生成时间为25 s,成功率更高(94%),表明有效度更高,试卷的难度和分化程度更接近预设值。自动评分结果与人工评分结果的相关性也大于0.8。实验结果证明了该方法的有效性。可以在实践中推广应用,增强大型英语考试的安全性和公平性,实现评分的客观性和一致性。
{"title":"A Study on an Intelligent Algorithm for Automatic Test Paper Generation and Scoring in University English Exams","authors":"Han Yang","doi":"10.13052/jicts2245-800X.1144","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1144","url":null,"abstract":"This paper mainly studied the automatic test paper generation and scoring problems in university English exams. Firstly, an automatic test paper generation model was established. Then, an improved genetic algorithm (IGA) was designed for intelligent test paper generation, and it was also used to automatically score answers to Chinese-to-English translation questions in terms of syntax and semantics. It was found that compared with the traditional GA and particle swarm optimization algorithm, the IGA method was faster in generating test papers, with an average generation time of 25 s, and had a higher success rate (94%), suggesting higher validity, and the difficulty and differentiation degrees of the test papers were closer to the preset values. The results of automatic scoring also had a correlation of more than 0.8 with the manual scoring results. The results prove the effectiveness of the automatic test paper generation and scoring method. It can be promoted and applied in practice to enhance the security and fairness of large-scale English exams, as well as achieve objectivity and consistency in scoring.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"11 4","pages":"391-401"},"PeriodicalIF":0.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10326101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138431045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Elliptic Curve Cryptography & RSA 椭圆曲线密码与RSA分析
Q3 Decision Sciences Pub Date : 2023-11-22 DOI: 10.13052/jicts2245-800X.1142
Mohammad Rafeek Khan;Kamal Upreti;Mohammad Imran Alam;Haneef Khan;Shams Tabrez Siddiqui;Mustafizul Haque;Jyoti Parashar
In today's digital world, the Internet is an essential component of communication networks. It provides a platform for quickly exchanging information among communicating parties. There is a risk of unauthorized persons gaining access to our sensitive information while it is being transmitted. Cryptography is one of the most effective and efficient strategies for protecting our data and it are utilized all around the world. The efficiency of a cryptography algorithm is determined by a number of parameters, one of which is the length of the key. For cryptography, key (public/private) is an essential part. To provide robust security, RSA takes larger key size. If we use larger key size, the processing performance will be slowed. As a result, processing speed will decrease and memory consumption will increase. Due to this, cryptographic algorithms with smaller key size and higher security are becoming more popular. Out of the cryptographic algorithms, Elliptic Curve Cryptography (ECC) provides equivalent level of safety which RSA provides, but it takes smaller key size. On the basis of key size, our work focused on, studied, and compared the efficacy in terms of security among the well-known public key cryptography algorithms, namely ECC (Elliptic Curve Cryptography) and RSA (Rivets Shamir Adelman).
在当今的数字世界中,互联网是通信网络的重要组成部分。它为通信各方之间快速交换信息提供了一个平台。在传输我们的敏感信息时,存在未经授权的人获得访问权限的风险。密码学是保护我们数据的最有效和最有效的策略之一,它在世界各地都被使用。密码算法的效率是由许多参数决定的,其中一个参数就是密钥的长度。对于密码学来说,密钥(公钥/私钥)是一个必不可少的部分。为了提供强大的安全性,RSA采用更大的密钥大小。如果我们使用较大的密钥大小,将会降低处理性能。因此,处理速度会降低,内存消耗会增加。因此,密钥尺寸更小、安全性更高的加密算法越来越受欢迎。在加密算法中,椭圆曲线加密(ECC)提供了与RSA相同的安全级别,但它需要更小的密钥大小。在密钥大小的基础上,我们的工作重点研究和比较了众所周知的公钥加密算法ECC (Elliptic Curve cryptography)和RSA (Rivets Shamir Adelman)在安全性方面的有效性。
{"title":"Analysis of Elliptic Curve Cryptography & RSA","authors":"Mohammad Rafeek Khan;Kamal Upreti;Mohammad Imran Alam;Haneef Khan;Shams Tabrez Siddiqui;Mustafizul Haque;Jyoti Parashar","doi":"10.13052/jicts2245-800X.1142","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1142","url":null,"abstract":"In today's digital world, the Internet is an essential component of communication networks. It provides a platform for quickly exchanging information among communicating parties. There is a risk of unauthorized persons gaining access to our sensitive information while it is being transmitted. Cryptography is one of the most effective and efficient strategies for protecting our data and it are utilized all around the world. The efficiency of a cryptography algorithm is determined by a number of parameters, one of which is the length of the key. For cryptography, key (public/private) is an essential part. To provide robust security, RSA takes larger key size. If we use larger key size, the processing performance will be slowed. As a result, processing speed will decrease and memory consumption will increase. Due to this, cryptographic algorithms with smaller key size and higher security are becoming more popular. Out of the cryptographic algorithms, Elliptic Curve Cryptography (ECC) provides equivalent level of safety which RSA provides, but it takes smaller key size. On the basis of key size, our work focused on, studied, and compared the efficacy in terms of security among the well-known public key cryptography algorithms, namely ECC (Elliptic Curve Cryptography) and RSA (Rivets Shamir Adelman).","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"11 4","pages":"355-378"},"PeriodicalIF":0.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10326103","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138431210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing the Standardization Landscape for Identity Management in Public Services - A Standards Review for the IMPULSE Project 公共服务中身份管理的标准化前景分析- IMPULSE项目标准回顾
Q3 Decision Sciences Pub Date : 2023-11-22 DOI: 10.13052/jicts2245-800X.1145
René Lindner;Madlen Schmudde;Alicia Jiménez González;Jaime Loureiro Acuña;Knut Blind
The digitalization of public services is one of the major challenges that public administrations are currently facing. Electronic identifications play a major role for a variety of these related services. Due to the impact these services will have on the daily life of citizens, organizations, and the public at large, the social dimensions must be considered equally to the technical ones. To ensure the applicability, trust, and compliance of electronic identity for access to public services, it is necessary to take into account relevant standards collected through an analysis of the state-of-the-art. In general, the literature on integrating standardization in research projects is very rare and potential impacts of standards related to electronic identification have not been assessed yet. The European project IMPULSE has integrated standardization as an essential element and assessed the relevant standardization landscape as one activity. The analysis of the standardization landscape resulted in the identification of nine formal and six de-facto standards that have high relevance for IMPULSE. The process for this analysis and the resulting dashboard will support future projects to effectively consider, analyze and use standards for their projects.
公共服务数字化是当前公共管理面临的主要挑战之一。电子身份识别在各种相关服务中发挥着重要作用。由于这些服务将对公民、组织和公众的日常生活产生影响,因此必须将社会层面与技术层面同等考虑。为了确保电子身份在获取公共服务方面的适用性、可信性和合规性,有必要考虑通过分析最新技术收集的相关标准。总体而言,将标准化整合到研究项目中的文献非常少,并且尚未对电子识别相关标准的潜在影响进行评估。欧洲项目IMPULSE将标准化作为一个基本要素,并将相关的标准化景观作为一项活动进行评估。标准化环境的分析导致了与IMPULSE高度相关的9个正式标准和6个事实上的标准的确定。这个分析过程和结果仪表板将支持未来的项目有效地考虑、分析和使用他们项目的标准。
{"title":"Analyzing the Standardization Landscape for Identity Management in Public Services - A Standards Review for the IMPULSE Project","authors":"René Lindner;Madlen Schmudde;Alicia Jiménez González;Jaime Loureiro Acuña;Knut Blind","doi":"10.13052/jicts2245-800X.1145","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1145","url":null,"abstract":"The digitalization of public services is one of the major challenges that public administrations are currently facing. Electronic identifications play a major role for a variety of these related services. Due to the impact these services will have on the daily life of citizens, organizations, and the public at large, the social dimensions must be considered equally to the technical ones. To ensure the applicability, trust, and compliance of electronic identity for access to public services, it is necessary to take into account relevant standards collected through an analysis of the state-of-the-art. In general, the literature on integrating standardization in research projects is very rare and potential impacts of standards related to electronic identification have not been assessed yet. The European project IMPULSE has integrated standardization as an essential element and assessed the relevant standardization landscape as one activity. The analysis of the standardization landscape resulted in the identification of nine formal and six de-facto standards that have high relevance for IMPULSE. The process for this analysis and the resulting dashboard will support future projects to effectively consider, analyze and use standards for their projects.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"11 4","pages":"403-430"},"PeriodicalIF":0.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10326104","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138431211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introducing Privacy Receipts into DLT and eIDAS 在DLT和eIDAS中引入隐私收据
Q3 Decision Sciences Pub Date : 2023-09-28 DOI: 10.13052/jicts2245-800X.1121
Jan Lindquist
The introduction of digital identification (e.g., eIDAS) and wallet standards (e.g., EUDI wallet) require compliance with privacy principles and clear communication of the principles through privacy notice and record of consent in the form of a privacy receipt. Regulation needs standards to help set the bar for reducing the privacy infringement risk. Without a standard-based implementation, solutions will be proprietary and siloed with no concern for interoperability, like privacy labels in Google and Apple app stores. Do existing standards address the gap, or do new ones need to be introduced? This article looks at the standards and regulations in three areas to answer this question: privacy protection standards, blockchain and DLT standards, and digital identification and wallet standards.
数字身份识别(如eIDAS)和钱包标准(如EUDI钱包)的引入要求遵守隐私原则,并通过隐私通知和隐私收据形式的同意记录明确传达这些原则。监管需要标准来帮助设定降低侵犯隐私风险的标准。如果没有基于标准的实施,解决方案将是专有的、孤立的,不关心互操作性,就像谷歌和苹果应用商店中的隐私标签一样。现有的标准是否解决了这一差距,还是需要引入新的标准?本文着眼于三个领域的标准和法规来回答这个问题:隐私保护标准、区块链和DLT标准以及数字识别和钱包标准。
{"title":"Introducing Privacy Receipts into DLT and eIDAS","authors":"Jan Lindquist","doi":"10.13052/jicts2245-800X.1121","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1121","url":null,"abstract":"The introduction of digital identification (e.g., eIDAS) and wallet standards (e.g., EUDI wallet) require compliance with privacy principles and clear communication of the principles through privacy notice and record of consent in the form of a privacy receipt. Regulation needs standards to help set the bar for reducing the privacy infringement risk. Without a standard-based implementation, solutions will be proprietary and siloed with no concern for interoperability, like privacy labels in Google and Apple app stores. Do existing standards address the gap, or do new ones need to be introduced? This article looks at the standards and regulations in three areas to answer this question: privacy protection standards, blockchain and DLT standards, and digital identification and wallet standards.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"11 2","pages":"117-134"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255407/10266732.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Impulsive Buying Behavior Using Partial Least Squares Algorithm 基于偏最小二乘算法的网上冲动购买行为
Q3 Decision Sciences Pub Date : 2023-09-22 DOI: 10.13052/jicts2245-800X.1131
Dam Tri Cuong
Impulsive purchasing is one of many fascinating subjects to investigate in e-commerce research. Online buying facilitates purchases and provides impulsive buyers with a venue to meet their demands. Impulse buying occurs when a client feels a sudden, overpowering need to make a purchase, which is a common practice among online shoppers. Therefore, the study's purpose is to apply the partial least square (PLS) algorithm to investigate the factors driving online impulsive buying behavior (OIBB). Besides, in this research, the stimulus organism response (SOR) model was used as the research's guiding theory; with the stimulus such as visual appeal and price attributes, the organism comprising perceived enjoyment and perceived usefulness, and response as OIBB. In addition, a non-probability sampling method was employed to collect data from 313 customers who shared their online impulsive purchase experiences through a Google Forms online survey. The collected data was analyzed using the PLS technique to assess the reliability, convergent validity, and discriminant validity of the variables, as well as test the proposed hypotheses. The findings reveal that visual appeal and price attributes were positive connections to perceived enjoyment and perceived usefulness. Likewise, perceived enjoyment and perceived usefulness also impacted positively OIBB. Additionally, the findings disclosed that visual appeal and price attributes also were associated positively with OIBB.
冲动购买是电子商务研究中许多有趣的主题之一。网上购买方便了购买,并为冲动的买家提供了一个满足他们需求的场所。冲动购买发生在客户突然感到强烈的购买需求时,这是网购者的常见做法。因此,本研究的目的是应用偏最小二乘(PLS)算法来研究在线冲动购买行为(OIBB)的驱动因素。此外,本研究以刺激-机体反应(SOR)模型为研究指导理论;在视觉吸引力和价格属性等刺激下,生物体包括感知的享受和感知的有用性,以及作为OIBB的反应。此外,采用非概率抽样方法收集了313名客户的数据,这些客户通过谷歌表单在线调查分享了他们的在线冲动购买体验。使用PLS技术对收集的数据进行分析,以评估变量的可靠性、收敛有效性和判别有效性,并检验所提出的假设。研究结果表明,视觉吸引力和价格属性与感知的乐趣和有用性呈正相关。同样,感知到的乐趣和感知到的有用性也对OIBB产生了积极影响。此外,研究结果显示,视觉吸引力和价格属性也与OIBB呈正相关。
{"title":"Online Impulsive Buying Behavior Using Partial Least Squares Algorithm","authors":"Dam Tri Cuong","doi":"10.13052/jicts2245-800X.1131","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1131","url":null,"abstract":"Impulsive purchasing is one of many fascinating subjects to investigate in e-commerce research. Online buying facilitates purchases and provides impulsive buyers with a venue to meet their demands. Impulse buying occurs when a client feels a sudden, overpowering need to make a purchase, which is a common practice among online shoppers. Therefore, the study's purpose is to apply the partial least square (PLS) algorithm to investigate the factors driving online impulsive buying behavior (OIBB). Besides, in this research, the stimulus organism response (SOR) model was used as the research's guiding theory; with the stimulus such as visual appeal and price attributes, the organism comprising perceived enjoyment and perceived usefulness, and response as OIBB. In addition, a non-probability sampling method was employed to collect data from 313 customers who shared their online impulsive purchase experiences through a Google Forms online survey. The collected data was analyzed using the PLS technique to assess the reliability, convergent validity, and discriminant validity of the variables, as well as test the proposed hypotheses. The findings reveal that visual appeal and price attributes were positive connections to perceived enjoyment and perceived usefulness. Likewise, perceived enjoyment and perceived usefulness also impacted positively OIBB. Additionally, the findings disclosed that visual appeal and price attributes also were associated positively with OIBB.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"11 3","pages":"217-236"},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255391/10255405.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68139276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Adaptive Fault Diagnosis Control System of Audio Management Component Environment of Airborne Electronic Equipment 机载电子设备音频管理组件环境自适应故障诊断控制系统研究
Q3 Decision Sciences Pub Date : 2023-09-22 DOI: 10.13052/jicts2245-800X.1124
Xiaomin Xie;Shuguo Gui;Renwei Dou;Xuanfu Du
The system adopts adaptive control, and the controller of audio management component is directly applied to the controlled object. Through online calculation, the model is identified online by using the dynamic characteristics of the object, and the relationship between input and output variables is expressed. It can be corrected by entering and leaving data, which is actually to correct the controller. The initial rules of the controller are composed of default models. Through continuous self-reasoning learning, the controller is optimized to achieve data tracking, fast convergence, strong anti-interference ability and excellent performance. Combining intelligent control with adaptive technology not only expands the scope of adaptive system, but also provides an effective way for intelligent control. The environmental adaptive diagnostic control system uses adaptive technology to adjust the parameters, data and knowledge base of the controller. The system detects IO signal, AD signal and the status data sent by the sub-unit through the internal CAN bus according to the power-on self-check of the unit, and at the same time, it monitors all the status data in real time during the operation, judges the operation of each sub-component, gives an alarm in time and carries out protection control. Through the design of integrated detection module, the overall installation space of detection sensors is reduced, signal interfaces and connecting cables are reduced, and the overall adaptive diagnosis effect can be improved. Through the data recording and storage function, the system stores the operation information of each subunit, compares it with the built-in health data table, and prompts the maintenance information in time.
系统采用自适应控制,音频管理组件的控制器直接应用于被控对象。通过在线计算,利用对象的动态特性在线识别模型,并表达输入和输出变量之间的关系。它可以通过输入和留下数据来纠正,这实际上是为了纠正控制器。控制器的初始规则由默认模型组成。通过连续的自推理学习,对控制器进行优化,实现数据跟踪、快速收敛、抗干扰能力强、性能优异。将智能控制与自适应技术相结合,不仅扩大了自适应系统的范围,而且为智能控制提供了一条有效的途径。环境自适应诊断控制系统利用自适应技术对控制器的参数、数据和知识库进行调整。系统根据分机的通电自检,检测IO信号、AD信号和分机通过内部CAN总线发送的状态数据,同时实时监控运行过程中的所有状态数据,判断各分机的运行情况,及时报警并进行保护控制。通过集成检测模块的设计,减少了检测传感器的整体安装空间,减少了信号接口和连接电缆,提高了整体自适应诊断效果。系统通过数据记录和存储功能,存储各子单元的运行信息,并与内置的健康数据表进行比较,及时提示维护信息。
{"title":"Research on Adaptive Fault Diagnosis Control System of Audio Management Component Environment of Airborne Electronic Equipment","authors":"Xiaomin Xie;Shuguo Gui;Renwei Dou;Xuanfu Du","doi":"10.13052/jicts2245-800X.1124","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1124","url":null,"abstract":"The system adopts adaptive control, and the controller of audio management component is directly applied to the controlled object. Through online calculation, the model is identified online by using the dynamic characteristics of the object, and the relationship between input and output variables is expressed. It can be corrected by entering and leaving data, which is actually to correct the controller. The initial rules of the controller are composed of default models. Through continuous self-reasoning learning, the controller is optimized to achieve data tracking, fast convergence, strong anti-interference ability and excellent performance. Combining intelligent control with adaptive technology not only expands the scope of adaptive system, but also provides an effective way for intelligent control. The environmental adaptive diagnostic control system uses adaptive technology to adjust the parameters, data and knowledge base of the controller. The system detects IO signal, AD signal and the status data sent by the sub-unit through the internal CAN bus according to the power-on self-check of the unit, and at the same time, it monitors all the status data in real time during the operation, judges the operation of each sub-component, gives an alarm in time and carries out protection control. Through the design of integrated detection module, the overall installation space of detection sensors is reduced, signal interfaces and connecting cables are reduced, and the overall adaptive diagnosis effect can be improved. Through the data recording and storage function, the system stores the operation information of each subunit, compares it with the built-in health data table, and prompts the maintenance information in time.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"11 2","pages":"175-196"},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255407/10255420.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved YOLO for Road and Vehicle Target Detection Model 一种用于道路和车辆目标检测模型的改进YOLO
Q3 Decision Sciences Pub Date : 2023-09-22 DOI: 10.13052/jicts2245-800X.1125
Qinghe Yu;Huaiqin Liu;Qu Wu
The yolo series is the prevalent algorithm for target identification at now. Nevertheless, due to the high real-time, mixed target parity, and obscured target features of vehicle target recognition, missed detection and incorrect detection are common. It enhances the yolo algorithm in order to enhance the network performance of this method while identifying vehicle targets. To properly portray the improvement impact, the yolov4 method is used as the improvement baseline. First, the structure of the DarkNet backbone network is modified, and a more efficient backbone network, FBR-DarkNet, is presented to enhance the effect of feature extraction. In order to better detect obstructed cars, a thin feature layer for focused detection of tiny objects is added to the Neck module to increase the recognition impact. The attention mechanism module CBAM is included to increase the model's precision and speed of convergence. The lightweight network replaces the MISH function with the H-SWISH function, and the improved algorithm improves by 4.76 percentage points over the original network on the BDD100K data set, with the mAP metrics improving by 8 points, 8 points, and 7 points, respectively, for the car, truck, and bus categories. Compared to other newer and better algorithms, it nevertheless maintains a pretty decent performance. It satisfies the criteria for real-time detection and significantly improves the detection accuracy.
yolo序列是目前较为流行的目标识别算法。然而,由于车辆目标识别的实时性高、目标奇偶性混合、目标模糊等特点,漏检和误检是常见的。它对yolo算法进行了改进,以提高该方法在识别车辆目标时的网络性能。为了正确描述改进影响,使用yolov4方法作为改进基线。首先,对DarkNet骨干网络的结构进行了修改,提出了一种更高效的骨干网络FBR-DarkNet,以增强特征提取的效果。为了更好地检测被遮挡的汽车,在Neck模块中添加了一个用于聚焦检测微小物体的薄特征层,以增加识别效果。为了提高模型的精度和收敛速度,引入了注意机制模块CBAM。轻量级网络用H-SWISH函数取代了MISH函数,在BDD100K数据集上,改进的算法比原始网络提高了4.76个百分点,汽车、卡车和公共汽车类别的mAP指标分别提高了8个点、8个点和7个点。与其他更新更好的算法相比,它仍然保持了相当不错的性能。它满足了实时检测的标准,并显著提高了检测精度。
{"title":"An Improved YOLO for Road and Vehicle Target Detection Model","authors":"Qinghe Yu;Huaiqin Liu;Qu Wu","doi":"10.13052/jicts2245-800X.1125","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1125","url":null,"abstract":"The yolo series is the prevalent algorithm for target identification at now. Nevertheless, due to the high real-time, mixed target parity, and obscured target features of vehicle target recognition, missed detection and incorrect detection are common. It enhances the yolo algorithm in order to enhance the network performance of this method while identifying vehicle targets. To properly portray the improvement impact, the yolov4 method is used as the improvement baseline. First, the structure of the DarkNet backbone network is modified, and a more efficient backbone network, FBR-DarkNet, is presented to enhance the effect of feature extraction. In order to better detect obstructed cars, a thin feature layer for focused detection of tiny objects is added to the Neck module to increase the recognition impact. The attention mechanism module CBAM is included to increase the model's precision and speed of convergence. The lightweight network replaces the MISH function with the H-SWISH function, and the improved algorithm improves by 4.76 percentage points over the original network on the BDD100K data set, with the mAP metrics improving by 8 points, 8 points, and 7 points, respectively, for the car, truck, and bus categories. Compared to other newer and better algorithms, it nevertheless maintains a pretty decent performance. It satisfies the criteria for real-time detection and significantly improves the detection accuracy.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"11 2","pages":"197-216"},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255407/10255428.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain-based MQTT Protocol Optimization Algorithm 一种基于区块链的MQTT协议优化算法
Q3 Decision Sciences Pub Date : 2023-09-22 DOI: 10.13052/jicts2245-800X.1122
Wei Gao;Lixia Zhang;Yun Ju
The communication protocol is an important support to realize the communication between equipment and Internet. And it covers all aspects of the IoT (Internet of things) system. To address the security problem of forging or tampering of key data in traditional IoT protocols, this paper designs an improved MQTT (message queue telemetry transmission) protocol that uses blockchain technology to ensure the security of transmitted data in the process of data transmission. Because the information in the blockchain is not tamperable, which in turn ensures that data stored in brokers are not maliciously tampered with. Through simulation experiments, it is proved that this scheme is lightweight, efficient and easy to implement, which helps to protect the security of IoT data.
通信协议是实现设备与互联网通信的重要支撑。它涵盖了物联网系统的各个方面。为了解决传统物联网协议中伪造或篡改关键数据的安全问题,本文设计了一种改进的MQTT(消息队列遥测传输)协议,该协议使用区块链技术来确保数据传输过程中传输数据的安全。因为区块链中的信息是不可篡改的,这反过来又确保了存储在经纪人中的数据不会被恶意篡改。通过仿真实验证明,该方案轻量级、高效、易于实现,有助于保护物联网数据的安全。
{"title":"A Blockchain-based MQTT Protocol Optimization Algorithm","authors":"Wei Gao;Lixia Zhang;Yun Ju","doi":"10.13052/jicts2245-800X.1122","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1122","url":null,"abstract":"The communication protocol is an important support to realize the communication between equipment and Internet. And it covers all aspects of the IoT (Internet of things) system. To address the security problem of forging or tampering of key data in traditional IoT protocols, this paper designs an improved MQTT (message queue telemetry transmission) protocol that uses blockchain technology to ensure the security of transmitted data in the process of data transmission. Because the information in the blockchain is not tamperable, which in turn ensures that data stored in brokers are not maliciously tampered with. Through simulation experiments, it is proved that this scheme is lightweight, efficient and easy to implement, which helps to protect the security of IoT data.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"11 2","pages":"135-156"},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255407/10255408.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of ICT Standardization
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1