首页 > 最新文献

2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)最新文献

英文 中文
A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes 智能家居中物联网应用的隐私保护通信协议
Tianyi Song, Ruinian Li, Bo Mei, Jiguo Yu, Xiaoshuang Xing, Xiuzhen Cheng
Internet of things is the trending direction when it comes to designing smart living environment. One of the popular applications of Internet of things is the smart home system. A smart home system usually consists of various types of connected sensors, actuators, appliances and a controller. The controller analyzes the data reported by the sensors and sends out messages to electric appliances and other sensors to ask them to behave accordingly. There are a lot of smart home designs proposed in the literature to make the systems smarter and more comfortable. However, little work has considered the security and privacy issues in smart home systems. In this paper, we analyze the differences of security and privacy issues that lie in the smart home systems, smart grid, and wireless sensor networks. Further, we propose our own solutions that achieves privacy preservation during the communications between end sensors and appliances and the controller.
物联网是智能生活环境设计的趋势方向。智能家居系统是物联网的热门应用之一。智能家居系统通常由各种类型的连接传感器、执行器、电器和控制器组成。控制器分析传感器报告的数据,并向电器和其他传感器发送信息,要求它们采取相应的行动。文献中提出了许多智能家居设计,以使系统更智能,更舒适。然而,很少有工作考虑到智能家居系统的安全和隐私问题。本文分析了智能家居系统、智能电网和无线传感器网络在安全和隐私问题上的差异。此外,我们提出了自己的解决方案,在终端传感器和设备与控制器之间的通信过程中实现隐私保护。
{"title":"A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes","authors":"Tianyi Song, Ruinian Li, Bo Mei, Jiguo Yu, Xiaoshuang Xing, Xiuzhen Cheng","doi":"10.1109/IIKI.2016.3","DOIUrl":"https://doi.org/10.1109/IIKI.2016.3","url":null,"abstract":"Internet of things is the trending direction when it comes to designing smart living environment. One of the popular applications of Internet of things is the smart home system. A smart home system usually consists of various types of connected sensors, actuators, appliances and a controller. The controller analyzes the data reported by the sensors and sends out messages to electric appliances and other sensors to ask them to behave accordingly. There are a lot of smart home designs proposed in the literature to make the systems smarter and more comfortable. However, little work has considered the security and privacy issues in smart home systems. In this paper, we analyze the differences of security and privacy issues that lie in the smart home systems, smart grid, and wireless sensor networks. Further, we propose our own solutions that achieves privacy preservation during the communications between end sensors and appliances and the controller.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122792076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 170
Optimization Coverage Control Algorithm Based on Square Monitoring Area in Wireless Sensor Networks 无线传感器网络中基于方形监控区域的优化覆盖控制算法
Zeyu Sun, Ben Yan, Mengluo Ji, Huihui Wang
In the k-coverage process of the target area, the wireless sensor network is easy to generate a great number of redundant nodes, consume a great deal of nodes energy in the network and is restricted by environmental factors. Based on the above deficiencies, this paper puts forward an optimization connected coverage algorithm based on rule area (optimization coverage control algorithm, OCCA). By using the double squares, this algorithm puts target nodes into the inner square area and establishes the correlation model by the sensor nodes and target nodes. As for the whole coverage area, the minimum number of sensor nodes is calculated through the expected value. The simulation shows that this algorithm can effectively complete the coverage of the target area at a low cost. Thus the effectiveness of the algorithm is verified. By using the algorithm, the allocation of network resources is reduced and the covering and connecting performance of the network can be better evaluated.
在目标区域的k覆盖过程中,无线传感器网络容易产生大量冗余节点,消耗网络中大量节点能量,并且受到环境因素的制约。基于以上不足,本文提出了一种基于规则域的优化连通覆盖算法(优化覆盖控制算法,OCCA)。该算法利用双平方将目标节点置于内平方区域,并建立传感器节点与目标节点的关联模型。对于整个覆盖区域,通过期望值计算最小传感器节点数。仿真结果表明,该算法能够以较低的成本有效地完成对目标区域的覆盖。从而验证了该算法的有效性。该算法减少了网络资源的分配,更好地评价了网络的覆盖性能和连接性能。
{"title":"Optimization Coverage Control Algorithm Based on Square Monitoring Area in Wireless Sensor Networks","authors":"Zeyu Sun, Ben Yan, Mengluo Ji, Huihui Wang","doi":"10.1109/IIKI.2016.82","DOIUrl":"https://doi.org/10.1109/IIKI.2016.82","url":null,"abstract":"In the k-coverage process of the target area, the wireless sensor network is easy to generate a great number of redundant nodes, consume a great deal of nodes energy in the network and is restricted by environmental factors. Based on the above deficiencies, this paper puts forward an optimization connected coverage algorithm based on rule area (optimization coverage control algorithm, OCCA). By using the double squares, this algorithm puts target nodes into the inner square area and establishes the correlation model by the sensor nodes and target nodes. As for the whole coverage area, the minimum number of sensor nodes is calculated through the expected value. The simulation shows that this algorithm can effectively complete the coverage of the target area at a low cost. Thus the effectiveness of the algorithm is verified. By using the algorithm, the allocation of network resources is reduced and the covering and connecting performance of the network can be better evaluated.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116021821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SINR-Q-CSMA: Carrier Sense Multiple Access Based on Queue Length under SINR SINR- q - csma:基于SINR下队列长度的载波感知多址
Zhaofeng Niu, Jiguo Yu, Xiuzhen Cheng, Tianyi Song
With the development of the Internet of Things (IoT), wireless sensor networks (WSNs) play a more and more important issue. Energy efficiency, one of the crucial performance indices, is always considered for design of protocols and algorithms in WSNs. In this paper, we focus on data frame transmission under SINR (signal to interference plus noise ratio) model. An efficient mechanism, called as SINR-Q-CSMA, is proposed. SINR-Q-CSMA combines dual-channel with time slotted methods, and considers sink circle and regular circle according to different scenarios, which can avoid collision problem effectively. Further, SINR-Q-CSMA employs a solution based on queue length to solve the collision.
随着物联网(IoT)的发展,无线传感器网络(WSNs)扮演着越来越重要的角色。在无线传感器网络协议和算法的设计中,能效一直是一个重要的性能指标。本文主要研究了信噪比(SINR)模型下的数据帧传输。提出了一种有效的机制,称为SINR-Q-CSMA。SINR-Q-CSMA将双通道与时隙方法相结合,并根据不同场景考虑了汇聚圈和规则圈,有效避免了碰撞问题。此外,SINR-Q-CSMA采用基于队列长度的解决方案来解决碰撞问题。
{"title":"SINR-Q-CSMA: Carrier Sense Multiple Access Based on Queue Length under SINR","authors":"Zhaofeng Niu, Jiguo Yu, Xiuzhen Cheng, Tianyi Song","doi":"10.1109/IIKI.2016.100","DOIUrl":"https://doi.org/10.1109/IIKI.2016.100","url":null,"abstract":"With the development of the Internet of Things (IoT), wireless sensor networks (WSNs) play a more and more important issue. Energy efficiency, one of the crucial performance indices, is always considered for design of protocols and algorithms in WSNs. In this paper, we focus on data frame transmission under SINR (signal to interference plus noise ratio) model. An efficient mechanism, called as SINR-Q-CSMA, is proposed. SINR-Q-CSMA combines dual-channel with time slotted methods, and considers sink circle and regular circle according to different scenarios, which can avoid collision problem effectively. Further, SINR-Q-CSMA employs a solution based on queue length to solve the collision.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115459879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personal Information Prediction Based on Movie Rating Data 基于电影评分数据的个人信息预测
Bo Mei, Xiaolu Cheng, Xiaoshuang Xing, Bowu Zhang, Wei Cheng
Movies are a major form of entertainment in the US. There are a dozens of websites focusing on movie information. On most of the websites, ratings and reviews from the users play an important role. When a user gives a movie a certain score, the user not only reflects his taste toward that movie but also potentially exposes his personal information. In this paper, we investigated several movie genres. In each genre, movies were classified into different clusters by using expectationmaximization (EM) algorithm. The classification criteria were built upon audience movie rating scores and existing user information. As a result, a new or anonymous users personal information could be predicted when he rated movies on movie-related websites. Moreover, newly released movies could be easily classified into corresponding clusters to assistant user information discovery. The revealed personal information was very useful and could be utilized in different ways such as increasing the accuracy for delivering user-related ads.
电影在美国是一种主要的娱乐形式。有几十个网站专注于电影信息。在大多数网站上,用户的评分和评论起着重要的作用。当用户给一部电影打某个分数时,用户不仅反映了他对这部电影的品味,还潜在地暴露了他的个人信息。在本文中,我们调查了几种电影类型。在每个类型中,使用期望最大化(EM)算法将电影分为不同的类。分类标准建立在观众电影评分分数和现有用户信息的基础上。因此,在电影相关网站对电影进行评价时,可以预测新用户或匿名用户的个人信息。此外,新发布的电影可以很容易地分类到相应的类中,以帮助用户发现信息。泄露的个人信息非常有用,可以以不同的方式加以利用,例如提高投放与用户相关的广告的准确性。
{"title":"Personal Information Prediction Based on Movie Rating Data","authors":"Bo Mei, Xiaolu Cheng, Xiaoshuang Xing, Bowu Zhang, Wei Cheng","doi":"10.1109/IIKI.2016.84","DOIUrl":"https://doi.org/10.1109/IIKI.2016.84","url":null,"abstract":"Movies are a major form of entertainment in the US. There are a dozens of websites focusing on movie information. On most of the websites, ratings and reviews from the users play an important role. When a user gives a movie a certain score, the user not only reflects his taste toward that movie but also potentially exposes his personal information. In this paper, we investigated several movie genres. In each genre, movies were classified into different clusters by using expectationmaximization (EM) algorithm. The classification criteria were built upon audience movie rating scores and existing user information. As a result, a new or anonymous users personal information could be predicted when he rated movies on movie-related websites. Moreover, newly released movies could be easily classified into corresponding clusters to assistant user information discovery. The revealed personal information was very useful and could be utilized in different ways such as increasing the accuracy for delivering user-related ads.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114653428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Correctness of the Chord Protocol Chord协议的正确性
Bojan Marinkovic, Z. Ognjanovic, Paola Glavan, A. Umek
The Chord protocol is one of the first, simplest and most popular overlay protocol. This paper describes the Chord protocol using the logic of time and knowledge. The formalization concerns Chord actions that maintain ring topology. We consider the case when the nodes are not allowed to fail or leave and prove the correctness with respect to it.
Chord协议是最早、最简单、最流行的覆盖协议之一。本文用时间逻辑和知识逻辑来描述Chord协议。形式化涉及维护环形拓扑的Chord操作。我们考虑节点不允许故障或离开的情况,并证明其正确性。
{"title":"Correctness of the Chord Protocol","authors":"Bojan Marinkovic, Z. Ognjanovic, Paola Glavan, A. Umek","doi":"10.1109/IIKI.2016.65","DOIUrl":"https://doi.org/10.1109/IIKI.2016.65","url":null,"abstract":"The Chord protocol is one of the first, simplest and most popular overlay protocol. This paper describes the Chord protocol using the logic of time and knowledge. The formalization concerns Chord actions that maintain ring topology. We consider the case when the nodes are not allowed to fail or leave and prove the correctness with respect to it.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122149278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security in Internet of Things: Opportunities and Challenges 物联网安全:机遇与挑战
Wei Wei, Andrew T. Yang, Weisong Shi
Internet of Things (IoT) have become the most pervasive and largest computing platform nowadays. Security plays a more and more important role because of the nature of IoT systems that deals with people's daily life. IoT systems are often composed of low capable devices, which are devices with low computational capability, limited energy supply, or small memory size, some traditional security solutions, such as asymmetric key based protocols and IP-based solutions, cannot be effectively applied to IoT systems. Other factors, such as the tight coupling between the cyber system and the physical world, the heterogeneity of IoT devices and IoT communication protocols, and the extremely large system scale, make it more challenging to secure IoT systems. Within the context of a general IoT system architecture, this paper investigates special security issues, identifies new challenges, and explores alternative designs of deploying security solutions.
物联网(IoT)已经成为当今最普及和最大的计算平台。由于物联网系统处理人们日常生活的性质,安全起着越来越重要的作用。物联网系统通常由低能力设备组成,即计算能力低、能量供应有限或内存大小小的设备,一些传统的安全解决方案,如基于非对称密钥的协议和基于ip的解决方案,不能有效地应用于物联网系统。其他因素,如网络系统与物理世界之间的紧密耦合,物联网设备和物联网通信协议的异构性,以及极其庞大的系统规模,使物联网系统的安全更具挑战性。在一般物联网系统架构的背景下,本文研究了特殊的安全问题,确定了新的挑战,并探索了部署安全解决方案的替代设计。
{"title":"Security in Internet of Things: Opportunities and Challenges","authors":"Wei Wei, Andrew T. Yang, Weisong Shi","doi":"10.1109/IIKI.2016.35","DOIUrl":"https://doi.org/10.1109/IIKI.2016.35","url":null,"abstract":"Internet of Things (IoT) have become the most pervasive and largest computing platform nowadays. Security plays a more and more important role because of the nature of IoT systems that deals with people's daily life. IoT systems are often composed of low capable devices, which are devices with low computational capability, limited energy supply, or small memory size, some traditional security solutions, such as asymmetric key based protocols and IP-based solutions, cannot be effectively applied to IoT systems. Other factors, such as the tight coupling between the cyber system and the physical world, the heterogeneity of IoT devices and IoT communication protocols, and the extremely large system scale, make it more challenging to secure IoT systems. Within the context of a general IoT system architecture, this paper investigates special security issues, identifies new challenges, and explores alternative designs of deploying security solutions.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125528538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Artificial Haze Immune Algorithm for Image Processing 图像处理中的人工雾免疫算法
Yanhui Guo, Lin Meng, Xiaobing Tang, Yufeng Shi, Han Cao, Y. Bai
The Intelligent Transportation Systems bring a safely and comfortable motorized society, which are based on image processing such as predicting/detecting the danger of vehicles collecting the transport information to control the traffic flow on traffic control systems etc. However, with the pollution of environment, the fog/haze becomes a serious problem, causing the image deterioration or degradation and the Intelligent Transportation Systems lose their functions. This paper proposed an immunological method of image processing for detecting the fog/haze in the image to support Intelligent Transportation Systems. This state-of-the-art method is based on the theory of biological defence system, which unites the reducing of fog/haze and edge detection. The experimental results show that our proposed haze immunized algorithm can remove effect of haze on image processing algorithm. Compared to conventional de-haze image processing algorithm, our proposed algorithm unitizes bio-inspired algorithm to achieve efficient hardware consumption. The results of FPGA implementation show less hardware usage than conventional method.
智能交通系统通过对交通控制系统进行图像处理,预测/检测车辆的危险,收集交通信息,控制交通流量,从而带来了一个安全、舒适的机动化社会。然而,随着环境的污染,雾霾成为一个严重的问题,导致图像恶化或退化,智能交通系统失去了功能。本文提出了一种免疫图像处理方法,用于检测图像中的雾/霾,以支持智能交通系统。这种最先进的方法是基于生物防御系统的理论,它结合了减少雾/霾和边缘检测。实验结果表明,本文提出的雾霾免疫算法能够消除雾霾对图像处理算法的影响。与传统的去雾图像处理算法相比,我们提出的算法结合了仿生算法,实现了高效的硬件消耗。FPGA实现的结果表明,与传统方法相比,硬件占用更少。
{"title":"Artificial Haze Immune Algorithm for Image Processing","authors":"Yanhui Guo, Lin Meng, Xiaobing Tang, Yufeng Shi, Han Cao, Y. Bai","doi":"10.1109/IIKI.2016.14","DOIUrl":"https://doi.org/10.1109/IIKI.2016.14","url":null,"abstract":"The Intelligent Transportation Systems bring a safely and comfortable motorized society, which are based on image processing such as predicting/detecting the danger of vehicles collecting the transport information to control the traffic flow on traffic control systems etc. However, with the pollution of environment, the fog/haze becomes a serious problem, causing the image deterioration or degradation and the Intelligent Transportation Systems lose their functions. This paper proposed an immunological method of image processing for detecting the fog/haze in the image to support Intelligent Transportation Systems. This state-of-the-art method is based on the theory of biological defence system, which unites the reducing of fog/haze and edge detection. The experimental results show that our proposed haze immunized algorithm can remove effect of haze on image processing algorithm. Compared to conventional de-haze image processing algorithm, our proposed algorithm unitizes bio-inspired algorithm to achieve efficient hardware consumption. The results of FPGA implementation show less hardware usage than conventional method.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130319754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Evaluation of Product Quality Perceived Value Based on Text Mining and Fuzzy Comprehensive Evaluation 基于文本挖掘和模糊综合评价的产品质量感知价值评价研究
Lifeng He, Ning Zhang, Lemin Yin
Over the past ten years, with the deepening and expansion of the application of Internet technology, more and more customers browse a lot of online reviews to understand the product and service reputation. Online reviews can provide decision support for consumers to purchase satisfactory product and the product customer satisfaction is mainly determined by product quality perceived value. This article will establish a new quality perceived value evaluation method by combining relatively mature test mining method with fuzzy comprehensive evaluation method. This evaluation model will be user oriented and more reflect the real needs of users. The new evaluation model will provide better decision support for consumers to buy satisfactory product.
近十年来,随着互联网技术应用的深入和扩展,越来越多的客户通过浏览大量的在线评论来了解产品和服务的口碑。在线评论可以为消费者购买满意的产品提供决策支持,产品顾客满意度主要由产品质量感知价值决定。本文将比较成熟的试验挖掘法与模糊综合评价法相结合,建立一种新的质量感知价值评价方法。这种评价模型将以用户为导向,更能反映用户的真实需求。新的评价模型将为消费者购买满意的产品提供更好的决策支持。
{"title":"Research on the Evaluation of Product Quality Perceived Value Based on Text Mining and Fuzzy Comprehensive Evaluation","authors":"Lifeng He, Ning Zhang, Lemin Yin","doi":"10.1109/IIKI.2016.95","DOIUrl":"https://doi.org/10.1109/IIKI.2016.95","url":null,"abstract":"Over the past ten years, with the deepening and expansion of the application of Internet technology, more and more customers browse a lot of online reviews to understand the product and service reputation. Online reviews can provide decision support for consumers to purchase satisfactory product and the product customer satisfaction is mainly determined by product quality perceived value. This article will establish a new quality perceived value evaluation method by combining relatively mature test mining method with fuzzy comprehensive evaluation method. This evaluation model will be user oriented and more reflect the real needs of users. The new evaluation model will provide better decision support for consumers to buy satisfactory product.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"38 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114013069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Big-Data-Driven Credit Reporting Framework for SMEs in China 中国中小企业大数据驱动的信用报告框架
Yunchuan Sun, Chunlei Li, Xuegang Cui, Guangzhi Zhang, Xiaoping Zeng, Xueying Chang, Dengbiao Tu, Yongping Xiong
SMEs (Small and Medium-size Enterprises) in China always face financing constraints and hardly obtain bank loans under unsound financing system. In external f Academic literature has shown that widespread information asymmetry may prevent the efficient allocation of lending, leading to credit rationing. Currently, most credit reporting, models for SMEs in China are primarily based on hard information about the enterprises and their owners but lack comprehensive evaluation based on the combination with soft information. To bridge the gap for SMEs, we propose a novel big-data-driven credit reporting framework which presents a new credit reporting system by including big data in business, finance, and social networks. The proposed approach features in capturing diversified data online, conducting evaluation and analysis in real-time, and automatically generating online credit reports for SMEs, banks, and government. It also provides an efficient interactive way for SMEs to check credit reports online.
中国的中小企业在不健全的融资体系下,一直面临融资约束,难以获得银行贷款。外部学术文献表明,普遍存在的信息不对称可能会阻碍贷款的有效配置,从而导致信贷配给。目前,中国大多数中小企业信用报告模型主要基于企业及其所有者的硬信息,缺乏与软信息相结合的综合评价。为了弥补中小企业的差距,我们提出了一种新的大数据驱动的信用报告框架,该框架通过将商业、金融和社交网络中的大数据纳入其中,提出了一种新的信用报告系统。该方法的特点是在线获取多样化的数据,实时进行评估和分析,并为中小企业、银行和政府自动生成在线信用报告。它还为中小企业提供了一种高效的互动方式,让他们在网上查阅信用报告。
{"title":"A Novel Big-Data-Driven Credit Reporting Framework for SMEs in China","authors":"Yunchuan Sun, Chunlei Li, Xuegang Cui, Guangzhi Zhang, Xiaoping Zeng, Xueying Chang, Dengbiao Tu, Yongping Xiong","doi":"10.1109/IIKI.2016.46","DOIUrl":"https://doi.org/10.1109/IIKI.2016.46","url":null,"abstract":"SMEs (Small and Medium-size Enterprises) in China always face financing constraints and hardly obtain bank loans under unsound financing system. In external f Academic literature has shown that widespread information asymmetry may prevent the efficient allocation of lending, leading to credit rationing. Currently, most credit reporting, models for SMEs in China are primarily based on hard information about the enterprises and their owners but lack comprehensive evaluation based on the combination with soft information. To bridge the gap for SMEs, we propose a novel big-data-driven credit reporting framework which presents a new credit reporting system by including big data in business, finance, and social networks. The proposed approach features in capturing diversified data online, conducting evaluation and analysis in real-time, and automatically generating online credit reports for SMEs, banks, and government. It also provides an efficient interactive way for SMEs to check credit reports online.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131847015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Validity Analysis of Fractional Age Assumptions under Rational Interpolating Method 有理插值法下分数年龄假设的有效性分析
Xia Zhao, Shilong Li
Validity analysis plays important role in the study of fractional age assumptions (FAAs), which assures assumption methods be effective. This paper investigate the validity conditions of FAA under RIM introduced in Li et al. (2013). A new sufficient validity condition is obtained, which also revised one mistake in Theorem 1 of Li et al. (2013). And the necessary and sufficient condition is found, which gives the accurate range of the parameter, even a little complex in analytical form. Simulation shows a clear comparison between these two conditions. These results perfect FAA under RIM in theoretical viewpoint, and are helpful to choose appropriate parameter in actuarial practice of life insurance.
效度分析在分数年龄假设研究中起着重要的作用,它保证了假设方法的有效性。本文研究Li et al.(2013)引入的RIM下FAA的有效性条件。得到了一个新的充分有效条件,修正了Li et al.(2013)的定理1中的一个错误。并给出了该参数的准确取值范围的充分必要条件,其解析形式稍显复杂。仿真结果表明这两种情况有明显的比较。这些结果从理论上完善了RIM下的FAA,有助于寿险精算实践中选择合适的参数。
{"title":"Validity Analysis of Fractional Age Assumptions under Rational Interpolating Method","authors":"Xia Zhao, Shilong Li","doi":"10.1109/IIKI.2016.118","DOIUrl":"https://doi.org/10.1109/IIKI.2016.118","url":null,"abstract":"Validity analysis plays important role in the study of fractional age assumptions (FAAs), which assures assumption methods be effective. This paper investigate the validity conditions of FAA under RIM introduced in Li et al. (2013). A new sufficient validity condition is obtained, which also revised one mistake in Theorem 1 of Li et al. (2013). And the necessary and sufficient condition is found, which gives the accurate range of the parameter, even a little complex in analytical form. Simulation shows a clear comparison between these two conditions. These results perfect FAA under RIM in theoretical viewpoint, and are helpful to choose appropriate parameter in actuarial practice of life insurance.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134144833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1