首页 > 最新文献

2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)最新文献

英文 中文
Analysis of Complex Time Series Using a Modified Multiscale Fuzzy Entropy Algorithm 基于改进多尺度模糊熵算法的复杂时间序列分析
Tian Han, Cheng Cheng Shi, Z. Wei, T. Lin
Multiscale fuzzy entropy (MFE) is an effective algorithm which has been successfully applied in many fields for measuring the complexity of a time series. Though, MFE can yield inaccurate entropy estimations as the coarse-graining procedure used by the algorithm reduces the length of the time series under investigation. A modified multiscale fuzzy entropy (MMFE) algorithm is presented in this paper to overcome this problem. In this new approach, the coarse-graining procedure is replaced by a moving-average procedure which constructs template vectors in calculating the fuzzy entropy. The effectiveness of the proposed MMFE algorithm is evaluated on several mixed data (i.e., data mixed with white noise) of various data length. The result shows that the MMFE algorithm can effectively reduce the deviation in entropy estimation as compared to that using MFE algorithm. The MMFE algorithm is further employed in the study to estimate the complexity and irregularity of vibration data of a roller element bearing for fault diagnosis. It is shown that the MMFE algorithm can effectively discriminate the four bearing operation conditions under study.
多尺度模糊熵(MFE)是一种有效的度量时间序列复杂度的算法,已成功地应用于许多领域。然而,MFE可能会产生不准确的熵估计,因为算法使用的粗粒度过程减少了所研究的时间序列的长度。针对这一问题,提出了一种改进的多尺度模糊熵(MMFE)算法。在该方法中,模糊熵的计算以构造模板向量的移动平均过程代替粗粒度过程。在不同数据长度的混合数据(即混合了白噪声的数据)上对所提出的MMFE算法的有效性进行了评价。结果表明,与MFE算法相比,MMFE算法可以有效地减少熵估计的偏差。进一步利用MMFE算法对滚动轴承振动数据的复杂性和不规则性进行估计,用于故障诊断。结果表明,MMFE算法能够有效地区分所研究的四种轴承工况。
{"title":"Analysis of Complex Time Series Using a Modified Multiscale Fuzzy Entropy Algorithm","authors":"Tian Han, Cheng Cheng Shi, Z. Wei, T. Lin","doi":"10.1109/IIKI.2016.12","DOIUrl":"https://doi.org/10.1109/IIKI.2016.12","url":null,"abstract":"Multiscale fuzzy entropy (MFE) is an effective algorithm which has been successfully applied in many fields for measuring the complexity of a time series. Though, MFE can yield inaccurate entropy estimations as the coarse-graining procedure used by the algorithm reduces the length of the time series under investigation. A modified multiscale fuzzy entropy (MMFE) algorithm is presented in this paper to overcome this problem. In this new approach, the coarse-graining procedure is replaced by a moving-average procedure which constructs template vectors in calculating the fuzzy entropy. The effectiveness of the proposed MMFE algorithm is evaluated on several mixed data (i.e., data mixed with white noise) of various data length. The result shows that the MMFE algorithm can effectively reduce the deviation in entropy estimation as compared to that using MFE algorithm. The MMFE algorithm is further employed in the study to estimate the complexity and irregularity of vibration data of a roller element bearing for fault diagnosis. It is shown that the MMFE algorithm can effectively discriminate the four bearing operation conditions under study.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128666653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Provable Data Possession Based on Ranked Merkle Hash Tree 基于排名Merkle哈希树的动态可证明数据占有
Jing Zou, Yunchuan Sun, Shixian Li
To move the application software and data into the cloud has become a trend. To prevent the data from being lost, modified and corrupted, the data integrity needs to be verified. The provable data possession (PDP) protocol is used to solve this problem. However, users often do some dynamic operations, such as insertion, modification and deletion, and it increases the difficulty and complexity of verification. How to construct the PDP scheme supporting dynamic updating of data becomes a hot research topic. The technology of hash aggregation is considered as one of the solutions to reduce costs of verification due to data dynamic operation. We analyze Wang et al.'s dynamic provable data possession (DPDP) solution and identify its security flaws during hash aggregation phase. This paper proposes an improved scheme to resolve security problem in Wang et al.'s scheme.
将应用软件和数据迁移到云端已经成为一种趋势。为了防止数据丢失、被修改和损坏,需要对数据完整性进行验证。可证明数据占有(PDP)协议解决了这一问题。但是,用户经常进行一些动态操作,如插入、修改、删除等,这增加了验证的难度和复杂性。如何构建支持数据动态更新的PDP方案成为一个研究热点。哈希聚合技术被认为是减少数据动态操作带来的验证成本的解决方案之一。我们分析了Wang等人的动态可证明数据占有(DPDP)解决方案,并识别了其在哈希聚合阶段的安全缺陷。本文提出了一种改进方案来解决Wang等人方案中的安全问题。
{"title":"Dynamic Provable Data Possession Based on Ranked Merkle Hash Tree","authors":"Jing Zou, Yunchuan Sun, Shixian Li","doi":"10.1109/IIKI.2016.69","DOIUrl":"https://doi.org/10.1109/IIKI.2016.69","url":null,"abstract":"To move the application software and data into the cloud has become a trend. To prevent the data from being lost, modified and corrupted, the data integrity needs to be verified. The provable data possession (PDP) protocol is used to solve this problem. However, users often do some dynamic operations, such as insertion, modification and deletion, and it increases the difficulty and complexity of verification. How to construct the PDP scheme supporting dynamic updating of data becomes a hot research topic. The technology of hash aggregation is considered as one of the solutions to reduce costs of verification due to data dynamic operation. We analyze Wang et al.'s dynamic provable data possession (DPDP) solution and identify its security flaws during hash aggregation phase. This paper proposes an improved scheme to resolve security problem in Wang et al.'s scheme.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128256956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Correlation and Visualization Analysis of Large Scale Dataset GDELT 大型数据集GDELT的关联与可视化分析
Fengcai Qiao, Kedi Chen
The Global Data on Events, Location, and Tone (GDELT) is a real time large scale database of global human society for open research which monitors the worlds broadcast, print, and web news since 1979, creating a free open platform for computing on the entire world. In this paper, first, we designed and implemented a data crawler, which collects metadata of GDELT database in real time and stores them in Hadoop Distributed File System (HDFS). Then, we proposed a hashbased method to correlate "Event" table, "Mentions" table and "GKG" table in GDELT, in order to digest every detailed information of each event. Finally, we took South Korea as example to make spatiotemporal visualization analysis, such as event spatiotemporal heat map, distribution of media attention and event extraction confidence dot map.
Global Data on Events, Location, and Tone (GDELT)是一个用于开放研究的全球人类社会的实时大型数据库,它监测了自1979年以来世界广播,印刷和网络新闻,为整个世界创造了一个免费开放的计算平台。本文首先设计并实现了一个数据爬虫,实时收集GDELT数据库的元数据并存储在Hadoop分布式文件系统(HDFS)中。然后,我们提出了一种基于哈希的方法来关联GDELT中的“Event”表、“mention”表和“GKG”表,以消化每个事件的每个详细信息。最后,以韩国为例,进行事件时空热图、媒体关注度分布、事件提取置信度点图等时空可视化分析。
{"title":"Correlation and Visualization Analysis of Large Scale Dataset GDELT","authors":"Fengcai Qiao, Kedi Chen","doi":"10.1109/IIKI.2016.19","DOIUrl":"https://doi.org/10.1109/IIKI.2016.19","url":null,"abstract":"The Global Data on Events, Location, and Tone (GDELT) is a real time large scale database of global human society for open research which monitors the worlds broadcast, print, and web news since 1979, creating a free open platform for computing on the entire world. In this paper, first, we designed and implemented a data crawler, which collects metadata of GDELT database in real time and stores them in Hadoop Distributed File System (HDFS). Then, we proposed a hashbased method to correlate \"Event\" table, \"Mentions\" table and \"GKG\" table in GDELT, in order to digest every detailed information of each event. Finally, we took South Korea as example to make spatiotemporal visualization analysis, such as event spatiotemporal heat map, distribution of media attention and event extraction confidence dot map.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122677812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic Relation Extraction from Text: A Survey 文本关系自动提取研究进展
Kun Li, Junsheng Zhang, Changqing Yao, Chongde Shi
Relation extraction is an important task for understanding text. In the big data era, automatic relation extraction from unstructured texts is urgently needed for structured information organization and information analysis. In this paper, we survey the automatic relation extraction methods, especially the traditional machine learning on closed data set and open information environment such as Web, including supervised and semi-supervised methods. And then, we discuss the applications based on relation extraction such as event extraction and QA systems.
关系提取是文本理解的重要环节。在大数据时代,从非结构化文本中自动提取关系是结构化信息组织和信息分析的迫切需要。本文综述了在封闭数据集和开放信息环境(如Web)下的自动关系提取方法,特别是传统的机器学习方法,包括监督和半监督方法。然后讨论了基于关系抽取的应用,如事件抽取和QA系统。
{"title":"Automatic Relation Extraction from Text: A Survey","authors":"Kun Li, Junsheng Zhang, Changqing Yao, Chongde Shi","doi":"10.1109/IIKI.2016.58","DOIUrl":"https://doi.org/10.1109/IIKI.2016.58","url":null,"abstract":"Relation extraction is an important task for understanding text. In the big data era, automatic relation extraction from unstructured texts is urgently needed for structured information organization and information analysis. In this paper, we survey the automatic relation extraction methods, especially the traditional machine learning on closed data set and open information environment such as Web, including supervised and semi-supervised methods. And then, we discuss the applications based on relation extraction such as event extraction and QA systems.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126304034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research of Target Characteristics Storage Based on RDBMS and Hadoop 基于RDBMS和Hadoop的目标特征存储研究
Yanqi Wang, Yusheng Jia, Xiaodan Xie
As the amount of target characteristics data increasing rapidly, the tradition methods cannot satisfy the need of the storage and management of those data. According to the features of those data, a new storage system is proposed base on RDBMS and Hadoop. The structured data and the metadata of unstructured data is stored in the RDBMS under certain schema, while the large amount of unstructured one allocated among numbers of nodes in the hadoop cluster. In order to maximize the superiority of storage, the HBase is used for storing massive small-size unstructured data and the HDFS is applied for holding the large-scale ones. Meanwhile, the access control and the multi-thread upload and download approach combined with load balancing and caching mechanism is applied for improving the efficiency of data transmission. Experiment results show that the proposed storage system is reasonable and practicable.
随着目标特征数据量的迅速增加,传统的方法已不能满足目标特征数据存储和管理的需要。根据这些数据的特点,提出了一种基于关系型数据库管理系统和Hadoop的存储系统。结构化数据和非结构化数据的元数据按照一定的模式存储在RDBMS中,而大量的非结构化数据则分布在hadoop集群的多个节点之间。为了最大限度地发挥存储的优势,HBase用于存储海量的小规模非结构化数据,HDFS用于存储大规模的非结构化数据。同时,采用访问控制和多线程上传下载方式,结合负载均衡和缓存机制,提高数据传输效率。实验结果表明,该存储系统是合理可行的。
{"title":"Research of Target Characteristics Storage Based on RDBMS and Hadoop","authors":"Yanqi Wang, Yusheng Jia, Xiaodan Xie","doi":"10.1109/IIKI.2016.33","DOIUrl":"https://doi.org/10.1109/IIKI.2016.33","url":null,"abstract":"As the amount of target characteristics data increasing rapidly, the tradition methods cannot satisfy the need of the storage and management of those data. According to the features of those data, a new storage system is proposed base on RDBMS and Hadoop. The structured data and the metadata of unstructured data is stored in the RDBMS under certain schema, while the large amount of unstructured one allocated among numbers of nodes in the hadoop cluster. In order to maximize the superiority of storage, the HBase is used for storing massive small-size unstructured data and the HDFS is applied for holding the large-scale ones. Meanwhile, the access control and the multi-thread upload and download approach combined with load balancing and caching mechanism is applied for improving the efficiency of data transmission. Experiment results show that the proposed storage system is reasonable and practicable.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134128619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Algorithm Based on Two-Layer Graph Model for E-Commerce Recommendation 基于双层图模型的电子商务推荐算法
Li Pan, Xiaosha Xu, Zhimeng Tan, Xin Peng
Recommender systems have been applied by E-commerce or other application sites to recommend their produces that customers might be interested in. This paper refines a bipartite graph to a two-layer graph model by adding the similarity information between consumers and products, the related metric is presented to measure the relationship among them, and the shortest path algorithm is introduced to obtain suitable recommendations.
电子商务或其他应用网站已经应用了推荐系统来推荐客户可能感兴趣的产品。本文通过添加消费者与产品之间的相似度信息,将二分图细化为两层图模型,提出了度量消费者与产品之间关系的相关度量,并引入了最短路径算法来获得合适的推荐。
{"title":"An Algorithm Based on Two-Layer Graph Model for E-Commerce Recommendation","authors":"Li Pan, Xiaosha Xu, Zhimeng Tan, Xin Peng","doi":"10.1109/IIKI.2016.53","DOIUrl":"https://doi.org/10.1109/IIKI.2016.53","url":null,"abstract":"Recommender systems have been applied by E-commerce or other application sites to recommend their produces that customers might be interested in. This paper refines a bipartite graph to a two-layer graph model by adding the similarity information between consumers and products, the related metric is presented to measure the relationship among them, and the shortest path algorithm is introduced to obtain suitable recommendations.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124749875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Mechanism Design Solution for DTN Routing 一种DTN路由机制设计方案
Zhi Lin, Shengling Wang, Chun-Chi Liu, Madiha Ikram
The routing in DTN (Delay/Disruption Tolerant Network) deals with network partition and the mobility of nodes. In order to motivate involvement in routing, several incentive schemes are created, one of them is by payment. Suppose the budget is limited, the question is how to make a routing plan based on payments. That is to say how a sender can decide the data amount assigned to one special next hop and the payment for it. This paper proposes a mechanism design approach to define the utility function of the sender and the next hops, then maximize the utility functions for all the participants, including the sender and next hops, using the tool of KKT (Karush-Kuhn-Tucker) conditions solving a nonlinear programming problem with one inequality constraint. Index
DTN (Delay/Disruption Tolerant Network)中的路由处理网络分区和节点的可移动性。为了激励参与路由,创建了几种激励方案,其中之一是通过支付。假设预算有限,问题是如何根据付款制定路由计划。也就是说,发送方如何决定分配给一个特殊的下一跳的数据量及其支付方式。本文提出了一种机制设计方法来定义发送方和下一跳的效用函数,然后利用KKT (Karush-Kuhn-Tucker)条件工具求解一个带有一个不等式约束的非线性规划问题,使包括发送方和下一跳在内的所有参与者的效用函数最大化。指数
{"title":"A Mechanism Design Solution for DTN Routing","authors":"Zhi Lin, Shengling Wang, Chun-Chi Liu, Madiha Ikram","doi":"10.1109/IIKI.2016.42","DOIUrl":"https://doi.org/10.1109/IIKI.2016.42","url":null,"abstract":"The routing in DTN (Delay/Disruption Tolerant Network) deals with network partition and the mobility of nodes. In order to motivate involvement in routing, several incentive schemes are created, one of them is by payment. Suppose the budget is limited, the question is how to make a routing plan based on payments. That is to say how a sender can decide the data amount assigned to one special next hop and the payment for it. This paper proposes a mechanism design approach to define the utility function of the sender and the next hops, then maximize the utility functions for all the participants, including the sender and next hops, using the tool of KKT (Karush-Kuhn-Tucker) conditions solving a nonlinear programming problem with one inequality constraint. Index","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115922044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fablabs as Drivers for Open Innovation and Co-creation to Foster Rural Development Fablabs:开放创新和共同创造的驱动力,促进农村发展
Emilija Stojmenova Duh, A. Kos
The paper presents Fablabs, as co-working spaces, where different stakeholders, such as policy makers, companies and citizens can co-create innovative products and services. We are focusing mainly on Fablabs and the opportunities they are providing for the development of rural areas. As an example, we are presenting two cases from two rural municipalities, Ptuj and Ribnica, in Slovenia, Europe.
本文将Fablabs作为共同工作空间,在这里不同的利益相关者,如政策制定者、公司和公民可以共同创造创新的产品和服务。我们主要关注的是工厂,以及它们为农村地区的发展提供的机会。作为一个例子,我们将介绍来自欧洲斯洛文尼亚普图伊和里布尼察两个农村城市的两个案例。
{"title":"Fablabs as Drivers for Open Innovation and Co-creation to Foster Rural Development","authors":"Emilija Stojmenova Duh, A. Kos","doi":"10.1109/IIKI.2016.70","DOIUrl":"https://doi.org/10.1109/IIKI.2016.70","url":null,"abstract":"The paper presents Fablabs, as co-working spaces, where different stakeholders, such as policy makers, companies and citizens can co-create innovative products and services. We are focusing mainly on Fablabs and the opportunities they are providing for the development of rural areas. As an example, we are presenting two cases from two rural municipalities, Ptuj and Ribnica, in Slovenia, Europe.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126981097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The SAR Image Storage and Recognition System Based on Cloud Platform 基于云平台的SAR图像存储与识别系统
Jia Zhai, Xiaodan Xie, Yusheng Jia
As the modern battlefield environment has become increasingly complex, the traditional SAR recognition methods are too dependent on the training data source to be robust and universal, which makes it can not meet the demand of modern warfare. So how to automatically interpret the fast increased SAR images becomes an urgent problem. The emergence of big data, cloud computing and deep learning technology makes the automatic and intelligent interpretation of large volume of SAR images become possible. This paper proposes a SAR image storage and recognition system based on cloud platform to automatically obtain and identify all kinds of military targets from a complex scene. The system combines the cloud-based platform and deep learning method to achieve real-time recognizing analyses and batch processing of data. The seamless integration of distributed storage and cloud services meets the needs of large-scale data recognition and management requirements. The assessment shows that the method is more efficient in terms of performance, storage, and fault tolerance.
随着现代战场环境的日益复杂,传统的SAR识别方法过于依赖训练数据源,难以实现鲁棒性和通用性,已不能满足现代战争的需求。因此,如何对快速增长的SAR图像进行自动解译成为一个迫切需要解决的问题。大数据、云计算和深度学习技术的出现,使得大容量SAR图像的自动智能解译成为可能。本文提出了一种基于云平台的SAR图像存储与识别系统,用于从复杂场景中自动获取和识别各种军事目标。该系统将基于云的平台与深度学习方法相结合,实现数据的实时识别分析和批量处理。分布式存储与云服务无缝融合,满足大规模数据识别和管理需求。评估表明,该方法在性能、存储和容错性方面更有效。
{"title":"The SAR Image Storage and Recognition System Based on Cloud Platform","authors":"Jia Zhai, Xiaodan Xie, Yusheng Jia","doi":"10.1109/IIKI.2016.113","DOIUrl":"https://doi.org/10.1109/IIKI.2016.113","url":null,"abstract":"As the modern battlefield environment has become increasingly complex, the traditional SAR recognition methods are too dependent on the training data source to be robust and universal, which makes it can not meet the demand of modern warfare. So how to automatically interpret the fast increased SAR images becomes an urgent problem. The emergence of big data, cloud computing and deep learning technology makes the automatic and intelligent interpretation of large volume of SAR images become possible. This paper proposes a SAR image storage and recognition system based on cloud platform to automatically obtain and identify all kinds of military targets from a complex scene. The system combines the cloud-based platform and deep learning method to achieve real-time recognizing analyses and batch processing of data. The seamless integration of distributed storage and cloud services meets the needs of large-scale data recognition and management requirements. The assessment shows that the method is more efficient in terms of performance, storage, and fault tolerance.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127497110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Function-Level Behavior Model for Anomalous Behavior Detection in Hybrid Mobile Applications 混合移动应用中异常行为检测的功能级行为模型
Jian Mao, Ruilong Wang, Yueh-Ting Chen, Yinhao Xiao, Yaoqi Jia, Zhenkai Liang
Hybrid mobile applications (or apps) are based on web technologies, such as HTML5 and JavaScript, and run in a browser environment. They facilitate cross-platform development. However, the security issues of web technologies are inherited by hybrid mobile apps, where the injected code may execute with the system-level privilege. In this paper, we propose a behavior model to detect malicious behaviors in hybrid mobile apps. Our model uses function-level information to describe how an app's behaviors are activated. Furthermore, once script injection happens, the behaviors made by the injected code can be detected according to the deviation from the app's behavior model.
混合移动应用程序(或应用程序)基于web技术,如HTML5和JavaScript,并在浏览器环境中运行。它们促进了跨平台开发。然而,混合移动应用程序继承了web技术的安全问题,其中注入的代码可能以系统级特权执行。在本文中,我们提出了一种行为模型来检测混合移动应用中的恶意行为。我们的模型使用功能级信息来描述应用程序的行为是如何被激活的。此外,一旦脚本注入发生,被注入代码的行为就可以根据与应用程序行为模型的偏差来检测。
{"title":"A Function-Level Behavior Model for Anomalous Behavior Detection in Hybrid Mobile Applications","authors":"Jian Mao, Ruilong Wang, Yueh-Ting Chen, Yinhao Xiao, Yaoqi Jia, Zhenkai Liang","doi":"10.1109/IIKI.2016.2","DOIUrl":"https://doi.org/10.1109/IIKI.2016.2","url":null,"abstract":"Hybrid mobile applications (or apps) are based on web technologies, such as HTML5 and JavaScript, and run in a browser environment. They facilitate cross-platform development. However, the security issues of web technologies are inherited by hybrid mobile apps, where the injected code may execute with the system-level privilege. In this paper, we propose a behavior model to detect malicious behaviors in hybrid mobile apps. Our model uses function-level information to describe how an app's behaviors are activated. Furthermore, once script injection happens, the behaviors made by the injected code can be detected according to the deviation from the app's behavior model.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124169567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1