首页 > 最新文献

Journal of Communications Software and Systems最新文献

英文 中文
IoT LoRa-Based Energy Management Information System with RAD Method and Laravel Frameworks 基于物联网lora的能源管理信息系统与RAD方法和Laravel框架
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.24138/jcomss-2021-0003
A. Ramelan, F. Adriyanto, C. Apribowo, M. Ibrahim, M. E. Sulistyo, Kevin S. Arief
—This work presents a design and implementation an information system called LoRa-Building Energy Management System (Lo-BEMS). This research proposes an engaging data transmission (read and write), that combines the HTTP and MQTT protocols using third party broker that has monitor and control features for energy usages. Data retrieving uses single LoRa modulation and delivery to the Application Programming Interface (API) in Laravel Framework will then be stopped by the system and stored in the database. The development of this system uses the Rapid Application Development (RAD) method and the Laravel Frameworks. The black-box, UAT, and performance validation test results showed that the information system was running properly and following the objectives.
本文提出了一个名为lora -建筑能源管理系统(Lo-BEMS)的信息系统的设计和实现。这项研究提出了一种引人入胜的数据传输(读和写),它结合了HTTP和MQTT协议,使用第三方代理,该代理具有能源使用的监视和控制功能。数据检索使用单一的LoRa调制,并交付到Laravel框架中的应用程序编程接口(API),然后由系统停止并存储在数据库中。本系统的开发采用了快速应用开发(RAD)方法和Laravel框架。黑盒、UAT和性能验证测试结果表明,信息系统正常运行并遵循目标。
{"title":"IoT LoRa-Based Energy Management Information System with RAD Method and Laravel Frameworks","authors":"A. Ramelan, F. Adriyanto, C. Apribowo, M. Ibrahim, M. E. Sulistyo, Kevin S. Arief","doi":"10.24138/jcomss-2021-0003","DOIUrl":"https://doi.org/10.24138/jcomss-2021-0003","url":null,"abstract":"—This work presents a design and implementation an information system called LoRa-Building Energy Management System (Lo-BEMS). This research proposes an engaging data transmission (read and write), that combines the HTTP and MQTT protocols using third party broker that has monitor and control features for energy usages. Data retrieving uses single LoRa modulation and delivery to the Application Programming Interface (API) in Laravel Framework will then be stopped by the system and stored in the database. The development of this system uses the Rapid Application Development (RAD) method and the Laravel Frameworks. The black-box, UAT, and performance validation test results showed that the information system was running properly and following the objectives.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"44 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69098688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pegasis Double Cluster Head Hybrid Congestion Control in Wireless Sensor Networks 无线传感器网络中的Pegasis双簇头混合拥塞控制
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.24138/jcomss-2021-0032
Alim Abdul, M. Vadivel
—Wireless sensor network (WSN) is the fastest growing technology that dominates the future world into wireless communication. It is a collection of a number of self-governing sensor nodes responsible to sense, process and manipulate the nodes. The sensor nodes are regulated by a battery where the network gets failed if the battery is dead. Thus, energy is an important factor to be efficiently used. Furthermore, congestion occurs in WSN when the incoming traffic load exceeds the capacity of the network. The major factors that lead to congestion are buffer overflow, varying rates of transmission, packet collision, and many-to-one data transmission. Due to these, the network suffers from packet loss, queuing delay, end-to-end delay, decrease in network lifetime, and increase in energy consumption. Hence, a clustering-based routing protocol is introduced in this paper to improve the performance of the network and reduce congestion. In the proposed method, Power-Efficient Gathering in Sensor Information Systems (PEGASIS) double cluster head with artificial neural network (ANN) is utilized to analyze the overall network lifetime. The proposed technique is comprised of four phases: clustering the network nodes, cluster head (CH) selection, chain formation, and secondary CH (SCH) selection. The sensor nodes are initially clustered with the firefly algorithm in which the cluster heads of each node are elected via an artificial neural network. Meanwhile, chain formation is processed by PEGASIS double cluster head (PDCH) and the SCH is selected through grey wolf optimizer (GWO) to afford equivalent energy utilization between the sensor nodes. The simulation outcomes proved that the proposed method efficiently increases the lifetime of the network and reduces congestion level in WSN.
-无线传感器网络(WSN)是主导未来世界无线通信的发展最快的技术。它是许多自治的传感器节点的集合,负责感知、处理和操纵节点。传感器节点由电池调节,如果电池没电,网络就会失效。因此,能源是有效利用的重要因素。此外,当传入的流量负载超过网络容量时,WSN会发生拥塞。导致拥塞的主要因素是缓冲区溢出、传输速率变化、数据包冲突和多对一数据传输。因此,网络会出现丢包、排队延迟、端到端延迟、网络生存时间缩短、能耗增加等问题。为此,本文提出了一种基于集群的路由协议,以提高网络性能,减少拥塞。在该方法中,利用传感器信息系统中的功率高效采集(PEGASIS)双簇头和人工神经网络(ANN)来分析整个网络的生存期。该技术包括四个阶段:网络节点聚类、簇头选择、链形成和次级簇头选择。采用萤火虫算法对传感器节点进行初始聚类,通过人工神经网络选出每个节点的簇头。同时,PEGASIS双簇头(PDCH)处理链的形成,并通过灰狼优化器(GWO)选择簇头,使传感器节点之间的能量利用率相等。仿真结果表明,该方法有效地提高了无线传感器网络的生存期,降低了网络的拥塞程度。
{"title":"Pegasis Double Cluster Head Hybrid Congestion Control in Wireless Sensor Networks","authors":"Alim Abdul, M. Vadivel","doi":"10.24138/jcomss-2021-0032","DOIUrl":"https://doi.org/10.24138/jcomss-2021-0032","url":null,"abstract":"—Wireless sensor network (WSN) is the fastest growing technology that dominates the future world into wireless communication. It is a collection of a number of self-governing sensor nodes responsible to sense, process and manipulate the nodes. The sensor nodes are regulated by a battery where the network gets failed if the battery is dead. Thus, energy is an important factor to be efficiently used. Furthermore, congestion occurs in WSN when the incoming traffic load exceeds the capacity of the network. The major factors that lead to congestion are buffer overflow, varying rates of transmission, packet collision, and many-to-one data transmission. Due to these, the network suffers from packet loss, queuing delay, end-to-end delay, decrease in network lifetime, and increase in energy consumption. Hence, a clustering-based routing protocol is introduced in this paper to improve the performance of the network and reduce congestion. In the proposed method, Power-Efficient Gathering in Sensor Information Systems (PEGASIS) double cluster head with artificial neural network (ANN) is utilized to analyze the overall network lifetime. The proposed technique is comprised of four phases: clustering the network nodes, cluster head (CH) selection, chain formation, and secondary CH (SCH) selection. The sensor nodes are initially clustered with the firefly algorithm in which the cluster heads of each node are elected via an artificial neural network. Meanwhile, chain formation is processed by PEGASIS double cluster head (PDCH) and the SCH is selected through grey wolf optimizer (GWO) to afford equivalent energy utilization between the sensor nodes. The simulation outcomes proved that the proposed method efficiently increases the lifetime of the network and reduces congestion level in WSN.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69098801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Effect of Latent Space Dimension on the Quality of Synthesized Human Face Images 潜在空间维数对合成人脸图像质量的影响
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.24138/JCOMSS-2021-0035
Ivana Marin, S. Gotovac, M. Russo, Dunja Božić-Štulić
In recent years Generative Adversarial Networks (GANs) have achieved remarkable results in the task of realistic image synthesis. Despite their continued success and advances, there still lacks a thorough understanding of how precisely GANs map random latent vectors to realistic-looking images and how the priors set on the latent space affect the learned mapping. In this work, we analyze the effect of the chosen latent dimension on the final quality of synthesized images of human faces and learned data representations. We show that GANs can generate images plausibly even with latent dimensions significantly smaller than the standard dimensions like 100 or 512. Although one might expect that larger latent dimensions encourage the generation of more diverse and enhanced quality images, we show that an increase of latent dimension after some point does not lead to visible improvements in perceptual image quality nor in quantitative estimates of its generalization abilities.
近年来,生成对抗网络(GANs)在真实感图像合成任务中取得了显著的成果。尽管它们不断取得成功和进步,但对于gan如何精确地将随机潜在向量映射到逼真的图像,以及在潜在空间上设置的先验如何影响学习映射,仍然缺乏透彻的理解。在这项工作中,我们分析了所选择的潜在维度对人脸合成图像和学习数据表示的最终质量的影响。我们表明,即使潜在维数明显小于标准维数(如100或512),gan也可以合理地生成图像。尽管人们可能会期望更大的潜在维数会鼓励生成更多样化和更高质量的图像,但我们表明,在某个点之后增加潜在维数不会导致感知图像质量的明显改善,也不会导致其泛化能力的定量估计。
{"title":"The Effect of Latent Space Dimension on the Quality of Synthesized Human Face Images","authors":"Ivana Marin, S. Gotovac, M. Russo, Dunja Božić-Štulić","doi":"10.24138/JCOMSS-2021-0035","DOIUrl":"https://doi.org/10.24138/JCOMSS-2021-0035","url":null,"abstract":"In recent years Generative Adversarial Networks (GANs) have achieved remarkable results in the task of realistic image synthesis. Despite their continued success and advances, there still lacks a thorough understanding of how precisely GANs map random latent vectors to realistic-looking images and how the priors set on the latent space affect the learned mapping. In this work, we analyze the effect of the chosen latent dimension on the final quality of synthesized images of human faces and learned data representations. We show that GANs can generate images plausibly even with latent dimensions significantly smaller than the standard dimensions like 100 or 512. Although one might expect that larger latent dimensions encourage the generation of more diverse and enhanced quality images, we show that an increase of latent dimension after some point does not lead to visible improvements in perceptual image quality nor in quantitative estimates of its generalization abilities.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69098819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
IEGGR: Improved Energy-aware and Delivery Guarantee Geographic Routing IEGGR:改进的能源意识和交付保证地理路由
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.24138/JCOMSS-2020-0019
Kenza Redjimi, M. Boulaiche, M. Redjimi
—Wireless Sensor Networks are a set of sensor nodes that probe their surroundings and send their data over multi-hop routes to a base-station (BS) for processing. Many routing protocols have been developed for WSNs. A great attention has been given to geographic routing protocols, which rely only on local knowledge of nodes to disseminate data towards the BS. In this paper, we propose a new energy efficient geographic routing protocol called Improved Energy-aware and delivery Guarantee Geographic Routing protocol (IEGGR). The proposed protocol exploits the positions of neighboring nodes, which are closest to the BS to forward packets through the shortest path in terms of energy consumption. IEGGR introduces a mechanism in order to forward packets efficiently around voids. IEGGR algorithm considers the WSN as a connected-graph and to route a packet from a source node to the BS, IEGGR tries making the locally optimal choice at each intermediate node with the hope of finding a global optimum path, which aims to minimize energy consumption. To find greedily the optimal path, each forwarding node exploits its neighbor positions that are closest to the BS in order to iteratively building the end-to-end optimal path. Simulation results show that IEGGR is efficient in energy management during packet forwarding.
无线传感器网络是一组传感器节点,它们探测周围环境,并通过多跳路由将数据发送到基站(BS)进行处理。针对无线传感器网络,已经开发了许多路由协议。对地理路由协议给予了极大的关注,它仅依赖于节点的本地知识来向BS传播数据。本文提出了一种新的高能效地理路由协议——改进的能量感知和交付保证地理路由协议(IEGGR)。该协议利用最接近BS的相邻节点的位置,以能量消耗最短的路径转发数据包。IEGGR引入了一种机制,以便在空洞周围有效地转发数据包。IEGGR算法将WSN视为一个连通图,为了将数据包从源节点路由到BS, IEGGR在每个中间节点上尝试进行局部最优选择,以期找到一个以能量消耗最小为目标的全局最优路径。为了贪婪地寻找最优路径,每个转发节点利用最接近BS的邻居位置,迭代构建端到端的最优路径。仿真结果表明,IEGGR在报文转发过程中的能量管理是有效的。
{"title":"IEGGR: Improved Energy-aware and Delivery Guarantee Geographic Routing","authors":"Kenza Redjimi, M. Boulaiche, M. Redjimi","doi":"10.24138/JCOMSS-2020-0019","DOIUrl":"https://doi.org/10.24138/JCOMSS-2020-0019","url":null,"abstract":"—Wireless Sensor Networks are a set of sensor nodes that probe their surroundings and send their data over multi-hop routes to a base-station (BS) for processing. Many routing protocols have been developed for WSNs. A great attention has been given to geographic routing protocols, which rely only on local knowledge of nodes to disseminate data towards the BS. In this paper, we propose a new energy efficient geographic routing protocol called Improved Energy-aware and delivery Guarantee Geographic Routing protocol (IEGGR). The proposed protocol exploits the positions of neighboring nodes, which are closest to the BS to forward packets through the shortest path in terms of energy consumption. IEGGR introduces a mechanism in order to forward packets efficiently around voids. IEGGR algorithm considers the WSN as a connected-graph and to route a packet from a source node to the BS, IEGGR tries making the locally optimal choice at each intermediate node with the hope of finding a global optimum path, which aims to minimize energy consumption. To find greedily the optimal path, each forwarding node exploits its neighbor positions that are closest to the BS in order to iteratively building the end-to-end optimal path. Simulation results show that IEGGR is efficient in energy management during packet forwarding.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69098677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
HW/SW Architecture Exploration for an Efficient Implementation of the Secure Hash Algorithm SHA-256 高效实现安全哈希算法SHA-256的硬件/软件架构探索
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.24138/JCOMSS-2021-0006
Manel Kammoun, Manel Elleuchi, M. Abid, A. Obeid
—Hash functions are used in the majority of security protocol to guarantee the integrity and the authenticity. Among the most important hash functions is the SHA-2 family, which offers higher security and solved the insecurity problems of other popular algorithms as MD5, SHA-1 and SHA-0. However, theses security algorithms are characterized by a certain amount of complex computations and consume a lot of energy. In order to reduce the power consumption as required in the majority of embedded applications, a solution consists to exploit a critical part on accelerator (hardware). In this paper, we propose a hardware/software exploration for the implementation of SHA256 algorithm. For hardware design, two principal design methods are proceeded: Low level synthesis (LLS) and high level synthesis (HLS). The exploration allows the evaluation of performances in term of area, throughput and power consumption. The synthesis results under Zynq 7000 based-FPGA reflect a significant improvement of about 80% and 15% respectively in FPGA resources and throughput for the LLS hardware design compared to HLS solution. For better efficiency, hardware IPs are deduced and implemented within HW/SW system on chip. The experiments are performed using Xilinx ZC 702-based platform. The HW/SW LLS design records a gain of 10% to 25% in term of execution time and 73% in term of power consumption.
大多数安全协议都使用哈希函数来保证数据的完整性和真实性。其中最重要的哈希函数是SHA-2家族,它提供了更高的安全性,并解决了MD5, SHA-1和SHA-0等流行算法的不安全问题。然而,这些安全算法的特点是计算量大,能耗大。为了降低大多数嵌入式应用程序所需的功耗,解决方案包括利用加速器(硬件)上的关键部分。在本文中,我们提出了实现SHA256算法的硬件/软件探索。硬件设计主要采用两种设计方法:低级综合(LLS)和高级综合(HLS)。该探索允许在面积,吞吐量和功耗方面评估性能。基于Zynq 7000的FPGA合成结果表明,与HLS解决方案相比,LLS硬件设计的FPGA资源和吞吐量分别显著提高了约80%和15%。为了提高效率,硬件ip被推导并在片上硬件/软件系统中实现。实验在Xilinx zc702平台上进行。HW/SW LLS设计在执行时间方面增加了10%到25%,在功耗方面增加了73%。
{"title":"HW/SW Architecture Exploration for an Efficient Implementation of the Secure Hash Algorithm SHA-256","authors":"Manel Kammoun, Manel Elleuchi, M. Abid, A. Obeid","doi":"10.24138/JCOMSS-2021-0006","DOIUrl":"https://doi.org/10.24138/JCOMSS-2021-0006","url":null,"abstract":"—Hash functions are used in the majority of security protocol to guarantee the integrity and the authenticity. Among the most important hash functions is the SHA-2 family, which offers higher security and solved the insecurity problems of other popular algorithms as MD5, SHA-1 and SHA-0. However, theses security algorithms are characterized by a certain amount of complex computations and consume a lot of energy. In order to reduce the power consumption as required in the majority of embedded applications, a solution consists to exploit a critical part on accelerator (hardware). In this paper, we propose a hardware/software exploration for the implementation of SHA256 algorithm. For hardware design, two principal design methods are proceeded: Low level synthesis (LLS) and high level synthesis (HLS). The exploration allows the evaluation of performances in term of area, throughput and power consumption. The synthesis results under Zynq 7000 based-FPGA reflect a significant improvement of about 80% and 15% respectively in FPGA resources and throughput for the LLS hardware design compared to HLS solution. For better efficiency, hardware IPs are deduced and implemented within HW/SW system on chip. The experiments are performed using Xilinx ZC 702-based platform. The HW/SW LLS design records a gain of 10% to 25% in term of execution time and 73% in term of power consumption.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69098696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimized Method for Locating the Source of Voltage Sags 电压跌落源定位的优化方法
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.24138/jcomss-2021-0070
Jose Carlos Filho, Fabbio Anderson da Silva Borges, Ricardo de Andrade Lira Rabêlo, Ivan Saraiva Silva, A. O. de Carvalho Filho
Short-Duration Voltage Variations (SDVVs) are the power quality disturbances (PQD) that mainly affect industrial systems, and are originated for various reasons, in particular short circuits over large areas, even those originating in remote points of the electrical system. The location problem aims to indicate the area or region or distance from the substation that is connected to the source causing the voltage sags, and is a fundamental task to ensure good power quality. One of the strategies used to determine the location of sources causing SDVVs and for an implementation of machine learning algorithms in modern distribution networks, called Smart Grids. Monitoring a Smart Grid plays a key role, however mostly it generates a large volume of data (Big Data) and as a result, multiple challenges arise due to the properties of this data such as volume, variety and velocity. This work presents an optimization through genetic algorithm to select meters which already exist in the Smart Grid, using a voltage sag location method in order to reduce the data obtained and analyzed throughout the localization process. Optimization was evaluated through a comparison with a non-optimized localization method, this comparison showed a difference between the hit rates of less than 1%.
短时电压变化(sdvv)是主要影响工业系统的电能质量扰动(PQD),其产生的原因多种多样,特别是大面积的短路,甚至是那些起源于电力系统的远程点。定位问题是指与电源相连的变电站产生电压跌落的区域或距离,是保证电能质量的一项基本任务。其中一种策略用于确定导致sdvv的源的位置,以及在现代配电网络中实施机器学习算法,称为智能电网。监控智能电网起着关键作用,但大多数情况下它会产生大量数据(大数据),因此,由于这些数据的属性(如数量、种类和速度),会出现多种挑战。本文通过遗传算法对智能电网中已有的电表进行优化选择,采用电压暂降定位方法,以减少在定位过程中获取和分析的数据。通过与非优化的定位方法的比较来评估优化,这种比较显示命中率的差异小于1%。
{"title":"Optimized Method for Locating the Source of Voltage Sags","authors":"Jose Carlos Filho, Fabbio Anderson da Silva Borges, Ricardo de Andrade Lira Rabêlo, Ivan Saraiva Silva, A. O. de Carvalho Filho","doi":"10.24138/jcomss-2021-0070","DOIUrl":"https://doi.org/10.24138/jcomss-2021-0070","url":null,"abstract":"Short-Duration Voltage Variations (SDVVs) are the power quality disturbances (PQD) that mainly affect industrial systems, and are originated for various reasons, in particular short circuits over large areas, even those originating in remote points of the electrical system. The location problem aims to indicate the area or region or distance from the substation that is connected to the source causing the voltage sags, and is a fundamental task to ensure good power quality. One of the strategies used to determine the location of sources causing SDVVs and for an implementation of machine learning algorithms in modern distribution networks, called Smart Grids. Monitoring a Smart Grid plays a key role, however mostly it generates a large volume of data (Big Data) and as a result, multiple challenges arise due to the properties of this data such as volume, variety and velocity. This work presents an optimization through genetic algorithm to select meters which already exist in the Smart Grid, using a voltage sag location method in order to reduce the data obtained and analyzed throughout the localization process. Optimization was evaluated through a comparison with a non-optimized localization method, this comparison showed a difference between the hit rates of less than 1%.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69098442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Advances in Clickbait and Fake News Detection Using New Language-independent Strategies 使用新的语言独立策略的标题党和假新闻检测进展
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.24138/jcomss-2021-0038
C. Coste, Darius Bufnea
—Online publishers rely on different techniques to trap web visitors, clickbait being one such technique. Besides being a bad habit, clickbait is also a strong indicator for fake news spreading. Its presence in online media leads to an overall bad browsing experience for the web consumer. Recently, big players on the Internet scene, such as search engines and social networks, have turned their attention towards this negative phenomenon that is increasingly present in our everyday browsing experience. The research community has also joined in this effort, a broad band of detection techniques being developed. These techniques are usually based on intelligent classifiers, for which feature selection is of great importance. The work presented in this paper brings our own contributions to the field of clickbait detection. We present a new language-independent strategy for clickbait detection that takes into consideration only features that are general enough to be independent of any particular language. The methods presented in this paper could be applied to web content written in different languages. In addition, we present the results of a complex experiment that we performed to evaluate our proposed method and we compare our results with the most relevant results previously obtained in the field.
在线出版商依靠不同的技术来吸引网络访问者,标题党就是其中一种技术。除了是一种坏习惯,标题党也是假新闻传播的一个强有力的指标。它在网络媒体上的存在给网络消费者带来了糟糕的浏览体验。最近,互联网领域的大玩家,如搜索引擎和社交网络,已经把注意力转向了这种在我们日常浏览体验中日益存在的负面现象。研究界也加入了这一努力,正在开发广泛的检测技术。这些技术通常基于智能分类器,其中特征选择非常重要。本文提出的工作为标题党检测领域带来了我们自己的贡献。我们提出了一种新的独立于语言的点击党检测策略,该策略只考虑那些足以独立于任何特定语言的通用特征。本文提出的方法可以应用于用不同语言编写的网页内容。此外,我们提出了一个复杂的实验结果,我们进行了评估我们提出的方法,并将我们的结果与该领域以前获得的最相关的结果进行了比较。
{"title":"Advances in Clickbait and Fake News Detection Using New Language-independent Strategies","authors":"C. Coste, Darius Bufnea","doi":"10.24138/jcomss-2021-0038","DOIUrl":"https://doi.org/10.24138/jcomss-2021-0038","url":null,"abstract":"—Online publishers rely on different techniques to trap web visitors, clickbait being one such technique. Besides being a bad habit, clickbait is also a strong indicator for fake news spreading. Its presence in online media leads to an overall bad browsing experience for the web consumer. Recently, big players on the Internet scene, such as search engines and social networks, have turned their attention towards this negative phenomenon that is increasingly present in our everyday browsing experience. The research community has also joined in this effort, a broad band of detection techniques being developed. These techniques are usually based on intelligent classifiers, for which feature selection is of great importance. The work presented in this paper brings our own contributions to the field of clickbait detection. We present a new language-independent strategy for clickbait detection that takes into consideration only features that are general enough to be independent of any particular language. The methods presented in this paper could be applied to web content written in different languages. In addition, we present the results of a complex experiment that we performed to evaluate our proposed method and we compare our results with the most relevant results previously obtained in the field.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69098868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Guest Editorial: Smart Systems and Architectures 嘉宾评论:智能系统和架构
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.24138/jcomss-2021-0112
P. Šolić, T. Perković, I. Marasović, D. López-de-Ipiña, L. Patrono
{"title":"Guest Editorial: Smart Systems and Architectures","authors":"P. Šolić, T. Perković, I. Marasović, D. López-de-Ipiña, L. Patrono","doi":"10.24138/jcomss-2021-0112","DOIUrl":"https://doi.org/10.24138/jcomss-2021-0112","url":null,"abstract":"","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69098545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint RSMA and IDMA-Based NOMA system for downlink Communication in 5G and Beyond Networks 5G及以后网络下行通信的基于RSMA和idma的联合NOMA系统
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-12-30 DOI: 10.24138/jcomss.v16i4.1035
Aasheesh Shukla
Future communication networks may encounter various issues in order to facilitate heavy heterogeneous data traffic and large number of users, therefore more advanced multiple access (MA) schemes is required to meet the changing requirements. Recently, a promising physical-layer MA technique has been suggested for multi-antenna broadcast channels, namely Rate Splitting Multiple Access (RSMA). This new scheme has the ability to partially decode the interference and partially treat the remaining interference as noise which makes it to cope with wide range of user deployments and network loads. On the other hand, interleave division multiple access (IDMA) has already been recognized as a potential code domain NOMA (non-orthogonal multiple access) scheme, suitable for 5G and beyond communication network. Hence, in this paper, a new approach of multiple access scheme is proposed to get the grip on new challenges in future communication (6G). The proposed framework consists the joint processing of RSMA and IDMA (code domain NOMA), in which the transmitter involves an IDMA as encoder and allows rate splitting to split the message in two parts i.e. common part and private part, before the actual transmission. The mathematical modeling of proposed system is elaborated in the paper and for simulation purpose the downlink communication scenario has been considered where users faced diverse channel conditions. The weighted sum rate (WSR) performance is evaluated for the proposed scheme which validate the quality of service (QoS) of the joint RS-IDMA system.
未来的通信网络可能会遇到各种各样的问题,以适应繁重的异构数据流量和大量的用户,因此需要更先进的多址(MA)方案来满足不断变化的需求。近年来,针对多天线广播信道提出了一种很有前途的物理层多址接入技术,即速率分割多址接入(RSMA)。该方案能够对干扰进行部分解码,并将剩余的干扰部分处理为噪声,使其能够适应大范围的用户部署和网络负载。另一方面,交错分多址(IDMA)已经被认为是一种潜在的码域非正交多址(NOMA)方案,适用于5G及以后的通信网络。因此,本文提出了一种新的多址方案,以应对未来通信(6G)的新挑战。所提出的框架由RSMA和IDMA(码域NOMA)的联合处理组成,其中发射机将IDMA作为编码器,并允许速率分割,在实际传输之前将消息分割为两部分,即公共部分和私有部分。本文详细阐述了系统的数学建模,并考虑了用户面临不同信道条件的下行通信场景。对该方案进行了加权和率性能评价,验证了联合RS-IDMA系统的服务质量。
{"title":"Joint RSMA and IDMA-Based NOMA system for downlink Communication in 5G and Beyond Networks","authors":"Aasheesh Shukla","doi":"10.24138/jcomss.v16i4.1035","DOIUrl":"https://doi.org/10.24138/jcomss.v16i4.1035","url":null,"abstract":"Future communication networks may encounter various issues in order to facilitate heavy heterogeneous data traffic and large number of users, therefore more advanced multiple access (MA) schemes is required to meet the changing requirements. Recently, a promising physical-layer MA technique has been suggested for multi-antenna broadcast channels, namely Rate Splitting Multiple Access (RSMA). This new scheme has the ability to partially decode the interference and partially treat the remaining interference as noise which makes it to cope with wide range of user deployments and network loads. On the other hand, interleave division multiple access (IDMA) has already been recognized as a potential code domain NOMA (non-orthogonal multiple access) scheme, suitable for 5G and beyond communication network. Hence, in this paper, a new approach of multiple access scheme is proposed to get the grip on new challenges in future communication (6G). The proposed framework consists the joint processing of RSMA and IDMA (code domain NOMA), in which the transmitter involves an IDMA as encoder and allows rate splitting to split the message in two parts i.e. common part and private part, before the actual transmission. The mathematical modeling of proposed system is elaborated in the paper and for simulation purpose the downlink communication scenario has been considered where users faced diverse channel conditions. The weighted sum rate (WSR) performance is evaluated for the proposed scheme which validate the quality of service (QoS) of the joint RS-IDMA system.","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46192382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Non-cooperative Game-Theoretic Framework for Sponsoring Content in the Internet Market 互联网市场赞助内容的非合作博弈论框架
IF 0.7 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-12-01 DOI: 10.24138/jcomss.v16i4.1017
Hamid Garmani, Driss Ait Omar, Mohamed EL Amrani, Mohamed Baslam, M. Jourhmane
With a sponsored content plan on the internet market , a content provider (CP) can pay to the internet service providers ( ISP ) on behalf of the mobile users / subscribers to remove the network subscription fees for introduce an increase in the number of advertisements . As such , CP, ISP and end- users are all actively motivated to participate in the sponsored content plan. In this paper , we investigate the interactions between CPs as a non- cooperative game as a function of two market parameters credibility of content and number of sponsored content. In turn , the subscribers’ demand for the content of a CP depends not only on their strategies but also upon those proposed by all of its competitors . Through rigorous mathematical analysis , we prove the existence and uniqueness of the Nash equilibrium . Based on the analysis of the game properties , we propose an iterative algorithm, which guarantees to converge to the Nash equilibrium point in a distributed manner . Numerical investigation shows the convergence of a proposed algorithm to the Nash equilibrium point and corroborates the fact that sponsoring content may improve the CPs outcome .
通过互联网市场上的赞助内容计划,内容提供商(CP)可以代表移动用户/订户向互联网服务提供商(ISP)付费,以取消引入广告数量增加的网络订阅费。因此,CP、ISP和最终用户都积极参与赞助内容计划。在本文中,我们研究了作为非合作游戏的CP之间的互动,作为内容可信度和赞助内容数量这两个市场参数的函数。反过来,用户对CP内容的需求不仅取决于他们的策略,还取决于所有竞争对手提出的策略。通过严格的数学分析,我们证明了纳什均衡的存在性和唯一性。在分析博弈性质的基础上,我们提出了一种迭代算法,该算法保证以分布式方式收敛到纳什均衡点。数值研究表明,所提出的算法收敛于纳什均衡点,并证实了赞助内容可以改善CP结果的事实。
{"title":"A Non-cooperative Game-Theoretic Framework for Sponsoring Content in the Internet Market","authors":"Hamid Garmani, Driss Ait Omar, Mohamed EL Amrani, Mohamed Baslam, M. Jourhmane","doi":"10.24138/jcomss.v16i4.1017","DOIUrl":"https://doi.org/10.24138/jcomss.v16i4.1017","url":null,"abstract":"With a sponsored content plan on the internet market , a content provider (CP) can pay to the internet service providers ( ISP ) on behalf of the mobile users / subscribers to remove the network subscription fees for introduce an increase in the number of advertisements . As such , CP, ISP and end- users are all actively motivated to participate in the sponsored content plan. In this paper , we investigate the interactions between CPs as a non- cooperative game as a function of two market parameters credibility of content and number of sponsored content. In turn , the subscribers’ demand for the content of a CP depends not only on their strategies but also upon those proposed by all of its competitors . Through rigorous mathematical analysis , we prove the existence and uniqueness of the Nash equilibrium . Based on the analysis of the game properties , we propose an iterative algorithm, which guarantees to converge to the Nash equilibrium point in a distributed manner . Numerical investigation shows the convergence of a proposed algorithm to the Nash equilibrium point and corroborates the fact that sponsoring content may improve the CPs outcome .","PeriodicalId":38910,"journal":{"name":"Journal of Communications Software and Systems","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43865893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Communications Software and Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1