首页 > 最新文献

J. Inf. Process. Syst.最新文献

英文 中文
GPU-Based ECC Decode Unit for Efficient Massive Data Reception Acceleration 基于gpu的高效海量数据接收加速ECC解码单元
Pub Date : 2020-12-01 DOI: 10.3745/JIPS.01.0060
Jisu Kwon, Moon Gi Seok, Daejin Park
In transmitting and receiving such a large amount of data, reliable data communication is crucial for normal operation of a device and to prevent abnormal operations caused by errors. Therefore, in this paper, it is assumed that an error correction code (ECC) that can detect and correct errors by itself is used in an environment where massive data is sequentially received. Because an embedded system has limited resources, such as a low-performance processor or a small memory, it requires efficient operation of applications. In this paper, we propose using an accelerated ECC-decoding technique with a graphics processing unit (GPU) built into the embedded system when receiving a large amount of data. In the matrix–vector multiplication that forms the Hamming code used as a function of the ECC operation, the matrix is expressed in compressed sparse row (CSR) format, and a sparse matrix–vector product is used. The multiplication operation is performed in the kernel of the GPU, and we also accelerate the Hamming code computation so that the ECC operation can be performed in parallel. The proposed technique is implemented with CUDA on a GPU-embedded target board, NVIDIA Jetson TX2, and compared with execution time of the CPU.
在传输和接收如此大的数据量的情况下,可靠的数据通信对于设备的正常运行和防止由于错误导致的异常运行至关重要。因此,本文假设在连续接收海量数据的环境中,使用一种能够自行检测和纠错的纠错码(error correction code, ECC)。由于嵌入式系统的资源有限,例如低性能处理器或小内存,因此要求应用程序的高效运行。在本文中,我们建议在接收大量数据时,使用嵌入式系统内置图形处理单元(GPU)的加速ecc解码技术。在形成汉明码的矩阵-向量乘法中,作为ECC操作的函数,矩阵以压缩稀疏行(CSR)格式表示,并使用稀疏矩阵-向量积。乘法运算是在GPU的内核中进行的,我们还加速了汉明码的计算,使ECC运算可以并行执行。采用CUDA技术在NVIDIA Jetson TX2嵌入式gpu目标板上实现了该技术,并与CPU的执行时间进行了比较。
{"title":"GPU-Based ECC Decode Unit for Efficient Massive Data Reception Acceleration","authors":"Jisu Kwon, Moon Gi Seok, Daejin Park","doi":"10.3745/JIPS.01.0060","DOIUrl":"https://doi.org/10.3745/JIPS.01.0060","url":null,"abstract":"In transmitting and receiving such a large amount of data, reliable data communication is crucial for normal operation of a device and to prevent abnormal operations caused by errors. Therefore, in this paper, it is assumed that an error correction code (ECC) that can detect and correct errors by itself is used in an environment where massive data is sequentially received. Because an embedded system has limited resources, such as a low-performance processor or a small memory, it requires efficient operation of applications. In this paper, we propose using an accelerated ECC-decoding technique with a graphics processing unit (GPU) built into the embedded system when receiving a large amount of data. In the matrix–vector multiplication that forms the Hamming code used as a function of the ECC operation, the matrix is expressed in compressed sparse row (CSR) format, and a sparse matrix–vector product is used. The multiplication operation is performed in the kernel of the GPU, and we also accelerate the Hamming code computation so that the ECC operation can be performed in parallel. The proposed technique is implemented with CUDA on a GPU-embedded target board, NVIDIA Jetson TX2, and compared with execution time of the CPU.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114705470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of Image Generation System for DCGAN-Based Kids' Book Text 基于dcgan的儿童图书文本图像生成系统设计
Pub Date : 2020-12-01 DOI: 10.3745/JIPS.02.0149
Jaehyeong Cho, Nammee Moon
When a picture book is photographed with a smart device, the text is analyzed for meaning and associated images are created. Image creation is the first step in learning DCGAN using class lists and images. In this study, DCGAN was trained with 11 classes and images of 1688 bears, which were collected by ImageNet for design. The second step is to shoot the image and text of the picture book on a smart device, and convert the text part of the shot image into a system readable character. We use the morpheme analyzer to classify nouns and verbs in text, and Discriminator learn to recognize the classified parts of speech as latent vectors of images. The third step is to create an associated image in the text. In the picture book, take the text of the part without the image and extract nouns and verbs. The extracted parts of speech and the learned latent vector are used as Generator parameters to generate images associated with the text.
当用智能设备拍摄图画书时,会分析文本的含义并创建相关图像。图像创建是使用类列表和图像学习DCGAN的第一步。在本研究中,DCGAN使用11个类和1688只熊的图像进行训练,这些熊的图像是由ImageNet收集用于设计的。第二步是在智能设备上拍摄绘本的图像和文本,并将拍摄图像的文本部分转换为系统可读字符。我们使用词素分析器对文本中的名词和动词进行分类,鉴别器学习识别分类后的词性作为图像的潜在向量。第三步是在文本中创建一个相关的图像。在绘本中,选取没有图片的部分的文字,提取名词和动词。将提取的语音部分和学习到的潜在向量作为生成器参数,生成与文本相关的图像。
{"title":"Design of Image Generation System for DCGAN-Based Kids' Book Text","authors":"Jaehyeong Cho, Nammee Moon","doi":"10.3745/JIPS.02.0149","DOIUrl":"https://doi.org/10.3745/JIPS.02.0149","url":null,"abstract":"When a picture book is photographed with a smart device, the text is analyzed for meaning and associated images are created. Image creation is the first step in learning DCGAN using class lists and images. In this study, DCGAN was trained with 11 classes and images of 1688 bears, which were collected by ImageNet for design. The second step is to shoot the image and text of the picture book on a smart device, and convert the text part of the shot image into a system readable character. We use the morpheme analyzer to classify nouns and verbs in text, and Discriminator learn to recognize the classified parts of speech as latent vectors of images. The third step is to create an associated image in the text. In the picture book, take the text of the part without the image and extract nouns and verbs. The extracted parts of speech and the learned latent vector are used as Generator parameters to generate images associated with the text.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124463952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secure Performance Analysis Based on Maximum Capacity 基于最大容量的安全性能分析
Pub Date : 2020-12-01 DOI: 10.3745/JIPS.03.0151
Xiuping Zheng, Meiling Li, Xiaoxia Yang
The physical security layer of industrial wireless sensor networks in the event of an eavesdropping attack has been investigated in this paper. An optimal sensor selection scheme based on the maximum channel capacity is proposed for transmission environments that experience Nakagami fading. Comparing the intercept probabilities of the traditional round robin (TRR) and optimal sensor selection schemes, the system secure performance is analyzed. Simulation results show that the change in the number of sensors and the eavesdropping ratio affect the convergence rate of the intercept probability. Additionally, the proposed optimal selection scheme has a faster convergence rate compared to the TRR scheduling scheme for the same eavesdropping ratio and number of sensors. This observation is also valid when the Nakagami channel is simplified to a Rayleigh channel.
本文研究了工业无线传感器网络在遭受窃听攻击时的物理安全问题。针对中上衰落的传输环境,提出了一种基于最大信道容量的最优传感器选择方案。比较了传统轮循和最优传感器选择方案的截获概率,分析了系统的安全性能。仿真结果表明,传感器数目和窃听比的变化会影响截获概率的收敛速度。此外,在相同的窃听比和传感器数量下,所提出的最优选择方案比TRR调度方案具有更快的收敛速度。当将中上信道简化为瑞利信道时,这一观察结果也有效。
{"title":"Secure Performance Analysis Based on Maximum Capacity","authors":"Xiuping Zheng, Meiling Li, Xiaoxia Yang","doi":"10.3745/JIPS.03.0151","DOIUrl":"https://doi.org/10.3745/JIPS.03.0151","url":null,"abstract":"The physical security layer of industrial wireless sensor networks in the event of an eavesdropping attack has been investigated in this paper. An optimal sensor selection scheme based on the maximum channel capacity is proposed for transmission environments that experience Nakagami fading. Comparing the intercept probabilities of the traditional round robin (TRR) and optimal sensor selection schemes, the system secure performance is analyzed. Simulation results show that the change in the number of sensors and the eavesdropping ratio affect the convergence rate of the intercept probability. Additionally, the proposed optimal selection scheme has a faster convergence rate compared to the TRR scheduling scheme for the same eavesdropping ratio and number of sensors. This observation is also valid when the Nakagami channel is simplified to a Rayleigh channel.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127954236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Social Force Model based on Navigation Points for Crowd Emergent Evacuation 基于导航点的人群紧急疏散改进社会力模型
Pub Date : 2020-12-01 DOI: 10.3745/JIPS.04.0199
Jun Li, Haoxiang Zhang, Zhongrui Ni
Crowd evacuation simulation is an important research issue for designing reasonable building layouts and planning more effective evacuation routes. The social force model (SFM) is an important pedestrian movement model, and is widely used in crowd evacuation simulations. The model can effectively simulate crowd evacuation behaviors in a simple scene, but for a multi-obstacle scene, the model could result in some undesirable problems, such as pedestrian evacuation trajectory oscillation, pedestrian stagnation and poor evacuation routing. This paper analyzes the causes of these problems and proposes an improved SFM for complex multi-obstacle scenes. The new model adds navigation points and walking shortest route principles to the SFM. Based on the proposed model, a crowd evacuation simulation system is developed, and the crowd evacuation simulation was carried out in various scenes, including some with simple obstacles, as well as those with multi-obstacles. Experiments show that the pedestrians in the proposed model can effectively bypass obstacles and plan reasonable evacuation routes.
人群疏散仿真是设计合理的建筑布局和规划更有效的疏散路线的重要研究课题。社会力模型(social force model, SFM)是一种重要的行人运动模型,广泛应用于人群疏散仿真。该模型可以有效地模拟简单场景下的人群疏散行为,但对于多障碍物场景,该模型可能会导致行人疏散轨迹振荡、行人停滞和疏散路径不佳等不良问题。本文分析了产生这些问题的原因,提出了一种针对复杂多障碍物场景的改进SFM算法。新模型在SFM中增加了导航点和步行最短路径原则。基于所提出的模型,开发了人群疏散仿真系统,并在不同场景下进行了人群疏散仿真,包括简单障碍物场景和多障碍物场景。实验表明,该模型中的行人能够有效绕过障碍物,规划合理的疏散路线。
{"title":"Improved Social Force Model based on Navigation Points for Crowd Emergent Evacuation","authors":"Jun Li, Haoxiang Zhang, Zhongrui Ni","doi":"10.3745/JIPS.04.0199","DOIUrl":"https://doi.org/10.3745/JIPS.04.0199","url":null,"abstract":"Crowd evacuation simulation is an important research issue for designing reasonable building layouts and planning more effective evacuation routes. The social force model (SFM) is an important pedestrian movement model, and is widely used in crowd evacuation simulations. The model can effectively simulate crowd evacuation behaviors in a simple scene, but for a multi-obstacle scene, the model could result in some undesirable problems, such as pedestrian evacuation trajectory oscillation, pedestrian stagnation and poor evacuation routing. This paper analyzes the causes of these problems and proposes an improved SFM for complex multi-obstacle scenes. The new model adds navigation points and walking shortest route principles to the SFM. Based on the proposed model, a crowd evacuation simulation system is developed, and the crowd evacuation simulation was carried out in various scenes, including some with simple obstacles, as well as those with multi-obstacles. Experiments show that the pedestrians in the proposed model can effectively bypass obstacles and plan reasonable evacuation routes.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122258326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Study on Visual Saliency Detection in Infrared Images Using Boolean Map Approach 基于布尔映射方法的红外图像视觉显著性检测研究
Pub Date : 2020-10-30 DOI: 10.3745/JIPS.02.0145
M. T. N. Truong, Sanghoon Kim
Visual saliency detection is an essential task because it is an important part of various vision-based applications. There are many techniques for saliency detection in color images. However, the number of methods for saliency detection in infrared images is limited. In this paper, we introduce a simple approach for saliency detection in infrared images based on the thresholding technique. The input image is thresholded into several Boolean maps, and an initial saliency map is calculated as a weighted sum of the created Boolean maps. The initial map is further refined by using thresholding, morphology operation, and a Gaussian filter to produce the final, highquality saliency map. The experiment showed that the proposed method has high performance when applied to real-life data.
视觉显著性检测是各种基于视觉的应用的重要组成部分,是一项必不可少的任务。彩色图像的显著性检测技术有很多。然而,红外图像显著性检测方法的数量有限。本文介绍了一种基于阈值分割技术的红外图像显著性检测方法。输入图像被阈值划分为几个布尔图,初始显著性图被计算为创建的布尔图的加权和。通过使用阈值分割、形态学操作和高斯滤波器进一步细化初始地图,以产生最终的高质量显著性地图。实验表明,该方法在实际数据处理中具有良好的性能。
{"title":"A Study on Visual Saliency Detection in Infrared Images Using Boolean Map Approach","authors":"M. T. N. Truong, Sanghoon Kim","doi":"10.3745/JIPS.02.0145","DOIUrl":"https://doi.org/10.3745/JIPS.02.0145","url":null,"abstract":"Visual saliency detection is an essential task because it is an important part of various vision-based applications. There are many techniques for saliency detection in color images. However, the number of methods for saliency detection in infrared images is limited. In this paper, we introduce a simple approach for saliency detection in infrared images based on the thresholding technique. The input image is thresholded into several Boolean maps, and an initial saliency map is calculated as a weighted sum of the created Boolean maps. The initial map is further refined by using thresholding, morphology operation, and a Gaussian filter to produce the final, highquality saliency map. The experiment showed that the proposed method has high performance when applied to real-life data.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127208968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved Defect Detection Algorithm of Jean Fabric Based on Optimized Gabor Filter 一种改进的基于优化Gabor滤波器的牛仔织物缺陷检测算法
Pub Date : 2020-10-30 DOI: 10.3745/JIPS.02.0140
Shuangbao Ma, Wen Liu, Changli You, Shulin Jia, Yurong Wu
Aiming at the defect detection quality of denim fabric, this paper designs an improved algorithm based on the optimized Gabor filter. Firstly, we propose an improved defect detection algorithm of jean fabric based on the maximum two-dimensional image entropy and the loss evaluation function. Secondly, 24 Gabor filter banks with 4 scales and 6 directions are created and the optimal filter is selected from the filter banks by the one-dimensional image entropy algorithm and the two-dimensional image entropy algorithm respectively. Thirdly, these two optimized Gabor filters are compared to realize the common defect detection of denim fabric, such as normal texture, miss of weft, hole and oil stain. The results show that the improved algorithm has better detection effect on common defects of denim fabrics and the average detection rate is more than 91.25%.
针对牛仔织物疵点检测质量问题,设计了一种基于优化Gabor滤波器的改进算法。首先,提出了一种基于最大二维图像熵和损失评价函数的改进牛仔织物缺陷检测算法。其次,创建4个尺度、6个方向的24个Gabor滤波器组,分别采用一维图像熵算法和二维图像熵算法从滤波器组中选择最优滤波器;第三,将这两种优化后的Gabor滤波器进行对比,实现对牛仔织物正常纹理、缺纬、破洞、油污等常见疵点的检测。结果表明,改进算法对牛仔织物常见缺陷的检测效果较好,平均检出率大于91.25%。
{"title":"An Improved Defect Detection Algorithm of Jean Fabric Based on Optimized Gabor Filter","authors":"Shuangbao Ma, Wen Liu, Changli You, Shulin Jia, Yurong Wu","doi":"10.3745/JIPS.02.0140","DOIUrl":"https://doi.org/10.3745/JIPS.02.0140","url":null,"abstract":"Aiming at the defect detection quality of denim fabric, this paper designs an improved algorithm based on the optimized Gabor filter. Firstly, we propose an improved defect detection algorithm of jean fabric based on the maximum two-dimensional image entropy and the loss evaluation function. Secondly, 24 Gabor filter banks with 4 scales and 6 directions are created and the optimal filter is selected from the filter banks by the one-dimensional image entropy algorithm and the two-dimensional image entropy algorithm respectively. Thirdly, these two optimized Gabor filters are compared to realize the common defect detection of denim fabric, such as normal texture, miss of weft, hole and oil stain. The results show that the improved algorithm has better detection effect on common defects of denim fabrics and the average detection rate is more than 91.25%.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131816562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Next-Generation Personal Authentication Scheme Based on EEG Signal and Deep Learning 基于脑电信号和深度学习的下一代个人认证方案
Pub Date : 2020-10-30 DOI: 10.3745/JIPS.03.0147
Gi-Chul Yang
The personal authentication technique is an essential tool in this complex and modern digital information society. Traditionally, the most general mechanism of personal authentication was using alphanumeric passwords. However, passwords that are hard to guess or to break, are often hard to remember. There are demands for a technology capable of replacing the text-based password system. Graphical passwords can be an alternative, but it is vulnerable to shoulder-surfing attacks. This paper looks through a number of recently developed graphical password systems and introduces a personal authentication system using a machine learning technique with electroencephalography (EEG) signals as a new type of personal authentication system which is easier for a person to use and more difficult for others to steal than other preexisting authentication systems.
在这个复杂的现代数字信息社会中,个人认证技术是必不可少的工具。传统上,最通用的个人身份验证机制是使用字母数字密码。然而,难以猜测或破解的密码往往很难记住。人们需要一种能够取代基于文本的密码系统的技术。图形密码是另一种选择,但它很容易受到肩部冲浪攻击。本文通过对近年来发展起来的图形密码系统的研究,介绍了一种基于脑电图信号的机器学习技术的个人身份认证系统,它是一种比现有的其他身份认证系统更容易被人使用、更难以被他人窃取的新型个人身份认证系统。
{"title":"Next-Generation Personal Authentication Scheme Based on EEG Signal and Deep Learning","authors":"Gi-Chul Yang","doi":"10.3745/JIPS.03.0147","DOIUrl":"https://doi.org/10.3745/JIPS.03.0147","url":null,"abstract":"The personal authentication technique is an essential tool in this complex and modern digital information society. Traditionally, the most general mechanism of personal authentication was using alphanumeric passwords. However, passwords that are hard to guess or to break, are often hard to remember. There are demands for a technology capable of replacing the text-based password system. Graphical passwords can be an alternative, but it is vulnerable to shoulder-surfing attacks. This paper looks through a number of recently developed graphical password systems and introduces a personal authentication system using a machine learning technique with electroencephalography (EEG) signals as a new type of personal authentication system which is easier for a person to use and more difficult for others to steal than other preexisting authentication systems.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125932306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Rate Adaptation with Q-Learning in CSMA/CA Wireless Networks 基于q -学习的CSMA/CA无线网络速率自适应
Pub Date : 2020-10-30 DOI: 10.3745/JIPS.03.0148
Soohyun Cho
In this study, we propose a reinforcement learning agent to control the data transmission rates of nodes in carrier sensing multiple access with collision avoidance (CSMA/CA)-based wireless networks. We design a reinforcement learning (RL) agent, based on Q-learning. The agent learns the environment using the timeout events of packets, which are locally available in data sending nodes. The agent selects actions to control the data transmission rates of nodes that adjust the modulation and coding scheme (MCS) levels of the data packets to utilize the available bandwidth in dynamically changing channel conditions effectively. We use the ns3-gym framework to simulate RL and investigate the effects of the parameters of Q-learning on the performance of the RL agent. The simulation results indicate that the proposed RL agent adequately adjusts the MCS levels according to the changes in the network, and achieves a high throughput comparable to those of the existing data transmission rate adaptation schemes such as Minstrel.
在这项研究中,我们提出了一种强化学习代理来控制基于碰撞避免(CSMA/CA)的载波感知多址无线网络中节点的数据传输速率。我们设计了一个基于q学习的强化学习(RL)智能体。代理使用数据包的超时事件来学习环境,这些事件在数据发送节点中是本地可用的。agent选择控制节点数据传输速率的动作,调整数据包的调制和编码方案(MCS)级别,从而在动态变化的信道条件下有效利用可用带宽。我们使用ns3-gym框架来模拟强化学习,并研究Q-learning参数对强化学习代理性能的影响。仿真结果表明,所提出的RL代理能够根据网络的变化充分调整MCS水平,并达到与Minstrel等现有数据传输速率自适应方案相当的高吞吐量。
{"title":"Rate Adaptation with Q-Learning in CSMA/CA Wireless Networks","authors":"Soohyun Cho","doi":"10.3745/JIPS.03.0148","DOIUrl":"https://doi.org/10.3745/JIPS.03.0148","url":null,"abstract":"In this study, we propose a reinforcement learning agent to control the data transmission rates of nodes in carrier sensing multiple access with collision avoidance (CSMA/CA)-based wireless networks. We design a reinforcement learning (RL) agent, based on Q-learning. The agent learns the environment using the timeout events of packets, which are locally available in data sending nodes. The agent selects actions to control the data transmission rates of nodes that adjust the modulation and coding scheme (MCS) levels of the data packets to utilize the available bandwidth in dynamically changing channel conditions effectively. We use the ns3-gym framework to simulate RL and investigate the effects of the parameters of Q-learning on the performance of the RL agent. The simulation results indicate that the proposed RL agent adequately adjusts the MCS levels according to the changes in the network, and achieves a high throughput comparable to those of the existing data transmission rate adaptation schemes such as Minstrel.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130658188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Heuristic and Statistical Prediction Algorithms Survey for Smart Environments 智能环境的启发式和统计预测算法综述
Pub Date : 2020-10-30 DOI: 10.3745/JIPS.04.0191
Sehrish Malik, Israr Ullah, Do-Hyeun Kim, Kyu-Tae Lee
There is a growing interest in the development of smart environments through predicting the behaviors of inhabitants of smart spaces in the recent past. Various smart services are deployed in modern smart cities to facilitate residents and city administration. Prediction algorithms are broadly used in the smart fields in order to well equip the smart services for the future demands. Hence, an accurate prediction technology plays a vital role in the smart services. In this paper, we take out an extensive survey of smart spaces such as smart homes, smart farms and smart cars and smart applications such as smart health and smart energy. Our extensive survey is based on more than 400 articles and the final list of research studies included in this survey consist of 134 research papers selected using Google Scholar database for period of 2008 to 2018. In this survey, we highlight the role of prediction algorithms in each sub-domain of smart Internet of Things (IoT) environments. We also discuss the main algorithms which play pivotal role in a particular IoT subfield and effectiveness of these algorithms. The conducted survey provides an efficient way to analyze and have a quick understanding of state of the art work in the targeted domain. To the best of our knowledge, this is the very first survey paper on main categories of prediction algorithms covering statistical, heuristic and hybrid approaches for smart environments.
近年来,通过预测智能空间居民的行为,人们对智能环境的发展越来越感兴趣。现代智慧城市中部署了各种智能服务,方便居民和城市管理。预测算法被广泛应用于智能领域,以更好地装备未来需求的智能服务。因此,准确的预测技术在智能服务中起着至关重要的作用。在本文中,我们对智能空间(如智能家居、智能农场和智能汽车)和智能应用(如智能健康和智能能源)进行了广泛的调查。我们的广泛调查基于400多篇文章,调查中包括的最终研究清单包括2008年至2018年期间使用谷歌学术数据库选择的134篇研究论文。在这项调查中,我们强调了预测算法在智能物联网(IoT)环境的每个子领域中的作用。我们还讨论了在特定物联网子领域中发挥关键作用的主要算法以及这些算法的有效性。所进行的调查提供了一种有效的方法来分析和快速了解目标领域的最新工作状态。据我们所知,这是第一篇关于预测算法主要类别的调查论文,涵盖了智能环境的统计、启发式和混合方法。
{"title":"Heuristic and Statistical Prediction Algorithms Survey for Smart Environments","authors":"Sehrish Malik, Israr Ullah, Do-Hyeun Kim, Kyu-Tae Lee","doi":"10.3745/JIPS.04.0191","DOIUrl":"https://doi.org/10.3745/JIPS.04.0191","url":null,"abstract":"There is a growing interest in the development of smart environments through predicting the behaviors of inhabitants of smart spaces in the recent past. Various smart services are deployed in modern smart cities to facilitate residents and city administration. Prediction algorithms are broadly used in the smart fields in order to well equip the smart services for the future demands. Hence, an accurate prediction technology plays a vital role in the smart services. In this paper, we take out an extensive survey of smart spaces such as smart homes, smart farms and smart cars and smart applications such as smart health and smart energy. Our extensive survey is based on more than 400 articles and the final list of research studies included in this survey consist of 134 research papers selected using Google Scholar database for period of 2008 to 2018. In this survey, we highlight the role of prediction algorithms in each sub-domain of smart Internet of Things (IoT) environments. We also discuss the main algorithms which play pivotal role in a particular IoT subfield and effectiveness of these algorithms. The conducted survey provides an efficient way to analyze and have a quick understanding of state of the art work in the targeted domain. To the best of our knowledge, this is the very first survey paper on main categories of prediction algorithms covering statistical, heuristic and hybrid approaches for smart environments.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121815901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Survey of Deep Learning in Agriculture: Techniques and Their Applications 农业深度学习综述:技术及其应用
Pub Date : 2020-10-30 DOI: 10.3745/JIPS.04.0187
Chengjuan Ren, Dae-Kyoo Kim, Dongwon Jeong
{"title":"A Survey of Deep Learning in Agriculture: Techniques and Their Applications","authors":"Chengjuan Ren, Dae-Kyoo Kim, Dongwon Jeong","doi":"10.3745/JIPS.04.0187","DOIUrl":"https://doi.org/10.3745/JIPS.04.0187","url":null,"abstract":"","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124039980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
期刊
J. Inf. Process. Syst.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1