首页 > 最新文献

J. Inf. Process. Syst.最新文献

英文 中文
GPU-Based ECC Decode Unit for Efficient Massive Data Reception Acceleration 基于gpu的高效海量数据接收加速ECC解码单元
Pub Date : 2020-12-01 DOI: 10.3745/JIPS.01.0060
Jisu Kwon, Moon Gi Seok, Daejin Park
In transmitting and receiving such a large amount of data, reliable data communication is crucial for normal operation of a device and to prevent abnormal operations caused by errors. Therefore, in this paper, it is assumed that an error correction code (ECC) that can detect and correct errors by itself is used in an environment where massive data is sequentially received. Because an embedded system has limited resources, such as a low-performance processor or a small memory, it requires efficient operation of applications. In this paper, we propose using an accelerated ECC-decoding technique with a graphics processing unit (GPU) built into the embedded system when receiving a large amount of data. In the matrix–vector multiplication that forms the Hamming code used as a function of the ECC operation, the matrix is expressed in compressed sparse row (CSR) format, and a sparse matrix–vector product is used. The multiplication operation is performed in the kernel of the GPU, and we also accelerate the Hamming code computation so that the ECC operation can be performed in parallel. The proposed technique is implemented with CUDA on a GPU-embedded target board, NVIDIA Jetson TX2, and compared with execution time of the CPU.
在传输和接收如此大的数据量的情况下,可靠的数据通信对于设备的正常运行和防止由于错误导致的异常运行至关重要。因此,本文假设在连续接收海量数据的环境中,使用一种能够自行检测和纠错的纠错码(error correction code, ECC)。由于嵌入式系统的资源有限,例如低性能处理器或小内存,因此要求应用程序的高效运行。在本文中,我们建议在接收大量数据时,使用嵌入式系统内置图形处理单元(GPU)的加速ecc解码技术。在形成汉明码的矩阵-向量乘法中,作为ECC操作的函数,矩阵以压缩稀疏行(CSR)格式表示,并使用稀疏矩阵-向量积。乘法运算是在GPU的内核中进行的,我们还加速了汉明码的计算,使ECC运算可以并行执行。采用CUDA技术在NVIDIA Jetson TX2嵌入式gpu目标板上实现了该技术,并与CPU的执行时间进行了比较。
{"title":"GPU-Based ECC Decode Unit for Efficient Massive Data Reception Acceleration","authors":"Jisu Kwon, Moon Gi Seok, Daejin Park","doi":"10.3745/JIPS.01.0060","DOIUrl":"https://doi.org/10.3745/JIPS.01.0060","url":null,"abstract":"In transmitting and receiving such a large amount of data, reliable data communication is crucial for normal operation of a device and to prevent abnormal operations caused by errors. Therefore, in this paper, it is assumed that an error correction code (ECC) that can detect and correct errors by itself is used in an environment where massive data is sequentially received. Because an embedded system has limited resources, such as a low-performance processor or a small memory, it requires efficient operation of applications. In this paper, we propose using an accelerated ECC-decoding technique with a graphics processing unit (GPU) built into the embedded system when receiving a large amount of data. In the matrix–vector multiplication that forms the Hamming code used as a function of the ECC operation, the matrix is expressed in compressed sparse row (CSR) format, and a sparse matrix–vector product is used. The multiplication operation is performed in the kernel of the GPU, and we also accelerate the Hamming code computation so that the ECC operation can be performed in parallel. The proposed technique is implemented with CUDA on a GPU-embedded target board, NVIDIA Jetson TX2, and compared with execution time of the CPU.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114705470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Zero-Watermarking Algorithm in Transform Domain Based on RGB Channel and Voting Strategy 基于RGB通道和投票策略的变换域零水印算法
Pub Date : 2020-12-01 DOI: 10.3745/JIPS.02.0150
Q. Zheng, Nan Liu, Baoqin Cao, Fenghua Wang, Yanan Yang
A zero-watermarking algorithm in transform domain based on RGB channel and voting strategy is proposed. The registration and identification of ownership have achieved copyright protection for color images. In the ownership registration, discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) are used comprehensively because they have the characteristics of multi-resolution, energy concentration and stability, which is conducive to improving the robustness of the proposed algorithm. In order to take full advantage of the characteristics of the image, we use three channels of R, G, and B of a color image to construct three master shares, instead of using data from only one channel. Then, in order to improve security, the master share is superimposed with the copyright watermark encrypted by the owner’s key to generate an ownership share. When the ownership is authenticated, copyright watermarks are extracted from the three channels of the disputed image. Then using voting decisions, the final copyright information is determined by comparing the extracted three watermarks bit by bit. Experimental results show that the proposed zero watermarking scheme is robust to conventional attacks such as JPEG compression, noise addition, filtering and tampering, and has higher stability in various common color images.
提出了一种基于RGB通道和投票策略的变换域零水印算法。所有权的登记和认定实现了对彩色图像的版权保护。在所有权注册中,由于离散小波变换(DWT)、离散余弦变换(DCT)和奇异值分解(SVD)具有多分辨率、能量集中和稳定性等特点,综合使用了它们,有利于提高算法的鲁棒性。为了充分利用图像的特性,我们使用彩色图像的R、G、B三个通道来构造三个主共享,而不是只使用一个通道的数据。然后,为了提高安全性,将主共享与由所有者密钥加密的版权水印叠加,生成所有权共享。当所有权被验证时,从争议图像的三个通道中提取版权水印。然后采用投票决定的方法,通过逐位比较提取的三个水印来确定最终的版权信息。实验结果表明,所提出的零水印方案对JPEG压缩、加噪、滤波和篡改等常规攻击具有较强的鲁棒性,在各种常见彩色图像中具有较高的稳定性。
{"title":"Zero-Watermarking Algorithm in Transform Domain Based on RGB Channel and Voting Strategy","authors":"Q. Zheng, Nan Liu, Baoqin Cao, Fenghua Wang, Yanan Yang","doi":"10.3745/JIPS.02.0150","DOIUrl":"https://doi.org/10.3745/JIPS.02.0150","url":null,"abstract":"A zero-watermarking algorithm in transform domain based on RGB channel and voting strategy is proposed. The registration and identification of ownership have achieved copyright protection for color images. In the ownership registration, discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) are used comprehensively because they have the characteristics of multi-resolution, energy concentration and stability, which is conducive to improving the robustness of the proposed algorithm. In order to take full advantage of the characteristics of the image, we use three channels of R, G, and B of a color image to construct three master shares, instead of using data from only one channel. Then, in order to improve security, the master share is superimposed with the copyright watermark encrypted by the owner’s key to generate an ownership share. When the ownership is authenticated, copyright watermarks are extracted from the three channels of the disputed image. Then using voting decisions, the final copyright information is determined by comparing the extracted three watermarks bit by bit. Experimental results show that the proposed zero watermarking scheme is robust to conventional attacks such as JPEG compression, noise addition, filtering and tampering, and has higher stability in various common color images.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115745938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secure Performance Analysis Based on Maximum Capacity 基于最大容量的安全性能分析
Pub Date : 2020-12-01 DOI: 10.3745/JIPS.03.0151
Xiuping Zheng, Meiling Li, Xiaoxia Yang
The physical security layer of industrial wireless sensor networks in the event of an eavesdropping attack has been investigated in this paper. An optimal sensor selection scheme based on the maximum channel capacity is proposed for transmission environments that experience Nakagami fading. Comparing the intercept probabilities of the traditional round robin (TRR) and optimal sensor selection schemes, the system secure performance is analyzed. Simulation results show that the change in the number of sensors and the eavesdropping ratio affect the convergence rate of the intercept probability. Additionally, the proposed optimal selection scheme has a faster convergence rate compared to the TRR scheduling scheme for the same eavesdropping ratio and number of sensors. This observation is also valid when the Nakagami channel is simplified to a Rayleigh channel.
本文研究了工业无线传感器网络在遭受窃听攻击时的物理安全问题。针对中上衰落的传输环境,提出了一种基于最大信道容量的最优传感器选择方案。比较了传统轮循和最优传感器选择方案的截获概率,分析了系统的安全性能。仿真结果表明,传感器数目和窃听比的变化会影响截获概率的收敛速度。此外,在相同的窃听比和传感器数量下,所提出的最优选择方案比TRR调度方案具有更快的收敛速度。当将中上信道简化为瑞利信道时,这一观察结果也有效。
{"title":"Secure Performance Analysis Based on Maximum Capacity","authors":"Xiuping Zheng, Meiling Li, Xiaoxia Yang","doi":"10.3745/JIPS.03.0151","DOIUrl":"https://doi.org/10.3745/JIPS.03.0151","url":null,"abstract":"The physical security layer of industrial wireless sensor networks in the event of an eavesdropping attack has been investigated in this paper. An optimal sensor selection scheme based on the maximum channel capacity is proposed for transmission environments that experience Nakagami fading. Comparing the intercept probabilities of the traditional round robin (TRR) and optimal sensor selection schemes, the system secure performance is analyzed. Simulation results show that the change in the number of sensors and the eavesdropping ratio affect the convergence rate of the intercept probability. Additionally, the proposed optimal selection scheme has a faster convergence rate compared to the TRR scheduling scheme for the same eavesdropping ratio and number of sensors. This observation is also valid when the Nakagami channel is simplified to a Rayleigh channel.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127954236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Social Force Model based on Navigation Points for Crowd Emergent Evacuation 基于导航点的人群紧急疏散改进社会力模型
Pub Date : 2020-12-01 DOI: 10.3745/JIPS.04.0199
Jun Li, Haoxiang Zhang, Zhongrui Ni
Crowd evacuation simulation is an important research issue for designing reasonable building layouts and planning more effective evacuation routes. The social force model (SFM) is an important pedestrian movement model, and is widely used in crowd evacuation simulations. The model can effectively simulate crowd evacuation behaviors in a simple scene, but for a multi-obstacle scene, the model could result in some undesirable problems, such as pedestrian evacuation trajectory oscillation, pedestrian stagnation and poor evacuation routing. This paper analyzes the causes of these problems and proposes an improved SFM for complex multi-obstacle scenes. The new model adds navigation points and walking shortest route principles to the SFM. Based on the proposed model, a crowd evacuation simulation system is developed, and the crowd evacuation simulation was carried out in various scenes, including some with simple obstacles, as well as those with multi-obstacles. Experiments show that the pedestrians in the proposed model can effectively bypass obstacles and plan reasonable evacuation routes.
人群疏散仿真是设计合理的建筑布局和规划更有效的疏散路线的重要研究课题。社会力模型(social force model, SFM)是一种重要的行人运动模型,广泛应用于人群疏散仿真。该模型可以有效地模拟简单场景下的人群疏散行为,但对于多障碍物场景,该模型可能会导致行人疏散轨迹振荡、行人停滞和疏散路径不佳等不良问题。本文分析了产生这些问题的原因,提出了一种针对复杂多障碍物场景的改进SFM算法。新模型在SFM中增加了导航点和步行最短路径原则。基于所提出的模型,开发了人群疏散仿真系统,并在不同场景下进行了人群疏散仿真,包括简单障碍物场景和多障碍物场景。实验表明,该模型中的行人能够有效绕过障碍物,规划合理的疏散路线。
{"title":"Improved Social Force Model based on Navigation Points for Crowd Emergent Evacuation","authors":"Jun Li, Haoxiang Zhang, Zhongrui Ni","doi":"10.3745/JIPS.04.0199","DOIUrl":"https://doi.org/10.3745/JIPS.04.0199","url":null,"abstract":"Crowd evacuation simulation is an important research issue for designing reasonable building layouts and planning more effective evacuation routes. The social force model (SFM) is an important pedestrian movement model, and is widely used in crowd evacuation simulations. The model can effectively simulate crowd evacuation behaviors in a simple scene, but for a multi-obstacle scene, the model could result in some undesirable problems, such as pedestrian evacuation trajectory oscillation, pedestrian stagnation and poor evacuation routing. This paper analyzes the causes of these problems and proposes an improved SFM for complex multi-obstacle scenes. The new model adds navigation points and walking shortest route principles to the SFM. Based on the proposed model, a crowd evacuation simulation system is developed, and the crowd evacuation simulation was carried out in various scenes, including some with simple obstacles, as well as those with multi-obstacles. Experiments show that the pedestrians in the proposed model can effectively bypass obstacles and plan reasonable evacuation routes.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122258326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Study on Visual Saliency Detection in Infrared Images Using Boolean Map Approach 基于布尔映射方法的红外图像视觉显著性检测研究
Pub Date : 2020-10-30 DOI: 10.3745/JIPS.02.0145
M. T. N. Truong, Sanghoon Kim
Visual saliency detection is an essential task because it is an important part of various vision-based applications. There are many techniques for saliency detection in color images. However, the number of methods for saliency detection in infrared images is limited. In this paper, we introduce a simple approach for saliency detection in infrared images based on the thresholding technique. The input image is thresholded into several Boolean maps, and an initial saliency map is calculated as a weighted sum of the created Boolean maps. The initial map is further refined by using thresholding, morphology operation, and a Gaussian filter to produce the final, highquality saliency map. The experiment showed that the proposed method has high performance when applied to real-life data.
视觉显著性检测是各种基于视觉的应用的重要组成部分,是一项必不可少的任务。彩色图像的显著性检测技术有很多。然而,红外图像显著性检测方法的数量有限。本文介绍了一种基于阈值分割技术的红外图像显著性检测方法。输入图像被阈值划分为几个布尔图,初始显著性图被计算为创建的布尔图的加权和。通过使用阈值分割、形态学操作和高斯滤波器进一步细化初始地图,以产生最终的高质量显著性地图。实验表明,该方法在实际数据处理中具有良好的性能。
{"title":"A Study on Visual Saliency Detection in Infrared Images Using Boolean Map Approach","authors":"M. T. N. Truong, Sanghoon Kim","doi":"10.3745/JIPS.02.0145","DOIUrl":"https://doi.org/10.3745/JIPS.02.0145","url":null,"abstract":"Visual saliency detection is an essential task because it is an important part of various vision-based applications. There are many techniques for saliency detection in color images. However, the number of methods for saliency detection in infrared images is limited. In this paper, we introduce a simple approach for saliency detection in infrared images based on the thresholding technique. The input image is thresholded into several Boolean maps, and an initial saliency map is calculated as a weighted sum of the created Boolean maps. The initial map is further refined by using thresholding, morphology operation, and a Gaussian filter to produce the final, highquality saliency map. The experiment showed that the proposed method has high performance when applied to real-life data.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127208968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved Defect Detection Algorithm of Jean Fabric Based on Optimized Gabor Filter 一种改进的基于优化Gabor滤波器的牛仔织物缺陷检测算法
Pub Date : 2020-10-30 DOI: 10.3745/JIPS.02.0140
Shuangbao Ma, Wen Liu, Changli You, Shulin Jia, Yurong Wu
Aiming at the defect detection quality of denim fabric, this paper designs an improved algorithm based on the optimized Gabor filter. Firstly, we propose an improved defect detection algorithm of jean fabric based on the maximum two-dimensional image entropy and the loss evaluation function. Secondly, 24 Gabor filter banks with 4 scales and 6 directions are created and the optimal filter is selected from the filter banks by the one-dimensional image entropy algorithm and the two-dimensional image entropy algorithm respectively. Thirdly, these two optimized Gabor filters are compared to realize the common defect detection of denim fabric, such as normal texture, miss of weft, hole and oil stain. The results show that the improved algorithm has better detection effect on common defects of denim fabrics and the average detection rate is more than 91.25%.
针对牛仔织物疵点检测质量问题,设计了一种基于优化Gabor滤波器的改进算法。首先,提出了一种基于最大二维图像熵和损失评价函数的改进牛仔织物缺陷检测算法。其次,创建4个尺度、6个方向的24个Gabor滤波器组,分别采用一维图像熵算法和二维图像熵算法从滤波器组中选择最优滤波器;第三,将这两种优化后的Gabor滤波器进行对比,实现对牛仔织物正常纹理、缺纬、破洞、油污等常见疵点的检测。结果表明,改进算法对牛仔织物常见缺陷的检测效果较好,平均检出率大于91.25%。
{"title":"An Improved Defect Detection Algorithm of Jean Fabric Based on Optimized Gabor Filter","authors":"Shuangbao Ma, Wen Liu, Changli You, Shulin Jia, Yurong Wu","doi":"10.3745/JIPS.02.0140","DOIUrl":"https://doi.org/10.3745/JIPS.02.0140","url":null,"abstract":"Aiming at the defect detection quality of denim fabric, this paper designs an improved algorithm based on the optimized Gabor filter. Firstly, we propose an improved defect detection algorithm of jean fabric based on the maximum two-dimensional image entropy and the loss evaluation function. Secondly, 24 Gabor filter banks with 4 scales and 6 directions are created and the optimal filter is selected from the filter banks by the one-dimensional image entropy algorithm and the two-dimensional image entropy algorithm respectively. Thirdly, these two optimized Gabor filters are compared to realize the common defect detection of denim fabric, such as normal texture, miss of weft, hole and oil stain. The results show that the improved algorithm has better detection effect on common defects of denim fabrics and the average detection rate is more than 91.25%.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131816562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Next-Generation Personal Authentication Scheme Based on EEG Signal and Deep Learning 基于脑电信号和深度学习的下一代个人认证方案
Pub Date : 2020-10-30 DOI: 10.3745/JIPS.03.0147
Gi-Chul Yang
The personal authentication technique is an essential tool in this complex and modern digital information society. Traditionally, the most general mechanism of personal authentication was using alphanumeric passwords. However, passwords that are hard to guess or to break, are often hard to remember. There are demands for a technology capable of replacing the text-based password system. Graphical passwords can be an alternative, but it is vulnerable to shoulder-surfing attacks. This paper looks through a number of recently developed graphical password systems and introduces a personal authentication system using a machine learning technique with electroencephalography (EEG) signals as a new type of personal authentication system which is easier for a person to use and more difficult for others to steal than other preexisting authentication systems.
在这个复杂的现代数字信息社会中,个人认证技术是必不可少的工具。传统上,最通用的个人身份验证机制是使用字母数字密码。然而,难以猜测或破解的密码往往很难记住。人们需要一种能够取代基于文本的密码系统的技术。图形密码是另一种选择,但它很容易受到肩部冲浪攻击。本文通过对近年来发展起来的图形密码系统的研究,介绍了一种基于脑电图信号的机器学习技术的个人身份认证系统,它是一种比现有的其他身份认证系统更容易被人使用、更难以被他人窃取的新型个人身份认证系统。
{"title":"Next-Generation Personal Authentication Scheme Based on EEG Signal and Deep Learning","authors":"Gi-Chul Yang","doi":"10.3745/JIPS.03.0147","DOIUrl":"https://doi.org/10.3745/JIPS.03.0147","url":null,"abstract":"The personal authentication technique is an essential tool in this complex and modern digital information society. Traditionally, the most general mechanism of personal authentication was using alphanumeric passwords. However, passwords that are hard to guess or to break, are often hard to remember. There are demands for a technology capable of replacing the text-based password system. Graphical passwords can be an alternative, but it is vulnerable to shoulder-surfing attacks. This paper looks through a number of recently developed graphical password systems and introduces a personal authentication system using a machine learning technique with electroencephalography (EEG) signals as a new type of personal authentication system which is easier for a person to use and more difficult for others to steal than other preexisting authentication systems.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125932306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Rate Adaptation with Q-Learning in CSMA/CA Wireless Networks 基于q -学习的CSMA/CA无线网络速率自适应
Pub Date : 2020-10-30 DOI: 10.3745/JIPS.03.0148
Soohyun Cho
In this study, we propose a reinforcement learning agent to control the data transmission rates of nodes in carrier sensing multiple access with collision avoidance (CSMA/CA)-based wireless networks. We design a reinforcement learning (RL) agent, based on Q-learning. The agent learns the environment using the timeout events of packets, which are locally available in data sending nodes. The agent selects actions to control the data transmission rates of nodes that adjust the modulation and coding scheme (MCS) levels of the data packets to utilize the available bandwidth in dynamically changing channel conditions effectively. We use the ns3-gym framework to simulate RL and investigate the effects of the parameters of Q-learning on the performance of the RL agent. The simulation results indicate that the proposed RL agent adequately adjusts the MCS levels according to the changes in the network, and achieves a high throughput comparable to those of the existing data transmission rate adaptation schemes such as Minstrel.
在这项研究中,我们提出了一种强化学习代理来控制基于碰撞避免(CSMA/CA)的载波感知多址无线网络中节点的数据传输速率。我们设计了一个基于q学习的强化学习(RL)智能体。代理使用数据包的超时事件来学习环境,这些事件在数据发送节点中是本地可用的。agent选择控制节点数据传输速率的动作,调整数据包的调制和编码方案(MCS)级别,从而在动态变化的信道条件下有效利用可用带宽。我们使用ns3-gym框架来模拟强化学习,并研究Q-learning参数对强化学习代理性能的影响。仿真结果表明,所提出的RL代理能够根据网络的变化充分调整MCS水平,并达到与Minstrel等现有数据传输速率自适应方案相当的高吞吐量。
{"title":"Rate Adaptation with Q-Learning in CSMA/CA Wireless Networks","authors":"Soohyun Cho","doi":"10.3745/JIPS.03.0148","DOIUrl":"https://doi.org/10.3745/JIPS.03.0148","url":null,"abstract":"In this study, we propose a reinforcement learning agent to control the data transmission rates of nodes in carrier sensing multiple access with collision avoidance (CSMA/CA)-based wireless networks. We design a reinforcement learning (RL) agent, based on Q-learning. The agent learns the environment using the timeout events of packets, which are locally available in data sending nodes. The agent selects actions to control the data transmission rates of nodes that adjust the modulation and coding scheme (MCS) levels of the data packets to utilize the available bandwidth in dynamically changing channel conditions effectively. We use the ns3-gym framework to simulate RL and investigate the effects of the parameters of Q-learning on the performance of the RL agent. The simulation results indicate that the proposed RL agent adequately adjusts the MCS levels according to the changes in the network, and achieves a high throughput comparable to those of the existing data transmission rate adaptation schemes such as Minstrel.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130658188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Heuristic and Statistical Prediction Algorithms Survey for Smart Environments 智能环境的启发式和统计预测算法综述
Pub Date : 2020-10-30 DOI: 10.3745/JIPS.04.0191
Sehrish Malik, Israr Ullah, Do-Hyeun Kim, Kyu-Tae Lee
There is a growing interest in the development of smart environments through predicting the behaviors of inhabitants of smart spaces in the recent past. Various smart services are deployed in modern smart cities to facilitate residents and city administration. Prediction algorithms are broadly used in the smart fields in order to well equip the smart services for the future demands. Hence, an accurate prediction technology plays a vital role in the smart services. In this paper, we take out an extensive survey of smart spaces such as smart homes, smart farms and smart cars and smart applications such as smart health and smart energy. Our extensive survey is based on more than 400 articles and the final list of research studies included in this survey consist of 134 research papers selected using Google Scholar database for period of 2008 to 2018. In this survey, we highlight the role of prediction algorithms in each sub-domain of smart Internet of Things (IoT) environments. We also discuss the main algorithms which play pivotal role in a particular IoT subfield and effectiveness of these algorithms. The conducted survey provides an efficient way to analyze and have a quick understanding of state of the art work in the targeted domain. To the best of our knowledge, this is the very first survey paper on main categories of prediction algorithms covering statistical, heuristic and hybrid approaches for smart environments.
近年来,通过预测智能空间居民的行为,人们对智能环境的发展越来越感兴趣。现代智慧城市中部署了各种智能服务,方便居民和城市管理。预测算法被广泛应用于智能领域,以更好地装备未来需求的智能服务。因此,准确的预测技术在智能服务中起着至关重要的作用。在本文中,我们对智能空间(如智能家居、智能农场和智能汽车)和智能应用(如智能健康和智能能源)进行了广泛的调查。我们的广泛调查基于400多篇文章,调查中包括的最终研究清单包括2008年至2018年期间使用谷歌学术数据库选择的134篇研究论文。在这项调查中,我们强调了预测算法在智能物联网(IoT)环境的每个子领域中的作用。我们还讨论了在特定物联网子领域中发挥关键作用的主要算法以及这些算法的有效性。所进行的调查提供了一种有效的方法来分析和快速了解目标领域的最新工作状态。据我们所知,这是第一篇关于预测算法主要类别的调查论文,涵盖了智能环境的统计、启发式和混合方法。
{"title":"Heuristic and Statistical Prediction Algorithms Survey for Smart Environments","authors":"Sehrish Malik, Israr Ullah, Do-Hyeun Kim, Kyu-Tae Lee","doi":"10.3745/JIPS.04.0191","DOIUrl":"https://doi.org/10.3745/JIPS.04.0191","url":null,"abstract":"There is a growing interest in the development of smart environments through predicting the behaviors of inhabitants of smart spaces in the recent past. Various smart services are deployed in modern smart cities to facilitate residents and city administration. Prediction algorithms are broadly used in the smart fields in order to well equip the smart services for the future demands. Hence, an accurate prediction technology plays a vital role in the smart services. In this paper, we take out an extensive survey of smart spaces such as smart homes, smart farms and smart cars and smart applications such as smart health and smart energy. Our extensive survey is based on more than 400 articles and the final list of research studies included in this survey consist of 134 research papers selected using Google Scholar database for period of 2008 to 2018. In this survey, we highlight the role of prediction algorithms in each sub-domain of smart Internet of Things (IoT) environments. We also discuss the main algorithms which play pivotal role in a particular IoT subfield and effectiveness of these algorithms. The conducted survey provides an efficient way to analyze and have a quick understanding of state of the art work in the targeted domain. To the best of our knowledge, this is the very first survey paper on main categories of prediction algorithms covering statistical, heuristic and hybrid approaches for smart environments.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121815901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Survey of Deep Learning in Agriculture: Techniques and Their Applications 农业深度学习综述:技术及其应用
Pub Date : 2020-10-30 DOI: 10.3745/JIPS.04.0187
Chengjuan Ren, Dae-Kyoo Kim, Dongwon Jeong
{"title":"A Survey of Deep Learning in Agriculture: Techniques and Their Applications","authors":"Chengjuan Ren, Dae-Kyoo Kim, Dongwon Jeong","doi":"10.3745/JIPS.04.0187","DOIUrl":"https://doi.org/10.3745/JIPS.04.0187","url":null,"abstract":"","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124039980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
期刊
J. Inf. Process. Syst.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1