This paper combines the dance 3D space simulation sequence diagram with video motion recognition technology, filters, denoises, grays and background removal the collected dance video images, analyzes the motion characteristics of people in the sequence diagram, uses support vector machine to learn and train 3D space models, classifies and recognizes people's dance movements, and extracts 3D-SIFT and optical flow characteristics of various areas of human body. Form a three-dimensional space simulation sequence diagram, reduce and normalize the extracted features, get the feature vectors of various characters, and input them into the classifier to realize the recognition of dance movements. The results show that the combination of 3D-SIFT and optical flow can realize the dynamic change of human static information, the illumination invariance of SIFT features can make up for the illumination sensitivity of optical flow features, and the optical flow features can solve the instability problem of determining the key points of SIFT features.
{"title":"The Role of the Combination of 3D Simulation Sequence Diagram and Video Motion Recognition Technology in Evaluating and Correcting Dancers' Dance Moves","authors":"Hua Wei, Vinh Chau","doi":"10.4018/ijmcmc.348662","DOIUrl":"https://doi.org/10.4018/ijmcmc.348662","url":null,"abstract":"This paper combines the dance 3D space simulation sequence diagram with video motion recognition technology, filters, denoises, grays and background removal the collected dance video images, analyzes the motion characteristics of people in the sequence diagram, uses support vector machine to learn and train 3D space models, classifies and recognizes people's dance movements, and extracts 3D-SIFT and optical flow characteristics of various areas of human body. Form a three-dimensional space simulation sequence diagram, reduce and normalize the extracted features, get the feature vectors of various characters, and input them into the classifier to realize the recognition of dance movements. The results show that the combination of 3D-SIFT and optical flow can realize the dynamic change of human static information, the illumination invariance of SIFT features can make up for the illumination sensitivity of optical flow features, and the optical flow features can solve the instability problem of determining the key points of SIFT features.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":null,"pages":null},"PeriodicalIF":0.4,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141829726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xinjia Li, Yahong Li, Lei Fang, Liwei Liu, Ke Wang
With the circulation of massive electric measurement data, data anomaly caused by security attacks imposes security risks on reliable operation of smart grid. Long short-term memory (LSTM) based data circulation monitoring and security risk anomaly evaluation has been intensively studied. However, some issues remain unsolved, including learning overfitting and large prediction error. In this paper, we investigate fuzzy learning to infer the abnormal level of security risk. In particular, an adaptive grey wolf optimization-LSTM-fuzzy petri network (AGWO-LSTM-FPN) based electrical measurement data circulation monitoring and security risk anomaly evaluation algorithm is proposed. Specifically, AGWO is utilized to optimize LSTM parameter updating and improve traffic prediction accuracy. Furthermore, FPN is combined with multi-dimensional monitoring indicators to enhance anomaly level evaluation. Simulation results illustrate the excellent performance of AGWO-LSTM-FPN.
随着海量电力测量数据的流通,由安全攻击引起的数据异常给智能电网的可靠运行带来了安全隐患。基于长短期记忆(LSTM)的数据流通监控和安全风险异常评估已得到深入研究。然而,一些问题仍未得到解决,包括学习过拟合和预测误差过大。在本文中,我们研究了模糊学习来推断安全风险的异常级别。具体而言,本文提出了一种基于自适应灰狼优化-LSTM-模糊 petri 网络(AGWO-LSTM-FPN)的电气测量数据循环监测和安全风险异常评估算法。具体来说,AGWO 用于优化 LSTM 参数更新,提高流量预测精度。此外,还将 FPN 与多维监测指标相结合,以加强异常级别评估。仿真结果表明了 AGWO-LSTM-FPN 的卓越性能。
{"title":"Fuzzy Learning-Based Electric Measurement Data Circulation Monitoring and Security Risk Anomaly Evaluation","authors":"Xinjia Li, Yahong Li, Lei Fang, Liwei Liu, Ke Wang","doi":"10.4018/ijmcmc.346990","DOIUrl":"https://doi.org/10.4018/ijmcmc.346990","url":null,"abstract":"With the circulation of massive electric measurement data, data anomaly caused by security attacks imposes security risks on reliable operation of smart grid. Long short-term memory (LSTM) based data circulation monitoring and security risk anomaly evaluation has been intensively studied. However, some issues remain unsolved, including learning overfitting and large prediction error. In this paper, we investigate fuzzy learning to infer the abnormal level of security risk. In particular, an adaptive grey wolf optimization-LSTM-fuzzy petri network (AGWO-LSTM-FPN) based electrical measurement data circulation monitoring and security risk anomaly evaluation algorithm is proposed. Specifically, AGWO is utilized to optimize LSTM parameter updating and improve traffic prediction accuracy. Furthermore, FPN is combined with multi-dimensional monitoring indicators to enhance anomaly level evaluation. Simulation results illustrate the excellent performance of AGWO-LSTM-FPN.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":null,"pages":null},"PeriodicalIF":0.4,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141831205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Coronavirus disease 2019 (COVID-19) pandemic has produced a global health crisis that has had a deep impact on the way we perceive our world and everyday lives. Not only the spread rate of contagion and patterns of transmission endangered our sense of security, but the safety measures put in place to contain the spread of the virus also require social distancing. In this context of physical threat, social and physical distancing, the role of the different mass media channels and social media in lives of individual, social and societal levels cannot be underestimated.
{"title":"Youth Sources of News During the COVID-19 Period","authors":"Badreya Al-jenaibi (536d4bda-1d8b-42f0-94b7-3346c1","doi":"10.4018/ijmcmc.343789","DOIUrl":"https://doi.org/10.4018/ijmcmc.343789","url":null,"abstract":"Coronavirus disease 2019 (COVID-19) pandemic has produced a global health crisis that has had a deep impact on the way we perceive our world and everyday lives. Not only the spread rate of contagion and patterns of transmission endangered our sense of security, but the safety measures put in place to contain the spread of the virus also require social distancing. In this context of physical threat, social and physical distancing, the role of the different mass media channels and social media in lives of individual, social and societal levels cannot be underestimated.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140963739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Virtual power plant (VPP) plays an important role in improving the balance and regulation abilities of new power system. The safe and reliable operation is support by the VPP end-to-end communication network with differentiated multi-service bearing capability. For the requirement of unified and standard VPP end-to-end networking scheme, the VPP service communication metrics, as well as the communication network architecture of VPP aggregation and control are analyzed. Then, a multi-dimension hierarchical VPP end-to-end network evaluation index system is put forward. In addition, an end-to-end VPP network evaluation method considering differentiated time-sensitive and granular requirements of multiple services is proposed. Finally, the suitability analysis results of various end-to-end networking schemes and multiple services with differentiated time-sensitive and granular requirements are given, which plays a guiding role in establishing a unified standard VPP end-to-end networking scheme.
{"title":"An End-to-End Network Evaluation Method for Differentiated Multi-Service Bearing in VPP","authors":"Wanqiao Wang, Jian Su, Hui Zhang, Luyao Guan, Qingrong Zheng, Zhuofan Tang, Huixia Ding","doi":"10.4018/ijmcmc.340381","DOIUrl":"https://doi.org/10.4018/ijmcmc.340381","url":null,"abstract":"Virtual power plant (VPP) plays an important role in improving the balance and regulation abilities of new power system. The safe and reliable operation is support by the VPP end-to-end communication network with differentiated multi-service bearing capability. For the requirement of unified and standard VPP end-to-end networking scheme, the VPP service communication metrics, as well as the communication network architecture of VPP aggregation and control are analyzed. Then, a multi-dimension hierarchical VPP end-to-end network evaluation index system is put forward. In addition, an end-to-end VPP network evaluation method considering differentiated time-sensitive and granular requirements of multiple services is proposed. Finally, the suitability analysis results of various end-to-end networking schemes and multiple services with differentiated time-sensitive and granular requirements are given, which plays a guiding role in establishing a unified standard VPP end-to-end networking scheme.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140249367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Agnitè Maxim Wilfrid Straiker Edoh, Tahirou Djara, Abdou-Aziz Sobabe Ali Tahirou, A. Vianou
In this work, the authors propose a new biometric authentication system on mobile devices, enhancing security at these terminals and preserving user privacy. The proposed system uses a method of extracting strong features from minutiae with refinement of the method with regard to the further elimination of false minutiae by the calculation of geometric information (orientations and distances between minutiae) to obtain true terminations and stronger bifurcations facilitating the recognition of individuals. A series of tests carried out using a recognition and authentication application allowed us to achieve a false rejection rate of 13.81% and a false acceptance rate of almost zero (0.021%). The authors also propose a security model using hash functions and a random number to make the recognition system revocable, more difficult to compromise and thus reducing the risk of usurpation.
{"title":"Biometric Authentication Methods on Mobile Platforms","authors":"Agnitè Maxim Wilfrid Straiker Edoh, Tahirou Djara, Abdou-Aziz Sobabe Ali Tahirou, A. Vianou","doi":"10.4018/ijmcmc.334130","DOIUrl":"https://doi.org/10.4018/ijmcmc.334130","url":null,"abstract":"In this work, the authors propose a new biometric authentication system on mobile devices, enhancing security at these terminals and preserving user privacy. The proposed system uses a method of extracting strong features from minutiae with refinement of the method with regard to the further elimination of false minutiae by the calculation of geometric information (orientations and distances between minutiae) to obtain true terminations and stronger bifurcations facilitating the recognition of individuals. A series of tests carried out using a recognition and authentication application allowed us to achieve a false rejection rate of 13.81% and a false acceptance rate of almost zero (0.021%). The authors also propose a security model using hash functions and a random number to make the recognition system revocable, more difficult to compromise and thus reducing the risk of usurpation.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139226654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-20DOI: 10.38007/ijmc.2023.040110
{"title":"Reverse Chronology: The Nature of News Stories——Based on the Investigation of the Typical Reports of the Model of the Times","authors":"","doi":"10.38007/ijmc.2023.040110","DOIUrl":"https://doi.org/10.38007/ijmc.2023.040110","url":null,"abstract":"","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85678676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-19DOI: 10.38007/ijmc.2023.040109
Baifang Liu, Yingqi Jia
: With the progress of information technology and the popularity of the Internet, the traditional Accounting information system (AIS) has been unable to meet the growing information processing needs of enterprises. The traditional AIS has problems such as inconvenient data storage and sharing, low efficiency of information transmission, etc. The AIS based on computer network can effectively solve these problems. This paper aimed to study the design of AIS based on computer network to improve the efficiency and accuracy of enterprise financial management. This paper first introduced the importance of computer network in enterprise management and the application of AIS in modern enterprises. Then, this paper put forward the demand of using computer network technology to design and establish AIS, and expounded the advantages of computer network in realizing real-time sharing and collaborative processing of financial data. This paper put forward indicators to evaluate different design schemes in terms of performance, security and reliability, and emphasized the importance of security in the design of enterprise AIS. This paper was committed to providing reference for enterprises to select appropriate AIS design scheme based on computer network through research and experiment.
{"title":"Design of Accounting Information System Based on Computer Network","authors":"Baifang Liu, Yingqi Jia","doi":"10.38007/ijmc.2023.040109","DOIUrl":"https://doi.org/10.38007/ijmc.2023.040109","url":null,"abstract":": With the progress of information technology and the popularity of the Internet, the traditional Accounting information system (AIS) has been unable to meet the growing information processing needs of enterprises. The traditional AIS has problems such as inconvenient data storage and sharing, low efficiency of information transmission, etc. The AIS based on computer network can effectively solve these problems. This paper aimed to study the design of AIS based on computer network to improve the efficiency and accuracy of enterprise financial management. This paper first introduced the importance of computer network in enterprise management and the application of AIS in modern enterprises. Then, this paper put forward the demand of using computer network technology to design and establish AIS, and expounded the advantages of computer network in realizing real-time sharing and collaborative processing of financial data. This paper put forward indicators to evaluate different design schemes in terms of performance, security and reliability, and emphasized the importance of security in the design of enterprise AIS. This paper was committed to providing reference for enterprises to select appropriate AIS design scheme based on computer network through research and experiment.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81704627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-15DOI: 10.38007/ijmc.2023.040108
Shenze Li
: With the rapid development of information technology, data center network security issues have become increasingly complex and severe. In order to address this challenge, various information technology driven solutions have been proposed, aimed at improving the security performance of data center networks. This article will explore these solutions and provide relevant numerical data support. By comparing the performance of traditional and new solutions in key indicators such as attack detection rate, false alarm rate, response time, and number of security events, it can be seen that the new solution has achieved significant results in improving network security performance. For example, the attack detection rate of the new solution has reached 95%, which is a significant improvement compared to 75% of traditional solutions. At the same time, the false alarm rate has been reduced to 5%, with a decrease of 50% compared to the traditional solution of 10%. The background significance of information technology driven data center network security solutions is significant, and remarkable numerical results have been achieved in key indicators.
{"title":"Challenges and Solutions for Network Security in Data Centers Driven by Information Technology","authors":"Shenze Li","doi":"10.38007/ijmc.2023.040108","DOIUrl":"https://doi.org/10.38007/ijmc.2023.040108","url":null,"abstract":": With the rapid development of information technology, data center network security issues have become increasingly complex and severe. In order to address this challenge, various information technology driven solutions have been proposed, aimed at improving the security performance of data center networks. This article will explore these solutions and provide relevant numerical data support. By comparing the performance of traditional and new solutions in key indicators such as attack detection rate, false alarm rate, response time, and number of security events, it can be seen that the new solution has achieved significant results in improving network security performance. For example, the attack detection rate of the new solution has reached 95%, which is a significant improvement compared to 75% of traditional solutions. At the same time, the false alarm rate has been reduced to 5%, with a decrease of 50% compared to the traditional solution of 10%. The background significance of information technology driven data center network security solutions is significant, and remarkable numerical results have been achieved in key indicators.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74745922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article examines usability evaluation methodologies, then presents a non-conscious behavioral indicator based on user eye movements and pupil dilation. The authors test how gender and online buying history affect the behavioral index's usability scores. This study uses three Iranian online food retailers. Thirty participants were asked to add things from predetermined grocery stores to virtual shopping carts before the experiment took them to the other two websites in a random order to collect eye movement data. Each group's presentation order was randomized. The number of fixations, number of saccades, total duration of fixations, scan-path length, pupil size, and task time were inversely linked with self-report usability measures. This research evaluates groups with different levels of online shopping expertise and gender based on experienced usability. Differences between groups suggest that user demographics affect usability.
{"title":"Using Eye Tracking to Measure Overall Usability of Online Grocery Shopping Websites","authors":"A. B. Naeini, A. Mahdipour, Rasam Dorri","doi":"10.4018/ijmcmc.326129","DOIUrl":"https://doi.org/10.4018/ijmcmc.326129","url":null,"abstract":"This article examines usability evaluation methodologies, then presents a non-conscious behavioral indicator based on user eye movements and pupil dilation. The authors test how gender and online buying history affect the behavioral index's usability scores. This study uses three Iranian online food retailers. Thirty participants were asked to add things from predetermined grocery stores to virtual shopping carts before the experiment took them to the other two websites in a random order to collect eye movement data. Each group's presentation order was randomized. The number of fixations, number of saccades, total duration of fixations, scan-path length, pupil size, and task time were inversely linked with self-report usability measures. This research evaluates groups with different levels of online shopping expertise and gender based on experienced usability. Differences between groups suggest that user demographics affect usability.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74183747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper investigates generating machine color emotion through deep learning. The grayscale image colorization model's training process resembles human memory color. Sixty images were recolored and quality evaluated to explore machine generated color impressions. Six experimental samples were recolored under D65, A, CWF, and TL84 light sources. Changes in lightness, chroma, and hue angle compared the original and colorized images, exploring light source effects on machine color perception. Analyzing differences in coloring results within the CIEL* a* b* color space for pixels with equal grayscale verified machine color emotion generation. Results show the machine learns to form color impressions from samples. Different light source color temperatures impact color prediction accuracy. The machine accurately colors images based on semantic context, demonstrating spontaneous color emotion generation through deep learning. This research positively contributes to the development of intelligent devices with color emotion.
{"title":"Deep Learning-Based Machine Color Emotion Generation","authors":"Tongyao Nie, Xinguang Lv","doi":"10.4018/ijmcmc.325349","DOIUrl":"https://doi.org/10.4018/ijmcmc.325349","url":null,"abstract":"This paper investigates generating machine color emotion through deep learning. The grayscale image colorization model's training process resembles human memory color. Sixty images were recolored and quality evaluated to explore machine generated color impressions. Six experimental samples were recolored under D65, A, CWF, and TL84 light sources. Changes in lightness, chroma, and hue angle compared the original and colorized images, exploring light source effects on machine color perception. Analyzing differences in coloring results within the CIEL* a* b* color space for pixels with equal grayscale verified machine color emotion generation. Results show the machine learns to form color impressions from samples. Different light source color temperatures impact color prediction accuracy. The machine accurately colors images based on semantic context, demonstrating spontaneous color emotion generation through deep learning. This research positively contributes to the development of intelligent devices with color emotion.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84498651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}