首页 > 最新文献

網際網路技術學刊最新文献

英文 中文
A Construction of Knowledge Graph for Semiconductor Industry Chain Based on Lattice-LSTM and PCNN Models 基于 Lattice-LSTM 和 PCNN 模型的半导体产业链知识图谱构建
Pub Date : 2024-03-01 DOI: 10.53106/160792642024032502013
C. C. Charles Chen, Sai-Sai Shi Charles Chen, Sheng-Lung Peng Sai-Sai Shi
This paper mainly focuses on building the knowledge graph of semiconductor industry chain. The main research contents include knowledge extraction, knowledge storage, and construction of knowledge graph in semiconductor field. The crawler technology and character recognition technology are used to obtain semiconductor industry chain information from the Internet, magazines, and institutions to establish the original data set. Then, Lattice Long Short-Term Memory (Lattice-LSTM) model is used to implement the entity extraction and recognition. The piecewise convolutional neural network (PCNN) model based on the sentence-level attention mechanism is used to extract relationships and obtain entity triples. The semiconductor dictionary library is constructed through the obtained structured data. The dictionary library and Chinese natural language toolkit HanLP are combined to annotate unstructured text data for knowledge extraction. Neo4j graph database is used to store the extracted data of semiconductor industry chain. Finally, Spring Boot and Vue technology are used to create a knowledge graph system. 
本文主要关注半导体产业链知识图谱的构建。主要研究内容包括半导体领域的知识提取、知识存储和知识图谱构建。利用爬虫技术和字符识别技术从互联网、杂志和机构中获取半导体产业链信息,建立原始数据集。然后,使用 Lattice Long Short-Term Memory(Lattice-LSTM)模型实现实体提取和识别。基于句子级关注机制的片断卷积神经网络(PCNN)模型用于提取关系并获得实体三元组。通过获得的结构化数据构建半导体词典库。字典库与中文自然语言工具包 HanLP 相结合,对非结构化文本数据进行注释,以提取知识。使用 Neo4j 图数据库存储提取的半导体产业链数据。最后,使用 Spring Boot 和 Vue 技术创建知识图谱系统。
{"title":"A Construction of Knowledge Graph for Semiconductor Industry Chain Based on Lattice-LSTM and PCNN Models","authors":"C. C. Charles Chen, Sai-Sai Shi Charles Chen, Sheng-Lung Peng Sai-Sai Shi","doi":"10.53106/160792642024032502013","DOIUrl":"https://doi.org/10.53106/160792642024032502013","url":null,"abstract":"\u0000 This paper mainly focuses on building the knowledge graph of semiconductor industry chain. The main research contents include knowledge extraction, knowledge storage, and construction of knowledge graph in semiconductor field. The crawler technology and character recognition technology are used to obtain semiconductor industry chain information from the Internet, magazines, and institutions to establish the original data set. Then, Lattice Long Short-Term Memory (Lattice-LSTM) model is used to implement the entity extraction and recognition. The piecewise convolutional neural network (PCNN) model based on the sentence-level attention mechanism is used to extract relationships and obtain entity triples. The semiconductor dictionary library is constructed through the obtained structured data. The dictionary library and Chinese natural language toolkit HanLP are combined to annotate unstructured text data for knowledge extraction. Neo4j graph database is used to store the extracted data of semiconductor industry chain. Finally, Spring Boot and Vue technology are used to create a knowledge graph system.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"49 44","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140400554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing a Multi-Criteria Decision-Making Framework to Establish a Value Ranking System for the Quality Evaluation of Long-Term Care Services 设计多标准决策框架,为长期护理服务质量评估建立价值排序系统
Pub Date : 2024-03-01 DOI: 10.53106/160792642024032502010
Lun-Ping Hung Lun-Ping Hung, Weidong Huang Lun-Ping Hung, Sheng-Tzong Cheng Weidong Huang, Zong-Jie Wu Sheng-Tzong Cheng, Syuan Ou Yang Zong-Jie Wu
Various levels of government across Taiwan are eager to promote the establishment of long-term care residential facilities to meet the significant caregiving needs arising from the wave of population aging. However, the successful establishment of an effective mechanism relies on proper supervision and guidance. Therefore, implementing a value assessment system for long-term care service quality management is of paramount importance. Using multi-criteria decision-making (MCDM) approach can provide effective conditions for the establishment of such system and enable a more comprehensive and objective evaluation of long-term care service quality. Using this system, decision-makers can incorporate different indicators based on various needs and weights to evaluate the quality and performance of long-term care services. This facilitates the determination of priorities and the formulation of improvement strategies, thereby enhancing the quality of long-term care services. This study develops an information-based assessment model for a platform that is win-win for both institutions and individuals. The model incorporates consumer reputation and environmental social governance (ESG) dimensions, in addition to indicators such as operational and management efficiency, professional care quality, safety and environmental facilities, and protection of individual rights and interests. Further, it integrates multiple indicator items and employs the analytic hierarchy process (AHP) to decompose and structure complex multi-dimensional issues, thereby aligning itself with current corporate evaluations. It aims to assist care service agencies in making key service quality decisions across different dimensions, and enhance the overall quality and competitiveness of those agencies, while increasing public trust and recognition in the evaluation of care service quality. 
台湾各级政府迫切希望推动建立长期护理住宅设施,以满足人口老龄化浪潮带来的巨大护理需求。然而,有效机制的成功建立有赖于正确的监督与引导。因此,实施长期护理服务质量管理的价值评估体系至关重要。多标准决策(MCDM)方法可以为这一体系的建立提供有效的条件,使长期护理服务质量的评价更加全面客观。利用这一系统,决策者可以根据不同的需求和权重纳入不同的指标,对长期护理服务的质量和绩效进行评估。这有助于确定工作重点和制定改进策略,从而提高长期护理服务的质量。本研究为机构和个人双赢的平台开发了一个基于信息的评估模型。除运营管理效率、专业护理质量、安全环保设施、个人权益保护等指标外,该模型还纳入了消费者口碑和环境社会治理(ESG)维度。此外,它还整合了多个指标项目,并采用层次分析法(AHP)对复杂的多维度问题进行分解和结构化,从而与当前的企业评估保持一致。其目的是帮助护理服务机构在不同维度上做出关键的服务质量决策,提升机构的整体质量和竞争力,同时提高公众对护理服务质量评价的信任度和认可度。
{"title":"Designing a Multi-Criteria Decision-Making Framework to Establish a Value Ranking System for the Quality Evaluation of Long-Term Care Services","authors":"Lun-Ping Hung Lun-Ping Hung, Weidong Huang Lun-Ping Hung, Sheng-Tzong Cheng Weidong Huang, Zong-Jie Wu Sheng-Tzong Cheng, Syuan Ou Yang Zong-Jie Wu","doi":"10.53106/160792642024032502010","DOIUrl":"https://doi.org/10.53106/160792642024032502010","url":null,"abstract":"\u0000 Various levels of government across Taiwan are eager to promote the establishment of long-term care residential facilities to meet the significant caregiving needs arising from the wave of population aging. However, the successful establishment of an effective mechanism relies on proper supervision and guidance. Therefore, implementing a value assessment system for long-term care service quality management is of paramount importance. Using multi-criteria decision-making (MCDM) approach can provide effective conditions for the establishment of such system and enable a more comprehensive and objective evaluation of long-term care service quality. Using this system, decision-makers can incorporate different indicators based on various needs and weights to evaluate the quality and performance of long-term care services. This facilitates the determination of priorities and the formulation of improvement strategies, thereby enhancing the quality of long-term care services. This study develops an information-based assessment model for a platform that is win-win for both institutions and individuals. The model incorporates consumer reputation and environmental social governance (ESG) dimensions, in addition to indicators such as operational and management efficiency, professional care quality, safety and environmental facilities, and protection of individual rights and interests. Further, it integrates multiple indicator items and employs the analytic hierarchy process (AHP) to decompose and structure complex multi-dimensional issues, thereby aligning itself with current corporate evaluations. It aims to assist care service agencies in making key service quality decisions across different dimensions, and enhance the overall quality and competitiveness of those agencies, while increasing public trust and recognition in the evaluation of care service quality.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"221 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140402790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TV-ADS: A Smarter Attack Detection Scheme Based on Traffic Visualization of Wireless Network Event Cell TV-ADS:基于无线网络事件单元流量可视化的更智能攻击检测方案
Pub Date : 2024-03-01 DOI: 10.53106/160792642024032502012
Zhiwei Zhang Zhiwei Zhang, Guiyuan Tang Zhiwei Zhang, Baoquan Ren Guiyuan Tang, Baoquan Ren Baoquan Ren, Yulong Shen Baoquan Ren
To protect the increasing cyberspace assets, attack detection systems (ADSs) as well as intrusion detection systems (IDSs) have been equipped in various network environments. Recently, with the development of big data, machine learning, deep learning, neural networks and other artificial intelligence (AI) technologies, more and more ADSs/IDSs based on Artificial Intelligence are presented in academia and industry. Particularly, depending on the outstanding performance and efficiency in recognizing and classifying images, computer vision algorithms have been employed to detect malicious software and malicious traffic. However, we found that in wireless networks, the results vary significantly depending on the mapping methods used to transform the original network traffic data into visual images. Therefore, in this paper, we propose an AI-based attack detection scheme (TV-ADS) by introducing a novel traffic-image mapping method, which segments the sequential network traffic into individual event cells and transforms variant images to a uniform standard size, and design a CNN model to recognize normal and malicious traffics with these visible network event images. Finally, the results of our experiments on the AWID3 dataset demonstrate that our TV-ADS outperforms the existing schemes in terms of accuracy, precision, recall, F1-score and efficiency. 
为了保护日益增长的网络空间资产,各种网络环境中都配备了攻击检测系统(ADS)和入侵检测系统(IDS)。近年来,随着大数据、机器学习、深度学习、神经网络等人工智能(AI)技术的发展,学术界和工业界出现了越来越多基于人工智能的 ADS/IDS。尤其是计算机视觉算法,凭借其在图像识别和分类方面的出色性能和效率,已被用于检测恶意软件和恶意流量。然而,我们发现,在无线网络中,将原始网络流量数据转换为可视图像的映射方法不同,结果也大相径庭。因此,在本文中,我们提出了一种基于人工智能的攻击检测方案(TV-ADS),它引入了一种新颖的流量-图像映射方法,将连续的网络流量分割成单个事件单元,并将变体图像转换为统一的标准尺寸,同时设计了一个 CNN 模型,利用这些可见的网络事件图像识别正常和恶意流量。最后,我们在 AWID3 数据集上的实验结果表明,我们的 TV-ADS 在准确度、精确度、召回率、F1 分数和效率方面都优于现有方案。
{"title":"TV-ADS: A Smarter Attack Detection Scheme Based on Traffic Visualization of Wireless Network Event Cell","authors":"Zhiwei Zhang Zhiwei Zhang, Guiyuan Tang Zhiwei Zhang, Baoquan Ren Guiyuan Tang, Baoquan Ren Baoquan Ren, Yulong Shen Baoquan Ren","doi":"10.53106/160792642024032502012","DOIUrl":"https://doi.org/10.53106/160792642024032502012","url":null,"abstract":"\u0000 To protect the increasing cyberspace assets, attack detection systems (ADSs) as well as intrusion detection systems (IDSs) have been equipped in various network environments. Recently, with the development of big data, machine learning, deep learning, neural networks and other artificial intelligence (AI) technologies, more and more ADSs/IDSs based on Artificial Intelligence are presented in academia and industry. Particularly, depending on the outstanding performance and efficiency in recognizing and classifying images, computer vision algorithms have been employed to detect malicious software and malicious traffic. However, we found that in wireless networks, the results vary significantly depending on the mapping methods used to transform the original network traffic data into visual images. Therefore, in this paper, we propose an AI-based attack detection scheme (TV-ADS) by introducing a novel traffic-image mapping method, which segments the sequential network traffic into individual event cells and transforms variant images to a uniform standard size, and design a CNN model to recognize normal and malicious traffics with these visible network event images. Finally, the results of our experiments on the AWID3 dataset demonstrate that our TV-ADS outperforms the existing schemes in terms of accuracy, precision, recall, F1-score and efficiency.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"201 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140403411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Navigating Online Learning Satisfaction in the Age of COVID-19: An Examination of Key Influencing Factors COVID-19 时代的在线学习满意度导航:关键影响因素研究
Pub Date : 2024-03-01 DOI: 10.53106/160792642024032502002
Hyeon Jo Hyeon Jo, Eun-Mi Baek Hyeon Jo
This study explores the key factors determining the success of online learning during the COVID-19 isolation. The analytical framework clarifies the role of social distancing attitude, social distancing intention, attitude towards online learning, and perceived value in developing user satisfaction. The research model was validated by fitting data gathered from 490 students in Asian countries through structural equation modeling (SEM). The results indicated that both social distancing attitude and social distancing intention do not have a significant impact on user satisfaction. The findings showed that both attitude and perceived value are significantly associated with user satisfaction. Risk perception affects social distancing attitude, attitude toward online learning, and perceived value. However, it does not impact social distancing intention. Cabin fever syndrome positively affects social distancing attitude while it negatively influences social distancing intention. The results would help to understand online learning success and to improve education strategies, explained by students’ perception of COVID-19. 
本研究探讨了决定 COVID-19 隔离期间在线学习成功与否的关键因素。分析框架阐明了社会疏远态度、社会疏远意向、在线学习态度和感知价值在提高用户满意度方面的作用。研究模型通过结构方程建模(SEM)对从亚洲国家 490 名学生收集的数据进行了拟合验证。结果表明,社会疏远态度和社会疏远意向对用户满意度没有显著影响。研究结果表明,态度和感知价值与用户满意度有明显关联。风险感知会影响社会疏远态度、在线学习态度和感知价值。然而,它并不影响社会疏远意向。客舱热综合症会对社会疏远态度产生积极影响,而对社会疏远意向产生消极影响。研究结果将有助于理解在线学习的成功,并通过学生对 COVID-19 的感知来改进教育策略。
{"title":"Navigating Online Learning Satisfaction in the Age of COVID-19: An Examination of Key Influencing Factors","authors":"Hyeon Jo Hyeon Jo, Eun-Mi Baek Hyeon Jo","doi":"10.53106/160792642024032502002","DOIUrl":"https://doi.org/10.53106/160792642024032502002","url":null,"abstract":"\u0000 This study explores the key factors determining the success of online learning during the COVID-19 isolation. The analytical framework clarifies the role of social distancing attitude, social distancing intention, attitude towards online learning, and perceived value in developing user satisfaction. The research model was validated by fitting data gathered from 490 students in Asian countries through structural equation modeling (SEM). The results indicated that both social distancing attitude and social distancing intention do not have a significant impact on user satisfaction. The findings showed that both attitude and perceived value are significantly associated with user satisfaction. Risk perception affects social distancing attitude, attitude toward online learning, and perceived value. However, it does not impact social distancing intention. Cabin fever syndrome positively affects social distancing attitude while it negatively influences social distancing intention. The results would help to understand online learning success and to improve education strategies, explained by students’ perception of COVID-19.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"83 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140405295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vehicle Identity Anonymity Framework with Accountability for VANET Environment 针对 VANET 环境的具有问责制的车辆身份匿名性框架
Pub Date : 2024-03-01 DOI: 10.53106/160792642024032502009
Nai-Wei Lo Nai-Wei Lo, Chi-Ying Chuang Nai-Wei Lo, Jia-Ning Luo Chi-Ying Chuang, Chong-Long Yang Jia-Ning Luo
In recent years, there has been rapid development in vehicle safety technology, with the emergence of various active safety systems including blind spot information systems, adaptive cruise control, and front collision warning systems. Simultaneously, car manufacturers and technology companies are actively exploring technologies in the realm of autonomous driving. To facilitate such applications, vehicles are required to communicate with each other, exchanging vital information such as position, speed, and acceleration. However, this exchange of information poses a potential risk of drivers’ personal data being compromised. For safety purposes, vehicles must undergo appropriate authentication before engaging in communication with other vehicles. Ensuring this authentication process maintains the anonymity of the vehicles is crucial. Yet, striking a balance between protecting vehicle anonymity and enabling vehicle identification when necessary remains a challenging issue. This paper introduces a multi-tier Vehicular Ad-Hoc Network (VANET) framework designed to uphold the conditional anonymity and traceability of vehicles. The implementation of a group signature mechanism facilitates anonymous authentication, thereby enabling the realization of conditional anonymity and traceability. Moreover, comprehensive simulations and security analyses were conducted to validate the effectiveness of the proposed framework, demonstrating its efficiency while incorporating robust safety considerations. 
近年来,汽车安全技术发展迅速,出现了各种主动安全系统,包括盲点信息系统、自适应巡航控制系统和前碰撞预警系统。与此同时,汽车制造商和技术公司也在积极探索自动驾驶领域的技术。为促进此类应用,车辆之间需要相互通信,交换位置、速度和加速度等重要信息。然而,这种信息交换存在驾驶员个人数据被泄露的潜在风险。为了安全起见,车辆在与其他车辆进行通信之前必须经过适当的身份验证。确保这一认证过程能够维护车辆的匿名性至关重要。然而,如何在保护车辆匿名性和必要时进行车辆识别之间取得平衡仍然是一个具有挑战性的问题。本文介绍了一种多层车载 Ad-Hoc 网络(VANET)框架,旨在维护车辆的条件匿名性和可追溯性。群签名机制的实施促进了匿名认证,从而实现了有条件的匿名性和可追溯性。此外,还进行了全面的模拟和安全分析,以验证所提框架的有效性,从而证明其高效性,同时纳入了稳健的安全考虑因素。
{"title":"Vehicle Identity Anonymity Framework with Accountability for VANET Environment","authors":"Nai-Wei Lo Nai-Wei Lo, Chi-Ying Chuang Nai-Wei Lo, Jia-Ning Luo Chi-Ying Chuang, Chong-Long Yang Jia-Ning Luo","doi":"10.53106/160792642024032502009","DOIUrl":"https://doi.org/10.53106/160792642024032502009","url":null,"abstract":"\u0000 In recent years, there has been rapid development in vehicle safety technology, with the emergence of various active safety systems including blind spot information systems, adaptive cruise control, and front collision warning systems. Simultaneously, car manufacturers and technology companies are actively exploring technologies in the realm of autonomous driving. To facilitate such applications, vehicles are required to communicate with each other, exchanging vital information such as position, speed, and acceleration. However, this exchange of information poses a potential risk of drivers’ personal data being compromised. For safety purposes, vehicles must undergo appropriate authentication before engaging in communication with other vehicles. Ensuring this authentication process maintains the anonymity of the vehicles is crucial. Yet, striking a balance between protecting vehicle anonymity and enabling vehicle identification when necessary remains a challenging issue. This paper introduces a multi-tier Vehicular Ad-Hoc Network (VANET) framework designed to uphold the conditional anonymity and traceability of vehicles. The implementation of a group signature mechanism facilitates anonymous authentication, thereby enabling the realization of conditional anonymity and traceability. Moreover, comprehensive simulations and security analyses were conducted to validate the effectiveness of the proposed framework, demonstrating its efficiency while incorporating robust safety considerations.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"12 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140404412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Compact Depth Separable Convolutional Image Filter for Clinical Color Perception Test 用于临床色觉测试的紧凑型深度可分离卷积图像滤波器
Pub Date : 2024-03-01 DOI: 10.53106/160792642024032502014
Zheyi Wen Zheyi Wen, Chenlu Ye Zheyi Wen, Ming Zhao Chenlu Ye, Fang-Chuan Ou Yang Ming Zhao
Deep convolutional neural networks have achieved good performance in the application of computer vision, but there are also problems, such as a large amount of computation, time consuming, and high memory demand. In this paper, a depthwise separable convolution filter pruning method based on PCA is proposed. First, this paper uses depthwise separable convolution to replace the conventional convolution in ResNet to reduce the number of parameters and the amount of computation in the network. The specific operation process is to first use depthwise convolution to separate the spatial dimension to increase the network width and expand the range of feature extraction, and then use pointwise convolution to reduce the computational complexity of conventional convolution operation. Second, PCA is used to distinguish stacked similar filters and perform dimensionality reduction, which not only alleviates the dimensional disaster, but also achieves compression of data and minimizes information loss. Experimental results show that this method can significantly improve the calculation speed and accuracy of the deep convolutional neural network model, and further compress the model size. On the clinical Color Perception Test Chart, this method reduced the amount of model parameters and MACs on ResNet by about 91% while maintaining the test accuracy at about 95%. With almost no loss of accuracy, this method greatly shortened the running time of the model. 
深度卷积神经网络在计算机视觉应用中取得了良好的性能,但也存在计算量大、耗时长、内存需求高等问题。本文提出了一种基于 PCA 的深度可分离卷积滤波器剪枝方法。首先,本文在 ResNet 中使用深度可分离卷积代替传统卷积,以减少网络中的参数数量和计算量。具体操作过程是先利用深度卷积分离空间维度,增加网络宽度,扩大特征提取范围,再利用点状卷积降低传统卷积操作的计算复杂度。其次,利用 PCA 区分堆叠的相似滤波器,进行降维处理,既缓解了维度灾难,又实现了数据压缩,将信息损失降到最低。实验结果表明,该方法能显著提高深度卷积神经网络模型的计算速度和准确性,并进一步压缩模型大小。在临床颜色感知测试图中,该方法将 ResNet 的模型参数和澳门威尼斯人官网具数量减少了约 91%,而测试准确率却保持在 95% 左右。在几乎不损失准确度的情况下,该方法大大缩短了模型的运行时间。
{"title":"A Compact Depth Separable Convolutional Image Filter for Clinical Color Perception Test","authors":"Zheyi Wen Zheyi Wen, Chenlu Ye Zheyi Wen, Ming Zhao Chenlu Ye, Fang-Chuan Ou Yang Ming Zhao","doi":"10.53106/160792642024032502014","DOIUrl":"https://doi.org/10.53106/160792642024032502014","url":null,"abstract":"\u0000 Deep convolutional neural networks have achieved good performance in the application of computer vision, but there are also problems, such as a large amount of computation, time consuming, and high memory demand. In this paper, a depthwise separable convolution filter pruning method based on PCA is proposed. First, this paper uses depthwise separable convolution to replace the conventional convolution in ResNet to reduce the number of parameters and the amount of computation in the network. The specific operation process is to first use depthwise convolution to separate the spatial dimension to increase the network width and expand the range of feature extraction, and then use pointwise convolution to reduce the computational complexity of conventional convolution operation. Second, PCA is used to distinguish stacked similar filters and perform dimensionality reduction, which not only alleviates the dimensional disaster, but also achieves compression of data and minimizes information loss. Experimental results show that this method can significantly improve the calculation speed and accuracy of the deep convolutional neural network model, and further compress the model size. On the clinical Color Perception Test Chart, this method reduced the amount of model parameters and MACs on ResNet by about 91% while maintaining the test accuracy at about 95%. With almost no loss of accuracy, this method greatly shortened the running time of the model.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"24 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140399773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable Authenticated Communication in Drone Swarm Environment 无人机群环境中的可扩展认证通信
Pub Date : 2024-03-01 DOI: 10.53106/160792642024032502008
Kyusuk Han Kyusuk Han, Eiman Al Nuaimi Kyusuk Han, Shamma Al Blooshi Eiman Al Nuaimi, Rafail Psiakis Shamma Al Blooshi, Chan Yeob Yeun Rafail Psiakis
The drone swarm is a preferable way to deploy many drones for large-scale missions. Establishing secure communication among drones in drone swarms is essential as the fog drone controls all other edge drones in the swarm. Although many researchers proposed methods of authenticating drones, most of them are unsuitable for use in swarm environments as they require either the ground station during the authentication or expensive PKI-based crypto operations with limited flexibility and scalability. In this work, we propose an efficient and scalable authentication protocol for drone swarm environments, enabling mutual authentication between fog and edge drones without involving the ground station. Moreover, we show that the protocol enables the verification of the sender in group communication. Protocol evaluations show security requirements satisfaction while achieving 14 - 20 times less computation overhead as compared to PKI-based models.​​ 
无人机群是部署多架无人机执行大规模任务的理想方式。在无人机群中建立无人机之间的安全通信至关重要,因为雾无人机可以控制无人机群中的所有其他边缘无人机。虽然许多研究人员都提出了无人机身份验证方法,但大多数方法都不适合在无人机群环境中使用,因为它们在身份验证过程中需要地面站或昂贵的基于 PKI 的加密操作,而且灵活性和可扩展性有限。在这项工作中,我们为无人机群环境提出了一种高效、可扩展的认证协议,无需地面站的参与,即可实现雾区和边缘无人机之间的相互认证。此外,我们还展示了该协议在群组通信中验证发送方的功能。协议评估显示,与基于 PKI 的模型相比,在满足安全要求的同时,计算开销减少了 14-20 倍。
{"title":"Scalable Authenticated Communication in Drone Swarm Environment","authors":"Kyusuk Han Kyusuk Han, Eiman Al Nuaimi Kyusuk Han, Shamma Al Blooshi Eiman Al Nuaimi, Rafail Psiakis Shamma Al Blooshi, Chan Yeob Yeun Rafail Psiakis","doi":"10.53106/160792642024032502008","DOIUrl":"https://doi.org/10.53106/160792642024032502008","url":null,"abstract":"\u0000 The drone swarm is a preferable way to deploy many drones for large-scale missions. Establishing secure communication among drones in drone swarms is essential as the fog drone controls all other edge drones in the swarm. Although many researchers proposed methods of authenticating drones, most of them are unsuitable for use in swarm environments as they require either the ground station during the authentication or expensive PKI-based crypto operations with limited flexibility and scalability. In this work, we propose an efficient and scalable authentication protocol for drone swarm environments, enabling mutual authentication between fog and edge drones without involving the ground station. Moreover, we show that the protocol enables the verification of the sender in group communication. Protocol evaluations show security requirements satisfaction while achieving 14 - 20 times less computation overhead as compared to PKI-based models.​​\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"64 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140403358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A User-friendly Cloud-based Multi-agent Information System for Smart Energy-saving 基于云的智能节能多代理信息系统,方便用户使用
Pub Date : 2024-03-01 DOI: 10.53106/160792642024032502011
Yi-Jen Su Yi-Jen Su, Sheng-Yuan Yang Yi-Jen Su
The study focused on leveraging artificial intelligence (AI) for efficient energy conservation in scientific applications. The proposed cloud-based multi-agent system merges various intelligent technologies to swiftly gather high-quality cloud data for effective smart energy-saving. Incorporating case-based reasoning (CBR), big data analysis, and intelligent user interfaces as key functionalities, the system utilized Web services, ontology, open data, and data mining. It expanded on the practical advancements of the multi-agent Dr. What-Info system for information collection. A Web services platform seamlessly gathers cloud interactions among subagents processing energy-saving data. Rigorous performance and operational experiments were conducted to demonstrate the efficiency and effectiveness of the system interface, offering detailed insights into relevant R&D technologies and outcomes. 
研究重点是利用人工智能(AI)在科学应用中实现高效节能。所提出的基于云的多代理系统融合了各种智能技术,可迅速收集高质量的云数据,从而实现有效的智能节能。该系统的主要功能包括基于案例的推理(CBR)、大数据分析和智能用户界面,并利用了网络服务、本体论、开放数据和数据挖掘。该系统在多代理 What-Info 博士信息收集系统的基础上取得了实际进展。网络服务平台无缝收集了处理节能数据的子代理之间的云互动。为证明系统界面的效率和有效性,进行了严格的性能和操作实验,对相关研发技术和成果提供了详细的见解。
{"title":"A User-friendly Cloud-based Multi-agent Information System for Smart Energy-saving","authors":"Yi-Jen Su Yi-Jen Su, Sheng-Yuan Yang Yi-Jen Su","doi":"10.53106/160792642024032502011","DOIUrl":"https://doi.org/10.53106/160792642024032502011","url":null,"abstract":"\u0000 The study focused on leveraging artificial intelligence (AI) for efficient energy conservation in scientific applications. The proposed cloud-based multi-agent system merges various intelligent technologies to swiftly gather high-quality cloud data for effective smart energy-saving. Incorporating case-based reasoning (CBR), big data analysis, and intelligent user interfaces as key functionalities, the system utilized Web services, ontology, open data, and data mining. It expanded on the practical advancements of the multi-agent Dr. What-Info system for information collection. A Web services platform seamlessly gathers cloud interactions among subagents processing energy-saving data. Rigorous performance and operational experiments were conducted to demonstrate the efficiency and effectiveness of the system interface, offering detailed insights into relevant R&D technologies and outcomes.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"94 S2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140405599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized Object Detection Based on The Improved Lightweight Model Mini Net 基于改进型轻量级模型迷你网的优化物体检测
Pub Date : 2024-03-01 DOI: 10.53106/160792642024032502005
Qi Chen Qi Chen, Xinyi Gao Qi Chen, Renjie Li Xinyi Gao, Yong Zhang Renjie Li
This paper proposes a Mini Net lightweight model that can be used for real-time detection. This model works together with Mini Lower and Mini Higher, which greatly improves the detection efficiency while ensuring the accuracy. The Mini module designs both the batch normalization layer and the excitation function at the front end of the module, which realizes efficient convolution, greatly reduces the amount of parameters and computation, and introduces the nonlinearity brought by more layers in the spatial dimension, which can improve the performance of the module extraction capacity. Based on the Mini convolution module, a multi-stage training strategy is proposed. The first stage makes the system fast and stable. In order to improve the overfitting phenomenon of the system, the second and third stages use finer features to improve the detection of small targets, thereby improving the Model training efficiency and detection accuracy. 
本文提出了一种可用于实时检测的 Mini Net 轻量级模型。该模型与 Mini Lower 和 Mini Higher 配合使用,在保证准确性的同时大大提高了检测效率。Mini 模块在模块前端同时设计了批量归一化层和激励函数,实现了高效卷积,大大减少了参数量和计算量,并在空间维度上引入了多层带来的非线性,可以提高模块提取能力的表现。在迷你卷积模块的基础上,提出了多阶段训练策略。第一阶段使系统快速稳定。为了改善系统的过拟合现象,第二和第三阶段使用更精细的特征来提高对小目标的检测能力,从而提高模型训练效率和检测精度。
{"title":"Optimized Object Detection Based on The Improved Lightweight Model Mini Net","authors":"Qi Chen Qi Chen, Xinyi Gao Qi Chen, Renjie Li Xinyi Gao, Yong Zhang Renjie Li","doi":"10.53106/160792642024032502005","DOIUrl":"https://doi.org/10.53106/160792642024032502005","url":null,"abstract":"\u0000 This paper proposes a Mini Net lightweight model that can be used for real-time detection. This model works together with Mini Lower and Mini Higher, which greatly improves the detection efficiency while ensuring the accuracy. The Mini module designs both the batch normalization layer and the excitation function at the front end of the module, which realizes efficient convolution, greatly reduces the amount of parameters and computation, and introduces the nonlinearity brought by more layers in the spatial dimension, which can improve the performance of the module extraction capacity. Based on the Mini convolution module, a multi-stage training strategy is proposed. The first stage makes the system fast and stable. In order to improve the overfitting phenomenon of the system, the second and third stages use finer features to improve the detection of small targets, thereby improving the Model training efficiency and detection accuracy.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"21 84","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140406031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Dynamic Analysis for Android Malware Protected by Anti-Analysis Techniques with DOOLDA 用 DOOLDA 对受反分析技术保护的安卓恶意软件进行混合动态分析
Pub Date : 2024-03-01 DOI: 10.53106/160792642024032502003
Sunjun Lee Sunjun Lee, Yonggu Shin Sunjun Lee, Minseong Choi Yonggu Shin, Haehyun Cho Minseong Choi, Jeong Hyun Yi Haehyun Cho
A lot of the recently reported malware is equipped with the anti-analysis techniques (e.g., anti-emulation, anti-debugging, etc.) for preventing from being the analyzed, which can delay detection and make malware alive for a longer period. Therefore, it is of the great importance of developing automated approaches to defeat such anti-analysis techniques so that we can handle and effectively mitigate numerous malware. In this paper, by analyzing 1,535 malicious applications, we found that 18.31% of them equipped with anti-analysis techniques. Next, we propose a novel, dynamic analyzer, named DOOLDA, for automatically invalidating anti-analysis techniques through dynamic instrumentation. DOOLDA monitors executions of Android applications’ entire code layers (i.e., bytecode and native code). Based on monitoring results, DOOLDA finds the code related to anti-analysis techniques and invalidates the anti-analysis techniques by instrumenting it. To demonstrate the effectiveness of DOOLDA, we show that it can invalidate all known anti-analysis techniques. Also, we compare DOOLDA with other dynamic analyzers. 
最近报告的许多恶意软件都配备了反分析技术(如反仿真、反调试等),以防止被分析,这可能会延迟检测并使恶意软件存活更长时间。因此,开发自动方法来破解这些反分析技术,以便我们能够处理和有效缓解众多恶意软件,就显得尤为重要。本文通过分析 1,535 个恶意应用程序,发现其中 18.31% 的应用程序配备了反分析技术。接下来,我们提出了一种名为 DOOLDA 的新型动态分析器,用于通过动态仪器自动失效反分析技术。DOOLDA 监控 Android 应用程序整个代码层(即字节码和本地代码)的执行情况。根据监控结果,DOOLDA 找到与反分析技术相关的代码,并通过仪器化使反分析技术失效。为了证明 DOOLDA 的有效性,我们展示了它可以使所有已知的反分析技术失效。此外,我们还将 DOOLDA 与其他动态分析器进行了比较。
{"title":"Hybrid Dynamic Analysis for Android Malware Protected by Anti-Analysis Techniques with DOOLDA","authors":"Sunjun Lee Sunjun Lee, Yonggu Shin Sunjun Lee, Minseong Choi Yonggu Shin, Haehyun Cho Minseong Choi, Jeong Hyun Yi Haehyun Cho","doi":"10.53106/160792642024032502003","DOIUrl":"https://doi.org/10.53106/160792642024032502003","url":null,"abstract":"\u0000 A lot of the recently reported malware is equipped with the anti-analysis techniques (e.g., anti-emulation, anti-debugging, etc.) for preventing from being the analyzed, which can delay detection and make malware alive for a longer period. Therefore, it is of the great importance of developing automated approaches to defeat such anti-analysis techniques so that we can handle and effectively mitigate numerous malware. In this paper, by analyzing 1,535 malicious applications, we found that 18.31% of them equipped with anti-analysis techniques. Next, we propose a novel, dynamic analyzer, named DOOLDA, for automatically invalidating anti-analysis techniques through dynamic instrumentation. DOOLDA monitors executions of Android applications’ entire code layers (i.e., bytecode and native code). Based on monitoring results, DOOLDA finds the code related to anti-analysis techniques and invalidates the anti-analysis techniques by instrumenting it. To demonstrate the effectiveness of DOOLDA, we show that it can invalidate all known anti-analysis techniques. Also, we compare DOOLDA with other dynamic analyzers.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"52 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140400317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
網際網路技術學刊
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1