首页 > 最新文献

網際網路技術學刊最新文献

英文 中文
Study on Shadow Detection of World View-II Remote Sensing Image Based on Band Standardization 基于波段标准化的World View-II遥感图像阴影检测研究
Pub Date : 2023-05-01 DOI: 10.53106/160792642023052403003
Junwei Xin Junwei Xin, Xiaoyong Chen Junwei Xin, Zixin Liu Xiaoyong Chen, Yan Luo Zixin Liu, Zhenxing Liu Yan Luo
This paper presents a valid shadow detection method subjected to WorldView-II remote images combining band standardization with principal component transformation algorithm. Eight bands among The WorldView-II image, each band indicates a specified range of values. Firstly, each band is standardized to the same scale, then utilizing three optimal bands forms a new single band. According to the characteristics of principal component, if the gray value of dark material is positive, just take it for granted, which will be used in next operation. Once the gray value is negative, it will be inverted comparing with the former. In this study, selecting the above adaption builds up an advanced shadow index. Experimental results show that the shadow index can distinguish the shadow from other objects effectively, such as water in high brightness, vegetation, roads, buildings. Meanwhile, there is no significant difference between the water in low brightness and high when using the shadow index. To cope with this problem, we propose an advanced water index based on the normalized differential water index, which is constructed to eliminate the interference of water in low brightness. Results indicate that the indexes can accurately distinguish shadow regions in the WorldView-II image data. 
本文提出了一种结合波段标准化和主成分变换算法的有效的WorldView-II遥感图像阴影检测方法。在WorldView-II图像中有8个波段,每个波段表示一个指定的值范围。首先,将每个波段标准化到相同的尺度,然后利用三个最优波段组成一个新的单一波段。根据主成分的特点,如果暗料的灰度值为正,则视为理所当然,将在下一步操作中使用。一旦灰度值为负,则与前者相比会发生倒转。在本研究中,选择上述自适应建立了一个先进的阴影指数。实验结果表明,阴影指数可以有效地区分高亮度水体、植被、道路、建筑物等物体的阴影。同时,在使用阴影指数时,低亮度和高亮度的水之间没有显著差异。为了解决这一问题,我们提出了一种基于归一化差分水指数的高级水指数,该指数是为了消除低亮度水的干扰而构造的。结果表明,这些指标能够准确区分WorldView-II图像数据中的阴影区域。
{"title":"Study on Shadow Detection of World View-II Remote Sensing Image Based on Band Standardization","authors":"Junwei Xin Junwei Xin, Xiaoyong Chen Junwei Xin, Zixin Liu Xiaoyong Chen, Yan Luo Zixin Liu, Zhenxing Liu Yan Luo","doi":"10.53106/160792642023052403003","DOIUrl":"https://doi.org/10.53106/160792642023052403003","url":null,"abstract":"\u0000 This paper presents a valid shadow detection method subjected to WorldView-II remote images combining band standardization with principal component transformation algorithm. Eight bands among The WorldView-II image, each band indicates a specified range of values. Firstly, each band is standardized to the same scale, then utilizing three optimal bands forms a new single band. According to the characteristics of principal component, if the gray value of dark material is positive, just take it for granted, which will be used in next operation. Once the gray value is negative, it will be inverted comparing with the former. In this study, selecting the above adaption builds up an advanced shadow index. Experimental results show that the shadow index can distinguish the shadow from other objects effectively, such as water in high brightness, vegetation, roads, buildings. Meanwhile, there is no significant difference between the water in low brightness and high when using the shadow index. To cope with this problem, we propose an advanced water index based on the normalized differential water index, which is constructed to eliminate the interference of water in low brightness. Results indicate that the indexes can accurately distinguish shadow regions in the WorldView-II image data.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124975366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Industrial IoT Security Based on Deep Learning 基于深度学习的工业物联网安全研究
Pub Date : 2023-05-01 DOI: 10.53106/160792642023052403017
Xian Guo Xian Guo, Keyu Chen Xian Guo, An Yang Keyu Chen, Zhanhui Gang An Yang
With the rapid development of "Internet +" and the construction of a new generation of information infrastructure, the intrusion behaviors against the Industrial Internet of Things are increasingly common. How to ensure the security of the industrial Internet of Things is one of the current research hotspots. The modern technology trend has the hottest technologies of the Internet of Things (IoT). The application of IoT on the other hand improves work efficiency and brings convenience to people’s life; on the other hand, it makes the network face increasingly serious security threat problems and attacks the network by unscrupulous elements occur from time to time. Machine learning-based intrusion detection techniques involve a large number of mathematical formula operations, while with the development of neural networks, the excellent autonomous feature learning capability of deep learning is recognized. An intrusion detection system plays an important role in preventing security threats and protecting them from attacks. The current research on industrial IoT security technology focuses on authentication technology, encryption technology, access control technology, and intrusion detection technology. In this paper, we analyze deep learning and industrial IoT intrusion detection and use the powerful data processing capability and feature learning capability of deep learning to conduct an in-depth study on industrial IoT intrusion detection methods based on deep learning. This paper achieves a 96.32% detection rate on industrial control dataset, which can better adapt to the needs of industrial IoT intrusion detection. 
随着“互联网+”的快速发展和新一代信息基础设施的建设,针对工业物联网的入侵行为日益普遍。如何保证工业物联网的安全是当前的研究热点之一。现代技术趋势中最热门的技术是物联网(IoT)。另一方面,物联网的应用提高了工作效率,给人们的生活带来了便利;另一方面,也使网络面临日益严重的安全威胁问题,不法分子对网络的攻击时有发生。基于机器学习的入侵检测技术涉及大量的数学公式运算,而随着神经网络的发展,深度学习优秀的自主特征学习能力得到了认可。入侵检测系统在防范安全威胁、保护企业不受攻击方面发挥着重要作用。目前对工业物联网安全技术的研究主要集中在认证技术、加密技术、访问控制技术、入侵检测技术等方面。本文对深度学习和工业物联网入侵检测进行了分析,利用深度学习强大的数据处理能力和特征学习能力,对基于深度学习的工业物联网入侵检测方法进行了深入研究。本文在工业控制数据集上实现了96.32%的检测率,能够更好地适应工业物联网入侵检测的需求。
{"title":"Research on Industrial IoT Security Based on Deep Learning","authors":"Xian Guo Xian Guo, Keyu Chen Xian Guo, An Yang Keyu Chen, Zhanhui Gang An Yang","doi":"10.53106/160792642023052403017","DOIUrl":"https://doi.org/10.53106/160792642023052403017","url":null,"abstract":"\u0000 With the rapid development of \"Internet +\" and the construction of a new generation of information infrastructure, the intrusion behaviors against the Industrial Internet of Things are increasingly common. How to ensure the security of the industrial Internet of Things is one of the current research hotspots. The modern technology trend has the hottest technologies of the Internet of Things (IoT). The application of IoT on the other hand improves work efficiency and brings convenience to people’s life; on the other hand, it makes the network face increasingly serious security threat problems and attacks the network by unscrupulous elements occur from time to time. Machine learning-based intrusion detection techniques involve a large number of mathematical formula operations, while with the development of neural networks, the excellent autonomous feature learning capability of deep learning is recognized. An intrusion detection system plays an important role in preventing security threats and protecting them from attacks. The current research on industrial IoT security technology focuses on authentication technology, encryption technology, access control technology, and intrusion detection technology. In this paper, we analyze deep learning and industrial IoT intrusion detection and use the powerful data processing capability and feature learning capability of deep learning to conduct an in-depth study on industrial IoT intrusion detection methods based on deep learning. This paper achieves a 96.32% detection rate on industrial control dataset, which can better adapt to the needs of industrial IoT intrusion detection.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128281869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis on Risk Awareness Model and Economic Growth of Finance Industry 金融行业风险意识模型与经济增长分析
Pub Date : 2023-05-01 DOI: 10.53106/160792642023052403015
Renyang Wang Renyang Wang, Badamasi Sani Mohammed Renyang Wang, R. P. Badamasi Sani Mohammed
The economy was slump mainly due to the credit market disruptions and losses generated by systemic credit institutions. The trust in the banking system to satisfy payment commitments collapsed, and financial, economic, and political risks were increased, and during that era, their significant volatility. Such dangers have skewed economic development and laid the foundations for creating an economy of dread. The financial risks occur due to investments made to firms that fail to meet their financial responsibilities. The trouble is due to the probability of financial expense. Therefore, a culture of risk consciousness must be created to increase risk sensitivity in a company. Risk awareness and agility in responding to incidents are essential, and then reaction times might be impeded, mainly when an organization has grown too fast. Creating that culture, awareness of risk management benefits, safety improvements, lower claims, and lower risk costs, and better financial outcomes improved and shown. This article examines the influence on the economic growth of financial development using time series data. This research has been conducted using three popular financial development indicators: wide cash, deposit/GDP, and private sector domestic credit. The risk awareness model (RAM) estimate has a favourable and substantial influence on economic development for all financial development indices. Therefore, this article demonstrates that all financial product economic growth indexes utilize a binding test in a profitable and long-term way. Consequently, it is suggested to push ahead with financial reforms to enhance financial sector development, increasing its contribution to economic expansion. The proposed method allows achieving better throughput by performance ratios, accuracy ratios, low error rate, precision ratio, poverty rates, and risk management levels, financial volatility rate. 
经济下滑的主要原因是信贷市场的混乱和系统性信贷机构造成的损失。人们对银行体系履行支付承诺的信任崩溃了,金融、经济和政治风险增加了,在那个时代,它们的波动性很大。这些危险扭曲了经济发展,并为制造恐怖经济奠定了基础。财务风险是由于对企业的投资未能履行其财务责任而产生的。麻烦是由于财务费用的可能性。因此,必须建立一种风险意识文化,以提高公司的风险敏感性。风险意识和响应事件的敏捷性是必不可少的,然后反应时间可能会受到阻碍,主要是在组织发展太快的时候。建立这种文化,意识到风险管理的好处,安全的改进,更低的索赔,更低的风险成本,以及更好的财务结果。本文利用时间序列数据检验了金融发展对经济增长的影响。这项研究使用了三个流行的金融发展指标:广义现金、存款/GDP和私营部门国内信贷。在所有金融发展指标中,风险意识模型(RAM)估计对经济发展具有有利的实质性影响。因此,本文论证了所有金融产品的经济增长指标都是在盈利和长期的方式下使用绑定检验的。因此,建议推进金融改革,促进金融业的发展,增加其对经济增长的贡献。所提出的方法可以通过性能比、准确率、低错误率、精确率、贫困率和风险管理水平、金融波动率来实现更好的吞吐量。
{"title":"Analysis on Risk Awareness Model and Economic Growth of Finance Industry","authors":"Renyang Wang Renyang Wang, Badamasi Sani Mohammed Renyang Wang, R. P. Badamasi Sani Mohammed","doi":"10.53106/160792642023052403015","DOIUrl":"https://doi.org/10.53106/160792642023052403015","url":null,"abstract":"\u0000 The economy was slump mainly due to the credit market disruptions and losses generated by systemic credit institutions. The trust in the banking system to satisfy payment commitments collapsed, and financial, economic, and political risks were increased, and during that era, their significant volatility. Such dangers have skewed economic development and laid the foundations for creating an economy of dread. The financial risks occur due to investments made to firms that fail to meet their financial responsibilities. The trouble is due to the probability of financial expense. Therefore, a culture of risk consciousness must be created to increase risk sensitivity in a company. Risk awareness and agility in responding to incidents are essential, and then reaction times might be impeded, mainly when an organization has grown too fast. Creating that culture, awareness of risk management benefits, safety improvements, lower claims, and lower risk costs, and better financial outcomes improved and shown. This article examines the influence on the economic growth of financial development using time series data. This research has been conducted using three popular financial development indicators: wide cash, deposit/GDP, and private sector domestic credit. The risk awareness model (RAM) estimate has a favourable and substantial influence on economic development for all financial development indices. Therefore, this article demonstrates that all financial product economic growth indexes utilize a binding test in a profitable and long-term way. Consequently, it is suggested to push ahead with financial reforms to enhance financial sector development, increasing its contribution to economic expansion. The proposed method allows achieving better throughput by performance ratios, accuracy ratios, low error rate, precision ratio, poverty rates, and risk management levels, financial volatility rate.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122471339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Path Planning for Spraying Drones Based on Deep Q-Learning 基于深度q -学习的喷涂无人机自动路径规划
Pub Date : 2023-05-01 DOI: 10.53106/160792642023052403001
Ya-Yu Huang Ya-Yu Huang, Zi-Wen Li Ya-Yu Huang, Chun-Hao Yang Zi-Wen Li, Yueh-Min Huang Chun-Hao Yang
The reduction of the agricultural workforce due to the rapid development of technology has resulted in labor shortages. Agricultural mechanization, such as drone use for pesticide spraying, can solve this problem. However, the terrain, culture, and operational limitations in mountainous orchards in Taiwan make pesticide spraying challenging. By combining reinforcement learning with deep neural networks, we propose to train drones to avoid obstacles and find optimal paths for pesticide spraying that reduce operational difficulties, pesticide costs, and battery consumption. We experimented with different reward mechanisms, neural network depths, flight direction granularities, and environments to devise a plan suitable for sloping orchards. Reinforcement learning is more effective than traditional algorithms for solving path planning in complex environments. 
由于技术的快速发展,农业劳动力的减少导致了劳动力短缺。农业机械化,如无人机喷洒农药,可以解决这个问题。然而,台湾山区果园的地形、文化和操作限制使农药喷洒具有挑战性。通过将强化学习与深度神经网络相结合,我们提出训练无人机避开障碍物并找到喷洒农药的最佳路径,从而降低操作难度、农药成本和电池消耗。我们尝试了不同的奖励机制、神经网络深度、飞行方向粒度和环境,以设计一个适合倾斜果园的计划。在解决复杂环境下的路径规划问题时,强化学习比传统算法更有效。
{"title":"Automatic Path Planning for Spraying Drones Based on Deep Q-Learning","authors":"Ya-Yu Huang Ya-Yu Huang, Zi-Wen Li Ya-Yu Huang, Chun-Hao Yang Zi-Wen Li, Yueh-Min Huang Chun-Hao Yang","doi":"10.53106/160792642023052403001","DOIUrl":"https://doi.org/10.53106/160792642023052403001","url":null,"abstract":"\u0000 The reduction of the agricultural workforce due to the rapid development of technology has resulted in labor shortages. Agricultural mechanization, such as drone use for pesticide spraying, can solve this problem. However, the terrain, culture, and operational limitations in mountainous orchards in Taiwan make pesticide spraying challenging. By combining reinforcement learning with deep neural networks, we propose to train drones to avoid obstacles and find optimal paths for pesticide spraying that reduce operational difficulties, pesticide costs, and battery consumption. We experimented with different reward mechanisms, neural network depths, flight direction granularities, and environments to devise a plan suitable for sloping orchards. Reinforcement learning is more effective than traditional algorithms for solving path planning in complex environments.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"259 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122928383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Device for Two-Way Time-Frequency Real-Time Synchronization 一种新型双向时频实时同步装置
Pub Date : 2023-05-01 DOI: 10.53106/160792642023052403024
Ke Zhang Ke Zhang, Decai Zou Ke Zhang, Pei Wang Decai Zou, Wenfang Jing Pei Wang
The netted wireless sensor nodes or coherent accumulation processing in multistatic radar imaging requires high accuracy time synchronization. Although GNSS timing can also be used as a time synchronization method to serve the applications above, its timing accuracy will be limited. In this context, we present the hardware implementation for Two-Way Time-Frequency Real-Time Synchronization (TWTFRTS) with an automatic adaptive jitter elimination algorithm based on Kalman and PID, which is implemented in a real-time, low-cost, portable Xilinx ZYNQ device. A short (2 km) baseline TWTFRTS experiment was done with a pair of devices composed of a master device and a slave device. The result shows a high precision of time synchronization performance with the standard deviation (1 σ) better than 1 ns. 
在多基地雷达成像中,无线传感器节点组网或相干积累处理需要高精度的时间同步。虽然GNSS授时也可以作为一种时间同步方法来服务于上述应用,但其授时精度将受到限制。在此背景下,我们提出了基于卡尔曼和PID的自动自适应抖动消除算法的双向时频实时同步(TWTFRTS)的硬件实现,该算法在实时、低成本、便携式Xilinx ZYNQ设备上实现。采用主设备和从设备组成的一对设备进行了短(2 km)基线TWTFRTS实验。结果表明,该系统具有较高的时间同步精度,其标准差(1 σ)优于1 ns。
{"title":"A New Device for Two-Way Time-Frequency Real-Time Synchronization","authors":"Ke Zhang Ke Zhang, Decai Zou Ke Zhang, Pei Wang Decai Zou, Wenfang Jing Pei Wang","doi":"10.53106/160792642023052403024","DOIUrl":"https://doi.org/10.53106/160792642023052403024","url":null,"abstract":"\u0000 The netted wireless sensor nodes or coherent accumulation processing in multistatic radar imaging requires high accuracy time synchronization. Although GNSS timing can also be used as a time synchronization method to serve the applications above, its timing accuracy will be limited. In this context, we present the hardware implementation for Two-Way Time-Frequency Real-Time Synchronization (TWTFRTS) with an automatic adaptive jitter elimination algorithm based on Kalman and PID, which is implemented in a real-time, low-cost, portable Xilinx ZYNQ device. A short (2 km) baseline TWTFRTS experiment was done with a pair of devices composed of a master device and a slave device. The result shows a high precision of time synchronization performance with the standard deviation (1 σ) better than 1 ns.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133593434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Efficient IoT Authentication Schemes for MQTT 5.0 MQTT 5.0高效物联网认证方案的设计与实现
Pub Date : 2023-05-01 DOI: 10.53106/160792642023052403012
Hung-Yu Chien Hung-Yu Chien, Pin-Ping Ciou Hung-Yu Chien
MQTT (Message Queue Telemetry Transport) is one of the most popular Internet of Things (IoT) communication protocols, owing to its lightweight and easiness to use. The previous MQTT standards (including version 3.1 and its precedents) do not provide proper security functions; instead, they assume the adoption of SSL/TLS in the underlying layer. However, it not only incurs larger overhead but also hinders the development of suitable authentication/confidentiality protection to suit various MQTT deployment scenarios. The newest MQTT standard called MQTT 5.0 responds to these challenges by supporting the Enhanced Authentication framework in which designers can design and implement any secure authentication mechanisms within the framework. This paper designs and implements two efficient authentication protocols, using the MQTT 5.0 Enhanced Authentication framework. One is simple challenge-response authentication scheme, and the other is an anonymous challenge-response authentication scheme. We extend HiveMQ platform to implement the schemes and evaluate the performance. The results show that the proposed schemes demand only hundred few more milliseconds to achieve much robust authentication, compared to the simple identity-password authentication. 
MQTT(消息队列遥测传输)是最流行的物联网(IoT)通信协议之一,由于其轻量级和易于使用。以前的MQTT标准(包括3.1版本及其前身)没有提供适当的安全功能;相反,它们假定在底层采用SSL/TLS。但是,它不仅会产生更大的开销,而且还会妨碍开发适合各种MQTT部署场景的适当身份验证/机密性保护。最新的MQTT标准MQTT 5.0通过支持增强型身份验证框架来应对这些挑战,设计人员可以在该框架内设计和实现任何安全身份验证机制。本文采用MQTT 5.0增强认证框架,设计并实现了两种高效的认证协议。一种是简单的挑战-响应认证方案,另一种是匿名的挑战-响应认证方案。我们扩展了HiveMQ平台来实现这些方案并评估其性能。结果表明,与简单的身份-密码认证相比,所提出的方案只需要几百毫秒的时间就可以实现更强的鲁棒性认证。
{"title":"Design and Implementation of Efficient IoT Authentication Schemes for MQTT 5.0","authors":"Hung-Yu Chien Hung-Yu Chien, Pin-Ping Ciou Hung-Yu Chien","doi":"10.53106/160792642023052403012","DOIUrl":"https://doi.org/10.53106/160792642023052403012","url":null,"abstract":"\u0000 MQTT (Message Queue Telemetry Transport) is one of the most popular Internet of Things (IoT) communication protocols, owing to its lightweight and easiness to use. The previous MQTT standards (including version 3.1 and its precedents) do not provide proper security functions; instead, they assume the adoption of SSL/TLS in the underlying layer. However, it not only incurs larger overhead but also hinders the development of suitable authentication/confidentiality protection to suit various MQTT deployment scenarios. The newest MQTT standard called MQTT 5.0 responds to these challenges by supporting the Enhanced Authentication framework in which designers can design and implement any secure authentication mechanisms within the framework. This paper designs and implements two efficient authentication protocols, using the MQTT 5.0 Enhanced Authentication framework. One is simple challenge-response authentication scheme, and the other is an anonymous challenge-response authentication scheme. We extend HiveMQ platform to implement the schemes and evaluate the performance. The results show that the proposed schemes demand only hundred few more milliseconds to achieve much robust authentication, compared to the simple identity-password authentication.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129975082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Retrieval Algorithm for Time-constrained Heterogeneous Data Items in Wireless Networks 无线网络中时间约束异构数据项的检索算法
Pub Date : 2023-05-01 DOI: 10.53106/160792642023052403006
Yangming Zhang Yangming Zhang, Ping He Yangming Zhang, Huaying Qi Ping He, Shiyi Wang Huaying Qi
Homogeneous and heterogeneous data retrieval problem refers that these requested data items are retrieved on the basis of data items broadcast at some channels such that the access latency of all requested data items is minimized. The problem has an important study significance in MIMO (Multiple Input and Multiple Output) wireless communication. Almost researches are focused on proposing some schemes for solving signal antenna or multiple antennae data retrieval based on homogeneous data items, but these schemes are not suitable for heterogeneous data retrieval problem. So in this paper, we describe a SPR (Shortest Paths Retrieval) algorithm that is suitable for solving homogeneous and heterogeneous data retrieval problem at the same time. Moreover, for avoiding the retrieval time too long, when the each requested data item is set a constrained condition-deadline, we propose another DKPR (Deadline-based Key Path Retrieval) algorithm that finds the critical path with the largest number of requested data items in a broadcast cycle, so as to complete the retrieval operation of data items within the deadline of requesting data items as much as possible. Through experiments, the proposed scheme has good efficiency.  
同质和异构数据检索问题是指这些请求的数据项是基于在某些通道上广播的数据项来检索的,从而使所有请求的数据项的访问延迟最小化。该问题在多输入多输出(MIMO)无线通信中具有重要的研究意义。目前已有研究提出了一些基于同质数据项的信号天线或多天线数据检索方案,但这些方案并不适用于异构数据检索问题。因此,本文提出了一种适用于同时解决同构和异构数据检索问题的最短路径检索算法。此外,为了避免检索时间过长,在为每个请求数据项设置约束条件截止日期的情况下,我们提出了另一种基于截止日期的关键路径检索(DKPR)算法,该算法在一个广播周期内寻找请求数据项数量最多的关键路径,从而尽可能在请求数据项的截止日期内完成数据项的检索操作。通过实验,该方案具有良好的效率。
{"title":"A Retrieval Algorithm for Time-constrained Heterogeneous Data Items in Wireless Networks","authors":"Yangming Zhang Yangming Zhang, Ping He Yangming Zhang, Huaying Qi Ping He, Shiyi Wang Huaying Qi","doi":"10.53106/160792642023052403006","DOIUrl":"https://doi.org/10.53106/160792642023052403006","url":null,"abstract":"\u0000 Homogeneous and heterogeneous data retrieval problem refers that these requested data items are retrieved on the basis of data items broadcast at some channels such that the access latency of all requested data items is minimized. The problem has an important study significance in MIMO (Multiple Input and Multiple Output) wireless communication. Almost researches are focused on proposing some schemes for solving signal antenna or multiple antennae data retrieval based on homogeneous data items, but these schemes are not suitable for heterogeneous data retrieval problem. So in this paper, we describe a SPR (Shortest Paths Retrieval) algorithm that is suitable for solving homogeneous and heterogeneous data retrieval problem at the same time. Moreover, for avoiding the retrieval time too long, when the each requested data item is set a constrained condition-deadline, we propose another DKPR (Deadline-based Key Path Retrieval) algorithm that finds the critical path with the largest number of requested data items in a broadcast cycle, so as to complete the retrieval operation of data items within the deadline of requesting data items as much as possible. Through experiments, the proposed scheme has good efficiency. \u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121483125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Attack on Remote Sensing Equipment: PoIs Recognition Based on HW with Bi-LSTM Attention 遥感设备的安全攻击:基于HW的Bi-LSTM注意力点识别
Pub Date : 2023-05-01 DOI: 10.53106/160792642023052403005
Wei Jiang Wei Jiang, Xianhua Zhang Wei Jiang, Yanpeng Li Xianhua Zhang, Chuansheng Chen Yanpeng Li, Jianfeng Zhu Chuansheng Chen
Deep learning is an influencer in hardware security applications, which grows up to be an essential tool in hardware security, threats the confidentiality, integrity, and availability of remote sensing equipment. Comparing to traditional physical attack, not only it can greatly reduce the workload of manual selection of POIs (Points of Interests) in security attack and Trojan backdoor, but also replenishes the toolbox for attacking. On account of minute changes between network structure model and hyperparameters constantly affecting the training and attacking effect, literally, deep learning serves as a tool but not key role in hardware security attack, which means it cannot completely replace template attack and other traditional energy attack methods. In this study, we present a method using Bi-LSTM Attention mechanism to focus on the POIs related to Hamming Weight at the last round s-box output. Firstly, it can increase attacking effect and decrease guessing entropy, where attacking FPGA data demonstrates the efficiency of attacking. Secondly, it is different from the traditional template attack and deep learning attack without preprocessing subjecting to raw traces but provides attentional POIs which is the same with artificial selection. Finally, it provides a solution for attacking encrypting equipment running in parallel. 
深度学习是硬件安全应用的重要影响因素,它逐渐成为硬件安全的重要工具,威胁着遥感设备的机密性、完整性和可用性。与传统的物理攻击相比,它不仅可以大大减少安全攻击和木马后门中手动选择poi (point of Interests)的工作量,而且还补充了攻击工具箱。由于网络结构模型和超参数之间的微小变化不断影响训练和攻击效果,从字面上看,深度学习在硬件安全攻击中只是工具而非关键,不能完全取代模板攻击等传统能量攻击方法。在本研究中,我们提出了一种使用Bi-LSTM注意力机制来关注最后一轮s盒输出中与汉明权重相关的poi的方法。首先,它可以提高攻击效果,降低猜测熵,其中攻击FPGA数据证明了攻击的效率。其次,它不同于传统的模板攻击和深度学习攻击不受原始痕迹的预处理,而是提供了与人工选择相同的注意点。最后,提出了一种针对并行运行的加密设备进行攻击的解决方案。
{"title":"Security Attack on Remote Sensing Equipment: PoIs Recognition Based on HW with Bi-LSTM Attention","authors":"Wei Jiang Wei Jiang, Xianhua Zhang Wei Jiang, Yanpeng Li Xianhua Zhang, Chuansheng Chen Yanpeng Li, Jianfeng Zhu Chuansheng Chen","doi":"10.53106/160792642023052403005","DOIUrl":"https://doi.org/10.53106/160792642023052403005","url":null,"abstract":"\u0000 Deep learning is an influencer in hardware security applications, which grows up to be an essential tool in hardware security, threats the confidentiality, integrity, and availability of remote sensing equipment. Comparing to traditional physical attack, not only it can greatly reduce the workload of manual selection of POIs (Points of Interests) in security attack and Trojan backdoor, but also replenishes the toolbox for attacking. On account of minute changes between network structure model and hyperparameters constantly affecting the training and attacking effect, literally, deep learning serves as a tool but not key role in hardware security attack, which means it cannot completely replace template attack and other traditional energy attack methods. In this study, we present a method using Bi-LSTM Attention mechanism to focus on the POIs related to Hamming Weight at the last round s-box output. Firstly, it can increase attacking effect and decrease guessing entropy, where attacking FPGA data demonstrates the efficiency of attacking. Secondly, it is different from the traditional template attack and deep learning attack without preprocessing subjecting to raw traces but provides attentional POIs which is the same with artificial selection. Finally, it provides a solution for attacking encrypting equipment running in parallel.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131637299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Computational Method for Identification of Functional SNPs in Human Noncoding Genome Regions based on Multi-feature Mining 基于多特征挖掘的人类非编码基因组区域功能snp识别计算方法
Pub Date : 2023-05-01 DOI: 10.53106/160792642023052403021
Rong Li Rong Li, Zhi-e Lou Rong Li
Single Nucleotide Polymorphism (SNP) is the variant on a single nucleotide in the genome. Functional SNP, as one of the most important molecular markers in disease research, has been widely used in various research fields, such as tumor pathogenesis, disease diagnosis and treatment, prognostic evaluation, drug development, etc. The number of functional SNPs in noncoding genome regions is much more than that in coding regions, and their detection is more difficult. In this work, a multi-feature mining based computational method is proposed to predict the functional SNPs in human noncoding genomes. We first analyzed the sequence properties, evolutionary conservation properties and epigenetic modification signal properties of the sample SNPs. Statistical methods together with multiple annotation data from genomes and epigenetics were used to mine high-dimensional discriminative features subsequently. In particular, the allele-specific features were designed to distinguish the function of SNPs with close locations. The random forest method was used to conduct feature dimension reduction and classification. The 10-fold cross-validation result showed the Area Under the Receiver Operating Characteristic Curve (AUC) of our method improved by 16.9% and 43.4% over existing methods GWAVA and CADD, respectively, illustrating that the allele-specific based features can help to distinguish functional and netural SNPs with near locations. 
单核苷酸多态性(SNP)是基因组中单个核苷酸的变异。功能SNP作为疾病研究中最重要的分子标记之一,已广泛应用于肿瘤发病机制、疾病诊断与治疗、预后评价、药物开发等各个研究领域。基因组非编码区功能snp数量远多于编码区,检测难度较大。本文提出了一种基于多特征挖掘的人类非编码基因组功能snp预测方法。我们首先分析了样本snp的序列特性、进化保守特性和表观遗传修饰信号特性。随后,利用统计方法结合基因组和表观遗传学的多重注释数据挖掘高维判别特征。特别是,等位基因特异性特征被设计用于区分位置接近的snp的功能。采用随机森林方法进行特征降维和分类。10倍交叉验证结果表明,与现有的GWAVA和CADD方法相比,该方法的AUC分别提高了16.9%和43.4%,说明基于等位基因特异性的特征可以帮助区分近位置的功能性和中性snp。
{"title":"A Computational Method for Identification of Functional SNPs in Human Noncoding Genome Regions based on Multi-feature Mining","authors":"Rong Li Rong Li, Zhi-e Lou Rong Li","doi":"10.53106/160792642023052403021","DOIUrl":"https://doi.org/10.53106/160792642023052403021","url":null,"abstract":"\u0000 Single Nucleotide Polymorphism (SNP) is the variant on a single nucleotide in the genome. Functional SNP, as one of the most important molecular markers in disease research, has been widely used in various research fields, such as tumor pathogenesis, disease diagnosis and treatment, prognostic evaluation, drug development, etc. The number of functional SNPs in noncoding genome regions is much more than that in coding regions, and their detection is more difficult. In this work, a multi-feature mining based computational method is proposed to predict the functional SNPs in human noncoding genomes. We first analyzed the sequence properties, evolutionary conservation properties and epigenetic modification signal properties of the sample SNPs. Statistical methods together with multiple annotation data from genomes and epigenetics were used to mine high-dimensional discriminative features subsequently. In particular, the allele-specific features were designed to distinguish the function of SNPs with close locations. The random forest method was used to conduct feature dimension reduction and classification. The 10-fold cross-validation result showed the Area Under the Receiver Operating Characteristic Curve (AUC) of our method improved by 16.9% and 43.4% over existing methods GWAVA and CADD, respectively, illustrating that the allele-specific based features can help to distinguish functional and netural SNPs with near locations.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125212883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Framework of Interaction Design Method Based on Blockchain System 基于区块链系统的交互设计方法框架
Pub Date : 2023-05-01 DOI: 10.53106/160792642023052403019
Chao Ma Chao Ma, Faren Huo Chao Ma, Aiqin Shi Faren Huo
As the fifth subversive and innovative technology for computing paradigm after the mainframe computer, personal computer, internet and mobile/social network, blockchain technology has entered into a new phase of development. Nevertheless, more intrinsic issues remain to be explored. With the usage of cryptography and a distributed database, once a block is recorded, it can no longer be changed. To defeat these issues, more existing techniques have emerged. The blockchain system mainly features decentralization, but as the existing architectures of the blockchain system are mixed up, it is hard to determine whether they are centralized or decentralized. Such hybrid feature is derived from the impact of uncertainty of human demands. In this study, we intend to explore the scientific perception of the blockchain technology after its integration with human activities by adopting the method of interaction design. Furthermore, we plan to establish a set of mechanisms on the method of blockchain system-based interaction design, so as to identify the impact of human uncertainty factors on the design of the blockchain system. In addition, we aim to provide theoretical guidance for establishing the decentralized blockchain systems in both standardized and mixed categories and the centralized blockchain system with decentralization as central node. Through the methods of the observational results, the article is summarized and assessed the methods of the interaction design based on blockchain system. Moreover, the evaluation process consists of the analysis of expert evaluation, practical evaluation and participatory evaluation ferments an efficient outcome. 
区块链技术作为继大型机、个人电脑、互联网、移动/社交网络之后的第五次颠覆性、创新性计算范式技术,进入了一个新的发展阶段。然而,更多的内在问题仍有待探讨。随着密码学和分布式数据库的使用,一个区块一旦被记录下来,就不能再被更改。为了解决这些问题,出现了更多现有的技术。区块链系统的主要特点是去中心化,但由于现有的区块链系统架构是混合的,很难确定是中心化的还是去中心化的。这种混合特征来源于人类需求不确定性的影响。在本研究中,我们打算通过交互设计的方法来探索区块链技术与人类活动融合后的科学感知。此外,我们计划建立一套基于区块链系统交互设计方法的机制,以识别人为不确定性因素对区块链系统设计的影响。此外,我们旨在为建立标准化和混合类别的去中心化区块链系统以及以去中心化为中心节点的中心化区块链系统提供理论指导。通过观察结果的方法,对基于区块链系统的交互设计方法进行了总结和评估。评价过程由专家评价分析、实践评价分析和参与性评价分析组成,形成了高效的评价结果。
{"title":"Framework of Interaction Design Method Based on Blockchain System","authors":"Chao Ma Chao Ma, Faren Huo Chao Ma, Aiqin Shi Faren Huo","doi":"10.53106/160792642023052403019","DOIUrl":"https://doi.org/10.53106/160792642023052403019","url":null,"abstract":"\u0000 As the fifth subversive and innovative technology for computing paradigm after the mainframe computer, personal computer, internet and mobile/social network, blockchain technology has entered into a new phase of development. Nevertheless, more intrinsic issues remain to be explored. With the usage of cryptography and a distributed database, once a block is recorded, it can no longer be changed. To defeat these issues, more existing techniques have emerged. The blockchain system mainly features decentralization, but as the existing architectures of the blockchain system are mixed up, it is hard to determine whether they are centralized or decentralized. Such hybrid feature is derived from the impact of uncertainty of human demands. In this study, we intend to explore the scientific perception of the blockchain technology after its integration with human activities by adopting the method of interaction design. Furthermore, we plan to establish a set of mechanisms on the method of blockchain system-based interaction design, so as to identify the impact of human uncertainty factors on the design of the blockchain system. In addition, we aim to provide theoretical guidance for establishing the decentralized blockchain systems in both standardized and mixed categories and the centralized blockchain system with decentralization as central node. Through the methods of the observational results, the article is summarized and assessed the methods of the interaction design based on blockchain system. Moreover, the evaluation process consists of the analysis of expert evaluation, practical evaluation and participatory evaluation ferments an efficient outcome.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130343286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
網際網路技術學刊
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1