首页 > 最新文献

網際網路技術學刊最新文献

英文 中文
Development of an Interactive Live Streaming System for Language Learning 开发语言学习互动直播系统
Pub Date : 2024-01-01 DOI: 10.53106/160792642024012501003
Hong-Yi Pai Hong-Yi Pai, Ching-Huang Wang Hong-Yi Pai, Yi-Chen Lai Ching-Huang Wang
In this paper, we propose Virtual Avatar Interactive Live Streaming System (VAILSS), our approach to streaming 3D avatar performances in interactive storytelling applications using multimodal interactive techniques. This study focuses on developing a virtual live interaction system for VTubers in the context of language learning. A live virtual performance from our system consists of three components: 1) an Avatar generation framework, 2) an AI motion capture system, and 3) an interactive storytelling engine. The system integrates artificial intelligence and uses motion capture to identify facial expressions and movements, enabling virtual characters to provide live storytelling services. Additionally, the system allows for bi-directional interaction with players through tablet touch and voice. The system aims to promote multimodal learning channels for the masses. To gain deeper insights into the effectiveness of virtual role-playing in language learning, we organized a three-week workshop to investigate our system’s impact on user experience. We extended invitations to 17 night-school freshmen from the NFU Department of Applied Foreign Languages, enrolled in an English class focused on tour guides, to participate in a virtual performance. The experiment results demonstrated that the VAILSS positively affected students’ learning outcomes, particularly in enhancing foreign language acquisition.
在本文中,我们提出了虚拟阿凡达互动现场直播系统(VAILSS),这是我们在互动故事应用中使用多模态互动技术串流三维阿凡达表演的方法。这项研究的重点是在语言学习的背景下为 VTubers 开发一个虚拟现场互动系统。我们系统中的现场虚拟表演由三个部分组成:1)阿凡达生成框架;2)人工智能动作捕捉系统;3)互动故事引擎。该系统集成了人工智能,并使用动作捕捉来识别面部表情和动作,使虚拟角色能够提供现场讲故事服务。此外,该系统还可通过平板电脑触摸和语音与玩家进行双向互动。该系统旨在为大众推广多模态学习渠道。为了深入了解虚拟角色扮演在语言学习中的有效性,我们组织了一次为期三周的研讨会,以调查我们的系统对用户体验的影响。我们邀请了 17 名来自北师大应用外语系的夜校新生参加虚拟表演,这些新生就读于一个以导游为主题的英语班。实验结果表明,VAILSS 对学生的学习成果产生了积极影响,尤其是在提高外语学习方面。
{"title":"Development of an Interactive Live Streaming System for Language Learning","authors":"Hong-Yi Pai Hong-Yi Pai, Ching-Huang Wang Hong-Yi Pai, Yi-Chen Lai Ching-Huang Wang","doi":"10.53106/160792642024012501003","DOIUrl":"https://doi.org/10.53106/160792642024012501003","url":null,"abstract":"\u0000 In this paper, we propose Virtual Avatar Interactive Live Streaming System (VAILSS), our approach to streaming 3D avatar performances in interactive storytelling applications using multimodal interactive techniques. This study focuses on developing a virtual live interaction system for VTubers in the context of language learning. A live virtual performance from our system consists of three components: 1) an Avatar generation framework, 2) an AI motion capture system, and 3) an interactive storytelling engine. The system integrates artificial intelligence and uses motion capture to identify facial expressions and movements, enabling virtual characters to provide live storytelling services. Additionally, the system allows for bi-directional interaction with players through tablet touch and voice. The system aims to promote multimodal learning channels for the masses. To gain deeper insights into the effectiveness of virtual role-playing in language learning, we organized a three-week workshop to investigate our system’s impact on user experience. We extended invitations to 17 night-school freshmen from the NFU Department of Applied Foreign Languages, enrolled in an English class focused on tour guides, to participate in a virtual performance. The experiment results demonstrated that the VAILSS positively affected students’ learning outcomes, particularly in enhancing foreign language acquisition.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"63 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139638329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Examination of the Use of VR Combined with Internet Technology to Enhance the Experience of Sound Art in the Treatment of Anxiety Disorders 研究利用虚拟现实技术结合互联网技术增强声音艺术在治疗焦虑症方面的体验
Pub Date : 2024-01-01 DOI: 10.53106/160792642024012501002
Xizhi Zhang Xizhi Zhang, Huan Ding Xizhi Zhang, YuXi Xie Huan Ding
《Due to the rapid development of interactive technology, sound interaction, as one of the core forms of interactive art, plays an important role in sound art. Its interactivity is one of the main factors affecting audiences’ perception. As far as the interaction of sound art is concerned, it can neither be extended as sound art nor give full play to its function, which is the key difficulty in the current development. Therefore, only by making full use of the existing advantages of virtual reality and the innovation of digital processing technology that the value of art therapy can be better reflected. However, in sound art therapy, the most critical thing is to establish the correct understanding of it and followed by the selection of the most appropriate treatment method to achieve the best outcomes. On this basis, this study reviews the progress and trend of virtual reality and related technologies. The results show that virtual reality can be used as an effective means to assist sound art therapy. Also, this paper explores how to use existing Internet technology to enhance the experience of virtual reality combined with sound art to improve the feasibility and effectiveness of treating anxiety disorders. After a systematic discussion through MFSC extraction algorithm, the results indicated that the extraction rate of MFSC changed several times and the index decreased significantly before and after the LF/HF experiment, which proved that this approach is more effective than the traditional one. In addition, VR can combine existing Internet technologies, such as high-speed Internet, cloud computing, Internet of Things technology, artificial intelligence, real-time performance, etc. Through these combined methods, the practice of the use of sound art in treating anxiety disorders will be enhanced by the interaction of virtual reality and high-speed Internet technology, which will deepen patients’ experience and improve the treatment effect.《
由于互动技术的飞速发展,声音互动作为互动艺术的核心形式之一,在声音艺术中扮演着重要角色。其互动性是影响受众感知的主要因素之一。就声音艺术的互动性而言,既不能作为声音艺术的延伸,也不能充分发挥其功能,这是当前发展的重点难点。因此,只有充分利用虚拟现实技术的现有优势和数字处理技术的革新,才能更好地体现艺术治疗的价值。然而,在声音艺术治疗中,最关键的是要树立正确的认识,其次是选择最合适的治疗方法,以达到最佳的治疗效果。在此基础上,本研究回顾了虚拟现实及相关技术的进展和趋势。研究结果表明,虚拟现实技术可以作为辅助声音艺术治疗的有效手段。同时,本文还探讨了如何利用现有的互联网技术增强虚拟现实与声音艺术相结合的体验,以提高治疗焦虑症的可行性和有效性。通过 MFSC 提取算法进行系统讨论后,结果表明,在 LF/HF 实验前后,MFSC 的提取率发生了多次变化,指数明显下降,证明这种方法比传统方法更有效。此外,VR 还可以结合现有的互联网技术,如高速互联网、云计算、物联网技术、人工智能、实时性能等。通过这些组合方法,虚拟现实与高速互联网技术的交互作用将加强声音艺术在治疗焦虑症方面的实践,从而加深患者的体验,提高治疗效果。
{"title":"Examination of the Use of VR Combined with Internet Technology to Enhance the Experience of Sound Art in the Treatment of Anxiety Disorders","authors":"Xizhi Zhang Xizhi Zhang, Huan Ding Xizhi Zhang, YuXi Xie Huan Ding","doi":"10.53106/160792642024012501002","DOIUrl":"https://doi.org/10.53106/160792642024012501002","url":null,"abstract":"\u0000 《Due to the rapid development of interactive technology, sound interaction, as one of the core forms of interactive art, plays an important role in sound art. Its interactivity is one of the main factors affecting audiences’ perception. As far as the interaction of sound art is concerned, it can neither be extended as sound art nor give full play to its function, which is the key difficulty in the current development. Therefore, only by making full use of the existing advantages of virtual reality and the innovation of digital processing technology that the value of art therapy can be better reflected. However, in sound art therapy, the most critical thing is to establish the correct understanding of it and followed by the selection of the most appropriate treatment method to achieve the best outcomes. On this basis, this study reviews the progress and trend of virtual reality and related technologies. The results show that virtual reality can be used as an effective means to assist sound art therapy. Also, this paper explores how to use existing Internet technology to enhance the experience of virtual reality combined with sound art to improve the feasibility and effectiveness of treating anxiety disorders. After a systematic discussion through MFSC extraction algorithm, the results indicated that the extraction rate of MFSC changed several times and the index decreased significantly before and after the LF/HF experiment, which proved that this approach is more effective than the traditional one. In addition, VR can combine existing Internet technologies, such as high-speed Internet, cloud computing, Internet of Things technology, artificial intelligence, real-time performance, etc. Through these combined methods, the practice of the use of sound art in treating anxiety disorders will be enhanced by the interaction of virtual reality and high-speed Internet technology, which will deepen patients’ experience and improve the treatment effect.《\u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"14 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139638528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development and Evaluation on The Framework Design of A Continuous Mental Stress Monitor Based on Contactless Sensors and Internet Technology Applications 基于非接触式传感器和互联网技术应用的连续精神压力监测器框架设计开发与评估
Pub Date : 2024-01-01 DOI: 10.53106/160792642024012501005
Manhai Li Manhai Li, Xunyi Zheng Manhai Li
Due to the impact of COVID-19 pandemic, there are quite a few concerns on organizations or companies with the capability in quickly and timely detecting psychological vulnerability level of employees and predicting potential risk behaviors. Regarding the application of daily health monitoring, ordinary camera is used to non-contact capture the shallow blood changes under the face, using algorithm to identify the physiological signs of human body, such as blood oxygen, blood pressure, respiration, and heart rate. With the rapid advancement of Internet technology, it not only assists the corresponding model of physiological signs and psychological symptoms on mapping the change regularities and health score of people’s psychological state at any time, but also utilizes suitable Internet technologies to realize and provide early warning and intervention too. The experimental results of this study show that the constant non-contact detection of human psycho-logical vulnerability level is theoretically feasible and that it can provide practical and effective reference for psychological health assessment. As a result, the scheme of epidemic psychological prevention adopted in this research has the convenience of rapid detection and real-time prediction as well as the scientific of long-time big data tracking and backtracking through the application of Internet technologies, which is a supplement to the traditional psychological detection and prevention. 
由于 COVID-19 大流行的影响,如何快速、及时地检测员工的心理脆弱程度,预测潜在的风险行为,成为组织或企业关注的焦点。在日常健康监测应用方面,利用普通摄像头非接触式捕捉人脸下方浅层血液变化,通过算法识别血氧、血压、呼吸、心率等人体生理体征。随着互联网技术的突飞猛进,它不仅可以辅助生理体征和心理症状的相应模型随时绘制出人们心理状态的变化规律和健康评分,还可以利用合适的互联网技术实现预警和干预。本研究的实验结果表明,对人的心理逻辑脆弱性水平进行非接触式的持续检测在理论上是可行的,可以为心理健康评估提供实用有效的参考。因此,本研究采用的流行病心理预防方案既具有快速检测、实时预测的便利性,又具有应用互联网技术进行长时间大数据跟踪与回溯的科学性,是对传统心理检测与预防的一种补充。
{"title":"Development and Evaluation on The Framework Design of A Continuous Mental Stress Monitor Based on Contactless Sensors and Internet Technology Applications","authors":"Manhai Li Manhai Li, Xunyi Zheng Manhai Li","doi":"10.53106/160792642024012501005","DOIUrl":"https://doi.org/10.53106/160792642024012501005","url":null,"abstract":"\u0000 Due to the impact of COVID-19 pandemic, there are quite a few concerns on organizations or companies with the capability in quickly and timely detecting psychological vulnerability level of employees and predicting potential risk behaviors. Regarding the application of daily health monitoring, ordinary camera is used to non-contact capture the shallow blood changes under the face, using algorithm to identify the physiological signs of human body, such as blood oxygen, blood pressure, respiration, and heart rate. With the rapid advancement of Internet technology, it not only assists the corresponding model of physiological signs and psychological symptoms on mapping the change regularities and health score of people’s psychological state at any time, but also utilizes suitable Internet technologies to realize and provide early warning and intervention too. The experimental results of this study show that the constant non-contact detection of human psycho-logical vulnerability level is theoretically feasible and that it can provide practical and effective reference for psychological health assessment. As a result, the scheme of epidemic psychological prevention adopted in this research has the convenience of rapid detection and real-time prediction as well as the scientific of long-time big data tracking and backtracking through the application of Internet technologies, which is a supplement to the traditional psychological detection and prevention.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"317 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139632333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Application of Behavioral Image Feature Capture in Basketball Game Video 篮球比赛视频中行为图像特征捕捉的应用研究
Pub Date : 2024-01-01 DOI: 10.53106/160792642024012501013
Yan Zhang Yan Zhang, Wei Wei Yan Zhang
In order to realize intelligent image recognition of foul behavior in basketball games, this paper designs a feature capture method of video foul behavior based on improved bilateral filtering algorithm. Adaptive bilateral filtering is used to denoise the video image, and the optical flow feature and HOG feature of the behavior in the denoised image are obtained by image combination feature extraction method, which is fused to a combined eigenvector. The combined features were taken as the target recognition samples, and the multi-back propagation neural network was used to identify the foul behavior features. The particle filter was used to capture the video features and identify the location of the video behavior features. The experimental results show that this method can accurately capture the changes of video behavior characteristics, and has applicable performance in the identification of foul behavior in basketball matches. 
为了实现篮球比赛中犯规行为的智能图像识别,本文设计了一种基于改进的双边滤波算法的视频犯规行为特征捕获方法。采用自适应双边滤波对视频图像进行去噪处理,通过图像组合特征提取方法得到去噪图像中行为的光流特征和HOG特征,并将其融合为组合特征向量。将组合特征作为目标识别样本,使用多回传播神经网络识别犯规行为特征。粒子滤波器用于捕捉视频特征和识别视频行为特征的位置。实验结果表明,该方法能准确捕捉视频行为特征的变化,在篮球比赛中的犯规行为识别中具有良好的应用效果。
{"title":"Research on the Application of Behavioral Image Feature Capture in Basketball Game Video","authors":"Yan Zhang Yan Zhang, Wei Wei Yan Zhang","doi":"10.53106/160792642024012501013","DOIUrl":"https://doi.org/10.53106/160792642024012501013","url":null,"abstract":"\u0000 In order to realize intelligent image recognition of foul behavior in basketball games, this paper designs a feature capture method of video foul behavior based on improved bilateral filtering algorithm. Adaptive bilateral filtering is used to denoise the video image, and the optical flow feature and HOG feature of the behavior in the denoised image are obtained by image combination feature extraction method, which is fused to a combined eigenvector. The combined features were taken as the target recognition samples, and the multi-back propagation neural network was used to identify the foul behavior features. The particle filter was used to capture the video features and identify the location of the video behavior features. The experimental results show that this method can accurately capture the changes of video behavior characteristics, and has applicable performance in the identification of foul behavior in basketball matches.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"31 s1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139638408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stories from a Customized Honeypot for the IoT 物联网定制蜜罐的故事
Pub Date : 2024-01-01 DOI: 10.53106/160792642024012501010
Javier Carrillo-Mondejar Javier Carrillo-Mondejar, José Roldán-Gómez Javier Carrillo-Mondejar, Juan Manuel Castelo Gómez José Roldán-Gómez, Sergio Ruiz Villafranca Juan Manuel Castelo Gómez, Guillermo Suarez-Tangil Sergio Ruiz Villafranca
Since the inception of the Internet of Things (IoT), the security measures implemented on its devices have been too weak to ensure the appropriate protection of the data that they handle. Appealed by this, cybercriminals continuously seek out for vulnerable units to control, leading to attacks spreading through networks and infecting a high number of devices. On top of that, while the IoT has evolved to provide a higher degree of security, the techniques used by attackers have done so as well, which has led to the need of continuously studying the way in which these attacks are performed to gather significant knowledge for the development of the pertinent security measures. In view of this, we analyze the state of IoT attacks by developing a high-interaction honeypot for SSH and Telnet services that simulates a custom device with the ARM architecture. This study is carried out in two steps. Firstly, we analyze and classify the interaction between the attacker and the devices by clustering the commands that they sent in the compromised Telnet and SSH sessions. Secondly, we study the malware samples that are downloaded and executed in each session and classify them based on the sequence of system calls that they execute at runtime. In addition, apart from studying the active data generated by the attacker, we extract the information that is left behind after a connection with the honeypot by inspecting the metadata associated with it. In total, more than 1,578 malicious samples were collected after 9,926 unique IP addresses interacted with the system, with the most downloaded malware family being Hajime, with 70.5% of samples belonging to it, and also detecting others such as Mirai, Gafgyt, Dofloo and Xorddos. 
自物联网(IoT)诞生以来,在其设备上实施的安全措施一直过于薄弱,无法确保对其处理的数据提供适当的保护。受此影响,网络犯罪分子不断寻找易受攻击的设备进行控制,导致攻击通过网络传播并感染大量设备。此外,物联网在不断发展以提供更高的安全性的同时,攻击者所使用的技术也在不断发展,这就需要不断研究这些攻击的实施方式,以收集重要的知识来制定相关的安全措施。有鉴于此,我们开发了一个用于 SSH 和 Telnet 服务的高交互蜜罐,模拟一个采用 ARM 架构的定制设备,以此来分析物联网攻击的现状。这项研究分两步进行。首先,我们通过对攻击者在被入侵的 Telnet 和 SSH 会话中发送的命令进行聚类,对攻击者与设备之间的交互进行分析和分类。其次,我们研究在每个会话中下载和执行的恶意软件样本,并根据它们在运行时执行的系统调用序列对其进行分类。此外,除了研究攻击者生成的活动数据外,我们还通过检查与 "蜜罐 "相关的元数据,提取与 "蜜罐 "连接后留下的信息。在 9926 个独立 IP 地址与系统交互后,我们总共收集到超过 1578 个恶意样本,其中下载最多的恶意软件家族是 Hajime,70.5% 的样本属于该家族,此外还检测到 Mirai、Gafgyt、Dofloo 和 Xorddos 等其他恶意软件。
{"title":"Stories from a Customized Honeypot for the IoT","authors":"Javier Carrillo-Mondejar Javier Carrillo-Mondejar, José Roldán-Gómez Javier Carrillo-Mondejar, Juan Manuel Castelo Gómez José Roldán-Gómez, Sergio Ruiz Villafranca Juan Manuel Castelo Gómez, Guillermo Suarez-Tangil Sergio Ruiz Villafranca","doi":"10.53106/160792642024012501010","DOIUrl":"https://doi.org/10.53106/160792642024012501010","url":null,"abstract":"\u0000 Since the inception of the Internet of Things (IoT), the security measures implemented on its devices have been too weak to ensure the appropriate protection of the data that they handle. Appealed by this, cybercriminals continuously seek out for vulnerable units to control, leading to attacks spreading through networks and infecting a high number of devices. On top of that, while the IoT has evolved to provide a higher degree of security, the techniques used by attackers have done so as well, which has led to the need of continuously studying the way in which these attacks are performed to gather significant knowledge for the development of the pertinent security measures. In view of this, we analyze the state of IoT attacks by developing a high-interaction honeypot for SSH and Telnet services that simulates a custom device with the ARM architecture. This study is carried out in two steps. Firstly, we analyze and classify the interaction between the attacker and the devices by clustering the commands that they sent in the compromised Telnet and SSH sessions. Secondly, we study the malware samples that are downloaded and executed in each session and classify them based on the sequence of system calls that they execute at runtime. In addition, apart from studying the active data generated by the attacker, we extract the information that is left behind after a connection with the honeypot by inspecting the metadata associated with it. In total, more than 1,578 malicious samples were collected after 9,926 unique IP addresses interacted with the system, with the most downloaded malware family being Hajime, with 70.5% of samples belonging to it, and also detecting others such as Mirai, Gafgyt, Dofloo and Xorddos.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"66 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139632891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ship Rescue Optimization: A New Metaheuristic Algorithm for Solving Engineering Problems 船舶救援优化:解决工程问题的新元启发式算法
Pub Date : 2024-01-01 DOI: 10.53106/160792642024012501006
Shu-Chuan Chu Shu-Chuan Chu, Ting-Ting Wang Shu-Chuan Chu, Ali Riza Yildiz Ting-Ting Wang, Jeng-Shyang Pan Ali Riza Yildiz
In recent years, more and more problems in the industry have started to be solved using metaheuristics. In this paper, inspired by the ship maneuvering motion function and the rescue process, we propose ship rescue optimization (SRO) to solve the challenging optimization problem. The ship rescue process can be divided into two types of delayed rescue (large area rescue) and immediate rescue (small rescue) according to the searched person, and we can correspond these two types of rescue behaviors to the search space exploration and exploitation processes, respectively. In this process, SRO simulates the motion process of ship rescue according to the ship maneuvering equation of motion and finally comes up with an optimal position update algorithm. We verified the performance of the proposed algorithm on different dimensions of 57 test functions consisting of CEC2013 and CEC2017 and on three real engineering problems, and compared it with eight current mainstream algorithms. The algorithm proposed in this paper is shown to be robustly applicable in solving challenging optimization problems. 
近年来,越来越多的行业问题开始采用元启发式方法来解决。本文受船舶操纵运动函数和救助过程的启发,提出了船舶救助优化(SRO)来解决具有挑战性的优化问题。根据被搜寻者的情况,船舶救援过程可分为延迟救援(大面积救援)和即时救援(小范围救援)两种类型,我们可以将这两种类型的救援行为分别对应到搜索空间探索和开发过程中。在此过程中,SRO 根据船舶操纵运动方程模拟船舶救援的运动过程,并最终得出最优位置更新算法。我们在由 CEC2013 和 CEC2017 组成的 57 个测试函数的不同维度以及三个实际工程问题上验证了所提算法的性能,并将其与当前的八种主流算法进行了比较。结果表明,本文提出的算法可以稳健地解决具有挑战性的优化问题。
{"title":"Ship Rescue Optimization: A New Metaheuristic Algorithm for Solving Engineering Problems","authors":"Shu-Chuan Chu Shu-Chuan Chu, Ting-Ting Wang Shu-Chuan Chu, Ali Riza Yildiz Ting-Ting Wang, Jeng-Shyang Pan Ali Riza Yildiz","doi":"10.53106/160792642024012501006","DOIUrl":"https://doi.org/10.53106/160792642024012501006","url":null,"abstract":"\u0000 In recent years, more and more problems in the industry have started to be solved using metaheuristics. In this paper, inspired by the ship maneuvering motion function and the rescue process, we propose ship rescue optimization (SRO) to solve the challenging optimization problem. The ship rescue process can be divided into two types of delayed rescue (large area rescue) and immediate rescue (small rescue) according to the searched person, and we can correspond these two types of rescue behaviors to the search space exploration and exploitation processes, respectively. In this process, SRO simulates the motion process of ship rescue according to the ship maneuvering equation of motion and finally comes up with an optimal position update algorithm. We verified the performance of the proposed algorithm on different dimensions of 57 test functions consisting of CEC2013 and CEC2017 and on three real engineering problems, and compared it with eight current mainstream algorithms. The algorithm proposed in this paper is shown to be robustly applicable in solving challenging optimization problems.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"10 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139637725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DroidExaminer: An Android Malware Hybrid Detection System Based on Ensemble Learning DroidExaminer:基于集合学习的安卓恶意软件混合检测系统
Pub Date : 2024-01-01 DOI: 10.53106/160792642024012501009
Zhongxiang Zhan Zhongxiang Zhan, Sai Ji Zhongxiang Zhan, Wenying Zheng Sai Ji, Dengzhi Liu Wenying Zheng
Android is an open-source mobile operating system, with more than 70% of the mobile market share, widely popular on various intelligent devices. At the same time, the number of new malicious applications keeps increasing every year. In this paper, we first discuss the advantages and disadvantages of various detection methods for malicious software. A single detection method can only cover specific types of malware. Therefore, we propose a system that combines static structural analysis and dynamic detection of malware. This system has dual detection capability, which consists of a client and a server. The client is a lightweight Android application that is used to obtain the relevant data information of the installation package. The server is responsible for static analysis of APK and dynamic running of monitoring logs to get the relevant feature information. Based on the feature information, the Bagging algorithm of ensemble learning is adopted, and the decision tree and random forest are combined to identify the malware accurately. We collected 4210 Android software samples, with malicious apps accounting for about 20% of the total. Cross-testing of malware detection on this sample set showed that DroidExaminer achieved approximately 96% accuracy in detecting malware. It can resist confusion and conversion techniques, and the test performance overhead is less. In addition, DroidExaminer can alert the user to the details of malware intrusion so that the user can prevent malware intrusion. 
安卓(Android)是一种开源移动操作系统,占据了移动市场 70% 以上的份额,在各种智能设备上广泛流行。与此同时,新的恶意程序数量也在逐年增加。本文首先讨论了各种恶意软件检测方法的优缺点。单一的检测方法只能覆盖特定类型的恶意软件。因此,我们提出了一种结合恶意软件静态结构分析和动态检测的系统。该系统具有双重检测能力,由客户端和服务器组成。客户端是一个轻量级的安卓应用程序,用于获取安装包的相关数据信息。服务器负责对 APK 进行静态分析,并动态运行监控日志以获取相关特征信息。根据特征信息,采用集合学习的 Bagging 算法,结合决策树和随机森林对恶意软件进行准确识别。我们收集了 4210 个安卓软件样本,其中恶意应用程序约占总数的 20%。对该样本集进行的恶意软件检测交叉测试表明,DroidExaminer 检测恶意软件的准确率约为 96%。它可以抵御混淆和转换技术,测试性能开销较小。此外,DroidExaminer 还能提醒用户注意恶意软件入侵的细节,以便用户防止恶意软件入侵。
{"title":"DroidExaminer: An Android Malware Hybrid Detection System Based on Ensemble Learning","authors":"Zhongxiang Zhan Zhongxiang Zhan, Sai Ji Zhongxiang Zhan, Wenying Zheng Sai Ji, Dengzhi Liu Wenying Zheng","doi":"10.53106/160792642024012501009","DOIUrl":"https://doi.org/10.53106/160792642024012501009","url":null,"abstract":"\u0000 Android is an open-source mobile operating system, with more than 70% of the mobile market share, widely popular on various intelligent devices. At the same time, the number of new malicious applications keeps increasing every year. In this paper, we first discuss the advantages and disadvantages of various detection methods for malicious software. A single detection method can only cover specific types of malware. Therefore, we propose a system that combines static structural analysis and dynamic detection of malware. This system has dual detection capability, which consists of a client and a server. The client is a lightweight Android application that is used to obtain the relevant data information of the installation package. The server is responsible for static analysis of APK and dynamic running of monitoring logs to get the relevant feature information. Based on the feature information, the Bagging algorithm of ensemble learning is adopted, and the decision tree and random forest are combined to identify the malware accurately. We collected 4210 Android software samples, with malicious apps accounting for about 20% of the total. Cross-testing of malware detection on this sample set showed that DroidExaminer achieved approximately 96% accuracy in detecting malware. It can resist confusion and conversion techniques, and the test performance overhead is less. In addition, DroidExaminer can alert the user to the details of malware intrusion so that the user can prevent malware intrusion.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"25 30","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139631736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DERLight: A Deep Reinforcement Learning Traffic Light Control Algorithm with Dual Experience Replay DERLight:具有双重经验回放功能的深度强化学习交通灯控制算法
Pub Date : 2024-01-01 DOI: 10.53106/160792642024012501007
Zhichao Yang Zhichao Yang, Yan Kong Zhichao Yang, Chih-Hsien Hsia Yan Kong
In recent years, with the increasingly severe traffic environment, most cities are facing various traffic congestion problems, and the demand for intelligent regulation of traffic signals is also increasing. In this study, we propose a new intelligent traffic light control algorithm, dual experience replay light (DERLight), which innovatively and efficiently designs a dual experience replay training mechanism based on the classic deep Q network (DQN) framework and considers the dynamic epoch function. As results show that compared with some state-of-the-art algorithms, DERLight can shorten the average travel time of vehicles, increase the throughput at intersections, and also speed up the convergence of the network. In addition, the design of this algorithm framework is not only limited to the field of intelligent transportation, but also has transferability for some other fields. 
近年来,随着交通环境的日益严峻,大多数城市都面临着各种交通拥堵问题,对交通信号智能调控的要求也越来越高。在本研究中,我们提出了一种新的智能交通信号灯控制算法--双经验重放光(DERLight),该算法基于经典的深度 Q 网络(DQN)框架,并考虑了动态纪元函数,创新性地设计了一种高效的双经验重放训练机制。结果表明,与一些最先进的算法相比,DERLight 可以缩短车辆的平均行驶时间,提高交叉口的吞吐量,还能加快网络的收敛速度。此外,该算法框架的设计不仅局限于智能交通领域,还可应用于其他领域。
{"title":"DERLight: A Deep Reinforcement Learning Traffic Light Control Algorithm with Dual Experience Replay","authors":"Zhichao Yang Zhichao Yang, Yan Kong Zhichao Yang, Chih-Hsien Hsia Yan Kong","doi":"10.53106/160792642024012501007","DOIUrl":"https://doi.org/10.53106/160792642024012501007","url":null,"abstract":"\u0000 In recent years, with the increasingly severe traffic environment, most cities are facing various traffic congestion problems, and the demand for intelligent regulation of traffic signals is also increasing. In this study, we propose a new intelligent traffic light control algorithm, dual experience replay light (DERLight), which innovatively and efficiently designs a dual experience replay training mechanism based on the classic deep Q network (DQN) framework and considers the dynamic epoch function. As results show that compared with some state-of-the-art algorithms, DERLight can shorten the average travel time of vehicles, increase the throughput at intersections, and also speed up the convergence of the network. In addition, the design of this algorithm framework is not only limited to the field of intelligent transportation, but also has transferability for some other fields.\u0000 \u0000","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"52 s39","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139633829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Document Classification Using Lightweight Neural Network 使用轻量级神经网络进行文档分类
Pub Date : 2023-12-01 DOI: 10.53106/160792642023122407012
Chung-Hsing Chen Chung-Hsing Chen, Ko-Wei Huang Chung-Hsing Chen
In recent years, OCR data has been used for learning and analyzing document classification. In addition, some neural networks have used image recognition for training, such as the network published by the ImageNet Large Scale Visual Recognition Challenge for document image training, AlexNet, GoogleNet, and MobileNet. Document image classification is important in data extraction processes and often requires significant computing power. Furthermore, it is difficult to implement image classification using general computers without a graphics processing unit (GPU). Therefore, this study proposes a lightweight neural network application that can perform document image classification on general computers or the Internet of Things (IoT) without a GPU. Plustek Inc. provided 3065 receipts belonging to 58 categories. Three datasets were considered as test samples while the remaining were considered as training samples to train the network to obtain a classifier. After the experiments, the classifier achieved 98.26% accuracy, and only 3 out of 174 samples showed errors.
近年来,OCR 数据已被用于学习和分析文档分类。此外,一些神经网络也利用图像识别进行训练,例如 ImageNet 大规模视觉识别挑战赛发布的用于文档图像训练的网络、AlexNet、GoogleNet 和 MobileNet。文档图像分类在数据提取过程中非常重要,通常需要强大的计算能力。此外,没有图形处理器(GPU)的普通计算机很难实现图像分类。因此,本研究提出了一种轻量级神经网络应用,无需 GPU 即可在普通计算机或物联网(IoT)上执行文档图像分类。Plustek 公司提供了属于 58 个类别的 3065 份收据。其中三个数据集被视为测试样本,其余数据集被视为训练样本,用于训练网络以获得分类器。实验结束后,分类器的准确率达到 98.26%,174 个样本中只有 3 个出现错误。
{"title":"Document Classification Using Lightweight Neural Network","authors":"Chung-Hsing Chen Chung-Hsing Chen, Ko-Wei Huang Chung-Hsing Chen","doi":"10.53106/160792642023122407012","DOIUrl":"https://doi.org/10.53106/160792642023122407012","url":null,"abstract":"In recent years, OCR data has been used for learning and analyzing document classification. In addition, some neural networks have used image recognition for training, such as the network published by the ImageNet Large Scale Visual Recognition Challenge for document image training, AlexNet, GoogleNet, and MobileNet. Document image classification is important in data extraction processes and often requires significant computing power. Furthermore, it is difficult to implement image classification using general computers without a graphics processing unit (GPU). Therefore, this study proposes a lightweight neural network application that can perform document image classification on general computers or the Internet of Things (IoT) without a GPU. Plustek Inc. provided 3065 receipts belonging to 58 categories. Three datasets were considered as test samples while the remaining were considered as training samples to train the network to obtain a classifier. After the experiments, the classifier achieved 98.26% accuracy, and only 3 out of 174 samples showed errors.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"17 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139188001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flow Table Overflow Attacks in Software Defined Networks: A Survey 软件定义网络中的流量表溢出攻击:调查
Pub Date : 2023-12-01 DOI: 10.53106/160792642023122407001
Changqing Zhao Changqing Zhao, Ling Xia Liao Changqing Zhao, Han-Chieh Chao Ling Xia Liao, Roy Xiaorong Lai Han-Chieh Chao, Miao Zhang Roy Xiaorong Lai
While Software-Defined Networks (SDNs) have separated control and data planes and completely decouple the flow control from the data forwarding to enable network flexibility, programmability, and innovation, they also raise serious security concerns in each plane and the interfaces between the two planes. This paper, instead of studying the security issues in the SDN control plane as many literatures have done in current research, focuses on the security issues in the SDN data plane, aiming at the state of the art mechanims to identify, detect, and mitigate them. Specifically, this paper reviews the typical models, detections, and mitigations of SDN flow table overflow attacks. After reviewing the various vulnerabilities in SDNs, this paper categorizes the flow table overflow attacks into saturation, low-rate table exhaustion, and slow saturation attacks, and summarizes the attack models, detections, and mitigations of each category. It reviews the typical attacks that can overflow the flow tables and provides the main challenges and open issues for the future research.
软件定义网络(SDN)将控制平面和数据平面分离,并将流量控制与数据转发完全解耦,从而实现了网络的灵活性、可编程性和创新性,但同时也在每个平面以及两个平面之间的接口上引发了严重的安全问题。本文并不像当前研究中的许多文献那样研究 SDN 控制平面的安全问题,而是重点关注 SDN 数据平面的安全问题,旨在研究识别、检测和缓解这些问题的最新机制。具体来说,本文回顾了 SDN 流量表溢出攻击的典型模型、检测和缓解方法。在回顾了 SDN 中的各种漏洞后,本文将流表溢出攻击分为饱和攻击、低速率表耗尽攻击和慢速饱和攻击,并总结了每类攻击的攻击模型、检测和缓解方法。本文回顾了可能导致流量表溢出的典型攻击,并提出了未来研究的主要挑战和开放性问题。
{"title":"Flow Table Overflow Attacks in Software Defined Networks: A Survey","authors":"Changqing Zhao Changqing Zhao, Ling Xia Liao Changqing Zhao, Han-Chieh Chao Ling Xia Liao, Roy Xiaorong Lai Han-Chieh Chao, Miao Zhang Roy Xiaorong Lai","doi":"10.53106/160792642023122407001","DOIUrl":"https://doi.org/10.53106/160792642023122407001","url":null,"abstract":"While Software-Defined Networks (SDNs) have separated control and data planes and completely decouple the flow control from the data forwarding to enable network flexibility, programmability, and innovation, they also raise serious security concerns in each plane and the interfaces between the two planes. This paper, instead of studying the security issues in the SDN control plane as many literatures have done in current research, focuses on the security issues in the SDN data plane, aiming at the state of the art mechanims to identify, detect, and mitigate them. Specifically, this paper reviews the typical models, detections, and mitigations of SDN flow table overflow attacks. After reviewing the various vulnerabilities in SDNs, this paper categorizes the flow table overflow attacks into saturation, low-rate table exhaustion, and slow saturation attacks, and summarizes the attack models, detections, and mitigations of each category. It reviews the typical attacks that can overflow the flow tables and provides the main challenges and open issues for the future research.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139188221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
網際網路技術學刊
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1