首页 > 最新文献

Journal of Internet Technology最新文献

英文 中文
A Novel Mechanism for Anomaly Removal of Firewall Filtering Rules 一种新的防火墙过滤规则异常去除机制
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-07-01 DOI: 10.3966/160792642020072104005
C. Chao, Stephen J. H. Yang
Firewalls are always treated as the core devices for network security to protect networks from being attacked. Still, properly configuring firewall rules is no easy task due to its laboring and time-consuming characteristic. In some cases, firewall rules need to be added, deleted, modified, or order-changed from time to time to fit in the dynamic of network traffic. As a result, firewalls are subject to rule anomalies caused by misconfigurations such that network security holes can be created accordingly, and then damage the managed networks and even worse the firewalls themselves. In this paper, an enhanced firewall rule management approach is proposed where it can not only pinpoint the anomalies among firewall rules effectively and efficiently, but also provide a novel mechanism for correct and speedy removal of rule anomalies. As a demonstration, a visualized firewall rule anomaly removal system has been realized and performance evaluations on anomaly removal have been also conducted, in which our developed mechanism shows its excellence and feasibility.
防火墙一直被视为网络安全的核心设备,保护网络免受攻击。尽管如此,正确配置防火墙规则并不是一件容易的事,因为它费时费力。在某些情况下,需要不时地添加、删除、修改或更改防火墙规则,以适应网络流量的动态变化。由于配置错误,防火墙容易出现规则异常,造成网络安全漏洞,进而破坏被管理的网络,甚至破坏防火墙本身。本文提出了一种增强的防火墙规则管理方法,该方法不仅可以有效地发现防火墙规则之间的异常,而且为正确快速地删除规则异常提供了一种新的机制。作为演示,实现了一个可视化的防火墙规则异常清除系统,并进行了异常清除的性能评估,表明了所开发机制的优越性和可行性。
{"title":"A Novel Mechanism for Anomaly Removal of Firewall Filtering Rules","authors":"C. Chao, Stephen J. H. Yang","doi":"10.3966/160792642020072104005","DOIUrl":"https://doi.org/10.3966/160792642020072104005","url":null,"abstract":"Firewalls are always treated as the core devices for network security to protect networks from being attacked. Still, properly configuring firewall rules is no easy task due to its laboring and time-consuming characteristic. In some cases, firewall rules need to be added, deleted, modified, or order-changed from time to time to fit in the dynamic of network traffic. As a result, firewalls are subject to rule anomalies caused by misconfigurations such that network security holes can be created accordingly, and then damage the managed networks and even worse the firewalls themselves. In this paper, an enhanced firewall rule management approach is proposed where it can not only pinpoint the anomalies among firewall rules effectively and efficiently, but also provide a novel mechanism for correct and speedy removal of rule anomalies. As a demonstration, a visualized firewall rule anomaly removal system has been realized and performance evaluations on anomaly removal have been also conducted, in which our developed mechanism shows its excellence and feasibility.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"21 1","pages":"949-957"},"PeriodicalIF":1.6,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46997444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Compression-friendly Image Encryption Algorithm Based on Order Relation 基于顺序关系的图像压缩友好加密算法
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-07-01 DOI: 10.3966/160792642020072104011
G. Gankhuyag, Yoonsik Choe
In this paper, we introduce an image encryption algorithm that can be used in combination with compression algorithms. Existing encryption algorithms focus on either encryption strength or speed without compression, whereas the proposed algorithm improves compression efficiency while ensuring security. Our encryption algorithm decomposes images into pixel values and pixel intensity subsets, and computes the order of permutations. An encrypted image becomes unpredictable after permutation. Order permutation reduces the discontinuity between signals in an image, increasing compression efficiency. The experimental results show that the security strength of the proposed algorithm is similar to that of existing algorithms. Additionally, we tested the algorithm on the JPEG and the JPEG2000 with variable compression ratios. Compared to existing methods applied without encryption, the proposed algorithm significantly increases PSNR and SSIM values.
在本文中,我们介绍了一种可以与压缩算法结合使用的图像加密算法。现有的加密算法在没有压缩的情况下注重加密强度或速度,而所提出的算法在确保安全的同时提高了压缩效率。我们的加密算法将图像分解为像素值和像素强度子集,并计算排列顺序。加密图像在排列后变得不可预测。顺序排列减少了图像中信号之间的不连续性,提高了压缩效率。实验结果表明,该算法的安全强度与现有算法相似。此外,我们在JPEG和具有可变压缩比的JPEG2000上测试了该算法。与现有的不加密方法相比,该算法显著提高了PSNR和SSIM值。
{"title":"Compression-friendly Image Encryption Algorithm Based on Order Relation","authors":"G. Gankhuyag, Yoonsik Choe","doi":"10.3966/160792642020072104011","DOIUrl":"https://doi.org/10.3966/160792642020072104011","url":null,"abstract":"In this paper, we introduce an image encryption algorithm that can be used in combination with compression algorithms. Existing encryption algorithms focus on either encryption strength or speed without compression, whereas the proposed algorithm improves compression efficiency while ensuring security. Our encryption algorithm decomposes images into pixel values and pixel intensity subsets, and computes the order of permutations. An encrypted image becomes unpredictable after permutation. Order permutation reduces the discontinuity between signals in an image, increasing compression efficiency. The experimental results show that the security strength of the proposed algorithm is similar to that of existing algorithms. Additionally, we tested the algorithm on the JPEG and the JPEG2000 with variable compression ratios. Compared to existing methods applied without encryption, the proposed algorithm significantly increases PSNR and SSIM values.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"21 1","pages":"1013-1023"},"PeriodicalIF":1.6,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45290399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced appearance-based finger detection and tracking using finite state machine control 使用有限状态机控制增强基于外观的手指检测和跟踪
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-07-01 DOI: 10.3966/160792642020072104017
Noorkholis Luthfil Hakim, T. Shih, Lin Hui
Real-time finger detection and tracking systems have been growing rapidly in the past decade. Among those methods, Appearance-based and Model-based methods have produced excellent results. However, the occlusion issue is one of the main challenges in this field. In this study, we address this issue by considering the repeating-finite gestures of a guitar-strumming or a hand puppet and, represent using a Finite State Machine model. Also we proposed a novel finger pose tracking system using FSM Model combining with the appearance-based method.. The proposed system consists of two parts: FSM-FT builder creates the FSM hand, and the FSM-FT runner controls the FSM-FT system. Empirically, we conducted an experimental study involving one sample repeating hand gesture and our approach achieved a significance recognition rate of 82% in the testing phase.
实时手指检测和跟踪系统在过去十年中发展迅速。其中,基于外观的方法和基于模型的方法取得了很好的效果。然而,遮挡问题是该领域的主要挑战之一。在本研究中,我们通过考虑吉他弹奏或手偶的重复有限手势来解决这个问题,并使用有限状态机模型表示。在此基础上,提出了一种基于FSM模型和基于外观方法的手指姿态跟踪系统。该系统由两部分组成:FSM- ft生成器创建FSM手,FSM- ft流道控制FSM- ft系统。在实证研究中,我们进行了一个样本重复手势的实验研究,我们的方法在测试阶段达到了82%的显著性识别率。
{"title":"Enhanced appearance-based finger detection and tracking using finite state machine control","authors":"Noorkholis Luthfil Hakim, T. Shih, Lin Hui","doi":"10.3966/160792642020072104017","DOIUrl":"https://doi.org/10.3966/160792642020072104017","url":null,"abstract":"Real-time finger detection and tracking systems have been growing rapidly in the past decade. Among those methods, Appearance-based and Model-based methods have produced excellent results. However, the occlusion issue is one of the main challenges in this field. In this study, we address this issue by considering the repeating-finite gestures of a guitar-strumming or a hand puppet and, represent using a Finite State Machine model. Also we proposed a novel finger pose tracking system using FSM Model combining with the appearance-based method.. The proposed system consists of two parts: FSM-FT builder creates the FSM hand, and the FSM-FT runner controls the FSM-FT system. Empirically, we conducted an experimental study involving one sample repeating hand gesture and our approach achieved a significance recognition rate of 82% in the testing phase.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"21 1","pages":"1087-1096"},"PeriodicalIF":1.6,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41937390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The demodulating and encoding heritage (DEH) platform for mobile digital culture heritage (M-DCH) 移动数字文化遗产(M-DCH)解调编码遗产(DEH)平台
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-05-01 DOI: 10.3966/160792642020052103014
Chung-Ming Huang, Yi Guo
This work designed and developed an innovative Mobile Digital Culture Heritage (M-DCH) platform called Demodulating and Encoding Heritage (DEH) to allow users to have the on-site exploring of the culture heritage using handheld devices and wireless mobile networks. Since most of the current M-DCH platforms (i) view a heritage object as a point and (ii) do not have the group-like authoring scenario, main innovations of the DEH platform are twofold. (1) DEH interprets M-DCH’s contents from the viewpoint of Point of Interest (POI), Line of Interest (LOI), Area of Interest (AOI), and Story/Site of Interest (SOI). The authors’ roles of POIs/LOIs/AOIs/SOIs can be classified as player (regular users), expert and narrator. The work defines the logic rules of composing some POIs (POIs, LOIs and/or AOIs) into a LOI/AOI (SOI) according to (i) the author’s role and (ii) the status, which can be (i) public or private and (ii) successfully verified, unsuccessfully verified or un-verified of the corresponding LOI/AOI (SOI). (2) DEH defines a new grouping function that allows the group creator to have the privilege of modifying contents created by group members. Details of the functional specification, system design and usage examples of DEH’s APPs and web are presented.
这项工作设计并开发了一个名为解调和编码遗产(DEH)的创新移动数字文化遗产(M-DCH)平台,允许用户使用手持设备和无线移动网络对文化遗产进行现场探索。由于目前的大多数M-DCH平台(i)将遗产对象视为一个点,(ii)没有类似群体的创作场景,因此DEH平台的主要创新有两个方面。(1) DEH从兴趣点(POI)、兴趣线(LOI)、兴趣区(AOI)和故事/兴趣点(SOI)的角度解释M-DCH的内容。POI/LOIs/AOI/SOI的作者角色可以分为玩家(常规用户)、专家和叙述者。该工作定义了根据(i)作者的角色和(ii)状态将一些POI(POI、LOI和/或AOI)组成LOI/AOI(SOI)的逻辑规则,该逻辑规则可以是(i)公共或私有的,以及(ii)相应的LOI/AOI(SOI)的成功验证、未成功验证或未验证的。(2) DEH定义了一个新的分组功能,允许组创建者有权修改组成员创建的内容。详细介绍了DEH应用程序和网络的功能说明、系统设计和使用实例。
{"title":"The demodulating and encoding heritage (DEH) platform for mobile digital culture heritage (M-DCH)","authors":"Chung-Ming Huang, Yi Guo","doi":"10.3966/160792642020052103014","DOIUrl":"https://doi.org/10.3966/160792642020052103014","url":null,"abstract":"This work designed and developed an innovative Mobile Digital Culture Heritage (M-DCH) platform called Demodulating and Encoding Heritage (DEH) to allow users to have the on-site exploring of the culture heritage using handheld devices and wireless mobile networks. Since most of the current M-DCH platforms (i) view a heritage object as a point and (ii) do not have the group-like authoring scenario, main innovations of the DEH platform are twofold. (1) DEH interprets M-DCH’s contents from the viewpoint of Point of Interest (POI), Line of Interest (LOI), Area of Interest (AOI), and Story/Site of Interest (SOI). The authors’ roles of POIs/LOIs/AOIs/SOIs can be classified as player (regular users), expert and narrator. The work defines the logic rules of composing some POIs (POIs, LOIs and/or AOIs) into a LOI/AOI (SOI) according to (i) the author’s role and (ii) the status, which can be (i) public or private and (ii) successfully verified, unsuccessfully verified or un-verified of the corresponding LOI/AOI (SOI). (2) DEH defines a new grouping function that allows the group creator to have the privilege of modifying contents created by group members. Details of the functional specification, system design and usage examples of DEH’s APPs and web are presented.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"21 1","pages":"765-781"},"PeriodicalIF":1.6,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47874248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SAR Image Segmentation with Structure Tensor Based Hierarchical Student’s t-Mixture Model 基于结构张量的分层学生t混合模型的SAR图像分割
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-05-01 DOI: 10.3966/160792642020052103001
Huilin Ge, Yahui Sun, Yueh Min Huang, S. Lim
Synthetic aperture radar (SAR) plays an important role in Satellite IoT, due to its remarkable capability of all-weather monitoring and information acquisition under complicated conditions. It is well-known that SAR image interpretation usually requires accurate segmentation. However, SAR image segmentation inevitably encounters speckle noise because of the unique imaging mechanism of SAR. In order to address the problem, we proposed SAR images segmentation method by combined a hierarchical Student’s t-mixture model (HSMM) with an anisotropic mean template, which can divide the global SAR image segmentation into several sub-clustering-issues efficiently resolved using classical algorithm. With the aid of a non-linear structure tensor for image contents analysis, the adaptive template can explore more spatial correlations between pixels for the purpose of improving HSMM robustness and segmentation accuracy. Experiments results both synthetic and real SAR images demonstrate that our proposed HSMM is more robust to speckle noise and obtains more accurate segmented images.
合成孔径雷达(SAR)在复杂条件下具有卓越的全天候监测和信息采集能力,在卫星物联网中发挥着重要作用。众所周知,SAR图像解释通常需要精确的分割。然而,由于SAR独特的成像机制,SAR图像分割不可避免地会遇到散斑噪声。为了解决这一问题,我们提出了一种将分层的Student t混合模型(HSMM)与各向异性均值模板相结合的SAR图像分割方法,该方法可以将全局SAR图像分割划分为几个子聚类问题,并使用经典算法有效地解决了这些问题。借助于用于图像内容分析的非线性结构张量,自适应模板可以探索像素之间更多的空间相关性,以提高HSMM的鲁棒性和分割精度。合成和真实SAR图像的实验结果表明,我们提出的HSMM对散斑噪声具有更强的鲁棒性,并获得了更准确的分割图像。
{"title":"SAR Image Segmentation with Structure Tensor Based Hierarchical Student’s t-Mixture Model","authors":"Huilin Ge, Yahui Sun, Yueh Min Huang, S. Lim","doi":"10.3966/160792642020052103001","DOIUrl":"https://doi.org/10.3966/160792642020052103001","url":null,"abstract":"Synthetic aperture radar (SAR) plays an important role in Satellite IoT, due to its remarkable capability of all-weather monitoring and information acquisition under complicated conditions. It is well-known that SAR image interpretation usually requires accurate segmentation. However, SAR image segmentation inevitably encounters speckle noise because of the unique imaging mechanism of SAR. In order to address the problem, we proposed SAR images segmentation method by combined a hierarchical Student’s t-mixture model (HSMM) with an anisotropic mean template, which can divide the global SAR image segmentation into several sub-clustering-issues efficiently resolved using classical algorithm. With the aid of a non-linear structure tensor for image contents analysis, the adaptive template can explore more spatial correlations between pixels for the purpose of improving HSMM robustness and segmentation accuracy. Experiments results both synthetic and real SAR images demonstrate that our proposed HSMM is more robust to speckle noise and obtains more accurate segmented images.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"21 1","pages":"615-628"},"PeriodicalIF":1.6,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47749215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Learning Approaches for Dynamic Object Understanding and Defect Detection 用于动态对象理解和缺陷检测的深度学习方法
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-05-01 DOI: 10.3966/160792642020052103015
Yuan Chang, W. Gunarathne, T. Shih
Industrial product defect detection has been known for a while to make sure the released products meet the expected requirements. Earlier, product defect detection was commonly done manually by humans; they have detected whether the products consist of defects or not by using their human senses based on the standard. In this industrial era, product defect detection is expected to be faster and more accurate, while humans could be exhausted and become slower and less reliable. Deep learning technology is very famous in the field of image processing, such as image classification, object detection, object tracking, and of course the defect detection. In this study, we propose a novel automated solution system to identify the good and defective products on a production line using deep learning technology. In the experiment, we have compared several algorithms of defect detections using a data set, which comprises 20 categories of objects and 50 images in each category. The experimental results demonstrated that the proposed system had produced effective results within a short time.
工业产品缺陷检测已经有一段时间了,以确保发布的产品符合预期的要求。早些时候,产品缺陷检测通常由人工手动完成;他们以标准为基础,通过人的感官来检测产品是否存在缺陷。在这个工业时代,产品缺陷检测被期望更快、更准确,而人类可能会筋疲力尽,变得更慢、更不可靠。深度学习技术在图像处理领域非常有名,比如图像分类、对象检测、对象跟踪,当然还有缺陷检测。在本研究中,我们提出了一种新的自动化解决方案系统,用于使用深度学习技术识别生产线上的优质和次品。在实验中,我们使用一个数据集比较了几种缺陷检测算法,该数据集包含20个对象类别和每个类别中的50个图像。实验结果表明,该系统在短时间内取得了较好的效果。
{"title":"Deep Learning Approaches for Dynamic Object Understanding and Defect Detection","authors":"Yuan Chang, W. Gunarathne, T. Shih","doi":"10.3966/160792642020052103015","DOIUrl":"https://doi.org/10.3966/160792642020052103015","url":null,"abstract":"Industrial product defect detection has been known for a while to make sure the released products meet the expected requirements. Earlier, product defect detection was commonly done manually by humans; they have detected whether the products consist of defects or not by using their human senses based on the standard. In this industrial era, product defect detection is expected to be faster and more accurate, while humans could be exhausted and become slower and less reliable. Deep learning technology is very famous in the field of image processing, such as image classification, object detection, object tracking, and of course the defect detection. In this study, we propose a novel automated solution system to identify the good and defective products on a production line using deep learning technology. In the experiment, we have compared several algorithms of defect detections using a data set, which comprises 20 categories of objects and 50 images in each category. The experimental results demonstrated that the proposed system had produced effective results within a short time.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"21 1","pages":"783-790"},"PeriodicalIF":1.6,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46578363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart Hat: Design and Implementation of a Wearable Learning Device for Kids Using AI and IoTs Techniques 智能帽子:使用AI和IoT技术设计和实现儿童可穿戴学习设备
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-03-01 DOI: 10.3966/160792642020032102026
I-Hsiung Chang, H. Keh, Bhargavi Dande, D. S. Roy
Internet of Things (IoT) and Artificial Intelligence (AI) have received much attention in recent years. Embedded with sensors and connected to the Internet, the IoT device can collect massive data and interact with a human. The data collected by IoT can be further analyzed by applying AI mechanisms for exploring the information behind the data and then have impacts on the interactions between human and things. This paper aims to design and implement a Smart Hat, which is a wearable device and majorly applies the IoT and AI technologies, aiming to help a kid for exploring knowledge in a manner of easy, active, and aggressive. The designed Smart Hat can identify objects in the outside environment and give output as an audio format, which adopts the IoT and AI technologies. The learning Smart Hat intends to help kids aid them in the primary learning task of identifying objects without the supervision of the third party (parents, teachers, others etc.,) in real life. This Smart Hat device provides a sophisticated technology to kids for easy, active, and aggressive learning in daily life. Performance studies show that the obtained results are promising and very satisfactory.
物联网(IoT)和人工智能(AI)近年来备受关注。物联网设备嵌入传感器并连接到互联网,可以收集大量数据并与人类互动。物联网收集的数据可以通过应用人工智能机制来进一步分析,以探索数据背后的信息,然后对人与物之间的互动产生影响。本文旨在设计和实现一款智能帽,这是一款可穿戴设备,主要应用物联网和人工智能技术,旨在帮助孩子以轻松、主动和积极的方式探索知识。设计的智能帽可以识别外部环境中的物体,并以音频格式输出,采用了物联网和人工智能技术。学习智能帽旨在帮助孩子们在现实生活中在没有第三方(父母、老师、其他人等)监督的情况下完成识别物体的主要学习任务。这款智能帽子设备为孩子们提供了一项先进的技术,让他们在日常生活中轻松、主动、积极地学习。性能研究表明,所获得的结果是有希望的,并且非常令人满意。
{"title":"Smart Hat: Design and Implementation of a Wearable Learning Device for Kids Using AI and IoTs Techniques","authors":"I-Hsiung Chang, H. Keh, Bhargavi Dande, D. S. Roy","doi":"10.3966/160792642020032102026","DOIUrl":"https://doi.org/10.3966/160792642020032102026","url":null,"abstract":"Internet of Things (IoT) and Artificial Intelligence (AI) have received much attention in recent years. Embedded with sensors and connected to the Internet, the IoT device can collect massive data and interact with a human. The data collected by IoT can be further analyzed by applying AI mechanisms for exploring the information behind the data and then have impacts on the interactions between human and things. This paper aims to design and implement a Smart Hat, which is a wearable device and majorly applies the IoT and AI technologies, aiming to help a kid for exploring knowledge in a manner of easy, active, and aggressive. The designed Smart Hat can identify objects in the outside environment and give output as an audio format, which adopts the IoT and AI technologies. The learning Smart Hat intends to help kids aid them in the primary learning task of identifying objects without the supervision of the third party (parents, teachers, others etc.,) in real life. This Smart Hat device provides a sophisticated technology to kids for easy, active, and aggressive learning in daily life. Performance studies show that the obtained results are promising and very satisfactory.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"21 1","pages":"593-604"},"PeriodicalIF":1.6,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44616873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Comparative Performance Evaluation of Popular Virtual Private Servers 流行的虚拟专用服务器性能比较评价
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-03-01 DOI: 10.3966/160792642020032102003
J. Balen, Denis Vajak, K. Salah
Virtual Private Server (VPS) enables user access to an operating system instance with a fine-grained control of private software and hardware resources. Many various factors can affect VPS performance and they primarily include physical server hardware specifications, installed operating system, virtualization layer, and the underlying network infrastructure. Therefore, it is very important to properly select a VPS host that meets users, applications and services resource and performance requirements. This paper presents a performance evaluation of three popular VPS hosts; namely Digital Ocean, Linode and VULTR. Performance measurement was conducted under the same controlled conditions for all three VPS hosts using a popular benchmark application for Unix operating systems - UnixBench. Three performance evaluation experiments with a focus on examining and studying key performance metrics which include CPU scheduling, memory management, hard disk drive management and Unix operating system task scheduling, were conducted. Performance easurement results show that VULTR achieves the best results under most of the tests in the first two experiments making it the best choice for low demand users, while DigitalOcean achieves the best results in the third experiment making it the best solution for high demand users who are looking for a high performance VPS.
虚拟专用服务器(Virtual Private Server, VPS)通过对专用软件和硬件资源的细粒度控制,使用户能够访问操作系统实例。影响VPS性能的因素很多,主要包括物理服务器硬件规格、安装的操作系统、虚拟化层和底层网络基础设施。因此,合理选择满足用户、应用和业务资源和性能要求的VPS主机非常重要。本文对三种流行的VPS主机进行了性能评价;即数字海洋,Linode和VULTR。在相同的控制条件下,使用Unix操作系统的流行基准测试应用程序UnixBench对所有三个VPS主机进行性能测量。针对CPU调度、内存管理、硬盘驱动器管理和Unix操作系统任务调度等关键性能指标,进行了三个性能评估实验。性能测试结果表明,VULTR在前两次实验的大部分测试下都取得了最好的结果,是低需求用户的最佳选择,而DigitalOcean在第三次实验中取得了最好的结果,是高需求用户寻找高性能VPS的最佳解决方案。
{"title":"Comparative Performance Evaluation of Popular Virtual Private Servers","authors":"J. Balen, Denis Vajak, K. Salah","doi":"10.3966/160792642020032102003","DOIUrl":"https://doi.org/10.3966/160792642020032102003","url":null,"abstract":"Virtual Private Server (VPS) enables user access to an operating system instance with a fine-grained control of private software and hardware resources. Many various factors can affect VPS performance and they primarily include physical server hardware specifications, installed operating system, virtualization layer, and the underlying network infrastructure. Therefore, it is very important to properly select a VPS host that meets users, applications and services resource and performance requirements. This paper presents a performance evaluation of three popular VPS hosts; namely Digital Ocean, Linode and VULTR. Performance measurement was conducted under the same controlled conditions for all three VPS hosts using a popular benchmark application for Unix operating systems - UnixBench. Three performance evaluation experiments with a focus on examining and studying key performance metrics which include CPU scheduling, memory management, hard disk drive management and Unix operating system task scheduling, were conducted. Performance easurement results show that VULTR achieves the best results under most of the tests in the first two experiments making it the best choice for low demand users, while DigitalOcean achieves the best results in the third experiment making it the best solution for high demand users who are looking for a high performance VPS.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"21 1","pages":"343-356"},"PeriodicalIF":1.6,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45210160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Deep Learning-Based Strategy to the Energy Management-Advice for Time-of-Use Rate of Household Electricity Consumption 基于深度学习的能源管理策略——家庭用电量分时利用率建议
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-01-01 DOI: 10.3966/160792642020012101026
Lu-Xian Wu, Shin-Jye Lee
With the high industrialization at a rapid pace, the demand for energy increases exponentially, but it is difficult to meet the balance of demand and supply. Therefore, how to effectively meet the balance of demand and supply intelligently has become a popular issue in this century. In recent years, Taiwan Power Company (Taipower), the biggest electric company in Taiwan, is committed to the construction of Advanced Metering Infrastructure (AMI), which provides communication channels and enables demand-side users to participate in load dispatch. On the other hand, the construction of AMI is expected to generate a tremendous number of valuable data on electricity consumption, but it is not easy to convert these data into effective information by the conventional quantitative methods. In as much as the rapid progression of AI technology in the industrial field, the application of AI technology in the technology management has become an increasing issue as an interdisciplinary study. To address this task, this work applies the recurrent neural network based on deep learning to predict low-voltage usage shortly by the electricity information of low-voltage user and meteorological data. After many vicissitudes, the electricity consumption per hour can be predicted and a sound energy arrangement can be therefore planned. Through introducing the proposed model, Taipower Company will have an effective capability that schedules power, reduces unnecessary backup power, and provides time-consuming electricity prices for industrial enterprises accurately among high usage of Taiwan industries.
随着高度工业化的快速发展,对能源的需求呈指数级增长,但难以实现供需平衡。因此,如何有效地实现智能化的供需平衡已成为本世纪的热门课题。近年来,台湾最大的电力公司台湾电力公司(Taipower)致力于建设先进计量基础设施(AMI),提供通信渠道,使需求侧用户参与负荷调度。另一方面,AMI的建设有望产生大量有价值的用电量数据,但传统的定量方法很难将这些数据转化为有效的信息。随着人工智能技术在工业领域的快速发展,人工智能技术在技术管理中的应用作为一门跨学科的研究已经成为一个日益突出的问题。为了解决这个问题,本工作应用基于深度学习的递归神经网络,通过低压用户的电力信息和气象数据来预测短期低压使用情况。经过多次沧桑,可以预测每小时的用电量,从而规划出合理的能源安排。通过引入本模型,台湾电力公司将具有有效的能力,在台湾工业的高使用率中,为工业企业准确地调度电力,减少不必要的备用电力,并提供耗时电价。
{"title":"A Deep Learning-Based Strategy to the Energy Management-Advice for Time-of-Use Rate of Household Electricity Consumption","authors":"Lu-Xian Wu, Shin-Jye Lee","doi":"10.3966/160792642020012101026","DOIUrl":"https://doi.org/10.3966/160792642020012101026","url":null,"abstract":"With the high industrialization at a rapid pace, the demand for energy increases exponentially, but it is difficult to meet the balance of demand and supply. Therefore, how to effectively meet the balance of demand and supply intelligently has become a popular issue in this century. In recent years, Taiwan Power Company (Taipower), the biggest electric company in Taiwan, is committed to the construction of Advanced Metering Infrastructure (AMI), which provides communication channels and enables demand-side users to participate in load dispatch. On the other hand, the construction of AMI is expected to generate a tremendous number of valuable data on electricity consumption, but it is not easy to convert these data into effective information by the conventional quantitative methods. In as much as the rapid progression of AI technology in the industrial field, the application of AI technology in the technology management has become an increasing issue as an interdisciplinary study. To address this task, this work applies the recurrent neural network based on deep learning to predict low-voltage usage shortly by the electricity information of low-voltage user and meteorological data. After many vicissitudes, the electricity consumption per hour can be predicted and a sound energy arrangement can be therefore planned. Through introducing the proposed model, Taipower Company will have an effective capability that schedules power, reduces unnecessary backup power, and provides time-consuming electricity prices for industrial enterprises accurately among high usage of Taiwan industries.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"21 1","pages":"305-311"},"PeriodicalIF":1.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70039349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimizing Ontology Alignment in Vector Space 向量空间本体对齐优化
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-01-01 DOI: 10.3966/160792642020012101002
S. Chu, Xingsi Xue, Jeng-Shyang Pan, Xiaojing Wu
Ontology matching technique aims at determining the identical entities, which can effectively solve the ontology heterogeneity problem and implement the collaborations among ontology-based intelligent systems. Typically, an ontology consists of a set of concepts which are described by various properties, and they define a space such that each distinct concept and property represents one dimension in that space. Therefore, it is an effective way to model an ontology in a vector space, and use the vector space based similarity measure to calculate two entities’ similarity. In this work, the entities’ structure information is utilized to model an ontology in a vector space, and then, their linguistic information is used to reduce the number of dimensions, which can improve the efficiency of the similarity calculation and entity matching process. After that, a discrete optimization model is constructed for the ontology matching problem, and a compact Evolutionary Algorithm (cEA) based ontology matching technique is proposed to efficiently address it. The experiment uses the benchmark track provided by Ontology Alignment Evaluation Initiative (OAEI) to test our proposal’s performance, and the comparing results with state-of-the-art ontology matching systems show that our approach can efficiently determine high-quality ontology alignments.
本体匹配技术旨在确定相同的实体,从而有效地解决本体异构问题,实现基于本体的智能系统之间的协作。通常,本体由一组由不同属性描述的概念组成,它们定义了一个空间,使每个不同的概念和属性代表该空间的一个维度。因此,在向量空间中对本体进行建模,并利用基于向量空间的相似度度量来计算两个实体的相似度是一种有效的方法。本文首先利用实体的结构信息在向量空间中对本体进行建模,然后利用实体的语言信息对本体进行降维,从而提高相似性计算和实体匹配过程的效率。在此基础上,建立了本体匹配问题的离散优化模型,提出了一种紧凑的基于进化算法的本体匹配技术。实验使用本体对齐评估计划(OAEI)提供的基准跟踪来测试我们的提议的性能,并与最先进的本体匹配系统进行比较,结果表明我们的方法可以有效地确定高质量的本体对齐。
{"title":"Optimizing Ontology Alignment in Vector Space","authors":"S. Chu, Xingsi Xue, Jeng-Shyang Pan, Xiaojing Wu","doi":"10.3966/160792642020012101002","DOIUrl":"https://doi.org/10.3966/160792642020012101002","url":null,"abstract":"Ontology matching technique aims at determining the identical entities, which can effectively solve the ontology heterogeneity problem and implement the collaborations among ontology-based intelligent systems. Typically, an ontology consists of a set of concepts which are described by various properties, and they define a space such that each distinct concept and property represents one dimension in that space. Therefore, it is an effective way to model an ontology in a vector space, and use the vector space based similarity measure to calculate two entities’ similarity. In this work, the entities’ structure information is utilized to model an ontology in a vector space, and then, their linguistic information is used to reduce the number of dimensions, which can improve the efficiency of the similarity calculation and entity matching process. After that, a discrete optimization model is constructed for the ontology matching problem, and a compact Evolutionary Algorithm (cEA) based ontology matching technique is proposed to efficiently address it. The experiment uses the benchmark track provided by Ontology Alignment Evaluation Initiative (OAEI) to test our proposal’s performance, and the comparing results with state-of-the-art ontology matching systems show that our approach can efficiently determine high-quality ontology alignments.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"21 1","pages":"15-22"},"PeriodicalIF":1.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70039296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
期刊
Journal of Internet Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1