首页 > 最新文献

Journal of Internet Technology最新文献

英文 中文
The Study of a Risk Assessment System based on PageRank 基于PageRank的风险评估系统研究
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-12-01 DOI: 10.3966/160792642019122007022
C. Kuo, C. Hou, Chu-Sing Yang
In recent years, network technology has developed rapidly. However, the Internet has been subject to a variety of attacks. Several notable attack events have been reported, such as those involving the use of flooding flows on widely used message boards, installation of malware in an automated teller machine to steal more than 80 million, and use of WannaCry to encrypt users’ files and request for ransoms. The majority of the attacks cannot be defended using single methods. Network-based intrusion detection systems (NIDSs) and host-based IDSs (HIDSs) can determine whether a system has been attacked. A NIDS alone cannot detect web-based attacks or system vulnerabilities. Thus, this paper proposes a risk assessment system (RAS) that integrates a NIDS and HIDS to detect suspicious behaviors and assess the risk value of Internet protocols (IPs). The RAS focuses on the analysis of attack or suspicious behaviors using the NIDS and HIDS. Furthermore, the system quantizes the influence of attackers in suspicious events by using PageRank. Finally, the RAS derives the risk value of every IP to warn users of an attack and protect hosts or devices from the attacks.
近年来,网络技术发展迅速。然而,互联网一直受到各种各样的攻击。据报道,一些著名的攻击事件涉及在广泛使用的留言板上使用洪水,在自动柜员机中安装恶意软件窃取超过8000万美元,以及使用WannaCry加密用户文件并要求赎金。大多数攻击不能用单一的方法来防御。基于网络的入侵检测系统(nids)和基于主机的入侵检测系统(hids)可以检测系统是否受到攻击。单独的NIDS无法检测基于web的攻击或系统漏洞。因此,本文提出了一种集成了NIDS和HIDS的风险评估系统(RAS),用于检测可疑行为并评估互联网协议(ip)的风险值。RAS侧重于利用入侵防御系统和入侵防御系统分析攻击或可疑行为。此外,该系统利用PageRank量化攻击者在可疑事件中的影响。最后,RAS提取每个IP的风险值,警告用户攻击,保护主机或设备免受攻击。
{"title":"The Study of a Risk Assessment System based on PageRank","authors":"C. Kuo, C. Hou, Chu-Sing Yang","doi":"10.3966/160792642019122007022","DOIUrl":"https://doi.org/10.3966/160792642019122007022","url":null,"abstract":"In recent years, network technology has developed rapidly. However, the Internet has been subject to a variety of attacks. Several notable attack events have been reported, such as those involving the use of flooding flows on widely used message boards, installation of malware in an automated teller machine to steal more than 80 million, and use of WannaCry to encrypt users’ files and request for ransoms. The majority of the attacks cannot be defended using single methods. Network-based intrusion detection systems (NIDSs) and host-based IDSs (HIDSs) can determine whether a system has been attacked. A NIDS alone cannot detect web-based attacks or system vulnerabilities. Thus, this paper proposes a risk assessment system (RAS) that integrates a NIDS and HIDS to detect suspicious behaviors and assess the risk value of Internet protocols (IPs). The RAS focuses on the analysis of attack or suspicious behaviors using the NIDS and HIDS. Furthermore, the system quantizes the influence of attackers in suspicious events by using PageRank. Finally, the RAS derives the risk value of every IP to warn users of an attack and protect hosts or devices from the attacks.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"20 1","pages":"2255-2264"},"PeriodicalIF":1.6,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45236858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A feedback control approach for preventing system resource exhaustion caused by software aging 一种防止软件老化导致系统资源耗尽的反馈控制方法
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-09-01 DOI: 10.3966/160792642019092005017
Yun-Fei Jia, Z. Zhou, R. Wu
The dynamic behavior of software systems attracts widened attention through the phenomenon of software aging. Software aging is caused by runtime environment deterioration, such as the gradual loss of memory or CPU cycles. The dynamic behavior of aged software systems can be described by a set of evolving resource variables, including CPU usage, I/O bandwidth, available memory and the like. From this point of view, an aging software system can be analogous to a dynamic system. Control theory provides sound and rigorous mathematical principles to analyze dynamic systems and build controllers for them. This paper introduces control theory to analyze and build a control model and apply control techniques to an aged web server. First, we treated the software system as a black box, and conducted controlled experiments to build the relationship between input and output. Then, these input-output couples are used to build a control model via a system identification method. Finally, a PI (proportional-integral) controller is designed to adjust the aged state of the software system, and software rejuvenation techniques are customized to target the web server. Performance testing shows that our approach can accurately track the reference value set by the website administrator.
软件系统的动态行为通过软件老化现象引起了广泛的关注。软件老化是由运行时环境恶化引起的,例如内存逐渐丢失或CPU周期逐渐减少。老化软件系统的动态行为可以用一组不断变化的资源变量来描述,包括CPU使用率、I/O带宽、可用内存等。从这个角度来看,一个老化的软件系统可以类似于一个动态系统。控制理论为分析动态系统和为其建立控制器提供了健全和严格的数学原理。本文介绍了控制理论,分析并建立了控制模型,并将控制技术应用于一个老旧的web服务器。首先,我们将软件系统视为一个黑盒子,并进行控制实验来建立输入和输出之间的关系。然后,利用这些输入输出对,通过系统辨识方法建立控制模型。最后,设计了PI(比例积分)控制器来调整软件系统的老化状态,并针对web服务器定制了软件再生技术。性能测试表明,我们的方法可以准确地跟踪网站管理员设置的参考值。
{"title":"A feedback control approach for preventing system resource exhaustion caused by software aging","authors":"Yun-Fei Jia, Z. Zhou, R. Wu","doi":"10.3966/160792642019092005017","DOIUrl":"https://doi.org/10.3966/160792642019092005017","url":null,"abstract":"The dynamic behavior of software systems attracts widened attention through the phenomenon of software aging. Software aging is caused by runtime environment deterioration, such as the gradual loss of memory or CPU cycles. The dynamic behavior of aged software systems can be described by a set of evolving resource variables, including CPU usage, I/O bandwidth, available memory and the like. From this point of view, an aging software system can be analogous to a dynamic system. Control theory provides sound and rigorous mathematical principles to analyze dynamic systems and build controllers for them. This paper introduces control theory to analyze and build a control model and apply control techniques to an aged web server. First, we treated the software system as a black box, and conducted controlled experiments to build the relationship between input and output. Then, these input-output couples are used to build a control model via a system identification method. Finally, a PI (proportional-integral) controller is designed to adjust the aged state of the software system, and software rejuvenation techniques are customized to target the web server. Performance testing shows that our approach can accurately track the reference value set by the website administrator.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"20 1","pages":"1513-1522"},"PeriodicalIF":1.6,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46201519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new method to detect the adversarial attack based on the residual image 提出了一种基于残差图像的对抗攻击检测方法
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-07-01 DOI: 10.3966/160792642019072004028
Feng Sun, Zhenjiang Zhang, Yi-Chih Kao, Tian-zhou Li, Bo Shen
Nowadays, with the development of artificial intelligence, deep learning has attracted more and more attention. Whereas deep neural network has made incredible progress in many domains including Computer Vision, Nature Language Processing, etc, recent studies show that they are vulnerable to the adversarial attacks which takes legitimate images with undetected perturbation as input and can mislead the model to predict incorrect outputs. We consider that the key point of the adversarial attack is the undetected perturbation added to the input. It will be of great significance to eliminate the effect of the added noise. Thus, we design a new, efficient model based on residual image which can detect this potential adversarial attack. We design a method to get the residual image which can capture these possible perturbations. Based on the residual image we got, the detection mechanism can help us detect whether it is an adversarial image or not. A serial of experiments has also been carried out. Subsequent experiments prove that the new detection method can detect the adversarial attack with high effectivity.
如今,随着人工智能的发展,深度学习越来越受到人们的关注。尽管深度神经网络在计算机视觉、自然语言处理等许多领域取得了令人难以置信的进步,但最近的研究表明,它们很容易受到对抗性攻击的影响,这种攻击将具有未检测到的扰动的合法图像作为输入,并可能误导模型预测错误的输出。我们认为对抗性攻击的关键点是在输入中加入未被检测到的扰动。消除附加噪声的影响具有重要意义。因此,我们设计了一种新的基于残差图像的高效模型来检测这种潜在的对抗性攻击。我们设计了一种获取残差图像的方法来捕捉这些可能的扰动。基于我们得到的残差图像,该检测机制可以帮助我们检测图像是否为对抗图像。还进行了一系列的实验。后续实验证明,该检测方法能够有效地检测对抗性攻击。
{"title":"A new method to detect the adversarial attack based on the residual image","authors":"Feng Sun, Zhenjiang Zhang, Yi-Chih Kao, Tian-zhou Li, Bo Shen","doi":"10.3966/160792642019072004028","DOIUrl":"https://doi.org/10.3966/160792642019072004028","url":null,"abstract":"Nowadays, with the development of artificial intelligence, deep learning has attracted more and more attention. Whereas deep neural network has made incredible progress in many domains including Computer Vision, Nature Language Processing, etc, recent studies show that they are vulnerable to the adversarial attacks which takes legitimate images with undetected perturbation as input and can mislead the model to predict incorrect outputs. We consider that the key point of the adversarial attack is the undetected perturbation added to the input. It will be of great significance to eliminate the effect of the added noise. Thus, we design a new, efficient model based on residual image which can detect this potential adversarial attack. We design a method to get the residual image which can capture these possible perturbations. Based on the residual image we got, the detection mechanism can help us detect whether it is an adversarial image or not. A serial of experiments has also been carried out. Subsequent experiments prove that the new detection method can detect the adversarial attack with high effectivity.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"20 1","pages":"1297-1304"},"PeriodicalIF":1.6,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44097567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A(k, p)-anonymity Framework to Sanitize Transactional Database with Personalized Sensitivity 一个(k,p)-匿名框架用于区分具有个性化敏感性的事务数据库
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-05-01 DOI: 10.3966/160792642019052003013
Binbin Zhang, Jerry Chun‐wei Lin, Qiankun Liu, Philippe Fournier-Viger, Y. Djenouri
In recent years, analyzing transactional data has become an important data analytic task since it can discover important information in several domains, for recommendation, prediction, and personalization. Nonetheless, transactional data sometimes contains sensitive and confidential information such as personal identifiers, information aboutsexual orientations, medical diseases, and religious beliefs. Such information can be analyzed using various data mining algorithms, which may cause security threats to individuals. Several algorithms were proposed to hide sensitive information in databases but most of them assume that sensitive information is the same for all users, which is an unrealistic assumption. Hence, this paper presents a (k, p)-anonymity framework to hide personal sensitive information. The developed ANonymity for Transactional database (ANT) algorithm can hide multiple pieces of sensitive information in transactions. Besides, it let users assign sensitivity values to indicate how sensitive each piece of information is. The designed anonymity algorithm ensures that the percentage of anonymized data does not exceed a predefined maximum sensitivity threshold. Results of several experiments indicate that the proposed algorithm outperforms the-state-of-the-art PTA and Gray-TSP algorithms in terms of information loss and runtime.
近年来,分析事务性数据已成为一项重要的数据分析任务,因为它可以发现多个领域的重要信息,用于推荐、预测和个性化。尽管如此,事务性数据有时包含敏感和机密信息,如个人标识符、性取向、医疗疾病和宗教信仰信息。这些信息可以使用各种数据挖掘算法进行分析,这可能会对个人造成安全威胁。提出了几种隐藏数据库敏感信息的算法,但大多数算法都假设所有用户的敏感信息是相同的,这是不现实的假设。因此,本文提出了一个(k, p)-匿名框架来隐藏个人敏感信息。提出的事务数据库匿名(ANT)算法可以隐藏事务中的多条敏感信息。此外,它还允许用户指定敏感性值,以指示每条信息的敏感程度。设计的匿名算法确保匿名数据的百分比不超过预定义的最大灵敏度阈值。实验结果表明,该算法在信息丢失和运行时间方面优于目前最先进的PTA和Gray-TSP算法。
{"title":"A(k, p)-anonymity Framework to Sanitize Transactional Database with Personalized Sensitivity","authors":"Binbin Zhang, Jerry Chun‐wei Lin, Qiankun Liu, Philippe Fournier-Viger, Y. Djenouri","doi":"10.3966/160792642019052003013","DOIUrl":"https://doi.org/10.3966/160792642019052003013","url":null,"abstract":"In recent years, analyzing transactional data has become an important data analytic task since it can discover important information in several domains, for recommendation, prediction, and personalization. Nonetheless, transactional data sometimes contains sensitive and confidential information such as personal identifiers, information aboutsexual orientations, medical diseases, and religious beliefs. Such information can be analyzed using various data mining algorithms, which may cause security threats to individuals. Several algorithms were proposed to hide sensitive information in databases but most of them assume that sensitive information is the same for all users, which is an unrealistic assumption. Hence, this paper presents a (k, p)-anonymity framework to hide personal sensitive information. The developed ANonymity for Transactional database (ANT) algorithm can hide multiple pieces of sensitive information in transactions. Besides, it let users assign sensitivity values to indicate how sensitive each piece of information is. The designed anonymity algorithm ensures that the percentage of anonymized data does not exceed a predefined maximum sensitivity threshold. Results of several experiments indicate that the proposed algorithm outperforms the-state-of-the-art PTA and Gray-TSP algorithms in terms of information loss and runtime.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"20 1","pages":"801-808"},"PeriodicalIF":1.6,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47087062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A study of using syntactic cues in short-text similarity measure 句法线索在短文本相似性度量中的应用研究
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-05-01 DOI: 10.3966/160792642019052003017
Po-Sen Huang, Po-Sheng Chiu, Jia-Wei Chang, Yueh-Min Huang, Ming-Che Lee
Short-text semantic similarity is an essential technique of natural language search and is widely used in social network analysis and opinion mining to find unknown knowledge. Such similarity measures usually measure short texts with 10-20 words. Similar to spoken utterances, short texts do not necessarily follow formal grammatical rules. The limited information contained in short texts and their syntactic and semantic flexibility make similarity measures difficult. Therefore, this study designed and tested a part-of-speech-based short-text similarity algorithm to solve those problems. The effects of evaluating different parts of speech are thoroughly discussed. The proposed algorithm achieved the best performance using word measures corresponding to different parts of speech.
短文本语义相似度是自然语言搜索的一项重要技术,广泛应用于社交网络分析和观点挖掘中,以发现未知知识。这种相似性度量通常测量10-20个单词的短文本。与口语类似,短文不一定遵循形式语法规则。短文本中所包含的有限信息及其句法和语义的灵活性使得相似性度量变得困难。因此,本研究设计并测试了一种基于词性的短文本相似度算法来解决这些问题。对评价不同词性的效果进行了深入的讨论。所提出的算法使用与不同词性相对应的单词测量来获得最佳性能。
{"title":"A study of using syntactic cues in short-text similarity measure","authors":"Po-Sen Huang, Po-Sheng Chiu, Jia-Wei Chang, Yueh-Min Huang, Ming-Che Lee","doi":"10.3966/160792642019052003017","DOIUrl":"https://doi.org/10.3966/160792642019052003017","url":null,"abstract":"Short-text semantic similarity is an essential technique of natural language search and is widely used in social network analysis and opinion mining to find unknown knowledge. Such similarity measures usually measure short texts with 10-20 words. Similar to spoken utterances, short texts do not necessarily follow formal grammatical rules. The limited information contained in short texts and their syntactic and semantic flexibility make similarity measures difficult. Therefore, this study designed and tested a part-of-speech-based short-text similarity algorithm to solve those problems. The effects of evaluating different parts of speech are thoroughly discussed. The proposed algorithm achieved the best performance using word measures corresponding to different parts of speech.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"20 1","pages":"839-850"},"PeriodicalIF":1.6,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47170271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A fuel-efficient route plan method based on game theory 一种基于博弈论的节能路线规划方法
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-05-01 DOI: 10.3966/160792642019052003024
Chi-Lun Lo, Chi-Hua Chen, Jin-Li Hu, Kuen-Rong Lo, Hsun-Jung Cho
This study adopts a fuel consumption estimation method to measure the consumed fuel quantity of each vehicle speed interval (i.e., a cost function) in accordance with individual behaviors. Furthermore, a mobile app is designed to consider the best responses of other route plan apps (e.g., the shortest route plan app and the fast route plan app) and plan the most fuel-efficient route according to the consumed fuel quantity. The numerical analysis results show that the proposed fuel-efficient route plan app can effectively support fuel-saving for logistics industries.
本研究采用油耗估计方法,根据个体行为测量每个车速区间的油耗(即成本函数)。此外,移动应用程序旨在考虑其他路线计划应用程序(例如,最短路线计划应用和快速路线计划应用)的最佳响应,并根据消耗的燃油量规划最省油的路线。数值分析结果表明,所提出的节能路线规划应用程序可以有效地支持物流行业的节能。
{"title":"A fuel-efficient route plan method based on game theory","authors":"Chi-Lun Lo, Chi-Hua Chen, Jin-Li Hu, Kuen-Rong Lo, Hsun-Jung Cho","doi":"10.3966/160792642019052003024","DOIUrl":"https://doi.org/10.3966/160792642019052003024","url":null,"abstract":"This study adopts a fuel consumption estimation method to measure the consumed fuel quantity of each vehicle speed interval (i.e., a cost function) in accordance with individual behaviors. Furthermore, a mobile app is designed to consider the best responses of other route plan apps (e.g., the shortest route plan app and the fast route plan app) and plan the most fuel-efficient route according to the consumed fuel quantity. The numerical analysis results show that the proposed fuel-efficient route plan app can effectively support fuel-saving for logistics industries.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"20 1","pages":"925-932"},"PeriodicalIF":1.6,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47295538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An Empirical Evaluation of Online Cooperative Programming Platforms Based on the PACT Framework and Technology Readiness 基于PACT框架和技术成熟度的在线合作编程平台的实证评估
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-03-01 DOI: 10.3966/160792642019032002003
Yi-Wen Liao, Yueh-Min Huang, Y. Huang, Zhiyun Su, C. Wei
Programming instruction helps students develop critical-thinking and problem-solving skills, and is also important for the development of professional talent in the information technology sector. Cooperative learning has been shown to promote innovative educational applications while enhancing learning motivation and performance. Referring to the People, Activities, Context, Technologies (PACT) framework and the theory of technology readiness, this study explores factors that affect continued use intention and learning performance for students using an online cooperative programming (OCP) platform. A total of 120 students were invited to participate in the programming course. Students were asked to complete programming projects on the OCP platform and fill out a questionnaire. A causal model was proposed and examined using a partial least squares regression. The results show that optimism/ innovativeness in technology readiness and trust among team members both have a positive impact on user satisfaction using the platform. In addition, both user satisfaction and trust encourage continued use intention and improve learning performance. The findings can help educators and researchers promote the development of programming teaching and learning.
编程指导可以帮助学生培养批判性思维和解决问题的能力,对培养信息技术领域的专业人才也很重要。合作学习已被证明可以促进创新的教育应用,同时提高学习动机和绩效。本研究以人、活动、情境、技术(People, Activities, Context, Technologies, PACT)框架和技术准备度理论为基础,探讨了影响在线合作规划(online cooperative programming, OCP)平台学生持续使用意愿和学习绩效的因素。共有120名学生获邀参加程式设计课程。学生们被要求在OCP平台上完成编程项目,并填写一份问卷。提出了一个因果模型,并使用偏最小二乘回归进行了检验。结果表明,技术准备的乐观/创新和团队成员之间的信任对用户使用平台的满意度都有积极的影响。此外,用户满意度和信任都鼓励持续使用意图,提高学习绩效。这些发现可以帮助教育工作者和研究人员促进编程教学和学习的发展。
{"title":"An Empirical Evaluation of Online Cooperative Programming Platforms Based on the PACT Framework and Technology Readiness","authors":"Yi-Wen Liao, Yueh-Min Huang, Y. Huang, Zhiyun Su, C. Wei","doi":"10.3966/160792642019032002003","DOIUrl":"https://doi.org/10.3966/160792642019032002003","url":null,"abstract":"Programming instruction helps students develop critical-thinking and problem-solving skills, and is also important for the development of professional talent in the information technology sector. Cooperative learning has been shown to promote innovative educational applications while enhancing learning motivation and performance. Referring to the People, Activities, Context, Technologies (PACT) framework and the theory of technology readiness, this study explores factors that affect continued use intention and learning performance for students using an online cooperative programming (OCP) platform. A total of 120 students were invited to participate in the programming course. Students were asked to complete programming projects on the OCP platform and fill out a questionnaire. A causal model was proposed and examined using a partial least squares regression. The results show that optimism/ innovativeness in technology readiness and trust among team members both have a positive impact on user satisfaction using the platform. In addition, both user satisfaction and trust encourage continued use intention and improve learning performance. The findings can help educators and researchers promote the development of programming teaching and learning.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"20 1","pages":"345-352"},"PeriodicalIF":1.6,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47606553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Method of Driving Characteristics Recognition on Vehicle Operation Sequence 一种基于车辆操作序列的驾驶特征识别方法
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-01-01 DOI: 10.3966/160792642019102006029
Yu Zhang, Bo Shen, Yi-Chih Kao, Hsin-Hung Chou
Driving behavior has been proved to have a great influence on road safety. Recognizing driving characteristic is an essential part of reducing traffic fatalities and developing intelligent traffic system. In this paper, we propose a method of driving characteristics recognition through mining vehicle operation data such as GPS, velocity and direction collected by the On-Board Diagnostic (OBD) port of vehicles. Based on the feature extracted from the vehicle operation sequence, we employ K-means algorithm to cluster and recognize different driving characteristics after reasonable normalization and dimensionality reduction of the features. Analysis and experimental results indicate that the proposed method has good application significance on mining effective information in vehicle operation data sequence.
驾驶行为已被证明对道路安全有很大的影响。驾驶特征识别是降低交通事故死亡率和发展智能交通系统的重要组成部分。本文提出了一种利用车载诊断(OBD)端口采集的GPS、速度、方向等矿用车辆运行数据进行驾驶特征识别的方法。基于从车辆运行序列中提取的特征,采用K-means算法对特征进行合理归一化和降维后聚类识别不同的驾驶特征。分析和实验结果表明,该方法对挖掘车辆运行数据序列中的有效信息具有良好的应用意义。
{"title":"A Method of Driving Characteristics Recognition on Vehicle Operation Sequence","authors":"Yu Zhang, Bo Shen, Yi-Chih Kao, Hsin-Hung Chou","doi":"10.3966/160792642019102006029","DOIUrl":"https://doi.org/10.3966/160792642019102006029","url":null,"abstract":"Driving behavior has been proved to have a great influence on road safety. Recognizing driving characteristic is an essential part of reducing traffic fatalities and developing intelligent traffic system. In this paper, we propose a method of driving characteristics recognition through mining vehicle operation data such as GPS, velocity and direction collected by the On-Board Diagnostic (OBD) port of vehicles. Based on the feature extracted from the vehicle operation sequence, we employ K-means algorithm to cluster and recognize different driving characteristics after reasonable normalization and dimensionality reduction of the features. Analysis and experimental results indicate that the proposed method has good application significance on mining effective information in vehicle operation data sequence.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"20 1","pages":"2007-2014"},"PeriodicalIF":1.6,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70039283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing Google Trends with Travel Keyword Rankings to Predict Tourists into a Group 利用旅游关键词排名分析谷歌趋势,预测游客群体
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-01-01 DOI: 10.3966/160792642019012001023
Jui-Hung Chang, Chien-Yuan Tseng
This study explored the correlation between tourism-related popular words in search engines and the number of tourists, which is a topic worth discussing for the tourism industry. When individuals decide to sign up for a tour planned by travel agencies, they often have no idea whether the minimum number of participants will be reached until it is confirmed a few days before the departure, which is of great inconvenience when arranging itineraries. Hence, predicting whether the minimum number of participants in a tour can be reached is closely related to both the tourism industry and the tourists. In this regard, the number of Taiwanese traveling to Japan was predicted based on the popularity of keywords concerning travel in Japan searched on Google Trends. The scores of popular words concerning travel in Japan on the Google search engine and words concerning travel in Japan mentioned in tourism articles in e-news networks were also summarized. The experimental results indicated that the popularity of tourism keywords on Google was highly correlated to the number of Taiwanese tourists traveling to Japan. After the number of Taiwanese traveling to Japan within the following month was classified by the ANN model, the mean square error reached 0.13. Furthermore, by using the data of travel agencies in Taiwan to match the Google Trends data, the research predicted whether tours to Hokkaido would reach the minimum requirement for participants. The prediction accuracy of the ANN model was 68%.
本研究探讨了搜索引擎中与旅游相关的热门词汇与游客数量之间的相关性,这是一个值得旅游行业探讨的话题。当个人决定报名参加旅行社计划的旅游时,他们往往不知道是否能达到最低参加人数,直到出发前几天才能确定,这给安排行程带来了极大的不便。因此,预测一次旅游是否能达到最小参与人数与旅游业和游客密切相关。因此,根据谷歌Trends上有关日本旅游的关键词的搜索次数,预测了台湾赴日旅游人数。并对谷歌搜索引擎上有关日本旅游的热门词汇得分和电子新闻网络旅游文章中有关日本旅游的词汇得分进行了总结。实验结果显示,旅游关键词在谷歌上的受欢迎程度与台湾赴日旅游人数高度相关。用ANN模型对接下来一个月台湾人赴日旅游人数进行分类后,均方误差达到0.13。此外,本研究利用台湾旅行社的数据与谷歌Trends的数据相匹配,预测前往北海道的旅游是否达到参与者的最低要求。人工神经网络模型的预测准确率为68%。
{"title":"Analyzing Google Trends with Travel Keyword Rankings to Predict Tourists into a Group","authors":"Jui-Hung Chang, Chien-Yuan Tseng","doi":"10.3966/160792642019012001023","DOIUrl":"https://doi.org/10.3966/160792642019012001023","url":null,"abstract":"This study explored the correlation between tourism-related popular words in search engines and the number of tourists, which is a topic worth discussing for the tourism industry. When individuals decide to sign up for a tour planned by travel agencies, they often have no idea whether the minimum number of participants will be reached until it is confirmed a few days before the departure, which is of great inconvenience when arranging itineraries. Hence, predicting whether the minimum number of participants in a tour can be reached is closely related to both the tourism industry and the tourists. In this regard, the number of Taiwanese traveling to Japan was predicted based on the popularity of keywords concerning travel in Japan searched on Google Trends. The scores of popular words concerning travel in Japan on the Google search engine and words concerning travel in Japan mentioned in tourism articles in e-news networks were also summarized. The experimental results indicated that the popularity of tourism keywords on Google was highly correlated to the number of Taiwanese tourists traveling to Japan. After the number of Taiwanese traveling to Japan within the following month was classified by the ANN model, the mean square error reached 0.13. Furthermore, by using the data of travel agencies in Taiwan to match the Google Trends data, the research predicted whether tours to Hokkaido would reach the minimum requirement for participants. The prediction accuracy of the ANN model was 68%.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"20 1","pages":"247-256"},"PeriodicalIF":1.6,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70039243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Development of the Sentence-based Collocation Recommender with Error Detection for Academic Writing 基于句子的学术写作搭配推荐错误检测系统的设计与开发
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-01-01 DOI: 10.3966/160792642019012001021
C. Kao, Jia-Wei Chang, Tzone-I Wang, Yueh-Min Huang, Po-Sheng Chiu
Appropriate collocations in writing of research papers in English can make the context smoother and expression of ideas more precise. In consequence, it is easier for the reader to understand and the purpose of sharing the outcome of research is accomplished. However, for non-native English speakers, the choice and use of collocations is very difficult. For this reason, this study is intended to refer to a large amount of high-quality academic literature to establish a collocation corpus and adopt natural language processing techniques and statistical methods to develop a collocation recommendation system. The system will allow users to enter sentences, automatically detect the locations and types of collocations and recommend synonymous collocations in accordance with the semantics and frequency of use. The fitness of collocations in the system for beginning sentences achieves 73.1%. Writers of academic papers can use the system to select appropriate collocations, reduce erroneous use of collocations and improve the quality of their papers.
在英语研究论文写作中,适当的搭配可以使语境更加流畅,思想表达更加准确。因此,读者更容易理解,并实现了分享研究成果的目的。然而,对于非英语母语的人来说,搭配的选择和使用是非常困难的。因此,本研究拟参考大量高质量的学术文献建立搭配语料库,并采用自然语言处理技术和统计方法开发搭配推荐系统。该系统将允许用户输入句子,自动检测搭配的位置和类型,并根据语义和使用频率推荐同义词搭配。系统对开始句的搭配适应度达到73.1%。学术论文的作者可以使用该系统来选择合适的搭配,减少搭配的错误使用,提高论文的质量。
{"title":"Design and Development of the Sentence-based Collocation Recommender with Error Detection for Academic Writing","authors":"C. Kao, Jia-Wei Chang, Tzone-I Wang, Yueh-Min Huang, Po-Sheng Chiu","doi":"10.3966/160792642019012001021","DOIUrl":"https://doi.org/10.3966/160792642019012001021","url":null,"abstract":"Appropriate collocations in writing of research papers in English can make the context smoother and expression of ideas more precise. In consequence, it is easier for the reader to understand and the purpose of sharing the outcome of research is accomplished. However, for non-native English speakers, the choice and use of collocations is very difficult. For this reason, this study is intended to refer to a large amount of high-quality academic literature to establish a collocation corpus and adopt natural language processing techniques and statistical methods to develop a collocation recommendation system. The system will allow users to enter sentences, automatically detect the locations and types of collocations and recommend synonymous collocations in accordance with the semantics and frequency of use. The fitness of collocations in the system for beginning sentences achieves 73.1%. Writers of academic papers can use the system to select appropriate collocations, reduce erroneous use of collocations and improve the quality of their papers.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"20 1","pages":"229-236"},"PeriodicalIF":1.6,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70039697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Journal of Internet Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1