首页 > 最新文献

International Journal of Communication Networks and Information Security (IJCNIS)最新文献

英文 中文
Research on Flood Disaster Monitoring and Early Warning Technology Based on UAV Remote Sensing and AI Algorithm 基于无人机遥感和人工智能算法的洪水灾害监测与预警技术研究
Pub Date : 2024-07-25 DOI: 10.17762/ijcnis.v16i2.6635
Zhongliang Zhang, Changyuan Wang
This paper, based on UAV far-flung sensing science and synthetic brain algorithm, studies the monitoring and early warning technological know-how of flood catastrophes. Firstly, the far-flung sensing monitoring science of flood catastrophes is summarized. Then, blended with geographic records machine (GIS) technology, the UAV far-flung sensing science software in flood catastrophe monitoring is analyzed. Finally, combining the micro-UAV technological know-how and AI technology, the key applied sciences of the micro-UAV flood catastrophe monitoring and early warning device primarily based on AI imaginative and prescient are studied, along with the lookup of the micro-UAV key gadget and the lookup of AI imaginative and prescient key technology. The key device lookup of micro-UAV is the definition of mindset. Mindset A mindset lookup on key applied sciences of AI, imaginative and prescient broadly speaking, expounds the precept of CNN and introduces Faster RCNN. It lays the groundwork for the later lookup on flood catastrophe monitoring and early warning technological know-how primarily based on UAV far-off sensing and AI algorithms.
本文基于无人机远感科学和合成大脑算法,研究了洪涝灾害监测预警技术诀窍。首先,总结了洪水灾害的远感监测科学。然后,结合地理信息系统(GIS)技术,分析了无人机远感科学软件在洪水灾害监测中的应用。最后,将微型无人机技术与人工智能技术相结合,研究了基于人工智能预想的微型无人机洪涝灾害监测预警装置的关键应用技术,以及微型无人机关键设备的查找和人工智能预想关键技术的查找。微型无人机关键设备的查找是思维方式的定义。思维模式 关于人工智能关键应用科学的思维模式查询,广义上的想象力和预知力,阐述了 CNN 的概念,并介绍了 Faster RCNN。它为后面基于无人机远距离传感和人工智能算法的洪水灾害监测和预警技术知识的研究奠定了基础。
{"title":"Research on Flood Disaster Monitoring and Early Warning Technology Based on UAV Remote Sensing and AI Algorithm","authors":"Zhongliang Zhang, Changyuan Wang","doi":"10.17762/ijcnis.v16i2.6635","DOIUrl":"https://doi.org/10.17762/ijcnis.v16i2.6635","url":null,"abstract":"This paper, based on UAV far-flung sensing science and synthetic brain algorithm, studies the monitoring and early warning technological know-how of flood catastrophes. Firstly, the far-flung sensing monitoring science of flood catastrophes is summarized. Then, blended with geographic records machine (GIS) technology, the UAV far-flung sensing science software in flood catastrophe monitoring is analyzed. Finally, combining the micro-UAV technological know-how and AI technology, the key applied sciences of the micro-UAV flood catastrophe monitoring and early warning device primarily based on AI imaginative and prescient are studied, along with the lookup of the micro-UAV key gadget and the lookup of AI imaginative and prescient key technology. The key device lookup of micro-UAV is the definition of mindset. Mindset A mindset lookup on key applied sciences of AI, imaginative and prescient broadly speaking, expounds the precept of CNN and introduces Faster RCNN. It lays the groundwork for the later lookup on flood catastrophe monitoring and early warning technological know-how primarily based on UAV far-off sensing and AI algorithms.","PeriodicalId":503773,"journal":{"name":"International Journal of Communication Networks and Information Security (IJCNIS)","volume":"56 42","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141804902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Optimization of Communication Network Security and Intelligent Supervision Model in Urban Community Aging Adaptation Renovation 城市社区适老化改造中通信网络安全优化与智能监管模式研究
Pub Date : 2024-07-25 DOI: 10.17762/ijcnis.v16i2.6637
Liu Yang
In the process of increasing the number of elderly people, their care and attention have received greater attention, which has made traditional community environments face insufficient data encryption performance and data mining services in the communication network security of aging communities. This has made communication security optimization and intelligent monitoring models in urban community aging adaptation and transformation a focus of research in the field of data communication security. This study delves into the improvement and enhancement of intelligent monitoring models for communication network security in urban communities. Its goal is to improve the security and intelligent monitoring mode of data communication networks during the transformation process through technological innovation and progress in management practices, and further improve the security performance of data communication. This research has solved the communication network security problems existing in intelligent devices and Internet services in the community aging transformation. Through the analysis of improvement strategies, this article compares the basic performance indicators of data encryption, firewall performance, data analysis and mining, and intelligent recommendation in communication network security and intelligent recommendation between different models. The optimization of communication network security in urban community aging adaptation can ensure the data security of terminal devices and further improve and enhance intelligent recommendation services for aging, providing more references and suggestions for communication network security and intelligent monitoring.
在老龄人口数量不断增加的过程中,对他们的关怀和照顾受到了更大的关注,这使得传统社区环境在老龄化社区通信网络安全方面面临着数据加密性能和数据挖掘服务不足的问题。这使得城市社区老龄化适应和转型中的通信安全优化和智能监控模式成为数据通信安全领域的研究重点。本研究深入探讨了城市社区通信网络安全智能监控模型的改进和提升。其目标是通过技术创新和管理实践的进步,完善转型过程中数据通信网络的安全智能监控模式,进一步提高数据通信的安全性能。本研究解决了社区老龄化改造中智能设备和互联网服务存在的通信网络安全问题。本文通过对改进策略的分析,对通信网络安全中的数据加密、防火墙性能、数据分析与挖掘、智能推荐等基本性能指标进行了比较,并在不同模型之间进行了智能推荐。城市社区老龄化适配中通信网络安全的优化,可以保障终端设备的数据安全,进一步完善和提升老龄化智能推荐服务,为通信网络安全和智能监控提供更多参考和建议。
{"title":"Research on Optimization of Communication Network Security and Intelligent Supervision Model in Urban Community Aging Adaptation Renovation","authors":"Liu Yang","doi":"10.17762/ijcnis.v16i2.6637","DOIUrl":"https://doi.org/10.17762/ijcnis.v16i2.6637","url":null,"abstract":"In the process of increasing the number of elderly people, their care and attention have received greater attention, which has made traditional community environments face insufficient data encryption performance and data mining services in the communication network security of aging communities. This has made communication security optimization and intelligent monitoring models in urban community aging adaptation and transformation a focus of research in the field of data communication security. This study delves into the improvement and enhancement of intelligent monitoring models for communication network security in urban communities. Its goal is to improve the security and intelligent monitoring mode of data communication networks during the transformation process through technological innovation and progress in management practices, and further improve the security performance of data communication. This research has solved the communication network security problems existing in intelligent devices and Internet services in the community aging transformation. Through the analysis of improvement strategies, this article compares the basic performance indicators of data encryption, firewall performance, data analysis and mining, and intelligent recommendation in communication network security and intelligent recommendation between different models. The optimization of communication network security in urban community aging adaptation can ensure the data security of terminal devices and further improve and enhance intelligent recommendation services for aging, providing more references and suggestions for communication network security and intelligent monitoring.","PeriodicalId":503773,"journal":{"name":"International Journal of Communication Networks and Information Security (IJCNIS)","volume":"44 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141802535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preserving the Integrity of Li Yu's Craft Aesthetics using the Digital Information Technology 利用数字信息技术保护李渔工艺美学的完整性
Pub Date : 2024-01-07 DOI: 10.17762/ijcnis.v15i4.6314
Shan Liu
Preserving the integrity of ancient aesthetic works has become a greater matter of concern in the modern digital age. As the internet is streaming with data that are collected from multiple sources, it imposes a severe threat to the integrity and security of the original aesthetic of many craft works. This paper proposes a novel framework that attempts to preserve Li Yu's craft aesthetics, which can be explored from his wide range of literary collections. As the author is popular for his excellence in many art forms like gardening, theatre arts, etc, recreation of his work is a major problem of concern. The framework initially pre-processed the corpus to extract keywords, which are then subjected to a semantic vector to find the closely related as well as differing words. Then, these words are subjected to geometric perturbations to impart versatility to the training phase. The text under screening is fed to the classification phase to find whether it is an altered or modified work of Li Yu, thus isolating the author's work from being reproduced, which greatly affects the aesthetics. As a future extension, the work can be trained with different classifiers to develop a defrauding system.
在现代数字时代,保护古代美学作品的完整性已成为一个更值得关注的问题。由于互联网上的数据流是从多个来源收集的,这对许多工艺美术作品原有美学的完整性和安全性构成了严重威胁。本文提出了一个新颖的框架,试图保存李渔的工艺美学,并可从其广泛的文学收藏中进行探索。由于作者在园艺、戏剧艺术等多种艺术形式上的卓越成就广受欢迎,其作品的再现是一个值得关注的重要问题。该框架首先对语料库进行预处理以提取关键词,然后对关键词进行语义向量处理,找出密切相关和不同的词。然后,对这些词进行几何扰动,为训练阶段提供多功能性。被筛选的文本将被送入分类阶段,以确定其是否为李煜的篡改或修改作品,从而避免作者的作品被复制,因为这将极大地影响美感。作为未来的扩展,这项工作可以用不同的分类器进行训练,从而开发出一个欺诈系统。
{"title":"Preserving the Integrity of Li Yu's Craft Aesthetics using the Digital Information Technology","authors":"Shan Liu","doi":"10.17762/ijcnis.v15i4.6314","DOIUrl":"https://doi.org/10.17762/ijcnis.v15i4.6314","url":null,"abstract":"Preserving the integrity of ancient aesthetic works has become a greater matter of concern in the modern digital age. As the internet is streaming with data that are collected from multiple sources, it imposes a severe threat to the integrity and security of the original aesthetic of many craft works. This paper proposes a novel framework that attempts to preserve Li Yu's craft aesthetics, which can be explored from his wide range of literary collections. As the author is popular for his excellence in many art forms like gardening, theatre arts, etc, recreation of his work is a major problem of concern. The framework initially pre-processed the corpus to extract keywords, which are then subjected to a semantic vector to find the closely related as well as differing words. Then, these words are subjected to geometric perturbations to impart versatility to the training phase. The text under screening is fed to the classification phase to find whether it is an altered or modified work of Li Yu, thus isolating the author's work from being reproduced, which greatly affects the aesthetics. As a future extension, the work can be trained with different classifiers to develop a defrauding system.","PeriodicalId":503773,"journal":{"name":"International Journal of Communication Networks and Information Security (IJCNIS)","volume":"65 14","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139449136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Research into Dark Mode: A Systematic Review Using Two-Stage Approach and S-O-R Framework 黑暗模式研究:采用两阶段法和 S-O-R 框架的系统综述
Pub Date : 2024-01-01 DOI: 10.17762/ijcnis.v15i4.6301
Aiyi Yang, Chu Hiang Goh, Lim Jing Yi
Dark mode in mobile applications has drawn widespread attention in business, and many users choose to use dark mode in their mobile applications for different purposes. However, it is still an emerging field in the academic circle, as there are not many systematic studies on the definition and concept of dark mode. Besides, scarce are the scholarly inferences regarding contemporary investigative undertakings and future advancements concerning the dark mode. The pros and cons of dark mode are still debatable. In order to bridge this gap, this paper undertook a comprehensive evaluation of the scholarship concerning dark mode across diverse disciplines, with the aim of building a fundamental research process for studying the concept of dark mode and user experience to establish a more robust groundwork for further exploration of the correlation between dark mode and user experience. Based on the Scopus database, this paper searched and collected articles on dark mode research within the last 30 years via the two-step approach. Thirty-five articles were selected based on the inclusion and exclusion criteria. This paper first analysed the themes, background, theoretical foundations and research methods on dark mode. Then it classified and integrated the variable factors of dark mode research based on the Stimulus-Organism-Response (S-O-R) framework. It ultimately proposed a research framework explaining the more profound concept of dark mode and the relationship between variable factors, user experience, and their behaviours. In addition, this paper also identified existing gaps in the current document studies and outlined potential opportunities for future research on dark mode.
移动应用中的暗模式已引起商业界的广泛关注,许多用户出于不同目的选择在其移动应用中使用暗模式。然而,在学术界,它仍是一个新兴领域,因为对暗黑模式的定义和概念的系统研究并不多。此外,有关暗模式的当代调查工作和未来进展的学术推论也很少。关于暗黑模式的利弊仍存在争议。为了弥补这一不足,本文对不同学科中有关暗模式的学术研究进行了全面评估,旨在建立一个研究暗模式概念和用户体验的基础研究流程,为进一步探索暗模式与用户体验之间的相关性奠定更坚实的基础。本文以 Scopus 数据库为基础,通过两步法搜索并收集了过去 30 年中有关暗模式研究的文章。根据纳入和排除标准,共筛选出 35 篇文章。本文首先分析了暗黑模式的主题、背景、理论基础和研究方法。然后,根据刺激-组织-反应(S-O-R)框架对暗黑模式研究的可变因素进行了分类和整合。最终提出了一个研究框架,解释了更深层次的暗模式概念,以及变量因素、用户体验及其行为之间的关系。此外,本文还指出了当前文献研究中存在的不足,并概述了未来暗模式研究的潜在机会。
{"title":"The Research into Dark Mode: A Systematic Review Using Two-Stage Approach and S-O-R Framework","authors":"Aiyi Yang, Chu Hiang Goh, Lim Jing Yi","doi":"10.17762/ijcnis.v15i4.6301","DOIUrl":"https://doi.org/10.17762/ijcnis.v15i4.6301","url":null,"abstract":"Dark mode in mobile applications has drawn widespread attention in business, and many users choose to use dark mode in their mobile applications for different purposes. However, it is still an emerging field in the academic circle, as there are not many systematic studies on the definition and concept of dark mode. Besides, scarce are the scholarly inferences regarding contemporary investigative undertakings and future advancements concerning the dark mode. The pros and cons of dark mode are still debatable. In order to bridge this gap, this paper undertook a comprehensive evaluation of the scholarship concerning dark mode across diverse disciplines, with the aim of building a fundamental research process for studying the concept of dark mode and user experience to establish a more robust groundwork for further exploration of the correlation between dark mode and user experience. Based on the Scopus database, this paper searched and collected articles on dark mode research within the last 30 years via the two-step approach. Thirty-five articles were selected based on the inclusion and exclusion criteria. This paper first analysed the themes, background, theoretical foundations and research methods on dark mode. Then it classified and integrated the variable factors of dark mode research based on the Stimulus-Organism-Response (S-O-R) framework. It ultimately proposed a research framework explaining the more profound concept of dark mode and the relationship between variable factors, user experience, and their behaviours. In addition, this paper also identified existing gaps in the current document studies and outlined potential opportunities for future research on dark mode.","PeriodicalId":503773,"journal":{"name":"International Journal of Communication Networks and Information Security (IJCNIS)","volume":"89 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139394005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Communication Networks and Information Security (IJCNIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1