Pub Date : 2024-07-25DOI: 10.17762/ijcnis.v16i2.6635
Zhongliang Zhang, Changyuan Wang
This paper, based on UAV far-flung sensing science and synthetic brain algorithm, studies the monitoring and early warning technological know-how of flood catastrophes. Firstly, the far-flung sensing monitoring science of flood catastrophes is summarized. Then, blended with geographic records machine (GIS) technology, the UAV far-flung sensing science software in flood catastrophe monitoring is analyzed. Finally, combining the micro-UAV technological know-how and AI technology, the key applied sciences of the micro-UAV flood catastrophe monitoring and early warning device primarily based on AI imaginative and prescient are studied, along with the lookup of the micro-UAV key gadget and the lookup of AI imaginative and prescient key technology. The key device lookup of micro-UAV is the definition of mindset. Mindset A mindset lookup on key applied sciences of AI, imaginative and prescient broadly speaking, expounds the precept of CNN and introduces Faster RCNN. It lays the groundwork for the later lookup on flood catastrophe monitoring and early warning technological know-how primarily based on UAV far-off sensing and AI algorithms.
{"title":"Research on Flood Disaster Monitoring and Early Warning Technology Based on UAV Remote Sensing and AI Algorithm","authors":"Zhongliang Zhang, Changyuan Wang","doi":"10.17762/ijcnis.v16i2.6635","DOIUrl":"https://doi.org/10.17762/ijcnis.v16i2.6635","url":null,"abstract":"This paper, based on UAV far-flung sensing science and synthetic brain algorithm, studies the monitoring and early warning technological know-how of flood catastrophes. Firstly, the far-flung sensing monitoring science of flood catastrophes is summarized. Then, blended with geographic records machine (GIS) technology, the UAV far-flung sensing science software in flood catastrophe monitoring is analyzed. Finally, combining the micro-UAV technological know-how and AI technology, the key applied sciences of the micro-UAV flood catastrophe monitoring and early warning device primarily based on AI imaginative and prescient are studied, along with the lookup of the micro-UAV key gadget and the lookup of AI imaginative and prescient key technology. The key device lookup of micro-UAV is the definition of mindset. Mindset A mindset lookup on key applied sciences of AI, imaginative and prescient broadly speaking, expounds the precept of CNN and introduces Faster RCNN. It lays the groundwork for the later lookup on flood catastrophe monitoring and early warning technological know-how primarily based on UAV far-off sensing and AI algorithms.","PeriodicalId":503773,"journal":{"name":"International Journal of Communication Networks and Information Security (IJCNIS)","volume":"56 42","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141804902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-25DOI: 10.17762/ijcnis.v16i2.6637
Liu Yang
In the process of increasing the number of elderly people, their care and attention have received greater attention, which has made traditional community environments face insufficient data encryption performance and data mining services in the communication network security of aging communities. This has made communication security optimization and intelligent monitoring models in urban community aging adaptation and transformation a focus of research in the field of data communication security. This study delves into the improvement and enhancement of intelligent monitoring models for communication network security in urban communities. Its goal is to improve the security and intelligent monitoring mode of data communication networks during the transformation process through technological innovation and progress in management practices, and further improve the security performance of data communication. This research has solved the communication network security problems existing in intelligent devices and Internet services in the community aging transformation. Through the analysis of improvement strategies, this article compares the basic performance indicators of data encryption, firewall performance, data analysis and mining, and intelligent recommendation in communication network security and intelligent recommendation between different models. The optimization of communication network security in urban community aging adaptation can ensure the data security of terminal devices and further improve and enhance intelligent recommendation services for aging, providing more references and suggestions for communication network security and intelligent monitoring.
{"title":"Research on Optimization of Communication Network Security and Intelligent Supervision Model in Urban Community Aging Adaptation Renovation","authors":"Liu Yang","doi":"10.17762/ijcnis.v16i2.6637","DOIUrl":"https://doi.org/10.17762/ijcnis.v16i2.6637","url":null,"abstract":"In the process of increasing the number of elderly people, their care and attention have received greater attention, which has made traditional community environments face insufficient data encryption performance and data mining services in the communication network security of aging communities. This has made communication security optimization and intelligent monitoring models in urban community aging adaptation and transformation a focus of research in the field of data communication security. This study delves into the improvement and enhancement of intelligent monitoring models for communication network security in urban communities. Its goal is to improve the security and intelligent monitoring mode of data communication networks during the transformation process through technological innovation and progress in management practices, and further improve the security performance of data communication. This research has solved the communication network security problems existing in intelligent devices and Internet services in the community aging transformation. Through the analysis of improvement strategies, this article compares the basic performance indicators of data encryption, firewall performance, data analysis and mining, and intelligent recommendation in communication network security and intelligent recommendation between different models. The optimization of communication network security in urban community aging adaptation can ensure the data security of terminal devices and further improve and enhance intelligent recommendation services for aging, providing more references and suggestions for communication network security and intelligent monitoring.","PeriodicalId":503773,"journal":{"name":"International Journal of Communication Networks and Information Security (IJCNIS)","volume":"44 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141802535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-07DOI: 10.17762/ijcnis.v15i4.6314
Shan Liu
Preserving the integrity of ancient aesthetic works has become a greater matter of concern in the modern digital age. As the internet is streaming with data that are collected from multiple sources, it imposes a severe threat to the integrity and security of the original aesthetic of many craft works. This paper proposes a novel framework that attempts to preserve Li Yu's craft aesthetics, which can be explored from his wide range of literary collections. As the author is popular for his excellence in many art forms like gardening, theatre arts, etc, recreation of his work is a major problem of concern. The framework initially pre-processed the corpus to extract keywords, which are then subjected to a semantic vector to find the closely related as well as differing words. Then, these words are subjected to geometric perturbations to impart versatility to the training phase. The text under screening is fed to the classification phase to find whether it is an altered or modified work of Li Yu, thus isolating the author's work from being reproduced, which greatly affects the aesthetics. As a future extension, the work can be trained with different classifiers to develop a defrauding system.
{"title":"Preserving the Integrity of Li Yu's Craft Aesthetics using the Digital Information Technology","authors":"Shan Liu","doi":"10.17762/ijcnis.v15i4.6314","DOIUrl":"https://doi.org/10.17762/ijcnis.v15i4.6314","url":null,"abstract":"Preserving the integrity of ancient aesthetic works has become a greater matter of concern in the modern digital age. As the internet is streaming with data that are collected from multiple sources, it imposes a severe threat to the integrity and security of the original aesthetic of many craft works. This paper proposes a novel framework that attempts to preserve Li Yu's craft aesthetics, which can be explored from his wide range of literary collections. As the author is popular for his excellence in many art forms like gardening, theatre arts, etc, recreation of his work is a major problem of concern. The framework initially pre-processed the corpus to extract keywords, which are then subjected to a semantic vector to find the closely related as well as differing words. Then, these words are subjected to geometric perturbations to impart versatility to the training phase. The text under screening is fed to the classification phase to find whether it is an altered or modified work of Li Yu, thus isolating the author's work from being reproduced, which greatly affects the aesthetics. As a future extension, the work can be trained with different classifiers to develop a defrauding system.","PeriodicalId":503773,"journal":{"name":"International Journal of Communication Networks and Information Security (IJCNIS)","volume":"65 14","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139449136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-01DOI: 10.17762/ijcnis.v15i4.6301
Aiyi Yang, Chu Hiang Goh, Lim Jing Yi
Dark mode in mobile applications has drawn widespread attention in business, and many users choose to use dark mode in their mobile applications for different purposes. However, it is still an emerging field in the academic circle, as there are not many systematic studies on the definition and concept of dark mode. Besides, scarce are the scholarly inferences regarding contemporary investigative undertakings and future advancements concerning the dark mode. The pros and cons of dark mode are still debatable. In order to bridge this gap, this paper undertook a comprehensive evaluation of the scholarship concerning dark mode across diverse disciplines, with the aim of building a fundamental research process for studying the concept of dark mode and user experience to establish a more robust groundwork for further exploration of the correlation between dark mode and user experience. Based on the Scopus database, this paper searched and collected articles on dark mode research within the last 30 years via the two-step approach. Thirty-five articles were selected based on the inclusion and exclusion criteria. This paper first analysed the themes, background, theoretical foundations and research methods on dark mode. Then it classified and integrated the variable factors of dark mode research based on the Stimulus-Organism-Response (S-O-R) framework. It ultimately proposed a research framework explaining the more profound concept of dark mode and the relationship between variable factors, user experience, and their behaviours. In addition, this paper also identified existing gaps in the current document studies and outlined potential opportunities for future research on dark mode.
{"title":"The Research into Dark Mode: A Systematic Review Using Two-Stage Approach and S-O-R Framework","authors":"Aiyi Yang, Chu Hiang Goh, Lim Jing Yi","doi":"10.17762/ijcnis.v15i4.6301","DOIUrl":"https://doi.org/10.17762/ijcnis.v15i4.6301","url":null,"abstract":"Dark mode in mobile applications has drawn widespread attention in business, and many users choose to use dark mode in their mobile applications for different purposes. However, it is still an emerging field in the academic circle, as there are not many systematic studies on the definition and concept of dark mode. Besides, scarce are the scholarly inferences regarding contemporary investigative undertakings and future advancements concerning the dark mode. The pros and cons of dark mode are still debatable. In order to bridge this gap, this paper undertook a comprehensive evaluation of the scholarship concerning dark mode across diverse disciplines, with the aim of building a fundamental research process for studying the concept of dark mode and user experience to establish a more robust groundwork for further exploration of the correlation between dark mode and user experience. Based on the Scopus database, this paper searched and collected articles on dark mode research within the last 30 years via the two-step approach. Thirty-five articles were selected based on the inclusion and exclusion criteria. This paper first analysed the themes, background, theoretical foundations and research methods on dark mode. Then it classified and integrated the variable factors of dark mode research based on the Stimulus-Organism-Response (S-O-R) framework. It ultimately proposed a research framework explaining the more profound concept of dark mode and the relationship between variable factors, user experience, and their behaviours. In addition, this paper also identified existing gaps in the current document studies and outlined potential opportunities for future research on dark mode.","PeriodicalId":503773,"journal":{"name":"International Journal of Communication Networks and Information Security (IJCNIS)","volume":"89 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139394005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}