首页 > 最新文献

International Journal of Ambient Computing and Intelligence最新文献

英文 中文
Analysis of Home Furnishing Marketing Based on Internet of Things in the Intelligent Environment 智能环境下基于物联网的家居营销分析
Q3 Computer Science Pub Date : 2024-07-23 DOI: 10.4018/ijaci.348964
Fang Wang
How to improve marketing efficiency and how to formulate scientific, effective and practical marketing strategies according to changes in the market environment are important issues facing current smart home companies. This paper adopts the analysis methods such as PEST macro model analysis method, Porter's five forces model, SWOT analysis model and STP analysis, taking Suzhou as the research object, conducts an in-depth analysis of the development environment of smart home, and clarifies the suitable smart home market. From the aspects of 6P marketing mix (product, price, channel, promotion, public relations and political rights), it proposes a Suzhou smart home marketing mix strategy based on mid-to-high-end smart home products. The research results of this paper will promote the development of the city's smart home market and have important reference value for other cities to carry out smart home marketing and can also be used as a reference for relevant government departments to formulate policies.
如何提高营销效率,如何根据市场环境的变化制定科学、有效、实用的营销策略,是当前智能家居企业面临的重要问题。本文采用PEST宏观模型分析法、波特五力模型、SWOT分析模型和STP分析等分析方法,以苏州为研究对象,对智能家居的发展环境进行了深入分析,明确了适合的智能家居市场。从 6P 营销组合(产品、价格、渠道、促销、公关、政治权利)等方面,提出了基于中高端智能家居产品的苏州智能家居营销组合策略。本文的研究成果将促进我市智能家居市场的发展,对其他城市开展智能家居营销具有重要的参考价值,也可作为政府相关部门制定政策的参考依据。
{"title":"Analysis of Home Furnishing Marketing Based on Internet of Things in the Intelligent Environment","authors":"Fang Wang","doi":"10.4018/ijaci.348964","DOIUrl":"https://doi.org/10.4018/ijaci.348964","url":null,"abstract":"How to improve marketing efficiency and how to formulate scientific, effective and practical marketing strategies according to changes in the market environment are important issues facing current smart home companies. This paper adopts the analysis methods such as PEST macro model analysis method, Porter's five forces model, SWOT analysis model and STP analysis, taking Suzhou as the research object, conducts an in-depth analysis of the development environment of smart home, and clarifies the suitable smart home market. From the aspects of 6P marketing mix (product, price, channel, promotion, public relations and political rights), it proposes a Suzhou smart home marketing mix strategy based on mid-to-high-end smart home products. The research results of this paper will promote the development of the city's smart home market and have important reference value for other cities to carry out smart home marketing and can also be used as a reference for relevant government departments to formulate policies.","PeriodicalId":51884,"journal":{"name":"International Journal of Ambient Computing and Intelligence","volume":"18 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141809938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Management of New Automatic Ticket Vending Machine System in Urban Rail Transit 城市轨道交通新型自动售票机系统的管理
Q3 Computer Science Pub Date : 2024-05-24 DOI: 10.4018/ijaci.344796
Yanshuo Li, Hao Zhu, Weigang Tian, Chengshun Xiao
The technology of automatic fare collection system for urban rail transit is an important technology for achieving automatic fare collection for public transportation facilities such as urban subways. This article studies the relevant characteristics of the AFC system. Through introducing queuing models, simulation comparative experiments, and neural network debugging, it is found that the automatic fare collection system for urban rail transit not only effectively helps station staff to allocate tickets in a timely and reasonable manner, adjust station ticket supply, but also facilitates station passengers to query tickets, and passengers can freely choose whether to take the train according to their actual needs. The experiment shows that the AFC system can effectively help passengers avoid traffic congestion during peak hours, greatly improve management level, and reduce labor intensity.
城市轨道交通自动售检票系统技术是实现城市地铁等公共交通设施自动售检票的重要技术。本文研究了自动售检票系统的相关特性。通过引入排队模型、仿真对比实验、神经网络调试等方法,发现城市轨道交通自动售检票系统不仅能有效帮助车站工作人员及时、合理地调配车票,调整车站票源,还能方便车站乘客查询车票,乘客可根据自己的实际需要自由选择是否乘车。实验表明,AFC系统能有效帮助乘客避开高峰时段的交通拥堵,大大提高管理水平,减轻劳动强度。
{"title":"Management of New Automatic Ticket Vending Machine System in Urban Rail Transit","authors":"Yanshuo Li, Hao Zhu, Weigang Tian, Chengshun Xiao","doi":"10.4018/ijaci.344796","DOIUrl":"https://doi.org/10.4018/ijaci.344796","url":null,"abstract":"The technology of automatic fare collection system for urban rail transit is an important technology for achieving automatic fare collection for public transportation facilities such as urban subways. This article studies the relevant characteristics of the AFC system. Through introducing queuing models, simulation comparative experiments, and neural network debugging, it is found that the automatic fare collection system for urban rail transit not only effectively helps station staff to allocate tickets in a timely and reasonable manner, adjust station ticket supply, but also facilitates station passengers to query tickets, and passengers can freely choose whether to take the train according to their actual needs. The experiment shows that the AFC system can effectively help passengers avoid traffic congestion during peak hours, greatly improve management level, and reduce labor intensity.","PeriodicalId":51884,"journal":{"name":"International Journal of Ambient Computing and Intelligence","volume":"36 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141102342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threat Attribution and Reasoning for Industrial Control System Asset 工业控制系统资产的威胁归因与推理
Q3 Computer Science Pub Date : 2023-11-17 DOI: 10.4018/ijaci.333853
Shuqin Zhang, Peiyu Shi, Tianhui Du, Xinyu Su, Yunfei Han
Due to the widespread use of the industrial internet of things, the industrial control system has steadily transformed into an intelligent and informational one. To increase the industrial control system's security, based on industrial control system assets, this paper provides a method of threat modeling, attributing, and reasoning. First, this method characterizes the asset threat of an industrial control system by constructing an asset security ontology based on the asset structure. Second, this approach makes use of machine learning to identify assets and attribute the attacker's attack path. Subsequently, inference rules are devised to replicate the attacker's attack path, thereby reducing the response time of security personnel to threats and strengthening the semantic relationship between asset security within industrial control systems. Finally, the process is used in the simulation environment and real case scenario based on the power grid, where the assets and attacks are mapped. The actual attack path is deduced, and it demonstrates the approach's effectiveness.
随着工业物联网的广泛应用,工业控制系统正逐步向智能化和信息化转型。为了提高工业控制系统的安全性,本文基于工业控制系统资产,提供了一种威胁建模、归因和推理的方法。首先,该方法通过构建基于资产结构的资产安全本体来描述工业控制系统的资产威胁。其次,该方法利用机器学习来识别资产,并对攻击者的攻击路径进行归因。随后,设计推理规则来复制攻击者的攻击路径,从而缩短安全人员对威胁的响应时间,并加强工业控制系统内资产安全之间的语义关系。最后,在基于电网的模拟环境和真实案例场景中使用该流程,对资产和攻击进行映射。推导出实际攻击路径,证明了该方法的有效性。
{"title":"Threat Attribution and Reasoning for Industrial Control System Asset","authors":"Shuqin Zhang, Peiyu Shi, Tianhui Du, Xinyu Su, Yunfei Han","doi":"10.4018/ijaci.333853","DOIUrl":"https://doi.org/10.4018/ijaci.333853","url":null,"abstract":"Due to the widespread use of the industrial internet of things, the industrial control system has steadily transformed into an intelligent and informational one. To increase the industrial control system's security, based on industrial control system assets, this paper provides a method of threat modeling, attributing, and reasoning. First, this method characterizes the asset threat of an industrial control system by constructing an asset security ontology based on the asset structure. Second, this approach makes use of machine learning to identify assets and attribute the attacker's attack path. Subsequently, inference rules are devised to replicate the attacker's attack path, thereby reducing the response time of security personnel to threats and strengthening the semantic relationship between asset security within industrial control systems. Finally, the process is used in the simulation environment and real case scenario based on the power grid, where the assets and attacks are mapped. The actual attack path is deduced, and it demonstrates the approach's effectiveness.","PeriodicalId":51884,"journal":{"name":"International Journal of Ambient Computing and Intelligence","volume":"54 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139263977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain-Based Security Model for Cloud Accounting Data 基于区块链的云会计数据安全模型
Q3 Computer Science Pub Date : 2023-10-27 DOI: 10.4018/ijaci.332860
Congcong Gou, Xiaoqing Deng
The popularity of cloud accounting is due to its low cost of entry, efficient data processing, and high business efficiency. However, security issues in cloud storage can affect user trust in the service. To address these security issues, a blockchain-based encryption technology model for cloud accounting data security is proposed. Firstly, the feasibility of integrating blockchain technology and cloud accounting is analyzed. Then, an elliptic curve cryptography-based cloud accounting data security solution is proposed. Blockchain and evidence chain technology are used to ensure data security and support data privacy protection for cloud service providers and third-party auditors. The proposed solution has a small computational overhead, as it does not require exponentiation or bilinear pairing. Experimental results show the proposed solution can enhance user control over cloud accounting data, ensure data transmission security, and improve trust between users and cloud accounting service providers. Moreover, it is more efficient.
云会计之所以受欢迎,是因为它的入门成本低,数据处理效率高,业务效率高。然而,云存储中的安全问题可能会影响用户对服务的信任。为了解决这些安全问题,提出了一种基于区块链的云会计数据安全加密技术模型。首先,分析了区块链技术与云会计融合的可行性。然后,提出了一种基于椭圆曲线密码的云会计数据安全解决方案。使用区块链和证据链技术确保数据安全,支持云服务提供商和第三方审计机构的数据隐私保护。所提出的解决方案具有较小的计算开销,因为它不需要幂运算或双线性配对。实验结果表明,该方案可以增强用户对云会计数据的控制,保证数据传输安全,提高用户与云会计服务商之间的信任。此外,它更有效率。
{"title":"A Blockchain-Based Security Model for Cloud Accounting Data","authors":"Congcong Gou, Xiaoqing Deng","doi":"10.4018/ijaci.332860","DOIUrl":"https://doi.org/10.4018/ijaci.332860","url":null,"abstract":"The popularity of cloud accounting is due to its low cost of entry, efficient data processing, and high business efficiency. However, security issues in cloud storage can affect user trust in the service. To address these security issues, a blockchain-based encryption technology model for cloud accounting data security is proposed. Firstly, the feasibility of integrating blockchain technology and cloud accounting is analyzed. Then, an elliptic curve cryptography-based cloud accounting data security solution is proposed. Blockchain and evidence chain technology are used to ensure data security and support data privacy protection for cloud service providers and third-party auditors. The proposed solution has a small computational overhead, as it does not require exponentiation or bilinear pairing. Experimental results show the proposed solution can enhance user control over cloud accounting data, ensure data transmission security, and improve trust between users and cloud accounting service providers. Moreover, it is more efficient.","PeriodicalId":51884,"journal":{"name":"International Journal of Ambient Computing and Intelligence","volume":"64 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136235091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Management and Optimization Methods of Music Audio-Visual Archives Resources Based on Big Data 基于大数据的音乐音像档案资源管理与优化方法
Q3 Computer Science Pub Date : 2023-10-27 DOI: 10.4018/ijaci.332866
Hongyu Liu, Chenxi Lu
Protecting Oroqen folk songs is not only the only way to reproduce Chinese traditional music culture, but also the only way to rebuild its national spirit and enhance national cultural confidence. In view of the modernity problems of Oroqen folk songs in the current process of inheritance and protection, this paper puts forward the management and optimization methods of music audio-visual archives resources under the background of big data. This paper analyzes and discusses the resource management path of folk music audio-visual archives in Oroqen in the era of big data and designs a set of perfect digital music audio-visual archives resource management platform, which can not only facilitate the collection, storage, management, and utilization of paper files and electronic files in archives, but also optimize the retrieval algorithm of archives. The resource allocation algorithm based on Nash equilibrium solution is used to optimize it. The simulation results show that the proposed method reduces the information resource allocation time and improves the demand satisfaction.
保护鄂伦春民歌是再现中国传统音乐文化的必由之路,也是重建鄂伦春民歌民族精神、增强民族文化自信的必由之路。针对鄂伦春民歌在当前传承保护过程中存在的现代性问题,提出了大数据背景下音乐音像档案资源的管理与优化方法。本文分析探讨了大数据时代鄂伦春地区民乐音像档案的资源管理路径,设计了一套完善的数字音乐音像档案资源管理平台,既方便了档案中纸质文件和电子文件的收集、存储、管理和利用,又优化了档案的检索算法。采用基于纳什均衡解的资源分配算法对其进行优化。仿真结果表明,该方法减少了信息资源分配时间,提高了需求满意度。
{"title":"Management and Optimization Methods of Music Audio-Visual Archives Resources Based on Big Data","authors":"Hongyu Liu, Chenxi Lu","doi":"10.4018/ijaci.332866","DOIUrl":"https://doi.org/10.4018/ijaci.332866","url":null,"abstract":"Protecting Oroqen folk songs is not only the only way to reproduce Chinese traditional music culture, but also the only way to rebuild its national spirit and enhance national cultural confidence. In view of the modernity problems of Oroqen folk songs in the current process of inheritance and protection, this paper puts forward the management and optimization methods of music audio-visual archives resources under the background of big data. This paper analyzes and discusses the resource management path of folk music audio-visual archives in Oroqen in the era of big data and designs a set of perfect digital music audio-visual archives resource management platform, which can not only facilitate the collection, storage, management, and utilization of paper files and electronic files in archives, but also optimize the retrieval algorithm of archives. The resource allocation algorithm based on Nash equilibrium solution is used to optimize it. The simulation results show that the proposed method reduces the information resource allocation time and improves the demand satisfaction.","PeriodicalId":51884,"journal":{"name":"International Journal of Ambient Computing and Intelligence","volume":"1 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136264184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fusion of XLNet and BiLSTM-TextCNN for Weibo Sentiment Analysis in Spark Big Data Environment Spark大数据环境下融合XLNet和BiLSTM-TextCNN的微博情感分析
Q3 Computer Science Pub Date : 2023-10-09 DOI: 10.4018/ijaci.331744
Aichuan Li, Tian Li
This article proposes a Weibo sentiment analysis method to improve traditional algorithms' analysis efficiency and accuracy. The proposed algorithm uses deep learning in the Spark big data environment. First, the input data are converted into dynamic word vector representations using the Chinese version of the XLNet model. Then, dual-channel feature extraction is performed on the data using TextCNN and BiLSTM. The proposed algorithm uses an attention mechanism to allocate computing resources efficiently and realizes feature fusion and data classification. Comparative experiments are conducted on two public datasets under identical experimental conditions. In the NLPCC2014 and NLPCC2015 datasets, the proposed model improves the precision and F1 metrics by at least 4.26% and 2.64%, respectively. In the weibo_senti_100k dataset, the proposed model improves the precision and F1 metrics by at least 4.66% and 2.69%, respectively. The results indicate that the proposed method has better sentiment analysis and prediction abilities than existing methods.
为了提高传统算法的分析效率和准确性,本文提出了一种微博情感分析方法。该算法在Spark大数据环境下使用深度学习。首先,使用中文版的XLNet模型将输入数据转换为动态词向量表示。然后,利用TextCNN和BiLSTM对数据进行双通道特征提取。该算法利用注意力机制有效分配计算资源,实现特征融合和数据分类。在两个公共数据集上,在相同的实验条件下进行对比实验。在NLPCC2014和NLPCC2015数据集上,该模型的精度和F1指标分别提高了至少4.26%和2.64%。在weibo_senti_100k数据集中,该模型的精度和F1指标分别提高了至少4.66%和2.69%。结果表明,该方法比现有方法具有更好的情感分析和预测能力。
{"title":"Fusion of XLNet and BiLSTM-TextCNN for Weibo Sentiment Analysis in Spark Big Data Environment","authors":"Aichuan Li, Tian Li","doi":"10.4018/ijaci.331744","DOIUrl":"https://doi.org/10.4018/ijaci.331744","url":null,"abstract":"This article proposes a Weibo sentiment analysis method to improve traditional algorithms' analysis efficiency and accuracy. The proposed algorithm uses deep learning in the Spark big data environment. First, the input data are converted into dynamic word vector representations using the Chinese version of the XLNet model. Then, dual-channel feature extraction is performed on the data using TextCNN and BiLSTM. The proposed algorithm uses an attention mechanism to allocate computing resources efficiently and realizes feature fusion and data classification. Comparative experiments are conducted on two public datasets under identical experimental conditions. In the NLPCC2014 and NLPCC2015 datasets, the proposed model improves the precision and F1 metrics by at least 4.26% and 2.64%, respectively. In the weibo_senti_100k dataset, the proposed model improves the precision and F1 metrics by at least 4.66% and 2.69%, respectively. The results indicate that the proposed method has better sentiment analysis and prediction abilities than existing methods.","PeriodicalId":51884,"journal":{"name":"International Journal of Ambient Computing and Intelligence","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135046904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Taijiquan Auxiliary Training and Scoring Based on Motion Capture Technology and DTW Algorithm 基于动作捕捉技术和DTW算法的太极拳辅助训练与计分
Q3 Computer Science Pub Date : 2023-09-21 DOI: 10.4018/ijaci.330539
Xia Feng, Xin Lu, Xingwei Si
Learning Tai Chi requires long-term practice and guidance, which is difficult for beginners. This article proposes a Tai Chi-assisted training and scoring method based on motion capture technology and a dynamic time warping (DTW) algorithm. Firstly, by using motion capture technology, the key point data of Tai Chi movements can be accurately captured. Then, using the DTW algorithm, the learner's action sequence is compared and matched with the standard Tai Chi action sequence in order to evaluate the learner's action accuracy and fluency. Learners can promptly correct incorrect actions and improve the accuracy and fluency of their actions. This method has significant advantages in accuracy and reliability. In summary, the Tai Chi-assisted training and scoring method based on motion capture technology and DTW algorithm provides an effective auxiliary tool for Tai Chi learners, which can help them better master the techniques and essence of Tai Chi. This study is of great significance for promoting the popularization of Tai Chi and improving the learning effectiveness of Tai Chi.
学习太极拳需要长期的练习和指导,这对初学者来说很难。本文提出了一种基于动作捕捉技术和动态时间规整(DTW)算法的太极拳辅助训练计分方法。首先,通过动作捕捉技术,可以准确捕捉太极拳动作的关键点数据。然后,使用DTW算法,将学习者的动作序列与标准太极拳动作序列进行对比匹配,以评估学习者动作的准确性和流畅性。学习者可以及时纠正错误的动作,提高动作的准确性和流畅性。该方法在准确性和可靠性方面具有显著的优势。综上所述,基于动作捕捉技术和DTW算法的太极拳辅助训练计分方法为太极拳学习者提供了一种有效的辅助工具,可以帮助他们更好地掌握太极拳的技术和精髓。本研究对于促进太极拳的普及,提高太极拳的学习效果具有重要意义。
{"title":"Taijiquan Auxiliary Training and Scoring Based on Motion Capture Technology and DTW Algorithm","authors":"Xia Feng, Xin Lu, Xingwei Si","doi":"10.4018/ijaci.330539","DOIUrl":"https://doi.org/10.4018/ijaci.330539","url":null,"abstract":"Learning Tai Chi requires long-term practice and guidance, which is difficult for beginners. This article proposes a Tai Chi-assisted training and scoring method based on motion capture technology and a dynamic time warping (DTW) algorithm. Firstly, by using motion capture technology, the key point data of Tai Chi movements can be accurately captured. Then, using the DTW algorithm, the learner's action sequence is compared and matched with the standard Tai Chi action sequence in order to evaluate the learner's action accuracy and fluency. Learners can promptly correct incorrect actions and improve the accuracy and fluency of their actions. This method has significant advantages in accuracy and reliability. In summary, the Tai Chi-assisted training and scoring method based on motion capture technology and DTW algorithm provides an effective auxiliary tool for Tai Chi learners, which can help them better master the techniques and essence of Tai Chi. This study is of great significance for promoting the popularization of Tai Chi and improving the learning effectiveness of Tai Chi.","PeriodicalId":51884,"journal":{"name":"International Journal of Ambient Computing and Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136130942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BTSAMA BTSAMA
Q3 Computer Science Pub Date : 2023-07-31 DOI: 10.4018/ijaci.327351
S. Lv, Liliya Pan
To deal with the problems of occurring personalized music recommendation methods, for instance, low explanation, low accuracy of recommendation, and difficulty extracting information effectively, a personalized music recommendation method combining TextCNN and attention is proposed. Firstly, TextCNN model and BERT are combined to capture local music continuous features. Secondly, self-attention is introduced to solve the remaining omitted non-continuous features that are not paid attention by TextCNN. Finally, multi-headed attention mechanism is used to get features of hotspot music and user's interest music, and cascading fusion method is used to achieve click prediction. Experimentally, the proposed model can effectively recommend personalized music, its MAE values on FMA and GTZAN datasets are 0.156 and 0.146, respectively, improving by at least 6.6% and 3.3% compared to other comparative models. And its RMSE result values on the FMA and GTZAN datasets are 0.185 and 0.164, respectively, improving by at least 12.4% and 5.2% compared to other comparative models.
针对个性化音乐推荐方法中存在的解释性低、推荐准确率低、信息难以有效提取等问题,提出了一种结合TextCNN和注意力的个性化音乐推荐方法。首先,将TextCNN模型与BERT相结合,获取局部音乐连续特征;其次,引入自关注来解决TextCNN未关注的剩余遗漏的非连续特征。最后,采用多头注意机制获取热点音乐和用户兴趣音乐的特征,并采用级联融合方法实现点击预测。实验结果表明,该模型可以有效地推荐个性化音乐,其在FMA和GTZAN数据集上的MAE值分别为0.156和0.146,比其他比较模型至少提高了6.6%和3.3%。其在FMA和GTZAN数据集上的RMSE结果值分别为0.185和0.164,比其他比较模型分别提高了12.4%和5.2%。
{"title":"BTSAMA","authors":"S. Lv, Liliya Pan","doi":"10.4018/ijaci.327351","DOIUrl":"https://doi.org/10.4018/ijaci.327351","url":null,"abstract":"To deal with the problems of occurring personalized music recommendation methods, for instance, low explanation, low accuracy of recommendation, and difficulty extracting information effectively, a personalized music recommendation method combining TextCNN and attention is proposed. Firstly, TextCNN model and BERT are combined to capture local music continuous features. Secondly, self-attention is introduced to solve the remaining omitted non-continuous features that are not paid attention by TextCNN. Finally, multi-headed attention mechanism is used to get features of hotspot music and user's interest music, and cascading fusion method is used to achieve click prediction. Experimentally, the proposed model can effectively recommend personalized music, its MAE values on FMA and GTZAN datasets are 0.156 and 0.146, respectively, improving by at least 6.6% and 3.3% compared to other comparative models. And its RMSE result values on the FMA and GTZAN datasets are 0.185 and 0.164, respectively, improving by at least 12.4% and 5.2% compared to other comparative models.","PeriodicalId":51884,"journal":{"name":"International Journal of Ambient Computing and Intelligence","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87924730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A User Authentication Schema Under the Integration of Mobile Edge Computing and Blockchain Technology 移动边缘计算与区块链技术融合下的用户认证方案
Q3 Computer Science Pub Date : 2023-07-31 DOI: 10.4018/ijaci.327027
Feng Xue, Fangju Li
The safe and efficient authentication of users is the basis for the realization of the Internet of Things. A reliable and fast user authentication schema that combines mobile edge computing and blockchain technology is proposed. This schema adopts the polling hosting method to optimize the practical Byzantine Fault Tolerance (PBFT) algorithm, it reduces the impact of tokens in the algorithm, and ensures trusted authentication. The two-way authentication protocol between the cluster head and the base station, and the one-way authentication protocol between the base station and the sensor node are designed to effectively simplify the authentication process of sensor nodes, which further guarantees the security and speed of user authentication and effectively meets the security, reliability, and convenience requirements of the Internet of Things. Simulation experiments show that the schema can achieve efficient information verification, and the identity authentication time and protocol authentication times are only 23.58 ms and 25.06 ms, respectively, which has obvious performance advantages over the Paillier algorithm, the hybrid Paillier-blowfish algorithm, and the ElGamal algorithm.
安全高效的用户认证是实现物联网的基础。提出了一种结合移动边缘计算和区块链技术的可靠、快速的用户认证方案。该模式采用轮询托管的方式对实际的拜占庭容错(PBFT)算法进行优化,减少了令牌对算法的影响,保证了可信认证。通过设计簇头与基站之间的双向认证协议、基站与传感器节点之间的单向认证协议,有效简化了传感器节点的认证过程,进一步保证了用户认证的安全性和速度,有效满足了物联网对安全性、可靠性和便利性的要求。仿真实验表明,该模式能够实现高效的信息验证,身份认证时间和协议认证时间分别仅为23.58 ms和25.06 ms,与Paillier算法、Paillier-blowfish混合算法和ElGamal算法相比,具有明显的性能优势。
{"title":"A User Authentication Schema Under the Integration of Mobile Edge Computing and Blockchain Technology","authors":"Feng Xue, Fangju Li","doi":"10.4018/ijaci.327027","DOIUrl":"https://doi.org/10.4018/ijaci.327027","url":null,"abstract":"The safe and efficient authentication of users is the basis for the realization of the Internet of Things. A reliable and fast user authentication schema that combines mobile edge computing and blockchain technology is proposed. This schema adopts the polling hosting method to optimize the practical Byzantine Fault Tolerance (PBFT) algorithm, it reduces the impact of tokens in the algorithm, and ensures trusted authentication. The two-way authentication protocol between the cluster head and the base station, and the one-way authentication protocol between the base station and the sensor node are designed to effectively simplify the authentication process of sensor nodes, which further guarantees the security and speed of user authentication and effectively meets the security, reliability, and convenience requirements of the Internet of Things. Simulation experiments show that the schema can achieve efficient information verification, and the identity authentication time and protocol authentication times are only 23.58 ms and 25.06 ms, respectively, which has obvious performance advantages over the Paillier algorithm, the hybrid Paillier-blowfish algorithm, and the ElGamal algorithm.","PeriodicalId":51884,"journal":{"name":"International Journal of Ambient Computing and Intelligence","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87981146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rotational Invariance Using Gabor Convolution Neural Network and Color Space for Image Processing 基于Gabor卷积神经网络和色彩空间的旋转不变性图像处理
Q3 Computer Science Pub Date : 2023-05-23 DOI: 10.4018/ijaci.323798
Judy Gateri, R. Rimiru, Michael W. Kimwele
Convolutional neural networks (CNNs) are deep learning methods that are utilized in image processing such as image classification and recognition. It has achieved excellent results in various sectors; however, it still lacks rotation invariant and spatial information. To establish whether two images are rotational versions of one other, one can rotate them exhaustively to see if they compare favorably at some angle. Due to the failure of current algorithms to rotate images and provide spatial information, the study proposes to transform color spaces and use the Gabor filter to address the issue. To gather spatial information, the HSV and CieLab color spaces are used, and Gabor is used to orient images at various orientation. The experiments show that HSV and CieLab color spaces and Gabor convolutional neural network (GCNN) improves image retrieval with an accuracy of 98.72% and 98.67% on the CIFAR-10 dataset.
卷积神经网络(cnn)是一种深度学习方法,用于图像分类和识别等图像处理。在各个领域都取得了优异的成绩;然而,它仍然缺乏旋转不变量和空间信息。为了确定两个图像是否是另一个图像的旋转版本,可以彻底旋转它们,看看它们在某个角度上是否比较有利。由于目前的算法无法旋转图像并提供空间信息,本研究提出变换颜色空间并使用Gabor滤波器来解决这一问题。为了收集空间信息,使用HSV和CieLab色彩空间,并使用Gabor在不同方向上定位图像。实验表明,HSV和CieLab色彩空间以及Gabor卷积神经网络(GCNN)在CIFAR-10数据集上的图像检索精度分别达到98.72%和98.67%。
{"title":"Rotational Invariance Using Gabor Convolution Neural Network and Color Space for Image Processing","authors":"Judy Gateri, R. Rimiru, Michael W. Kimwele","doi":"10.4018/ijaci.323798","DOIUrl":"https://doi.org/10.4018/ijaci.323798","url":null,"abstract":"Convolutional neural networks (CNNs) are deep learning methods that are utilized in image processing such as image classification and recognition. It has achieved excellent results in various sectors; however, it still lacks rotation invariant and spatial information. To establish whether two images are rotational versions of one other, one can rotate them exhaustively to see if they compare favorably at some angle. Due to the failure of current algorithms to rotate images and provide spatial information, the study proposes to transform color spaces and use the Gabor filter to address the issue. To gather spatial information, the HSV and CieLab color spaces are used, and Gabor is used to orient images at various orientation. The experiments show that HSV and CieLab color spaces and Gabor convolutional neural network (GCNN) improves image retrieval with an accuracy of 98.72% and 98.67% on the CIFAR-10 dataset.","PeriodicalId":51884,"journal":{"name":"International Journal of Ambient Computing and Intelligence","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73494388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Ambient Computing and Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1