Journal of ICT Standardization最新文献

筛选
英文 中文
Introducing Privacy Receipts into DLT and eIDAS 在DLT和eIDAS中引入隐私收据
Journal of ICT Standardization Pub Date : 2023-09-28 DOI: 10.13052/jicts2245-800X.1121
Jan Lindquist
{"title":"Introducing Privacy Receipts into DLT and eIDAS","authors":"Jan Lindquist","doi":"10.13052/jicts2245-800X.1121","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1121","url":null,"abstract":"The introduction of digital identification (e.g., eIDAS) and wallet standards (e.g., EUDI wallet) require compliance with privacy principles and clear communication of the principles through privacy notice and record of consent in the form of a privacy receipt. Regulation needs standards to help set the bar for reducing the privacy infringement risk. Without a standard-based implementation, solutions will be proprietary and siloed with no concern for interoperability, like privacy labels in Google and Apple app stores. Do existing standards address the gap, or do new ones need to be introduced? This article looks at the standards and regulations in three areas to answer this question: privacy protection standards, blockchain and DLT standards, and digital identification and wallet standards.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255407/10266732.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Impulsive Buying Behavior Using Partial Least Squares Algorithm 基于偏最小二乘算法的网上冲动购买行为
Journal of ICT Standardization Pub Date : 2023-09-22 DOI: 10.13052/jicts2245-800X.1131
Dam Tri Cuong
{"title":"Online Impulsive Buying Behavior Using Partial Least Squares Algorithm","authors":"Dam Tri Cuong","doi":"10.13052/jicts2245-800X.1131","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1131","url":null,"abstract":"Impulsive purchasing is one of many fascinating subjects to investigate in e-commerce research. Online buying facilitates purchases and provides impulsive buyers with a venue to meet their demands. Impulse buying occurs when a client feels a sudden, overpowering need to make a purchase, which is a common practice among online shoppers. Therefore, the study's purpose is to apply the partial least square (PLS) algorithm to investigate the factors driving online impulsive buying behavior (OIBB). Besides, in this research, the stimulus organism response (SOR) model was used as the research's guiding theory; with the stimulus such as visual appeal and price attributes, the organism comprising perceived enjoyment and perceived usefulness, and response as OIBB. In addition, a non-probability sampling method was employed to collect data from 313 customers who shared their online impulsive purchase experiences through a Google Forms online survey. The collected data was analyzed using the PLS technique to assess the reliability, convergent validity, and discriminant validity of the variables, as well as test the proposed hypotheses. The findings reveal that visual appeal and price attributes were positive connections to perceived enjoyment and perceived usefulness. Likewise, perceived enjoyment and perceived usefulness also impacted positively OIBB. Additionally, the findings disclosed that visual appeal and price attributes also were associated positively with OIBB.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255391/10255405.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68139276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Adaptive Fault Diagnosis Control System of Audio Management Component Environment of Airborne Electronic Equipment 机载电子设备音频管理组件环境自适应故障诊断控制系统研究
Journal of ICT Standardization Pub Date : 2023-09-22 DOI: 10.13052/jicts2245-800X.1124
Xiaomin Xie;Shuguo Gui;Renwei Dou;Xuanfu Du
{"title":"Research on Adaptive Fault Diagnosis Control System of Audio Management Component Environment of Airborne Electronic Equipment","authors":"Xiaomin Xie;Shuguo Gui;Renwei Dou;Xuanfu Du","doi":"10.13052/jicts2245-800X.1124","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1124","url":null,"abstract":"The system adopts adaptive control, and the controller of audio management component is directly applied to the controlled object. Through online calculation, the model is identified online by using the dynamic characteristics of the object, and the relationship between input and output variables is expressed. It can be corrected by entering and leaving data, which is actually to correct the controller. The initial rules of the controller are composed of default models. Through continuous self-reasoning learning, the controller is optimized to achieve data tracking, fast convergence, strong anti-interference ability and excellent performance. Combining intelligent control with adaptive technology not only expands the scope of adaptive system, but also provides an effective way for intelligent control. The environmental adaptive diagnostic control system uses adaptive technology to adjust the parameters, data and knowledge base of the controller. The system detects IO signal, AD signal and the status data sent by the sub-unit through the internal CAN bus according to the power-on self-check of the unit, and at the same time, it monitors all the status data in real time during the operation, judges the operation of each sub-component, gives an alarm in time and carries out protection control. Through the design of integrated detection module, the overall installation space of detection sensors is reduced, signal interfaces and connecting cables are reduced, and the overall adaptive diagnosis effect can be improved. Through the data recording and storage function, the system stores the operation information of each subunit, compares it with the built-in health data table, and prompts the maintenance information in time.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255407/10255420.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved YOLO for Road and Vehicle Target Detection Model 一种用于道路和车辆目标检测模型的改进YOLO
Journal of ICT Standardization Pub Date : 2023-09-22 DOI: 10.13052/jicts2245-800X.1125
Qinghe Yu;Huaiqin Liu;Qu Wu
{"title":"An Improved YOLO for Road and Vehicle Target Detection Model","authors":"Qinghe Yu;Huaiqin Liu;Qu Wu","doi":"10.13052/jicts2245-800X.1125","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1125","url":null,"abstract":"The yolo series is the prevalent algorithm for target identification at now. Nevertheless, due to the high real-time, mixed target parity, and obscured target features of vehicle target recognition, missed detection and incorrect detection are common. It enhances the yolo algorithm in order to enhance the network performance of this method while identifying vehicle targets. To properly portray the improvement impact, the yolov4 method is used as the improvement baseline. First, the structure of the DarkNet backbone network is modified, and a more efficient backbone network, FBR-DarkNet, is presented to enhance the effect of feature extraction. In order to better detect obstructed cars, a thin feature layer for focused detection of tiny objects is added to the Neck module to increase the recognition impact. The attention mechanism module CBAM is included to increase the model's precision and speed of convergence. The lightweight network replaces the MISH function with the H-SWISH function, and the improved algorithm improves by 4.76 percentage points over the original network on the BDD100K data set, with the mAP metrics improving by 8 points, 8 points, and 7 points, respectively, for the car, truck, and bus categories. Compared to other newer and better algorithms, it nevertheless maintains a pretty decent performance. It satisfies the criteria for real-time detection and significantly improves the detection accuracy.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255407/10255428.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain-based MQTT Protocol Optimization Algorithm 一种基于区块链的MQTT协议优化算法
Journal of ICT Standardization Pub Date : 2023-09-22 DOI: 10.13052/jicts2245-800X.1122
Wei Gao;Lixia Zhang;Yun Ju
{"title":"A Blockchain-based MQTT Protocol Optimization Algorithm","authors":"Wei Gao;Lixia Zhang;Yun Ju","doi":"10.13052/jicts2245-800X.1122","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1122","url":null,"abstract":"The communication protocol is an important support to realize the communication between equipment and Internet. And it covers all aspects of the IoT (Internet of things) system. To address the security problem of forging or tampering of key data in traditional IoT protocols, this paper designs an improved MQTT (message queue telemetry transmission) protocol that uses blockchain technology to ensure the security of transmitted data in the process of data transmission. Because the information in the blockchain is not tamperable, which in turn ensures that data stored in brokers are not maliciously tampered with. Through simulation experiments, it is proved that this scheme is lightweight, efficient and easy to implement, which helps to protect the security of IoT data.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255407/10255408.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Role-Based Access Control (RBAC) Authorization in Kubernetes Kubernetes中基于角色的访问控制(RBAC)授权
Journal of ICT Standardization Pub Date : 2023-09-22 DOI: 10.13052/jicts2245-800X.1132
Garsha Rostami
{"title":"Role-Based Access Control (RBAC) Authorization in Kubernetes","authors":"Garsha Rostami","doi":"10.13052/jicts2245-800X.1132","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1132","url":null,"abstract":"In computer systems security, role-based access control (RBAC) or role-based security is an approach to restricting system access to authorized users [1]. This paper will describe how the Kubernetes RBAC authorization sub-system works, how to leverage it to secure access to resources in the cluster, and how to validate the set policies through impersonation to ensure users and service accounts are granted the intended rights.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255391/10255393.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68142148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fruit Picking Robot Arm Training Solution Based on Reinforcement Learning in Digital Twin 数字孪生中基于强化学习的水果采摘机器人手臂训练解决方案
Journal of ICT Standardization Pub Date : 2023-09-22 DOI: 10.13052/jicts2245-800X.1133
Xinyuan Tian;Bingqin Pan;Liping Bai;Guangbin Wang;Deyun Mo
{"title":"Fruit Picking Robot Arm Training Solution Based on Reinforcement Learning in Digital Twin","authors":"Xinyuan Tian;Bingqin Pan;Liping Bai;Guangbin Wang;Deyun Mo","doi":"10.13052/jicts2245-800X.1133","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1133","url":null,"abstract":"In the era of Industry 4.0, digital agriculture is developing very rapidly and has achieved considerable results. Nowadays, digital agriculture-based research is more focused on the use of robotic fruit picking technology, and the main research direction of such topics is algorithms for computer vision. However, when computer vision algorithms successfully locate the target object, it is still necessary to use robotic arm movement to reach the object at the physical level, but such path planning has received minimal attention. Based on this research deficiency, we propose to use Unity software as a digital twin platform to plan the robotic arm path and use ML-Agent plug-in as a reinforcement learning means to train the robotic arm path, to improve the accuracy of the robotic arm to reach the fruit, and happily the effect of this method is much improved than the traditional method.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255391/10255409.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68142149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graphic Design of 3D Animation Scenes Based on Deep Learning and Information Security Technology 基于深度学习和信息安全技术的三维动画场景平面设计
Journal of ICT Standardization Pub Date : 2023-09-22 DOI: 10.13052/jicts2245-800X.1135
Jiao Tang
{"title":"Graphic Design of 3D Animation Scenes Based on Deep Learning and Information Security Technology","authors":"Jiao Tang","doi":"10.13052/jicts2245-800X.1135","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1135","url":null,"abstract":"This paper aims to use the improved Generative Adversarial Network (GAN) model for Three Dimensional (3D) animation graphic design, improve the efficiency of 3D animation graphic design, and promote the accuracy of model recognition. It acquires 3D animated scene color images from different perspectives. This paper performs 3D visualization through point clouds, outputs high-quality point cloud results, and uses Convolutional Neural Network (CNN), Earth-Mover (EM) distance, and Least Squares Method (LSM) to improve the GAN model. Finally, the effectiveness of the improved GAN in the graphic design of 3D animation scenes and the effects of different improved models in generating 3D animation scene images are analyzed. The results show that the computational loss amplitude of the improved GAN model using Label Smoothing processing deep convolutional neural network is between [2], [3]. The generator loss variation is smaller, and the image quality of the generated 3D animation scene is gradually improved. The training process of the LSM-improved model is more stable, and the loss value is lower than that of the EM distance improved model. The loss value of the generator is [0.3,0.5], and the loss value of the discriminator is [0.1,0.2]. The Inception score of the LSM-improved model is 0.0297 higher than that of the CNN-improved model and the EM distance improved model and 0.0198 higher than that of the GAN model.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255391/10255410.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68142150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Feature Point Image Registration Algorithm with Added Spatial Constraint Model 添加空间约束模型的自适应特征点图像配准算法
Journal of ICT Standardization Pub Date : 2023-09-22 DOI: 10.13052/jicts2245-800X.1123
Xiao Zhou;Songlin Yu;Jijun Wang;Yuhua Chen;Fangyuan Li;Yan Li
{"title":"Adaptive Feature Point Image Registration Algorithm with Added Spatial Constraint Model","authors":"Xiao Zhou;Songlin Yu;Jijun Wang;Yuhua Chen;Fangyuan Li;Yan Li","doi":"10.13052/jicts2245-800X.1123","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1123","url":null,"abstract":"Image data with different spectral features contain different attribute information of a target, which is naturally complementary and can provide more comprehensive and detailed features after registration and fusion. Image registration methods based on point features have the advantages of high speed and precision, and have been widely used in visible light image registration. For registration of multiscale images and those with different spectral characteristics, the precision of these methods is affected by such factors as complex gradient variation. To this end, we add a spatial constraint model to point feature image registration, and improve the method from the aspects of feature point selection, registration, and image conversion parameter calculation. The method is applied to different types of image registration programs, and the results show that it can effectively improve the registration accuracy of multiscale images with different spectral characteristics.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255407/10255435.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovation and Digital Transformation of Media Economy Based on Information Security Technology 基于信息安全技术的媒体经济创新与数字化转型
Journal of ICT Standardization Pub Date : 2023-09-22 DOI: 10.13052/jicts2245-800X.1134
Yan Meng;Jungjin Kim;Hak-chun Lee;Cho Dong Je;Peiyun Cheng
{"title":"Innovation and Digital Transformation of Media Economy Based on Information Security Technology","authors":"Yan Meng;Jungjin Kim;Hak-chun Lee;Cho Dong Je;Peiyun Cheng","doi":"10.13052/jicts2245-800X.1134","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1134","url":null,"abstract":"This study aims to analyze the application of information security (IS) technology and blockchain in the media economy, and the impact of cross-border cooperation and value chain reconstruction combined with blockchain technology (BCT) on promoting innovation and digital transformation in the media economy. This study delves into the interplay between cross-border collaboration, value chain reconstruction, and BCT. It constructs a media economic digital platform by amalgamating blockchain and cross-border value chain principles, subsequently evaluating and analyzing its performance. Findings indicate that the proposed model exhibits a reduced block propagation time and enhanced security performance, boasting a 5% improvement. The platform's latency remains stable at approximately 245 ms. Survey analysis reveals an agreement rate exceeding 57.94% across dimensions such as data mining, customer relationship management, and classification effectiveness, contributing to heightened user satisfaction. Consequently, this study offers valuable insights into user relationship security management within cross-border collaborations, shedding light on novel avenues for sustainable development and digital transformation in the realm of the media economy.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255391/10255392.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68142151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信