{"title":"ICT Agriculture Support System for Chili Pepper Harvesting","authors":"Young-Mi Byun, Se-Chang Oh, Min Choi","doi":"10.3745/JIPS.01.0056","DOIUrl":"https://doi.org/10.3745/JIPS.01.0056","url":null,"abstract":"","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121970372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Rahmadika, Si-Wan Noh, Kyeongmo Lee, Bruno Joachim Kweka, K. Rhee
{"title":"The Dilemma of Parameterizing Propagation Time in Blockchain P2P Network","authors":"S. Rahmadika, Si-Wan Noh, Kyeongmo Lee, Bruno Joachim Kweka, K. Rhee","doi":"10.3745/JIPS.03.0140","DOIUrl":"https://doi.org/10.3745/JIPS.03.0140","url":null,"abstract":"Propagation time on permissionless blockchain plays a significant role in terms of stability and performance in the decentralized systems. A large number of activities are disseminated to the whole nodes in the decentralized peer-to-peer network, thus causing propagation delay. The stability of the system is our concern in the first place. The propagation delay opens up opportunities for attackers to apply their protocol. Either by accelerating or decelerating the propagation time directly without proper calculation, it brings numerous negative impacts to the entire blockchain system. In this paper, we thoroughly review and elaborate on several parameters related to the propagation time in such a system. We describe our findings in terms of data communication, transaction propagation, and the possibility of an interference attack that caused an extra propagation time. Furthermore, we present the influence of block size, consensus, and blockchain scalability, including the relation of parameters. In the last session, we remark several points associated with the propagation time and use cases to avoid dilemmas in the light of the experiments and literary works.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114054924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Abnormal Behavior Recognition Based on Spatio-temporal Context","authors":"Yuanfeng Yang, Lin Li, Zhaobin Liu, Gang Liu","doi":"10.3745/JIPS.02.0134","DOIUrl":"https://doi.org/10.3745/JIPS.02.0134","url":null,"abstract":"This paper presents a new approach for detecting abnormal behaviors in complex surveillance scenes where anomalies are subtle and difficult to distinguish due to the intricate correlations among multiple objects’ behaviors. Specifically, a cascaded probabilistic topic model was put forward for learning the spatial context of local behavior and the temporal context of global behavior in two different stages. In the first stage of topic modeling, unlike the existing approaches using either optical flows or complete trajectories, spatio-temporal correlations between the trajectory fragments in video clips were modeled by the latent Dirichlet allocation (LDA) topic model based on Markov random fields to obtain the spatial context of local behavior in each video clip. The local behavior topic categories were then obtained by exploiting the spectral clustering algorithm. Based on the construction of a dictionary through the process of local behavior topic clustering, the second phase of the LDA topic model learns the correlations of global behaviors and temporal context. In particular, an abnormal behavior recognition method was developed based on the learned spatio-temporal context of behaviors. The specific identification method adopts a top-down strategy and consists of two stages: anomaly recognition of video clip and anomalous behavior recognition within each video clip. Evaluation was performed using the validity of spatio-temporal context learning for local behavior topics and abnormal behavior recognition. Furthermore, the performance of the proposed approach in abnormal behavior recognition improved effectively and significantly in complex surveillance scenes.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131924882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Receiver Protection from Electrical Shock in Vehicle Wireless Charging Environments","authors":"Taejun Park, Kwang-il Hwang","doi":"10.3745/JIPS.03.0139","DOIUrl":"https://doi.org/10.3745/JIPS.03.0139","url":null,"abstract":"This paper deals with the electrical shock that can occur in a car wireless charging system. The recently released the Wireless Power Consortium (WPC) standard specifies that the receiver must be protected from the radio power generated by the transmitter and presents two scenarios in which the receiver may be subjected to electrical shock due to the wireless power generated by the transmitter. The WPC also provides a hardware approach for blocking the wireless power generated by the transmitter to protect the receiver in each situation. In addition, it presents the hardware constraints that must be applied to the transmitter and the parameters that must be constrained by the software. In this paper, we analyze the results of the electric shock in the vehicle using the WPC certified transmitter and receiver in the scenarios presented by WPC. As a result, we found that all the scenarios had electrical shocks on the receiver, which could have a significant impact on the receiver circuitry. Therefore, we propose wireless power transfer limit (WPTL) algorithm to protect receiver circuitry in various vehicle charging environments.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"34 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116591784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xinghua Sun, Yongfei Ye, Jie Yang, Li Hao, L. Ding, Haomin Song
{"title":"Research and Implementation of U-Learning System Based on Experience API","authors":"Xinghua Sun, Yongfei Ye, Jie Yang, Li Hao, L. Ding, Haomin Song","doi":"10.3745/JIPS.04.0176","DOIUrl":"https://doi.org/10.3745/JIPS.04.0176","url":null,"abstract":"Experience API provides a learner-centered model for learning data collection and learning process recording. In particular, it can record learning data from multiple data sources. Therefore, Experience API provides very good support for ubiquitous learning. In this paper, we put forward the architecture of ubiquitous learning system and the method of reading the learning record from the ubiquitous learning system. We analyze students’ learning behavior from two aspects: horizontal and vertical, and give the analysis results. The system can provide personalized suggestions for learners according to the results of learning analysis. According to the feedback from learners, we can see that this u-learning system can greatly improve learning interest and quality of learners.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127792452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advances in Algorithms, Security, and Systems for ICT Convergence","authors":"Ji Su Park, J. Park","doi":"10.3745/JIPS.03.0141","DOIUrl":"https://doi.org/10.3745/JIPS.03.0141","url":null,"abstract":"","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126594239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Health Management Service with Beacon-Based Identification for Preventive Elderly Care","authors":"Jian-Wei Li, Yi-Chun Chang, Min-Xiong Xu, De-Yao Huang","doi":"10.3745/JIPS.04.0173","DOIUrl":"https://doi.org/10.3745/JIPS.04.0173","url":null,"abstract":"Bluetooth low energy (BLE) beacon is an actively push-to-broadcast electronic signal and can be used for object identification. This paper uses such beacon-based identification and Internet of Things (IoT) technologies for the elder health management service system to simplify the user interfaces and steps for preventive elder care. In the proposed system, an elder’s family member, caregiver, or medical worker can conveniently and quickly record daily health management information. Besides, through the statistics and analysis of the data on the back end of the system, it is helpful for the elderly to refer to the data of daily care management and future management trends. Similarly, it is also an essential reference data for system maintenance and the new preventive health care services development.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125526089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Sentiment Classification Approach of Sentences Clustering in Webcast Barrages","authors":"Jun Li, Guimin Huang, Ya Zhou","doi":"10.3745/JIPS.04.0174","DOIUrl":"https://doi.org/10.3745/JIPS.04.0174","url":null,"abstract":"Conducting sentiment analysis and opinion mining are challenging tasks in natural language processing. Many of the sentiment analysis and opinion mining applications focus on product reviews, social media reviews, forums and microblogs whose reviews are topic-similar and opinion-rich. In this paper, we try to analyze the sentiments of sentences from online webcast reviews that scroll across the screen, which we call live barrages. Contrary to social media comments or product reviews, the topics in live barrages are more fragmented, and there are plenty of invalid comments that we must remove in the preprocessing phase. To extract evaluative sentiment sentences, we proposed a novel approach that clusters the barrages from the same commenter to solve the problem of scattering the information for each barrage. The method developed in this paper contains two subtasks: in the data preprocessing phase, we cluster the sentences from the same commenter and remove unavailable sentences; and we use a semi-supervised machine learning approach, the naïve Bayes algorithm, to analyze the sentiment of the barrage. According to our experimental results, this method shows that it performs well in analyzing the sentiment of online webcast barrages.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114275722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Point Clouds Fast Thinning Algorithm Based on Sample Point Spatial Neighborhood","authors":"Jiaxing Wei, Maolin Xu, Hongling Xiu","doi":"10.3745/JIPS.01.0057","DOIUrl":"https://doi.org/10.3745/JIPS.01.0057","url":null,"abstract":"Point clouds have ability to express the spatial entities, however, the point clouds redundancy always involves some uncertainties in computer recognition and model construction. Therefore, point clouds thinning is an indispensable step in point clouds model reconstruction and other applications. To overcome the shortcomings of complex classification index and long time consuming in existing point clouds thinning algorithms, this paper proposes a point clouds fast thinning algorithm. Specifically, the two-dimensional index is established in plane linear array (x, y) for the scanned point clouds, and the thresholds of adjacent point distance difference and height difference are employed to further delete or retain the selected sample point. Sequentially, the index of sample point is traversed forwardly and backwardly until the process of point clouds thinning is completed. The results suggest that the proposed new algorithm can be applied to different targets when the thresholds are built in advance. Besides, the new method also performs superiority in time consuming, modelling accuracy and feature retention by comparing with octree thinning algorithm.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"15 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113962367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}