J. Inf. Process. Syst.最新文献

筛选
英文 中文
Fault Diagnosis Method Based on High Precision CRPF under Complex Noise Environment 复杂噪声环境下基于高精度CRPF的故障诊断方法
J. Inf. Process. Syst. Pub Date : 2020-06-02 DOI: 10.3745/JIPS.01.0053
Jinhua Wang, Jie Cao
{"title":"Fault Diagnosis Method Based on High Precision CRPF under Complex Noise Environment","authors":"Jinhua Wang, Jie Cao","doi":"10.3745/JIPS.01.0053","DOIUrl":"https://doi.org/10.3745/JIPS.01.0053","url":null,"abstract":"In order to solve the problem of low tracking accuracy caused by complex noise in the fault diagnosis of complex nonlinear system, a fault diagnosis method of high precision cost reference particle filter (CRPF) is proposed. By optimizing the low confidence particles to replace the resampling process, this paper improved the problem of sample impoverishment caused by the sample updating based on risk and cost of CRPF algorithm. This paper attempts to improve the accuracy of state estimation from the essential level of obtaining samples. Then, we study the correlation between the current observation value and the prior state. By adjusting the density variance of state transitions adaptively, the adaptive ability of the algorithm to the complex noises can be enhanced, which is expected to improve the accuracy of fault state tracking. Through the simulation analysis of a fuel unit fault diagnosis, the results show that the accuracy of the algorithm has been improved obviously under the background of complex noise.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130752917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing the Reliability of Wi-Fi Network Using Evil Twin AP Detection Method Based on Machine Learning 基于机器学习的恶意双AP检测方法提高Wi-Fi网络的可靠性
J. Inf. Process. Syst. Pub Date : 2020-06-02 DOI: 10.3745/JIPS.03.0137
Jeonghoon Seo, Chaeho Cho, Yoojae Won
{"title":"Enhancing the Reliability of Wi-Fi Network Using Evil Twin AP Detection Method Based on Machine Learning","authors":"Jeonghoon Seo, Chaeho Cho, Yoojae Won","doi":"10.3745/JIPS.03.0137","DOIUrl":"https://doi.org/10.3745/JIPS.03.0137","url":null,"abstract":"Wireless networks have become integral to society as they provide mobility and scalability advantages. However, their disadvantage is that they cannot control the media, which makes them vulnerable to various types of attacks. One example of such attacks is the evil twin access point (AP) attack, in which an authorized AP is impersonated by mimicking its service set identifier (SSID) and media access control (MAC) address. Evil twin APs are a major source of deception in wireless networks, facilitating message forgery and eavesdropping. Hence, it is necessary to detect them rapidly. To this end, numerous methods using clock skew have been proposed for evil twin AP detection. However, clock skew is difficult to calculate precisely because wireless networks are vulnerable to noise. This paper proposes an evil twin AP detection method that uses a multiple-feature-based machine learning classification algorithm. The features used in the proposed method are clock skew, channel, received signal strength, and duration. The results of experiments conducted indicate that the proposed method has an evil twin AP detection accuracy of 100% using the random forest algorithm.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117148102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Algorithm for Detection of Fire Smoke in a Video Based on Wavelet Energy Slope Fitting 基于小波能量斜率拟合的视频火灾烟雾检测算法
J. Inf. Process. Syst. Pub Date : 2020-06-02 DOI: 10.3745/JIPS.01.0054
Yi Zhang, Haifeng Wang, Xinwei Fan
{"title":"Algorithm for Detection of Fire Smoke in a Video Based on Wavelet Energy Slope Fitting","authors":"Yi Zhang, Haifeng Wang, Xinwei Fan","doi":"10.3745/JIPS.01.0054","DOIUrl":"https://doi.org/10.3745/JIPS.01.0054","url":null,"abstract":"The existing methods for detection of fire smoke in a video easily lead to misjudgment of cloud, fog and moving distractors, such as a moving person, a moving vehicle and other non-smoke moving objects. Therefore, an algorithm for detection of fire smoke in a video based on wavelet energy slope fitting is proposed in this paper. The change in wavelet energy of the moving target foreground is used as the basis, and a time window of 40 continuous frames is set to fit the wavelet energy slope of the suspected area in every 20 frames, thus establishing a wavelet-energy-based smoke judgment criterion. The experimental data show that the algorithm described in this paper not only can detect smoke more quickly and more accurately, but also can effectively avoid the distraction of cloud, fog and moving object and prevent false alarm.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122921900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Iris Ciphertext Authentication System Based on Fully Homomorphic Encryption 基于全同态加密的虹膜密文认证系统
J. Inf. Process. Syst. Pub Date : 2020-06-02 DOI: 10.3745/JIPS.03.0138
Xinxia Song, Zhigang Chen, Dechao Sun
{"title":"Iris Ciphertext Authentication System Based on Fully Homomorphic Encryption","authors":"Xinxia Song, Zhigang Chen, Dechao Sun","doi":"10.3745/JIPS.03.0138","DOIUrl":"https://doi.org/10.3745/JIPS.03.0138","url":null,"abstract":"With the application and promotion of biometric technology, biometrics has become more and more important to identity authentication. In order to ensure the privacy of the user, the biometrics cannot be stored or manipulated in plaintext. Aiming at this problem, this paper analyzes and summarizes the scheme and performance of the existing biometric authentication system, and proposes an iris-based ciphertext authentication system based on fully homomorphic encryption using the FV scheme. The implementation of the system is partly powered by Microsoft’s SEAL (Simple Encrypted Arithmetic Library). The entire system can complete iris authentication without decrypting the iris feature template, and the database stores the homomorphic ciphertext of the iris feature template. Thus, there is no need to worry about the leakage of the iris feature template. At the same time, the system does not require a trusted center for authentication, and the authentication is completed on the server side directly using the one-time MAC authentication method. Tests have shown that when the system adopts an iris algorithm with a low depth of calculation circuit such as the Hamming distance comparison algorithm, it has good performance, which basically meets the requirements of real application scenarios.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116097991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Construction of a Remote Monitoring System in Smart Dust Environment 智能粉尘环境远程监测系统的构建
J. Inf. Process. Syst. Pub Date : 2020-06-02 DOI: 10.3745/JIPS.04.0175
Joonsuu Park, Kee-Hyun Park
{"title":"Construction of a Remote Monitoring System in Smart Dust Environment","authors":"Joonsuu Park, Kee-Hyun Park","doi":"10.3745/JIPS.04.0175","DOIUrl":"https://doi.org/10.3745/JIPS.04.0175","url":null,"abstract":"A smart dust monitoring system is useful for obtaining information on rough terrain that is difficult for humans to access. One of ways to deploy sensors to gather information in smart dust environment is to use an aircraft in the Amazon rainforest to scatter an enormous amount of small and cheap sensors (or smart dust devices), or to use an unmanned spacecraft to throw the sensors on the moon’s surface. However, scattering an enormous amount of smart dust devices creates the difficulty of managing such devices as they can be scattered into inaccessible areas, and also causes problems such as bottlenecks, device failure, and high/low density of devices. Of the various problems that may occur in the smart dust environment, this paper is focused on solving the bottleneck problem. To address this, we propose and construct a three-layered hierarchical smart dust monitoring system that includes relay dust devices (RDDs). An RDD is a smart dust device with relatively higher computing/communicating power than a normal smart dust device. RDDs play a crucial role in reducing traffic load for the system. To validate the proposed system, we use climate data obtained from authorized portals to compare the system with other systems (i.e., non-hierarchical system and simple hierarchical system). Through this comparison, we determined that the transmission processing time is reduced by 49%-50% compared to other systems, and the maximum number of connectable devices can be increased by 16-32 times without compromising the system’s operations.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117109389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Alternative State Estimation Filtering Algorithm for Temporarily Uncertain Continuous Time System 一种暂不确定连续时间系统的备用状态估计滤波算法
J. Inf. Process. Syst. Pub Date : 2020-06-02 DOI: 10.3745/JIPS.01.0055
P. Kim
{"title":"An Alternative State Estimation Filtering Algorithm for Temporarily Uncertain Continuous Time System","authors":"P. Kim","doi":"10.3745/JIPS.01.0055","DOIUrl":"https://doi.org/10.3745/JIPS.01.0055","url":null,"abstract":"An alternative state estimation filtering algorithm is designed for continuous time systems with noises as well as control input. Two kinds of estimation filters, which have different measurement memory structures, are operated selectively in order to use both filters effectively as needed. Firstly, the estimation filter with infinite memory structure is operated for a certain continuous time system. Secondly, the estimation filter with finite memory structure is operated for temporarily uncertain continuous time system. That is, depending on the presence of uncertainty, one of infinite memory structure and finite memory structure filtered estimates is operated selectively to obtain the valid estimate. A couple of test variables and declaration rule are developed to detect uncertainty presence or uncertainty absence, to operate the suitable one from two kinds of filtered estimates, and to obtain ultimately the valid filtered estimate. Through computer simulations for a continuous time aircraft engine system with different measurement memory lengths and temporary model uncertainties, the proposed state estimation filtering algorithm can work well in temporarily uncertain as well as certain continuous time systems. Moreover, the proposed state estimation filtering algorithm shows remarkable superiority to the infinite memory structure filtering when temporary uncertainties occur in succession.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124336409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Movie Recommendation System Based on Users' Personal Information and Movies Rated Using the Method of k-Clique and Normalized Discounted Cumulative Gain 基于用户个人信息的电影推荐系统,基于k-Clique和归一化贴现累积增益的电影评分方法
J. Inf. Process. Syst. Pub Date : 2020-04-01 DOI: 10.3745/JIPS.04.0169
Vilakone Phonexay, Khamphaphone Xinchang, Doosoon Park
{"title":"Movie Recommendation System Based on Users' Personal Information and Movies Rated Using the Method of k-Clique and Normalized Discounted Cumulative Gain","authors":"Vilakone Phonexay, Khamphaphone Xinchang, Doosoon Park","doi":"10.3745/JIPS.04.0169","DOIUrl":"https://doi.org/10.3745/JIPS.04.0169","url":null,"abstract":"This study proposed the movie recommendation system based on the user’s personal information and movies rated using the method of k-clique and normalized discounted cumulative gain. The main idea is to solve the problem of cold-start and to increase the accuracy in the recommendation system further instead of using the basic technique that is commonly based on the behavior information of the users or based on the best-selling product. The personal information of the users and their relationship in the social network will divide into the various community with the help of the k-clique method. Later, the ranking measure method that is widely used in the searching engine will be used to check the top ranking movie and then recommend it to the new users. We strongly believe that this idea will prove to be significant and meaningful in predicting demand for new users. Ultimately, the result of the experiment in this paper serves as a guarantee that the proposed method offers substantial finding in raw data sets by increasing accuracy to 87.28% compared to the three most successful methods used in this experiment, and that it can solve the problem of cold-start.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124626034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Advanced Technologies in Blockchain, Machine Learning, and Big Data 区块链、机器学习和大数据的先进技术
J. Inf. Process. Syst. Pub Date : 2020-04-01 DOI: 10.3745/JIPS.01.0052
Ji Su Park, J. Park
{"title":"Advanced Technologies in Blockchain, Machine Learning, and Big Data","authors":"Ji Su Park, J. Park","doi":"10.3745/JIPS.01.0052","DOIUrl":"https://doi.org/10.3745/JIPS.01.0052","url":null,"abstract":"Blockchain, machine learning, and big data are among the key components of the future IT track. These technologies are used in various fields; hence their increasing application. This paper discusses the technologies developed in various research fields, such as data representation, Blockchain application, 3D shape recognition and classification, query method, classification method, and search algorithm, to provide insights into the future paradigm. In this paper, we present a summary of 18 high-quality accepted articles following a rigorous review process in the fields of Blockchain, machine learning, and big data.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124462001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Conceptual Extraction of Compound Korean Keywords 复合式韩语关键词的概念提取
J. Inf. Process. Syst. Pub Date : 2020-04-01 DOI: 10.3745/JIPS.02.0131
S. Lee
{"title":"Conceptual Extraction of Compound Korean Keywords","authors":"S. Lee","doi":"10.3745/JIPS.02.0131","DOIUrl":"https://doi.org/10.3745/JIPS.02.0131","url":null,"abstract":"After reading a document, people construct a concept about the information they consumed and merge multiple words to set up keywords that represent the material. With that in mind, this study suggests a smarter and more efficient keyword extraction method wherein scholarly journals are used as the basis for the establishment of production rules based on a concept information of words appearing in a document in a way in which authorprovided keywords are functional although they do not appear in the body of the document. This study presents a new way to determine the importance of each keyword, excluding non-relevant keywords. To identify the validity of extracted keywords, titles and abstracts of journals about natural language and auditory language were collected for analysis. The comparison of author-provided keywords with the keyword results of the developed system showed that the developed system was highly useful, with an accuracy rate as good as up to 96%.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124496979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Design for a Hyperledger Fabric Blockchain-Based Patch-Management System 基于区块链的超级账本结构补丁管理系统设计
J. Inf. Process. Syst. Pub Date : 2020-04-01 DOI: 10.3745/JIPS.03.0136
Kyungwoo Song, Shee-Ihn Kim, Seung-Hee Kim
{"title":"A Design for a Hyperledger Fabric Blockchain-Based Patch-Management System","authors":"Kyungwoo Song, Shee-Ihn Kim, Seung-Hee Kim","doi":"10.3745/JIPS.03.0136","DOIUrl":"https://doi.org/10.3745/JIPS.03.0136","url":null,"abstract":"An enterprise patch-management system (PMS) typically supplies a single point of failure (SPOF) of centralization structure. However, a Blockchain system offers features of decentralization, transaction integrity, user certification, and a smart chaincode. This study proposes a Hyperledger Fabric Blockchain-based distributed patch-management system and verifies its technological feasibility through prototyping, so that all participating users can be protected from various threats. In particular, by adopting a private chain for patch file set management, it is designed as a Blockchain system that can enhance security, log management, latest status supervision and monitoring functions. In addition, it uses a Hyperledger Fabric that owns a practical Byzantine fault tolerant consensus algorithm, and implements the functions of upload patch file set, download patch file set, and audit patch file history, which are major features of PMS, as a smart contract (chaincode), and verified this operation. The distributed ledger structure of Blockchain-based PMS can be a solution for distributor and client authentication and forgery problems, SPOF problem, and distribution record reliability problem. It not only presents an alternative to dealing with central management server loads and failures, but it also provides a higher level of security and availability.","PeriodicalId":415161,"journal":{"name":"J. Inf. Process. Syst.","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116347122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信