EAI Endorsed Transactions on Scalable Information Systems最新文献

筛选
英文 中文
RETRACTED: Modified dark channel prior based on multi-scale Retinex for power image defogging [EAI Endorsed Scal Inf Syst (2022), Online First] 撤稿:基于多尺度Retinex的功率图像去雾改进暗通道先验[EAI背书尺度信息系统(2022),在线第一]
IF 1.3
EAI Endorsed Transactions on Scalable Information Systems Pub Date : 2022-04-08 DOI: 10.4108/eai.8-4-2022.173800
Haiyan Yu, Jihong Wang
{"title":"RETRACTED: Modified dark channel prior based on multi-scale Retinex for power image defogging [EAI Endorsed Scal Inf Syst (2022), Online First]","authors":"Haiyan Yu, Jihong Wang","doi":"10.4108/eai.8-4-2022.173800","DOIUrl":"https://doi.org/10.4108/eai.8-4-2022.173800","url":null,"abstract":"","PeriodicalId":43034,"journal":{"name":"EAI Endorsed Transactions on Scalable Information Systems","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79735352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTED: An automatic scoring method for Chinese-English spoken translation based on attention LSTM [EAI Endorsed Scal Inf Syst (2022), Online First] 一种基于注意力LSTM的汉英口语翻译自动评分方法[EAI背书尺度信息系统(2022),Online First]
IF 1.3
EAI Endorsed Transactions on Scalable Information Systems Pub Date : 2022-04-08 DOI: 10.4108/eai.8-4-2022.173786
Xiaobin Guo
{"title":"RETRACTED: An automatic scoring method for Chinese-English spoken translation based on attention LSTM [EAI Endorsed Scal Inf Syst (2022), Online First]","authors":"Xiaobin Guo","doi":"10.4108/eai.8-4-2022.173786","DOIUrl":"https://doi.org/10.4108/eai.8-4-2022.173786","url":null,"abstract":"","PeriodicalId":43034,"journal":{"name":"EAI Endorsed Transactions on Scalable Information Systems","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86330804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTED: A novel Gauss-Laplace operator based on multi-scale convolution for dance motion image enhancement [EAI Endorsed Scal Inf Syst (2022), Online First] 撤下:一种基于多尺度卷积的新型高斯拉普拉斯算子用于舞蹈运动图像增强[EAI背书尺度信息系统(2022),Online First]
IF 1.3
EAI Endorsed Transactions on Scalable Information Systems Pub Date : 2022-04-08 DOI: 10.4108/eai.8-4-2022.173797
Dianhuai Shen, X. Jiang, Lin Teng
{"title":"RETRACTED: A novel Gauss-Laplace operator based on multi-scale convolution for dance motion image enhancement [EAI Endorsed Scal Inf Syst (2022), Online First]","authors":"Dianhuai Shen, X. Jiang, Lin Teng","doi":"10.4108/eai.8-4-2022.173797","DOIUrl":"https://doi.org/10.4108/eai.8-4-2022.173797","url":null,"abstract":"","PeriodicalId":43034,"journal":{"name":"EAI Endorsed Transactions on Scalable Information Systems","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86441246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Majority Voting and Feature Selection Based Network Intrusion Detection System 基于多数投票和特征选择的网络入侵检测系统
IF 1.3
EAI Endorsed Transactions on Scalable Information Systems Pub Date : 2022-04-04 DOI: 10.4108/eai.4-4-2022.173780
D. Patil, T. Pattewar
{"title":"Majority Voting and Feature Selection Based Network Intrusion Detection System","authors":"D. Patil, T. Pattewar","doi":"10.4108/eai.4-4-2022.173780","DOIUrl":"https://doi.org/10.4108/eai.4-4-2022.173780","url":null,"abstract":"Attackers continually foster new endeavours and attack strategies meant to keep away from safeguards. Many attacks have an effect on other malware or social engineering to collect consumer credentials that grant them get access to network and data. A network intrusion detection system (NIDS) is essential for network safety because it empowers to understand and react to malicious traffic. In this paper, we propose a feature selection and majority voting based solutions for detecting intrusions. A multi-model intrusion detection system is designed using Majority Voting approach. Our proposed approach was tested on a NSL-KDD benchmark dataset. The experimental results show that models based on Majority Voting and Chi-square features selection method achieved the best accuracy of 99.50% with error-rate of 0.501%, FPR of 0.005 and FNR of 0.005 using only 14 features.","PeriodicalId":43034,"journal":{"name":"EAI Endorsed Transactions on Scalable Information Systems","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74869487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Fuzzy TOPSIS Based Analysis to Prioritize Enabling Factors for Strategic Information Technology Management 基于模糊TOPSIS的战略信息技术管理使能因素优先排序分析
IF 1.3
EAI Endorsed Transactions on Scalable Information Systems Pub Date : 2022-04-04 DOI: 10.4108/eai.4-4-2022.173782
Raziya Siddiqui, N. Khan, S. Ahmad
{"title":"A Fuzzy TOPSIS Based Analysis to Prioritize Enabling Factors for Strategic Information Technology Management","authors":"Raziya Siddiqui, N. Khan, S. Ahmad","doi":"10.4108/eai.4-4-2022.173782","DOIUrl":"https://doi.org/10.4108/eai.4-4-2022.173782","url":null,"abstract":"Strategic management of information technology (IT) requires the attention provided to internal and external organizational factors. This paper discusses different enabling factors that allow strategic management of IT, making advances not only for using the approaches independently as well as in using them in a corresponding and adaptive way. A questionnaire-based survey and in-depth discussions were performed with 40 primary stakeholders to assess the relevance of enabling factors. Using available resources-based analysis, enabling factors were defined in four different categories: organizational, business, technological, and operational assessment. Subsequently, these four enabling factors were prioritized using the fuzzy Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) multi-criteria decision analysis method. Finally, technological assessments were given high priority on the basis of the findings to allow more successful strategic IT management.","PeriodicalId":43034,"journal":{"name":"EAI Endorsed Transactions on Scalable Information Systems","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79332629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Neuro Deep Learning Intrusion Detection System for Mobile Adhoc Networks 一种高效的移动自组网神经深度学习入侵检测系统
IF 1.3
EAI Endorsed Transactions on Scalable Information Systems Pub Date : 2022-04-04 DOI: 10.4108/eai.4-4-2022.173781
N. Venkateswaran, S. Prabaharan
{"title":"An Efficient Neuro Deep Learning Intrusion Detection System for Mobile Adhoc Networks","authors":"N. Venkateswaran, S. Prabaharan","doi":"10.4108/eai.4-4-2022.173781","DOIUrl":"https://doi.org/10.4108/eai.4-4-2022.173781","url":null,"abstract":"As of late mobile ad hoc networks (MANETs) have turned into a very popular explore the theme. By giving interchanges without a fixed infrastructure MANETs are an appealing innovation for some applications, for ex, reassigning tasks, strategic activities, nature observing, meetings, & so forth. This paper proposes the use of a neuro Deep learning wireless intrusion detection system that distinguishes the attacks in MANETs. Executing security is a hard task in MANET due to its immutable vulnerabilities. Deep learning gives extra security to such systems and the proposed framework comprises a hybrid conspiracy that joins the determination and abnormality-based methodologies. Executing the partial IDS utilizing neuro Deep learning improves the identification rate in MANETs. The proposed plan utilizes deep neural networks and a cross breed neural system. It demonstrates that Recurrent neural networks can successfully improve the identification and diminish the rate of false caution and failure.","PeriodicalId":43034,"journal":{"name":"EAI Endorsed Transactions on Scalable Information Systems","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84981617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Taxonomy for Large-Scale Cyber Security Attacks 大规模网络安全攻击的分类
IF 1.3
EAI Endorsed Transactions on Scalable Information Systems Pub Date : 2022-03-02 DOI: 10.4108/eai.2-3-2022.173548
Fadi Mohsen, C. Zwart, D. Karastoyanova, G. Gaydadjiev
{"title":"A Taxonomy for Large-Scale Cyber Security Attacks","authors":"Fadi Mohsen, C. Zwart, D. Karastoyanova, G. Gaydadjiev","doi":"10.4108/eai.2-3-2022.173548","DOIUrl":"https://doi.org/10.4108/eai.2-3-2022.173548","url":null,"abstract":"In an e ff ort to examine the spread of large-scale cyber attacks, researchers have created various taxonomies. These taxonomies are purposefully built to facilitate the understanding and the comparison of these attacks , and hence counter their spread. Yet, existing taxonomies focus mainly on the technical aspects of the attacks, with little or no information about how to defend against them. As such, the aim of this work is to extend existing taxonomies by incorporating new features pertaining the defense strategy, scale, and others. We will compare the proposed taxonomy with existing state of the art taxonomies. We also present the analysis of 174 large cyber security attacks based on our taxonomy. Finally, we present a web tool that we developed to allow researchers to explore exiting data sets of attacks and contribute new ones. We are convinced that our work will allow researchers gain deeper insights into emerging attacks by facilitating their categorization, sharing and analysis, which results in boosting the defense e ff orts against cyber attack.","PeriodicalId":43034,"journal":{"name":"EAI Endorsed Transactions on Scalable Information Systems","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72478753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A credible predictive model for employment of college graduates based on LightGBM 基于LightGBM的可信大学毕业生就业预测模型
IF 1.3
EAI Endorsed Transactions on Scalable Information Systems Pub Date : 2022-02-17 DOI: 10.4108/eai.17-2-2022.173456
Yangzi He, Jiawen Zhu, Weina Fu
{"title":"A credible predictive model for employment of college graduates based on LightGBM","authors":"Yangzi He, Jiawen Zhu, Weina Fu","doi":"10.4108/eai.17-2-2022.173456","DOIUrl":"https://doi.org/10.4108/eai.17-2-2022.173456","url":null,"abstract":"INTRODUCTION: \"Improving the employment rate of college students\" directly affects the stability of the country and society and the healthy development of the industry market. The traditional graduate employment rate model only predicts the future employment rate based on changes in historical employment data in previous years. OBJECTIVES: Quantify the employment factors and solve the employment problems in colleges and universities in a targeted manner. METHODS: We construct a credible employment prediction model for college graduates based on LightGBM. RESULTS: We use the model to predict the employment status of students and obtain the special importance which is important to employment of college students . CONCLUSION: The final result shows that our Model performs well in the two indicators of accuracy and model quality.","PeriodicalId":43034,"journal":{"name":"EAI Endorsed Transactions on Scalable Information Systems","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87357755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quality evaluation system of engineering cost education curriculum based on data clustering 基于数据聚类的工程造价教育课程质量评价体系
IF 1.3
EAI Endorsed Transactions on Scalable Information Systems Pub Date : 2022-02-11 DOI: 10.4108/eai.11-2-2022.173451
K. Liang, Xiao-qing Cai, Lu Hui
{"title":"Quality evaluation system of engineering cost education curriculum based on data clustering","authors":"K. Liang, Xiao-qing Cai, Lu Hui","doi":"10.4108/eai.11-2-2022.173451","DOIUrl":"https://doi.org/10.4108/eai.11-2-2022.173451","url":null,"abstract":"Aiming at the problems of poor evaluation effect and long system response time in the existing project cost course quality evaluation system, a project cost education course quality evaluation system based on data clustering is designed. The data acquisition module of infrastructure layer is used to collect the quality evaluation data of engineering cost education course, and the collected data is transmitted to the upper computer by can communication module. The processor control module in the upper computer transmits the data to the course quality evaluation module, and the processor control module selects 32-bit fixed-point chip TMS320F2812; After receiving the data, the course quality evaluation module uses the fuzzy matter-element proximity clustering evaluation method in data mining to evaluate the quality of engineering cost education courses. The evaluation results are transmitted to the application layer for users to use, and the evaluation results are displayed to users through the display interface of the display layer to complete the system design. The experimental results show that the proposed system can complete the quality evaluation of engineering cost education course, the response time of system evaluation is controlled within 400ms, and the response efficiency of the system is improved.","PeriodicalId":43034,"journal":{"name":"EAI Endorsed Transactions on Scalable Information Systems","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85792088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of music training assistant system based on artificial intelligence 基于人工智能的音乐训练辅助系统设计
IF 1.3
EAI Endorsed Transactions on Scalable Information Systems Pub Date : 2022-02-11 DOI: 10.4108/eai.11-2-2022.173450
Hua Zhihan, Liang Yuan, Tao Jin
{"title":"Design of music training assistant system based on artificial intelligence","authors":"Hua Zhihan, Liang Yuan, Tao Jin","doi":"10.4108/eai.11-2-2022.173450","DOIUrl":"https://doi.org/10.4108/eai.11-2-2022.173450","url":null,"abstract":"In order to improve the input accuracy and response speed of music training, this paper designs an intelligent assistant system. The architecture is divided into infrastructure layer, data layer, application layer and presentation layer. In the hardware design, the combination of ARM and digital signal processor (DSP) is used to realize the interaction between data analysis and human and interface. In the software design, cepstrum algorithm is used to extract cepstrum features of music signals, linear smoothing algorithm is used to filter, dynamic time warping method is used to match patterns, and radial basis function algorithm is used to output the results. Thus, the overall design of the music-assisted training system is completed. Experimental results show that the signal-to-noise ratio of music signal transmission is more than 14dB, the accuracy is higher than 99.5%, and the response speed of serving 240 users is only 1s. The system has strong operability and good performance of music assistant training.","PeriodicalId":43034,"journal":{"name":"EAI Endorsed Transactions on Scalable Information Systems","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2022-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85201528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信