International Journal of Mobile Computing and Multimedia Communications最新文献

筛选
英文 中文
The Role of the Combination of 3D Simulation Sequence Diagram and Video Motion Recognition Technology in Evaluating and Correcting Dancers' Dance Moves 三维模拟序列图与视频动作识别技术相结合在评估和纠正舞者舞蹈动作中的作用
IF 0.4
International Journal of Mobile Computing and Multimedia Communications Pub Date : 2024-07-17 DOI: 10.4018/ijmcmc.348662
Hua Wei, Vinh Chau
{"title":"The Role of the Combination of 3D Simulation Sequence Diagram and Video Motion Recognition Technology in Evaluating and Correcting Dancers' Dance Moves","authors":"Hua Wei, Vinh Chau","doi":"10.4018/ijmcmc.348662","DOIUrl":"https://doi.org/10.4018/ijmcmc.348662","url":null,"abstract":"This paper combines the dance 3D space simulation sequence diagram with video motion recognition technology, filters, denoises, grays and background removal the collected dance video images, analyzes the motion characteristics of people in the sequence diagram, uses support vector machine to learn and train 3D space models, classifies and recognizes people's dance movements, and extracts 3D-SIFT and optical flow characteristics of various areas of human body. Form a three-dimensional space simulation sequence diagram, reduce and normalize the extracted features, get the feature vectors of various characters, and input them into the classifier to realize the recognition of dance movements. The results show that the combination of 3D-SIFT and optical flow can realize the dynamic change of human static information, the illumination invariance of SIFT features can make up for the illumination sensitivity of optical flow features, and the optical flow features can solve the instability problem of determining the key points of SIFT features.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":null,"pages":null},"PeriodicalIF":0.4,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141829726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy Learning-Based Electric Measurement Data Circulation Monitoring and Security Risk Anomaly Evaluation 基于模糊学习的电力测量数据流通监控与安全风险异常评估
IF 0.4
International Journal of Mobile Computing and Multimedia Communications Pub Date : 2024-07-17 DOI: 10.4018/ijmcmc.346990
Xinjia Li, Yahong Li, Lei Fang, Liwei Liu, Ke Wang
{"title":"Fuzzy Learning-Based Electric Measurement Data Circulation Monitoring and Security Risk Anomaly Evaluation","authors":"Xinjia Li, Yahong Li, Lei Fang, Liwei Liu, Ke Wang","doi":"10.4018/ijmcmc.346990","DOIUrl":"https://doi.org/10.4018/ijmcmc.346990","url":null,"abstract":"With the circulation of massive electric measurement data, data anomaly caused by security attacks imposes security risks on reliable operation of smart grid. Long short-term memory (LSTM) based data circulation monitoring and security risk anomaly evaluation has been intensively studied. However, some issues remain unsolved, including learning overfitting and large prediction error. In this paper, we investigate fuzzy learning to infer the abnormal level of security risk. In particular, an adaptive grey wolf optimization-LSTM-fuzzy petri network (AGWO-LSTM-FPN) based electrical measurement data circulation monitoring and security risk anomaly evaluation algorithm is proposed. Specifically, AGWO is utilized to optimize LSTM parameter updating and improve traffic prediction accuracy. Furthermore, FPN is combined with multi-dimensional monitoring indicators to enhance anomaly level evaluation. Simulation results illustrate the excellent performance of AGWO-LSTM-FPN.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":null,"pages":null},"PeriodicalIF":0.4,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141831205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Youth Sources of News During the COVID-19 Period COVID-19 期间青少年的新闻来源
IF 0.6
International Journal of Mobile Computing and Multimedia Communications Pub Date : 2024-05-17 DOI: 10.4018/ijmcmc.343789
Badreya Al-jenaibi (536d4bda-1d8b-42f0-94b7-3346c1
{"title":"Youth Sources of News During the COVID-19 Period","authors":"Badreya Al-jenaibi (536d4bda-1d8b-42f0-94b7-3346c1","doi":"10.4018/ijmcmc.343789","DOIUrl":"https://doi.org/10.4018/ijmcmc.343789","url":null,"abstract":"Coronavirus disease 2019 (COVID-19) pandemic has produced a global health crisis that has had a deep impact on the way we perceive our world and everyday lives. Not only the spread rate of contagion and patterns of transmission endangered our sense of security, but the safety measures put in place to contain the spread of the virus also require social distancing. In this context of physical threat, social and physical distancing, the role of the different mass media channels and social media in lives of individual, social and societal levels cannot be underestimated.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140963739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An End-to-End Network Evaluation Method for Differentiated Multi-Service Bearing in VPP VPP 中差异化多服务承载的端到端网络评估方法
IF 0.6
International Journal of Mobile Computing and Multimedia Communications Pub Date : 2024-03-12 DOI: 10.4018/ijmcmc.340381
Wanqiao Wang, Jian Su, Hui Zhang, Luyao Guan, Qingrong Zheng, Zhuofan Tang, Huixia Ding
{"title":"An End-to-End Network Evaluation Method for Differentiated Multi-Service Bearing in VPP","authors":"Wanqiao Wang, Jian Su, Hui Zhang, Luyao Guan, Qingrong Zheng, Zhuofan Tang, Huixia Ding","doi":"10.4018/ijmcmc.340381","DOIUrl":"https://doi.org/10.4018/ijmcmc.340381","url":null,"abstract":"Virtual power plant (VPP) plays an important role in improving the balance and regulation abilities of new power system. The safe and reliable operation is support by the VPP end-to-end communication network with differentiated multi-service bearing capability. For the requirement of unified and standard VPP end-to-end networking scheme, the VPP service communication metrics, as well as the communication network architecture of VPP aggregation and control are analyzed. Then, a multi-dimension hierarchical VPP end-to-end network evaluation index system is put forward. In addition, an end-to-end VPP network evaluation method considering differentiated time-sensitive and granular requirements of multiple services is proposed. Finally, the suitability analysis results of various end-to-end networking schemes and multiple services with differentiated time-sensitive and granular requirements are given, which plays a guiding role in establishing a unified standard VPP end-to-end networking scheme.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140249367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometric Authentication Methods on Mobile Platforms 移动平台上的生物识别认证方法
IF 0.6
International Journal of Mobile Computing and Multimedia Communications Pub Date : 2023-11-28 DOI: 10.4018/ijmcmc.334130
Agnitè Maxim Wilfrid Straiker Edoh, Tahirou Djara, Abdou-Aziz Sobabe Ali Tahirou, A. Vianou
{"title":"Biometric Authentication Methods on Mobile Platforms","authors":"Agnitè Maxim Wilfrid Straiker Edoh, Tahirou Djara, Abdou-Aziz Sobabe Ali Tahirou, A. Vianou","doi":"10.4018/ijmcmc.334130","DOIUrl":"https://doi.org/10.4018/ijmcmc.334130","url":null,"abstract":"In this work, the authors propose a new biometric authentication system on mobile devices, enhancing security at these terminals and preserving user privacy. The proposed system uses a method of extracting strong features from minutiae with refinement of the method with regard to the further elimination of false minutiae by the calculation of geometric information (orientations and distances between minutiae) to obtain true terminations and stronger bifurcations facilitating the recognition of individuals. A series of tests carried out using a recognition and authentication application allowed us to achieve a false rejection rate of 13.81% and a false acceptance rate of almost zero (0.021%). The authors also propose a security model using hash functions and a random number to make the recognition system revocable, more difficult to compromise and thus reducing the risk of usurpation.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139226654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reverse Chronology: The Nature of News Stories——Based on the Investigation of the Typical Reports of the Model of the Times 逆年代学:新闻故事的本质——基于对《时代模式》典型报道的考察
IF 0.6
International Journal of Mobile Computing and Multimedia Communications Pub Date : 2023-08-20 DOI: 10.38007/ijmc.2023.040110
{"title":"Reverse Chronology: The Nature of News Stories——Based on the Investigation of the Typical Reports of the Model of the Times","authors":"","doi":"10.38007/ijmc.2023.040110","DOIUrl":"https://doi.org/10.38007/ijmc.2023.040110","url":null,"abstract":"","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85678676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Accounting Information System Based on Computer Network 基于计算机网络的会计信息系统设计
IF 0.6
International Journal of Mobile Computing and Multimedia Communications Pub Date : 2023-07-19 DOI: 10.38007/ijmc.2023.040109
Baifang Liu, Yingqi Jia
{"title":"Design of Accounting Information System Based on Computer Network","authors":"Baifang Liu, Yingqi Jia","doi":"10.38007/ijmc.2023.040109","DOIUrl":"https://doi.org/10.38007/ijmc.2023.040109","url":null,"abstract":": With the progress of information technology and the popularity of the Internet, the traditional Accounting information system (AIS) has been unable to meet the growing information processing needs of enterprises. The traditional AIS has problems such as inconvenient data storage and sharing, low efficiency of information transmission, etc. The AIS based on computer network can effectively solve these problems. This paper aimed to study the design of AIS based on computer network to improve the efficiency and accuracy of enterprise financial management. This paper first introduced the importance of computer network in enterprise management and the application of AIS in modern enterprises. Then, this paper put forward the demand of using computer network technology to design and establish AIS, and expounded the advantages of computer network in realizing real-time sharing and collaborative processing of financial data. This paper put forward indicators to evaluate different design schemes in terms of performance, security and reliability, and emphasized the importance of security in the design of enterprise AIS. This paper was committed to providing reference for enterprises to select appropriate AIS design scheme based on computer network through research and experiment.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81704627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges and Solutions for Network Security in Data Centers Driven by Information Technology 信息技术驱动下数据中心网络安全的挑战与解决方案
IF 0.6
International Journal of Mobile Computing and Multimedia Communications Pub Date : 2023-07-15 DOI: 10.38007/ijmc.2023.040108
Shenze Li
{"title":"Challenges and Solutions for Network Security in Data Centers Driven by Information Technology","authors":"Shenze Li","doi":"10.38007/ijmc.2023.040108","DOIUrl":"https://doi.org/10.38007/ijmc.2023.040108","url":null,"abstract":": With the rapid development of information technology, data center network security issues have become increasingly complex and severe. In order to address this challenge, various information technology driven solutions have been proposed, aimed at improving the security performance of data center networks. This article will explore these solutions and provide relevant numerical data support. By comparing the performance of traditional and new solutions in key indicators such as attack detection rate, false alarm rate, response time, and number of security events, it can be seen that the new solution has achieved significant results in improving network security performance. For example, the attack detection rate of the new solution has reached 95%, which is a significant improvement compared to 75% of traditional solutions. At the same time, the false alarm rate has been reduced to 5%, with a decrease of 50% compared to the traditional solution of 10%. The background significance of information technology driven data center network security solutions is significant, and remarkable numerical results have been achieved in key indicators.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74745922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Eye Tracking to Measure Overall Usability of Online Grocery Shopping Websites 使用眼动追踪来衡量在线杂货购物网站的整体可用性
IF 0.6
International Journal of Mobile Computing and Multimedia Communications Pub Date : 2023-07-14 DOI: 10.4018/ijmcmc.326129
A. B. Naeini, A. Mahdipour, Rasam Dorri
{"title":"Using Eye Tracking to Measure Overall Usability of Online Grocery Shopping Websites","authors":"A. B. Naeini, A. Mahdipour, Rasam Dorri","doi":"10.4018/ijmcmc.326129","DOIUrl":"https://doi.org/10.4018/ijmcmc.326129","url":null,"abstract":"This article examines usability evaluation methodologies, then presents a non-conscious behavioral indicator based on user eye movements and pupil dilation. The authors test how gender and online buying history affect the behavioral index's usability scores. This study uses three Iranian online food retailers. Thirty participants were asked to add things from predetermined grocery stores to virtual shopping carts before the experiment took them to the other two websites in a random order to collect eye movement data. Each group's presentation order was randomized. The number of fixations, number of saccades, total duration of fixations, scan-path length, pupil size, and task time were inversely linked with self-report usability measures. This research evaluates groups with different levels of online shopping expertise and gender based on experienced usability. Differences between groups suggest that user demographics affect usability.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74183747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning-Based Machine Color Emotion Generation 基于深度学习的机器色彩情感生成
IF 0.6
International Journal of Mobile Computing and Multimedia Communications Pub Date : 2023-07-10 DOI: 10.4018/ijmcmc.325349
Tongyao Nie, Xinguang Lv
{"title":"Deep Learning-Based Machine Color Emotion Generation","authors":"Tongyao Nie, Xinguang Lv","doi":"10.4018/ijmcmc.325349","DOIUrl":"https://doi.org/10.4018/ijmcmc.325349","url":null,"abstract":"This paper investigates generating machine color emotion through deep learning. The grayscale image colorization model's training process resembles human memory color. Sixty images were recolored and quality evaluated to explore machine generated color impressions. Six experimental samples were recolored under D65, A, CWF, and TL84 light sources. Changes in lightness, chroma, and hue angle compared the original and colorized images, exploring light source effects on machine color perception. Analyzing differences in coloring results within the CIEL* a* b* color space for pixels with equal grayscale verified machine color emotion generation. Results show the machine learns to form color impressions from samples. Different light source color temperatures impact color prediction accuracy. The machine accurately colors images based on semantic context, demonstrating spontaneous color emotion generation through deep learning. This research positively contributes to the development of intelligent devices with color emotion.","PeriodicalId":43265,"journal":{"name":"International Journal of Mobile Computing and Multimedia Communications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84498651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信