• Title/Summary/Keyword: combined systems

Search Result 2,640, Processing Time 0.03 seconds

Research on the Application of VR Technology in Meteorological Simulation

  • Lu, Kai;Cho, Dong Min
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.10
    • /
    • pp.1435-1448
    • /
    • 2021
  • Recent years, due to the direct or indirect damages caused by meteorological disasters more and more attention have been paid to natural disasters. At same time, diversified and multi-sensory interactive meteorological services is increasingly demanded. In this study, novel interactive meteorological service was compared with the traditional communication methods. Combining with case studies and systems creation, a virtual reality weather simulation framework was proposed, and a realistic virtual game environment providing real-time and historical weather information was created. The primary goal of this study is to build a weather display cabinet game system by using virtual reality technology, and promoting public's understanding of the principles of weather changes. With the interactive games in realistic scenarios, public's awareness for disasters prevention could be promoted. It is helping to change public's traditional understanding of meteorological theories, and will provide a more convenient way for the public to explore more effective weather forecasts. The simulation system is supported by VR technology. It was combined with Leap Motion interactive equipment to make popularization games for weather science. T-test data analysis showed that the application of VR technology in weather games has strong operability and interactivity.

Joint Detection Method for Non-orthogonal Multiple Access System Based on Linear Precoding and Serial Interference Cancellation

  • Li, Jianpo;Wang, Qiwei
    • Journal of Information Processing Systems
    • /
    • v.17 no.5
    • /
    • pp.933-946
    • /
    • 2021
  • In the non-orthogonal multiple access (NOMA) system, multiple user signals on the single carrier are superimposed in a non-orthogonal manner, which results in the interference between non-orthogonal users and noise interference in the channel. To solve this problem, an improved algorithm combining regularized zero-forcing (RZF) precoding with minimum mean square error-serial interference cancellation (MMSE-SIC) detection is proposed. The algorithm uses RZF precoding combined with successive over-relaxation (SOR) method at the base station to preprocess the source signal, which can balance the effects of non-orthogonal inter-user interference and noise interference, and generate a precoded signal suitable for transmission in the channel. At the receiver, the MMSE-SIC detection algorithm is used to further eliminate the interference in the signal for the received superimposed signal, and reduce the calculation complexity through the QR decomposition of the matrix. The simulation results show that the proposed joint detection algorithm has good applicability to eliminate the interference of non-orthogonal users, and it has low complexity and fast convergence speed. Compared with other traditional method, the improved method has lower error rate under different signal-to-interference and noise ratio (SINR).

Audio and Video Bimodal Emotion Recognition in Social Networks Based on Improved AlexNet Network and Attention Mechanism

  • Liu, Min;Tang, Jun
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.754-771
    • /
    • 2021
  • In the task of continuous dimension emotion recognition, the parts that highlight the emotional expression are not the same in each mode, and the influences of different modes on the emotional state is also different. Therefore, this paper studies the fusion of the two most important modes in emotional recognition (voice and visual expression), and proposes a two-mode dual-modal emotion recognition method combined with the attention mechanism of the improved AlexNet network. After a simple preprocessing of the audio signal and the video signal, respectively, the first step is to use the prior knowledge to realize the extraction of audio characteristics. Then, facial expression features are extracted by the improved AlexNet network. Finally, the multimodal attention mechanism is used to fuse facial expression features and audio features, and the improved loss function is used to optimize the modal missing problem, so as to improve the robustness of the model and the performance of emotion recognition. The experimental results show that the concordance coefficient of the proposed model in the two dimensions of arousal and valence (concordance correlation coefficient) were 0.729 and 0.718, respectively, which are superior to several comparative algorithms.

Development of IIoT Edge Middleware System for Smart Services (스마트서비스를 위한 경량형 IIoT Edge 미들웨어 시스템 개발)

  • Lee, Han;Hwang, Joon Suk;Kang, Dae Hyun;Jeong, Seok Chan
    • The Journal of Bigdata
    • /
    • v.6 no.1
    • /
    • pp.115-125
    • /
    • 2021
  • Due to various ICT Technology innovations and Digital Transformation, the Internet of Things(IoT) environment is increasingly requiring intelligence, decentralization, and automated service, especially an advanced and stable smart service environment in the Industrial Internet of Things(IIoT) where communication network(5G), data analysis and artificial intelligence(AI), and digital twin technology are combined. In this study, we propose IIoT Edge middleware systems for flexible interface with heterogeneous devices such as facilities and sensors at various industrial sites and for quick and stable data collection and processing.

Copyright Protection of E-books by Data Hiding Based on Integer Factorization

  • Wu, Da-Chun;Hsieh, Ping-Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3421-3443
    • /
    • 2021
  • A data hiding method based on integer factorization via e-books in the EPUB format with XHTML and CSS files for copyright protection is proposed. Firstly, a fixed number m of leading bits in a message are transformed into an integer which is then factorized to yield k results. One of the k factorizations is chosen according to the decimal value of a number n of the subsequent message bits with n being decided as the binary logarithm of k. Next, the chosen factorization, denoted as a × b, is utilized to create a combined use of the

    and elements in the XHTML files to embed the m + n message bits by including into the two elements a class selector named according to the value of a as well as a text segment with b characters. The class selector is created by the use of a CSS pseudo-element. The resulting web pages are of no visual difference from the original, achieving a steganographic effect. The security of the embedded message is also considered by randomizing the message bits before they are embedded. Good experimental results and comparisons with exiting methods show the feasibility of the proposed method for copyright protection of e-books.

The Pahlev Reliability Index: A measurement for the resilience of power generation technologies versus climate change

  • Norouzi, Nima
    • Nuclear Engineering and Technology
    • /
    • v.53 no.5
    • /
    • pp.1658-1663
    • /
    • 2021
  • Research on climate change and global warming on the power generation systems are rapidly increasing because of the Importance of the sustainable energy supply, thus the electricity supply since its growing share, in the end, uses energy supply. However, some researchers conducted this field, but many research gaps are not mentioned and filled in this field's literature since the lack of general statements and the quantitative models and formulation of the issue. In this research, an exergy-based model is implemented to model a set of six power generation technologies (combined cycle, gas turbine, nuclear plant, solar PV, and wind turbine) and use this model to simulate each technology's responses to climate change impacts. Finally, using these responses to define and calculate a formulation for the relationship between the system's energy performance in different environmental situations and a dimensionless index to quantize each power technology's reliability against the climate change impacts called the Pahlev reliability index (P-index) of the power technology. The results have shown that solar and nuclear technologies are the most, and wind turbines are the least reliable power generation technologies.

Electroconductive Graphene-Combined Polycaprolactone Electrospun Films for Biological Applications (생체적 적용을 위한 전기전도성을 갖는 그래핀과 폴리카프로락톤 복합물질 전기방사 섬유형 필름)

  • Oh, Jun-Sung;Lee, Eun-Jung
    • Korean Journal of Materials Research
    • /
    • v.31 no.5
    • /
    • pp.278-285
    • /
    • 2021
  • This study produces electroconductive polycaprolactone (PCL)-based film with different amounts of graphene (G) through electrospinning, and the characteristics of the produced G/PCL composites are investigated. The G/PCL results are analyzed by comparing them with those obtained using pure PCL electrospun film as a control. The morphology of electrospun material is analyzed through scanning electron microscopy and transmission electron microscopy. Mechanical and electrical properties are also evaluated. Composites containing 1 % graphene have the highest elongation rate, and 5 % samples have the highest strength and elasticity. Graphene contents > 25 % show electro-conductivity, which level improves with increase of graphene content. Biological characteristics of G/PCL composites are assessed through behavioral analysis of neural cell attachment and proliferation. Cell experiments reveal that compositions < 50 % show slightly reduced cell viability. Moreover, graphene combinations facilitated cell proliferation compared to pure PCL. These results confirm that a 25 % G/PCL composition is best for application to systems that introduce external stimuli such as electric fields and electrodes to lead to synergistic efficiency of tissue regeneration.

Audio Fingerprint Retrieval Method Based on Feature Dimension Reduction and Feature Combination

  • Zhang, Qiu-yu;Xu, Fu-jiu;Bai, Jian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.522-539
    • /
    • 2021
  • In order to solve the problems of the existing audio fingerprint method when extracting audio fingerprints from long speech segments, such as too large fingerprint dimension, poor robustness, and low retrieval accuracy and efficiency, a robust audio fingerprint retrieval method based on feature dimension reduction and feature combination is proposed. Firstly, the Mel-frequency cepstral coefficient (MFCC) and linear prediction cepstrum coefficient (LPCC) of the original speech are extracted respectively, and the MFCC feature matrix and LPCC feature matrix are combined. Secondly, the feature dimension reduction method based on information entropy is used for column dimension reduction, and the feature matrix after dimension reduction is used for row dimension reduction based on energy feature dimension reduction method. Finally, the audio fingerprint is constructed by using the feature combination matrix after dimension reduction. When speech's user retrieval, the normalized Hamming distance algorithm is used for matching retrieval. Experiment results show that the proposed method has smaller audio fingerprint dimension and better robustness for long speech segments, and has higher retrieval efficiency while maintaining a higher recall rate and precision rate.

A Cross-Platform Malware Variant Classification based on Image Representation

  • Naeem, Hamad;Guo, Bing;Ullah, Farhan;Naeem, Muhammad Rashid
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3756-3777
    • /
    • 2019
  • Recent internet development is helping malware researchers to generate malicious code variants through automated tools. Due to this reason, the number of malicious variants is increasing day by day. Consequently, the performance improvement in malware analysis is the critical requirement to stop the rapid expansion of malware. The existing research proved that the similarities among malware variants could be used for detection and family classification. In this paper, a Cross-Platform Malware Variant Classification System (CP-MVCS) proposed that converted malware binary into a grayscale image. Further, malicious features extracted from the grayscale image through Combined SIFT-GIST Malware (CSGM) description. Later, these features used to identify the relevant family of malware variant. CP-MVCS reduced computational time and improved classification accuracy by using CSGM feature description along machine learning classification. The experiment performed on four publically available datasets of Windows OS and Android OS. The experimental results showed that the computation time and malware classification accuracy of CP-MVCS was higher than traditional methods. The evaluation also showed that CP-MVCS was not only differentiated families of malware variants but also identified both malware and benign samples in mix fashion efficiently.

Deep Learning in Drebin: Android malware Image Texture Median Filter Analysis and Detection

  • Luo, Shi-qi;Ni, Bo;Jiang, Ping;Tian, Sheng-wei;Yu, Long;Wang, Rui-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3654-3670
    • /
    • 2019
  • This paper proposes an Image Texture Median Filter (ITMF) to analyze and detect Android malware on Drebin datasets. We design a model of "ITMF" combined with Image Processing of Median Filter (MF) to reflect the similarity of the malware binary file block. At the same time, using the MAEVS (Malware Activity Embedding in Vector Space) to reflect the potential dynamic activity of malware. In order to ensure the improvement of the classification accuracy, the above-mentioned features(ITMF feature and MAEVS feature)are studied to train Restricted Boltzmann Machine (RBM) and Back Propagation (BP). The experimental results show that the model has an average accuracy rate of 95.43% with few false alarms. to Android malicious code, which is significantly higher than 95.2% of without ITMF, 93.8% of shallow machine learning model SVM, 94.8% of KNN, 94.6% of ANN.