4.2 Article

Design and analysis of an effective graphics collaborative editing system

Journal

Publisher

SPRINGEROPEN
DOI: 10.1186/s13640-019-0427-6

Keywords

CSCW; Graphics co-editing; Consistency; CGCE algorithm

Funding

  1. National Key Research and Development Program of China [2018YFC0810204]
  2. National Natural Science Foundation of China [61872242, 61502220]
  3. Shanghai Science and Technology Innovation Action Plan Project [17511107203, 16111107502]
  4. Shanghai key lab of modern optical system

Ask authors/readers for more resources

With the rapid development of computer-supported cooperative work (CSCW) technology, graphical collaborative editing plays an increasingly important role in CSCW. The most important technique in graphics co-editing is the consistency of graphics co-editing, which mainly includes causality consistency, consistency of results, and consistency of intention. Most of the previous research was abstract and ineffective, lacking theoretical depth and scalability. However, because the algorithm proposed in this paper can solve the contradictions in the consistency of graphical collaborative editing, the research in this paper has particularity, and the results will be proven by the experiment described in the paper. In order to solve the consistency conflict problem of graphic collaborative editing, the common graphics collaborative editing algorithm (CGCE algorithm) is proposed. It is proposed not only to perfect and expand the definition of graphics collaborative editing but also to merge with HTML5 Canvas, WebSocket, jQuery, Node.js and other network programming languages and technologies. The graphic collaborative editing based on the design and implementation of this paper can effectively solve the consistency conflict problem of many users during the collaborative editing of graphics, which ensures that the graphics of each graphical collaborative editing interface is consistent and the collaborative work can achieve the desired effect.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.2
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

TANTO: An Effective Trust-Based Unmanned Aerial Vehicle Computing System for the Internet of Things

Jing Bai, Zhiwen Zeng, Tian Wang, Shaobo Zhang, Neal N. Xiong, Anfeng Liu

Summary: In this article, a trust-based active notice task offloading (TANTO) scheme is proposed to provide trust and low-delay task offloading for resource-limited IoT devices in areas with no available communication infrastructure. The main innovations of TANTO include a novel task offloading mechanism, a trust calculation and reasoning method, and an online UAV trajectory optimization algorithm. Experimental results show that TANTO outperforms previous studies in terms of task completion rate, tasks' average completion time, and UAV's flight cost.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Joint Architecture Design andWorkload Partitioning for DNN Inference on Industrial IoT Clusters

Weiwei Fang, Wenyuan Xu, Chongchong Yu, Neal N. Xiong

Summary: The advent of Deep Neural Networks (DNNs) has empowered numerous computer-vision applications, but it is challenging to efficiently deploy and execute DNNs in industrial scenarios due to computational intensity and resource constraints. This article presents EdgeDI, a framework for executing DNN inference in a partitioned, distributed manner on a cluster of Industrial Internet-of-Things (IIoT) devices. EdgeDI achieves high inference performance through model compression based on deep architecture design and distributed inference based on adaptive workload partitioning.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2023)

Article Computer Science, Theory & Methods

UWPEE: Using UAV and wavelet packet energy entropy to predict traffic-based attacks under limited communication, computing and caching for 6G wireless systems

Zichao Xie, Zeyuan Li, Jinsong Gui, Anfeng Liu, Neal N. Xiong, Shaobo Zhang

Summary: The development of 6G has improved the communication capabilities of IoT devices. However, most devices in wireless systems lack the communication capability of 6G and can only communicate through self-organized networks. These devices have low communication, computing, and caching capacities, making them vulnerable to attacks such as traffic-based attacks. To address this, a novel approach using Unmanned Aerial Vehicles (UAVs) and Wavelet Packet Energy Entropy (UWPEE) is proposed to detect traffic-based attacks and determine the trustworthiness of IoT devices. Experimental results show that the UWPEE scheme can effectively identify traffic-based attacks with high accuracy and reduce UAV flight paths.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2023)

Article Computer Science, Information Systems

A Siamese Inverted Residuals Network Image Steganalysis Scheme based on Deep Learning

Hao Li, Jinwei Wang, Neal Xiong, Yi Zhang, Athanasios V. Vasilakos, Xiangyang Luo

Summary: With the rapid rise of urbanization, criminals are able to exploit social networks to spread secret information by using images as a cover. Determining whether these images contain secret information poses a significant challenge to multimedia computing security. Steganalysis methods based on deep learning can effectively identify the presence of secret information in images transmitted on the Internet in urban scenes, thus playing a crucial role in safeguarding national and social security.

ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS (2023)

Article Chemistry, Multidisciplinary

A Digital Twin-Based Heuristic Multi-Cooperation Scheduling Framework for Smart Manufacturing in IIoT Environment

Haotian Chen, Sekione Reward Jeremiah, Changhoon Lee, Jong Hyuk Park

Summary: The Industrial Internet of Things (IIoT) combines smart manufacturing and the Internet of Things, improving product quality and reliability through intelligent connection, real-time data processing, collaborative monitoring, and automatic information processing. This paper proposes an automated smart manufacturing framework based on Digital Twin (DT) and Blockchain, where the data used in DT are from cluster generated after blockchain authentication and only accessed and visualized in the cloud when necessary. Simulation results show that the proposed authentication mode is faster than the standard protocol. Additionally, the DT framework for a smart factory deploys the PDQN DRL model, demonstrating higher accuracy, stability, and reliability.

APPLIED SCIENCES-BASEL (2023)

Article Computer Science, Theory & Methods

A reliability and truth-aware based online digital data auction mechanism for cybersecurity in MCS

Jiayi Yu, Zeyuan Li, Naixue Xiong, Shaobo Zhang, Anfeng Liu, Athanasios V. Vasilakos

Summary: Mobile Crowd Sensing (MCS) platform is a promising computing paradigm that recruits participants to sense and report data for building and providing services to consumers. However, malicious attacks based on false data and uncertain behaviors of participants can harm cybersecurity and reduce the platform's benefit. This paper proposes a Time, Reliability and Truth-aware Online Auction (TRT-OA) mechanism that considers these properties to ensure cybersecurity and maximize platform benefit. The TRT-OA mechanism achieves computational efficiency, budget feasibility, truthfulness, individual rationality, and strategy-proofness, resulting in a 44.06% increase in benefit compared to OMG and TDMC.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2023)

Article Engineering, Electrical & Electronic

An efficient intelligent control algorithm for drying rack system

Shiwen Zhang, Wang Hu, Wei Liang, Changjian Lei, Neal N. Xiong

Summary: In this study, an efficient intelligent control algorithm based on the back-propagation neural network (BP) is proposed. The STM32F103 is used as the central controller and multiple sensors are utilized to collect environmental information. The algorithm integrates remote control, voice keywords, and buttons for intelligent control. It also includes a motor drive intelligence control algorithm based on BP neural network (MCBP) to improve control accuracy. An application (APP) is developed to display environmental data and enable various intelligent control functions. Extensive experiments confirm the accuracy and efficiency of the proposed algorithm compared to normal control and programmable logic controller control methods.

IET COMMUNICATIONS (2023)

Article Computer Science, Information Systems

AAJS: An Anti-Malicious Attack Graphic Similarity Judgment System in Cloud Computing Environments

Xin Liu, Xiaomeng Liu, Neal Xiong, Dan Luo, Gang Xu, Xiubo Chen

Summary: With the development of cloud computing and other modern technologies, collaborative computing between data is increasing, which brings more attention to privacy protection and secure multi-party computation. This paper proposes a secure search protocol based on graph shape, using the cut-choose method and zero-knowledge proof. The proposed protocol achieves secure graph search and matching while resisting malicious attacks. Experimental simulations demonstrate high execution efficiency.

ELECTRONICS (2023)

Article Computer Science, Information Systems

An Intelligent Semi-Honest System for Secret Matching against Malicious Adversaries

Xin Liu, Jianwei Kong, Dan Luo, Neal Xiong, Gang Xu, Xiubo Chen

Summary: This paper proposes an Intelligent Semi-Honest System (ISHS) for secret matching against malicious adversaries. It designs a secure computation protocol based on the semi-honest model for the secret matching of text strings using a new digital encoding method and an ECC encryption algorithm. It also presents a text string matching protocol under the malicious model that utilizes the cut-and-choose method and zero-knowledge proof to resist malicious behaviors. The correctness and security of the protocol are analyzed, and it is shown to be more efficient and practical compared to existing algorithms. Secure text matching has important engineering applications.

ELECTRONICS (2023)

Article Computer Science, Information Systems

REEGAT: RoBERTa Entity Embedding and Graph Attention Networks Enhanced Sentence Representation for Relation Extraction

Fengze Cai, Qiang Hu, Renjie Zhou, Neal Xiong

Summary: Relation extraction is a crucial technology for intelligent information extraction, benefiting intelligent communication systems. Existing approaches suffer from the limitation of one-sided sentence embedding in their final prediction vector. This paper proposes an innovative model, REEGAT, which integrates enhanced word embedding from graph neural networks to improve relation extraction performance.

ELECTRONICS (2023)

Article Computer Science, Information Systems

A joint matrix factorization and clustering scheme for irregular time series data

Shiming He, Meng Guo, Zhuozhou Li, Ying Lei, Siyuan Zhou, Kun Xie, Neal N. Xiong

Summary: KPI clustering is important for AIOps when dealing with a large number of KPIs. This approach divides KPIs into classes and applies the same model to detect anomalies or predict outcomes for the KPIs in each class, reducing computational overhead. However, irregular KPIs caused by varying sampling strategies have not been fully addressed. This study proposes an iterative clustering scheme based on matrix factorization to solve the problem of clustering irregular KPIs and achieves higher NMI compared to non-iterative clustering.

INFORMATION SCIENCES (2023)

Article Computer Science, Information Systems

AQND: An asymmetric quorum-based neighbor discovery protocol for reducing delay in sensor based systems

Ziqing Xia, Zhangyang Gao, Anfeng Liu, Neal N. Xiong

Summary: In this paper, an asymmetric quorum-based neighbor discovery (AQND) protocol is proposed to reduce delay, improve energy utilization and lifetime, and outperform previous strategies in main performance indicators.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

DDSR: A delay differentiated services routing scheme to reduce deployment costs for the Internet of Things

Xiaohuan Liu, Anfeng Liu, Shaobo Zhang, Tian Wang, Neal N. Xiong

Summary: This paper proposes a delay differentiated services routing (DDSR) scheme to reduce the deployment costs for wireless sensor networks (WSNs) with wake-up radio (WuR) functionality, while meeting the delay requirement of forwarding urgent data and maintaining a long lifetime.

INFORMATION SCIENCES (2024)

Article Computer Science, Artificial Intelligence

An improved weighted ensemble clustering based on two-tier uncertainty measurement

Qinghua Gu, Yan Wang, Peipei Wang, Xuexian Li, Lu Chen, Neal N. Xiong, Di Liu

Summary: This paper proposes a new ensemble clustering method that combines the influence of cluster level and the base clustering level in a unified framework. The method inserts a global weighting strategy into a local ensemble cluster learning framework, improving the robustness and stability of clustering.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

Article Engineering, Civil

An UAV-Enabled Intelligent Connected Transportation System With 6G Communications for Internet of Vehicles

Run Liu, Anfeng Liu, Zhenzhe Qu, Neal N. Xiong

Summary: This paper proposes a UAV-enabled Computing-Communications Intelligent Offloading (UAV-CCIO) scheme to achieve energy-efficient task offloading in a UAV-enabled edge network. The scheme selects task gathering nodes and utilizes an optimization strategy to reduce the energy consumption of the UAV. Experimental simulations demonstrate that the performance of the UAV-CCIO scheme is superior to existing schemes.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

No Data Available