{"title":"Real-time vehicle detection using equi-height mosaicking image","authors":"Min-Woo Park, J. Park, Soon Ki Jung","doi":"10.1145/2513228.2513288","DOIUrl":"https://doi.org/10.1145/2513228.2513288","url":null,"abstract":"In this paper, we present a real-time forward vehicle detection warning system using a novel image representation called an equi-height mosaicking image. The proposed system uses a GPU (graphic processing unit) based approach for the real-time processing of a road scene image captured from a single camera. The equi-height mosaicking image improves the execution time of the existing GPU-based acceleration approach without decreasing the detection accuracy. The equi-height image is generated as follows. After a geometric analysis of a road scene using the vanishing point and horizon, we crop a set of image strips by sampling several positions on the road at uniform intervals. The height of each image strip is computed by projecting the predefined height of a vehicle at a distant position onto an image plane. After all the cropped images are resized to the uniform height required to build the equi-height image, we concatenate these resized images, similar to a panorama image, to create the equi-height mosaicking image. The concatenated image has a long width but the height of the image is uniform. The proposed system then performs a GPU-based vehicle detection on the concatenated image using a 1D search based support vector machine (SVM) classification. The proposed method is faster than the GPU-based OpenCV HOG detector because of the reduced search area.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127401982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time malware detection framework in intrusion detection systems","authors":"Sunwoo Kim, Taeguen Kim, E. Im","doi":"10.1145/2513228.2513297","DOIUrl":"https://doi.org/10.1145/2513228.2513297","url":null,"abstract":"We suggest an efficient framework to detect malware in Intrusion Detection System (IDS). The framework generates signatures from malware families and generates corresponding detection rules. The generated signatures are not influenced by small changes of malware while they can be used to detect malware that has similar behaviors with normal programs. Our signatures are stored as an Aho-Corasick Tree form to improve signature matching performance in IDS.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115398661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data filter cache with word selection cache for low power embedded processor","authors":"J. Choi, Jong Wook Kwak, S. Jhang, C. Jhon","doi":"10.1145/2513228.2513258","DOIUrl":"https://doi.org/10.1145/2513228.2513258","url":null,"abstract":"Filter cache was proposed to reduce power consumption. The proposers inserted a small and fast cache, which is called Filter Cache, between core and L1 cache. Filter cache reduced the number of accesses to L1 cache and a significant power savings is achieved. However, because the performance loss is so severe, many researchers should adopt some components which alleviate execution delay. In this paper, we revisit the original filter cache system and identify that employing filter cache does not degrade the system performance in the modern computer system. In base of the analysis, we propose Data Filter Cache system with Word Selection Cache(DWSC) as a new solution. Because tag matching of the L1 cache occurs simultaneously with access to the filter cache, the DWSC does not suffer performance loss. The result shows that our proposal achieves the 75.9% energy savings with respect to the baseline system.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114476683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault localization using forward slicing spectrum","authors":"Anupama Surendran, P. Samuel","doi":"10.1145/2513228.2513309","DOIUrl":"https://doi.org/10.1145/2513228.2513309","url":null,"abstract":"An increase in the cost incurred during manual software testing, debugging process and the requirement for reliable test data have forced the researchers to develop an automated system for software fault localization. We have proposed a forward slicing spectrum for fault localization. The proposed approach alleviates some of the core issues of standalone fault localization techniques such as program slicing and program spectrum based methods.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"576 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117348095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An effective API extraction scheme for dynamic binary similarity comparison","authors":"Youngsu Park, Jiman Hong","doi":"10.1145/2513228.2513317","DOIUrl":"https://doi.org/10.1145/2513228.2513317","url":null,"abstract":"Software piracy causes serious problems in many software-related industries. Dynamic binary similarity comparison methods can be used to detect software piracy. However, such methods generate large logs that require long periods of time to perform similarity comparisons. In this paper, we propose an extraction method that facilitates effective binary similarity comparisons. Using the cosine similarity and k-gram similarity, the proposed scheme is shown to be effective for binary similarity comparisons.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"131 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122045459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RAT selection for heterogeneous wireless networks using support vector machine","authors":"Wei-Te Wong, Ai-Chun Pang, Miao-Ru Hsu","doi":"10.1145/2513228.2513268","DOIUrl":"https://doi.org/10.1145/2513228.2513268","url":null,"abstract":"The next-generation cellular networks are envisioned to operate with heterogeneous wireless networks. Under such scenario, user device is required to periodically perform sensing for available RATs and switch between the one that best fits its current usage scenario. Such requirement may be highly energy-consuming; hence, efficient RAT selection mechanism is necessary to help user device select the best available RAT for its data transmission. In this paper, we propose a mechanism to make accurate RAT access recommendations to user devices by the Support Vector Machine tool, which can reduce unnecessary energy consumption due to periodic sensing. Simulation results demonstrate that our proposed methodology is highly accurate and capable of maintaining the average number of sensings as low as possible.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129074017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A better edit distance measure allowing for block swaps","authors":"Nhauo Davuth, Sung-Ryul Kim","doi":"10.1145/2513228.2513282","DOIUrl":"https://doi.org/10.1145/2513228.2513282","url":null,"abstract":"Edit Distance, also known as the Levenshtein distance or evolutionary distance, is a concept from information retrieval, and it describes the number of edit operations that have to be made in order to change one string to another. It's one of the most common measures to expose the dissimilarity between two strings. Ordinarily, Edit Distance is based on a character insert, delete and substitution operations. By using these three operators Edit Distance can help us to solve the problem of computing the similarity between two sequences that arise in many areas. However, standard Edit Distance still seems to miss the true relationship between these two similar strings in some cases because of the sequential order of common sub strings. For example, the Edit Distance between \"classbook\" and \"bookclass\" is eight, because of the words \"book\" and \"class\" is reversed but intuitively the two strings seem much closer. In order to solve this problem, we propose a method for extended Edit Distance, which permits block swap operation. The main contribution in this paper is the method to compute the cut points over a single string, and then allowing block swaps, which move sub strings from one position to another in a string, in order to make common substrings in the right order. Through our experiment, it is revealed that Block Swap Edit Distance can help us to find a better measure for Edit Distance.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132421560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. J. Majumder, Ishmat Zerin, M. Uddin, Sheikh Iqbal Ahamed, Roger O. Smith
{"title":"smartPrediction: a real-time smartphone-based fall risk prediction and prevention system","authors":"A. J. Majumder, Ishmat Zerin, M. Uddin, Sheikh Iqbal Ahamed, Roger O. Smith","doi":"10.1145/2513228.2513267","DOIUrl":"https://doi.org/10.1145/2513228.2513267","url":null,"abstract":"The high risk of falls and the substantial increase in the elderly population have recently stimulated scientific research on Smartphone-based fall detection systems. Even though these systems are helpful for fall detection, the best way to reduce the number of falls and their consequences is to predict and prevent them from happening in the first place. To address the issue of fall prevention, in this paper, we propose a fall prediction system by integrating the sensor data of Smartphones and a Smartshoe. We designed and implemented a Smartshoe that contains four pressure sensors with a Wi-Fi communication module to unobtrusively collect data in any environment. By assimilating the Smartshoe and Smartphone sensors data, we performed an extensive set of experiments to evaluate normal and abnormal walking patterns. The system can generate an alert message in the Smartphone to warn the user about the high-risk gait patterns and potentially save them from an imminent fall. We validated our approach using a decision tree with 10-fold cross validation and found 97.2% accuracy in gait abnormality detection.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128777103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of the fusion simulator based on multi-shader GPU","authors":"J. An, Younghwan Kim, Kiman Jeon","doi":"10.1145/2513228.2513256","DOIUrl":"https://doi.org/10.1145/2513228.2513256","url":null,"abstract":"This paper presents an intelligent computing architecture that enables CPUs and GPUs to works by seamlessly moving the right tasks to the best suited for operation. Also, simulation is one of the most important verification tools used by computer systems to evaluate their architecture. In this reason, we proposed fusion processor simulator that support the CPUs and the GPUs are combined on the same level. Proposed fusion processor simulator mainly consists of a CPU simulator and a GPU simulator with shared L2 cache and off-chip memory.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126354303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel passive worm defense model for multimedia sharing","authors":"Haokun Tang, Jun Huang, Wei Wang","doi":"10.1145/2513228.2513237","DOIUrl":"https://doi.org/10.1145/2513228.2513237","url":null,"abstract":"Passive worm, a serious risk to multimedia sharing environment, has drawn much attention because of its undetectable, destructive, and wide-ranging features. Existing propagation models for passive worm only noticed its similarity to biological viruses in propagation, ignored the impact of social attributes of P2P nodes on the spread of worms. This paper proposes a defense model of passive worm in multimedia sharing environment. The contributions made in this paper include four aspects. First, we analyze the deficiency of current defense model of passive worm based on mean-field theory in multimedia sharing environment. Second, we build a node evaluation system based on trust relationship. Third, we develop a defense model based on game theory. Fourth, we provide extensive numerical study and simulation experiments to the impact of some relevant model parameters on the defense of passive worm in multimedia sharing environment. The model presented in this paper is applicable for defending against passive worms in multimedia sharing environment.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121623573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}