Research in Adaptive and Convergent Systems最新文献

筛选
英文 中文
Real-time vehicle detection using equi-height mosaicking image 基于等高拼接图像的实时车辆检测
Research in Adaptive and Convergent Systems Pub Date : 2013-10-01 DOI: 10.1145/2513228.2513288
Min-Woo Park, J. Park, Soon Ki Jung
{"title":"Real-time vehicle detection using equi-height mosaicking image","authors":"Min-Woo Park, J. Park, Soon Ki Jung","doi":"10.1145/2513228.2513288","DOIUrl":"https://doi.org/10.1145/2513228.2513288","url":null,"abstract":"In this paper, we present a real-time forward vehicle detection warning system using a novel image representation called an equi-height mosaicking image. The proposed system uses a GPU (graphic processing unit) based approach for the real-time processing of a road scene image captured from a single camera. The equi-height mosaicking image improves the execution time of the existing GPU-based acceleration approach without decreasing the detection accuracy. The equi-height image is generated as follows. After a geometric analysis of a road scene using the vanishing point and horizon, we crop a set of image strips by sampling several positions on the road at uniform intervals. The height of each image strip is computed by projecting the predefined height of a vehicle at a distant position onto an image plane. After all the cropped images are resized to the uniform height required to build the equi-height image, we concatenate these resized images, similar to a panorama image, to create the equi-height mosaicking image. The concatenated image has a long width but the height of the image is uniform. The proposed system then performs a GPU-based vehicle detection on the concatenated image using a 1D search based support vector machine (SVM) classification. The proposed method is faster than the GPU-based OpenCV HOG detector because of the reduced search area.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127401982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Real-time malware detection framework in intrusion detection systems 入侵检测系统中的实时恶意软件检测框架
Research in Adaptive and Convergent Systems Pub Date : 2013-10-01 DOI: 10.1145/2513228.2513297
Sunwoo Kim, Taeguen Kim, E. Im
{"title":"Real-time malware detection framework in intrusion detection systems","authors":"Sunwoo Kim, Taeguen Kim, E. Im","doi":"10.1145/2513228.2513297","DOIUrl":"https://doi.org/10.1145/2513228.2513297","url":null,"abstract":"We suggest an efficient framework to detect malware in Intrusion Detection System (IDS). The framework generates signatures from malware families and generates corresponding detection rules. The generated signatures are not influenced by small changes of malware while they can be used to detect malware that has similar behaviors with normal programs. Our signatures are stored as an Aho-Corasick Tree form to improve signature matching performance in IDS.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115398661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data filter cache with word selection cache for low power embedded processor 低功耗嵌入式处理器的带字选择缓存的数据滤波缓存
Research in Adaptive and Convergent Systems Pub Date : 2013-10-01 DOI: 10.1145/2513228.2513258
J. Choi, Jong Wook Kwak, S. Jhang, C. Jhon
{"title":"Data filter cache with word selection cache for low power embedded processor","authors":"J. Choi, Jong Wook Kwak, S. Jhang, C. Jhon","doi":"10.1145/2513228.2513258","DOIUrl":"https://doi.org/10.1145/2513228.2513258","url":null,"abstract":"Filter cache was proposed to reduce power consumption. The proposers inserted a small and fast cache, which is called Filter Cache, between core and L1 cache. Filter cache reduced the number of accesses to L1 cache and a significant power savings is achieved. However, because the performance loss is so severe, many researchers should adopt some components which alleviate execution delay. In this paper, we revisit the original filter cache system and identify that employing filter cache does not degrade the system performance in the modern computer system. In base of the analysis, we propose Data Filter Cache system with Word Selection Cache(DWSC) as a new solution. Because tag matching of the L1 cache occurs simultaneously with access to the filter cache, the DWSC does not suffer performance loss. The result shows that our proposal achieves the 75.9% energy savings with respect to the baseline system.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114476683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fault localization using forward slicing spectrum 基于前向切片谱的故障定位
Research in Adaptive and Convergent Systems Pub Date : 2013-10-01 DOI: 10.1145/2513228.2513309
Anupama Surendran, P. Samuel
{"title":"Fault localization using forward slicing spectrum","authors":"Anupama Surendran, P. Samuel","doi":"10.1145/2513228.2513309","DOIUrl":"https://doi.org/10.1145/2513228.2513309","url":null,"abstract":"An increase in the cost incurred during manual software testing, debugging process and the requirement for reliable test data have forced the researchers to develop an automated system for software fault localization. We have proposed a forward slicing spectrum for fault localization. The proposed approach alleviates some of the core issues of standalone fault localization techniques such as program slicing and program spectrum based methods.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"576 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117348095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An effective API extraction scheme for dynamic binary similarity comparison 一种有效的API提取方案,用于动态二值相似度比较
Research in Adaptive and Convergent Systems Pub Date : 2013-10-01 DOI: 10.1145/2513228.2513317
Youngsu Park, Jiman Hong
{"title":"An effective API extraction scheme for dynamic binary similarity comparison","authors":"Youngsu Park, Jiman Hong","doi":"10.1145/2513228.2513317","DOIUrl":"https://doi.org/10.1145/2513228.2513317","url":null,"abstract":"Software piracy causes serious problems in many software-related industries. Dynamic binary similarity comparison methods can be used to detect software piracy. However, such methods generate large logs that require long periods of time to perform similarity comparisons. In this paper, we propose an extraction method that facilitates effective binary similarity comparisons. Using the cosine similarity and k-gram similarity, the proposed scheme is shown to be effective for binary similarity comparisons.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"131 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122045459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RAT selection for heterogeneous wireless networks using support vector machine 基于支持向量机的异构无线网络RAT选择
Research in Adaptive and Convergent Systems Pub Date : 2013-10-01 DOI: 10.1145/2513228.2513268
Wei-Te Wong, Ai-Chun Pang, Miao-Ru Hsu
{"title":"RAT selection for heterogeneous wireless networks using support vector machine","authors":"Wei-Te Wong, Ai-Chun Pang, Miao-Ru Hsu","doi":"10.1145/2513228.2513268","DOIUrl":"https://doi.org/10.1145/2513228.2513268","url":null,"abstract":"The next-generation cellular networks are envisioned to operate with heterogeneous wireless networks. Under such scenario, user device is required to periodically perform sensing for available RATs and switch between the one that best fits its current usage scenario. Such requirement may be highly energy-consuming; hence, efficient RAT selection mechanism is necessary to help user device select the best available RAT for its data transmission. In this paper, we propose a mechanism to make accurate RAT access recommendations to user devices by the Support Vector Machine tool, which can reduce unnecessary energy consumption due to periodic sensing. Simulation results demonstrate that our proposed methodology is highly accurate and capable of maintaining the average number of sensings as low as possible.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129074017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A better edit distance measure allowing for block swaps 一个更好的编辑距离测量允许块交换
Research in Adaptive and Convergent Systems Pub Date : 2013-10-01 DOI: 10.1145/2513228.2513282
Nhauo Davuth, Sung-Ryul Kim
{"title":"A better edit distance measure allowing for block swaps","authors":"Nhauo Davuth, Sung-Ryul Kim","doi":"10.1145/2513228.2513282","DOIUrl":"https://doi.org/10.1145/2513228.2513282","url":null,"abstract":"Edit Distance, also known as the Levenshtein distance or evolutionary distance, is a concept from information retrieval, and it describes the number of edit operations that have to be made in order to change one string to another. It's one of the most common measures to expose the dissimilarity between two strings. Ordinarily, Edit Distance is based on a character insert, delete and substitution operations. By using these three operators Edit Distance can help us to solve the problem of computing the similarity between two sequences that arise in many areas. However, standard Edit Distance still seems to miss the true relationship between these two similar strings in some cases because of the sequential order of common sub strings. For example, the Edit Distance between \"classbook\" and \"bookclass\" is eight, because of the words \"book\" and \"class\" is reversed but intuitively the two strings seem much closer. In order to solve this problem, we propose a method for extended Edit Distance, which permits block swap operation. The main contribution in this paper is the method to compute the cut points over a single string, and then allowing block swaps, which move sub strings from one position to another in a string, in order to make common substrings in the right order. Through our experiment, it is revealed that Block Swap Edit Distance can help us to find a better measure for Edit Distance.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132421560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
smartPrediction: a real-time smartphone-based fall risk prediction and prevention system smartPrediction:基于智能手机的实时跌倒风险预测和预防系统
Research in Adaptive and Convergent Systems Pub Date : 2013-10-01 DOI: 10.1145/2513228.2513267
A. J. Majumder, Ishmat Zerin, M. Uddin, Sheikh Iqbal Ahamed, Roger O. Smith
{"title":"smartPrediction: a real-time smartphone-based fall risk prediction and prevention system","authors":"A. J. Majumder, Ishmat Zerin, M. Uddin, Sheikh Iqbal Ahamed, Roger O. Smith","doi":"10.1145/2513228.2513267","DOIUrl":"https://doi.org/10.1145/2513228.2513267","url":null,"abstract":"The high risk of falls and the substantial increase in the elderly population have recently stimulated scientific research on Smartphone-based fall detection systems. Even though these systems are helpful for fall detection, the best way to reduce the number of falls and their consequences is to predict and prevent them from happening in the first place. To address the issue of fall prevention, in this paper, we propose a fall prediction system by integrating the sensor data of Smartphones and a Smartshoe. We designed and implemented a Smartshoe that contains four pressure sensors with a Wi-Fi communication module to unobtrusively collect data in any environment. By assimilating the Smartshoe and Smartphone sensors data, we performed an extensive set of experiments to evaluate normal and abnormal walking patterns. The system can generate an alert message in the Smartphone to warn the user about the high-risk gait patterns and potentially save them from an imminent fall. We validated our approach using a decision tree with 10-fold cross validation and found 97.2% accuracy in gait abnormality detection.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128777103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Design and implementation of the fusion simulator based on multi-shader GPU 基于多着色器GPU的融合模拟器的设计与实现
Research in Adaptive and Convergent Systems Pub Date : 2013-10-01 DOI: 10.1145/2513228.2513256
J. An, Younghwan Kim, Kiman Jeon
{"title":"Design and implementation of the fusion simulator based on multi-shader GPU","authors":"J. An, Younghwan Kim, Kiman Jeon","doi":"10.1145/2513228.2513256","DOIUrl":"https://doi.org/10.1145/2513228.2513256","url":null,"abstract":"This paper presents an intelligent computing architecture that enables CPUs and GPUs to works by seamlessly moving the right tasks to the best suited for operation. Also, simulation is one of the most important verification tools used by computer systems to evaluate their architecture. In this reason, we proposed fusion processor simulator that support the CPUs and the GPUs are combined on the same level. Proposed fusion processor simulator mainly consists of a CPU simulator and a GPU simulator with shared L2 cache and off-chip memory.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126354303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel passive worm defense model for multimedia sharing 一种新的多媒体共享被动蠕虫防御模型
Research in Adaptive and Convergent Systems Pub Date : 2013-10-01 DOI: 10.1145/2513228.2513237
Haokun Tang, Jun Huang, Wei Wang
{"title":"A novel passive worm defense model for multimedia sharing","authors":"Haokun Tang, Jun Huang, Wei Wang","doi":"10.1145/2513228.2513237","DOIUrl":"https://doi.org/10.1145/2513228.2513237","url":null,"abstract":"Passive worm, a serious risk to multimedia sharing environment, has drawn much attention because of its undetectable, destructive, and wide-ranging features. Existing propagation models for passive worm only noticed its similarity to biological viruses in propagation, ignored the impact of social attributes of P2P nodes on the spread of worms. This paper proposes a defense model of passive worm in multimedia sharing environment. The contributions made in this paper include four aspects. First, we analyze the deficiency of current defense model of passive worm based on mean-field theory in multimedia sharing environment. Second, we build a node evaluation system based on trust relationship. Third, we develop a defense model based on game theory. Fourth, we provide extensive numerical study and simulation experiments to the impact of some relevant model parameters on the defense of passive worm in multimedia sharing environment. The model presented in this paper is applicable for defending against passive worms in multimedia sharing environment.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121623573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信