2016 IEEE Region 10 Symposium (TENSYMP)最新文献

筛选
英文 中文
Toward hardware support for a flexible sketch-based network traffic monitoring system 面向硬件支持灵活的基于草图的网络流量监控系统
2016 IEEE Region 10 Symposium (TENSYMP) Pub Date : 2016-05-09 DOI: 10.1109/TENCONSPRING.2016.7519369
Theophilus Wellem, Yu-Kuen Lai, Chao-Yuan Huang, Wen-Yaw Chung
{"title":"Toward hardware support for a flexible sketch-based network traffic monitoring system","authors":"Theophilus Wellem, Yu-Kuen Lai, Chao-Yuan Huang, Wen-Yaw Chung","doi":"10.1109/TENCONSPRING.2016.7519369","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519369","url":null,"abstract":"Sketch-based data streaming algorithms are capable of summarizing high-speed network traffic in real-time without packet sampling. Therefore, they are used in many networking applications to make accurate estimates of traffic flow statistics. However, fixed hardware implementation of the sketch counters limits the flexibility of re-using the same data structure for various monitoring applications. In this paper, we propose a generic scheme for collecting flow-level data using high-speed memories on the NetFPGA-10G platform. The purpose is to enable sketch-based algorithms making statistics measurements in various network monitoring applications in a flexible manner. Experiments using real Internet traces are conducted for entropy estimation, superspreader detection, and change detection applications. The results show that the proposed scheme can support flexible selection of keys and counters for the monitoring applications achieving high measurement accuracy.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132185347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A static transliteration approach for assembly language translation 汇编语言翻译的静态音译方法
2016 IEEE Region 10 Symposium (TENSYMP) Pub Date : 2016-05-09 DOI: 10.1109/TENCONSPRING.2016.7519428
Jonathan Paul C. Cempron, C. Salinas, Jonathan Benedict Gonzales, R. Uy, Y. Hayakawa
{"title":"A static transliteration approach for assembly language translation","authors":"Jonathan Paul C. Cempron, C. Salinas, Jonathan Benedict Gonzales, R. Uy, Y. Hayakawa","doi":"10.1109/TENCONSPRING.2016.7519428","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519428","url":null,"abstract":"Migration of software between systems requires the migrated software to be compatible with the new platform. The original machine code in the source machine cannot always be directly ported. The program's source code may not be available for compilation to the new platform or the machine code may not be compatible to the new platform due to architectural differences. An alternative solution to porting software can be achieved through assembly language translation. This study presents the essential considerations in assembly language translation such as handling of the registers, data segment, and code segment. Possible approaches towards are also discussed.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132260037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Absolute Value Principal Components Analysis (AVPCA) and Parameter Estimation (PE) to bearing fault detection using rotor speed signal monitoring — A comparative study 基于转子转速信号监测的绝对主成分分析(AVPCA)和参数估计(PE)在轴承故障检测中的比较研究
2016 IEEE Region 10 Symposium (TENSYMP) Pub Date : 2016-05-09 DOI: 10.1109/TENCONSPRING.2016.7519434
M. Hamadache, Dongik Lee
{"title":"Absolute Value Principal Components Analysis (AVPCA) and Parameter Estimation (PE) to bearing fault detection using rotor speed signal monitoring — A comparative study","authors":"M. Hamadache, Dongik Lee","doi":"10.1109/TENCONSPRING.2016.7519434","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519434","url":null,"abstract":"In this paper, a comparative experimental study between the Parameter Estimation (PE) technique and the Absolute Value Principal Component Analysis (AVPCA) algorithm to bearing fault detection using rotor speed signal monitoring is represented. The PE technique relies on the residuals between the input/output (Voltage/Speed) signals of the real system and of the estimated model. AVPCA, in other hand base on the Sum Square Error (SSE) distance between the training-databases and the tested-databases from just only the output signal (Speed) and its minimum. The experimental results reveal that the AVPCA algorithm is more effective in detecting bearing faults than the PE technique using rotor speed signal monitoring.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128508314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A mobile application of American sign language translation via image processing algorithms 基于图像处理算法的美国手语翻译移动应用
2016 IEEE Region 10 Symposium (TENSYMP) Pub Date : 2016-05-09 DOI: 10.1109/TENCONSPRING.2016.7519386
Cheok Ming Jin, Z. Omar, M. Jaward
{"title":"A mobile application of American sign language translation via image processing algorithms","authors":"Cheok Ming Jin, Z. Omar, M. Jaward","doi":"10.1109/TENCONSPRING.2016.7519386","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519386","url":null,"abstract":"Due to the relative lack of pervasive sign language usage within our society, deaf and other verbally-challenged people tend to face difficulty in communicating on a daily basis. Our study thus aims to provide research into a sign language translator applied on the smartphone platform, due to its portability and ease of use. In this paper, a novel framework comprising established image processing techniques is proposed to recognise images of several sign language gestures. More specifically, we initially implement Canny edge detection and seeded region growing to segment the hand gesture from its background. Feature points are then extracted with Speeded Up Robust Features (SURF) algorithm, whose features are derived through Bag of Features (BoF). Support Vector Machine (SVM) is subsequently applied to classify our gesture image dataset; where the trained dataset is used to recognize future sign language gesture inputs. The proposed framework has been successfully implemented on smartphone platforms, and experimental results show that it is able to recognize and translate 16 different American Sign Language gestures with an overall accuracy of 97.13%.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122303978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
DataTweet: An architecture enabling data-centric IoT services DataTweet:一个支持以数据为中心的物联网服务的架构
2016 IEEE Region 10 Symposium (TENSYMP) Pub Date : 2016-05-09 DOI: 10.1109/TENCONSPRING.2016.7519430
S. K. Datta, C. Bonnet, Rui Pedro Ferreira Da Costa, J. Harri
{"title":"DataTweet: An architecture enabling data-centric IoT services","authors":"S. K. Datta, C. Bonnet, Rui Pedro Ferreira Da Costa, J. Harri","doi":"10.1109/TENCONSPRING.2016.7519430","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519430","url":null,"abstract":"This work proposes a data driven IoT architecture to mitigate the fragmentation and data silos in consumer IoT ecosystem. IoT data cycle is explored to understand data transformation from generation to processing, storage and dissemination. We have developed a framework called DataTweet focusing on data cycle based IoT services. The DataTweet architecture is presented along with its subsystems, services, requirements and common service functions necessary to implement the services. The main novelty of DataTweet is in creating a ubiquitous consumer data service for transmitting short messages to any computing platforms to generate actionable intelligence that is disseminated to consumers.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121426506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
An observation attacks resistant PIN-entry scheme using localized haptic feedback 一种使用局部触觉反馈的抗观察攻击PIN-entry方案
2016 IEEE Region 10 Symposium (TENSYMP) Pub Date : 2016-05-09 DOI: 10.1109/TENCONSPRING.2016.7519378
Hao-Jun Xu, W. Ku, Y. Dan
{"title":"An observation attacks resistant PIN-entry scheme using localized haptic feedback","authors":"Hao-Jun Xu, W. Ku, Y. Dan","doi":"10.1109/TENCONSPRING.2016.7519378","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519378","url":null,"abstract":"Common PIN-entry schemes are vulnerable to observation attacks. To enhance the resistance to observation attacks, some observation attacks resistant PIN-entry schemes for mobile devices based on audios and/or haptics have been proposed. However, none of existing observation attacks resistant PIN-entry schemes can achieve both good security and high usability. Herein, we propose a new observation attacks resistant PIN-entry scheme, Loc-HapPIN, for touchscreen devices providing localized haptic feedback. By using the technology of localized haptic feedback, the usability and the resistance to observation attacks are improved. Furthermore, the user can choose the efficiency-security setting suitable for him.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115223196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
High speed 3D object retrieval using skewness value 基于偏度值的高速三维物体检索
2016 IEEE Region 10 Symposium (TENSYMP) Pub Date : 2016-05-09 DOI: 10.1109/TENCONSPRING.2016.7519435
Vicky Sintunata, T. Aoki
{"title":"High speed 3D object retrieval using skewness value","authors":"Vicky Sintunata, T. Aoki","doi":"10.1109/TENCONSPRING.2016.7519435","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519435","url":null,"abstract":"A novel high-speed 3D object retrieval system is presented here. Since creating a 3D model as an input to the retrieval system is not trivial, a 2D image (photos, sketches, etc.) of the object is usually used instead. We present a new high-speed retrieval method by using skewness information. The images in the database will be represented by a skewness function. By using the proposed method, comparison between the query and all images in the database can be avoided. From the experiment, the proposed method performs 60 times faster than using only SURF method in retrieval system.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130728905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anomaly detection based on profile signature in network using machine learning technique 基于特征签名的网络异常检测
2016 IEEE Region 10 Symposium (TENSYMP) Pub Date : 2016-05-09 DOI: 10.1109/TENCONSPRING.2016.7519380
Kayvan Atefi, S. Yahya, Amirali Rezaei, Siti Hazyanti Binti Mohd Hashim
{"title":"Anomaly detection based on profile signature in network using machine learning technique","authors":"Kayvan Atefi, S. Yahya, Amirali Rezaei, Siti Hazyanti Binti Mohd Hashim","doi":"10.1109/TENCONSPRING.2016.7519380","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519380","url":null,"abstract":"Within the last couple of years, a lot of IDSs have already been developed, both as research prototypes and as commercial systems. The aim of Intrusion Detection would be to positively identify all true attacks and adversely identify all non-attacks. Through the study of the procedure and signature of intrusion behaviors, IDS can produce a real-time reaction to intrusion occasions and invasion processes. The objective of this study is to work with appropriate algorithms for intrusion detection and hybrid them to find acceptable results and investigate on new hybrid techniques of intrusion detecting system with high accuracy. Moreover, it also aims to minimize a false positive and false negative alarms in networks.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131278511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Web page access prediction using hierarchical clustering based on modified levenshtein distance and higher order Markov model 基于改进levelshtein距离和高阶马尔可夫模型的网页访问预测
2016 IEEE Region 10 Symposium (TENSYMP) Pub Date : 2016-05-09 DOI: 10.1109/TENCONSPRING.2016.7519368
B T Harish Kumar, L. Vibha, K R Venugopal
{"title":"Web page access prediction using hierarchical clustering based on modified levenshtein distance and higher order Markov model","authors":"B T Harish Kumar, L. Vibha, K R Venugopal","doi":"10.1109/TENCONSPRING.2016.7519368","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519368","url":null,"abstract":"Web Page access prediction is a challenging task in the current scenario, which draws the attention of many researchers. Predictions need to keep track of history data to analyze the usage behavior of the users. Web Usage behavior of a user can be analyzed using the web log file of a specific website. User behavior can be analyzed by observing the navigation patterns. This approach requires user session identification, clustering the sessions into similar clusters and developing a model for prediction using the current and earlier accesses. Most of the previous works in this field have used K-Means clustering technique with Euclidean distance for computation. The drawbacks of K-Means is that deciding on the number of clusters, choosing the initial random center are difficult and the order of page visits are not considered. The proposed research work uses hierarchical clustering technique with modified Levenshtein distance, Page Rank using access time length, frequency and higher order Markov model for prediction. Experimental results prove that the proposed approach for prediction gives better accuracy over the existing techniques.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127020384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
AppLERT: A mobile application for incident and disaster notification for Metro Manila AppLERT:马尼拉大都会事件和灾难通知的移动应用程序
2016 IEEE Region 10 Symposium (TENSYMP) Pub Date : 2016-05-09 DOI: 10.1109/TENCONSPRING.2016.7519420
Bernie S. Fabito, Francis F. Balahadia, Jade Devin N. Cabatlao
{"title":"AppLERT: A mobile application for incident and disaster notification for Metro Manila","authors":"Bernie S. Fabito, Francis F. Balahadia, Jade Devin N. Cabatlao","doi":"10.1109/TENCONSPRING.2016.7519420","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519420","url":null,"abstract":"The Philippines is battered by different natural and man-made disasters. It cannot be disputed that despite its magnificent and natural beauty, the country suffers from these devastations. Although the government has set in mitigation and prevention plans, little is put into consideration when the disaster happens. The paper focuses on the application of Information Communications Technology (ICT) in a form of an android based mobile application that gives victims the capability to seek help when a disaster or incident strikes. In addition, people can notify others of the danger ahead through AppLERT and Facebook so that they can avoid the area where the danger is through crowdsourcing. It seeks to help expedite the response time of the responding unit using the user's mobile phone built-in GPS.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117138101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信