2010 International Conference on Information Science and Applications最新文献

筛选
英文 中文
Adaptive Digital Watermarking of Images Using Genetic Algorithm 基于遗传算法的图像自适应数字水印
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480367
Bushra Sikander, M. Ishtiaq, M. Jaffar, Muhammad Tariq, Anwar M. Mirza
{"title":"Adaptive Digital Watermarking of Images Using Genetic Algorithm","authors":"Bushra Sikander, M. Ishtiaq, M. Jaffar, Muhammad Tariq, Anwar M. Mirza","doi":"10.1109/ICISA.2010.5480367","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480367","url":null,"abstract":"This paper presents a new method for adaptive watermark strength optimization in Discrete Cosine Transform (DCT) domain. Watermarking is a method to embed secret information in the host medium. Optimal strength selection for watermark is the most critical aspect in the whole process and it had attracted many researchers in the recent past. In the proposed method watermark strength is intelligently selected through Genetic Algorithm (GA). GA helps in perceptual shaping of the watermark such that it is less perceivable to the human visual system. Proposed method shows promising results against different attacks, such as low-pass filter, high-pass filter, median filters, shifting and cropping the marked image. Experimental results have shown better performance of the proposed method than the current approaches in practice","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133873185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
CUDA-Based Linear Solvers for Stable Fluids 基于cuda的稳定流体线性求解器
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480268
G. Amador, A. Gomes
{"title":"CUDA-Based Linear Solvers for Stable Fluids","authors":"G. Amador, A. Gomes","doi":"10.1109/ICISA.2010.5480268","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480268","url":null,"abstract":"In the field of computer graphics, physically-based fluids simulations (i.e., simulations that solve the equations that govern fluids behavior) are performed using, among others, Stam's stable fluids method. This method requires the solution of two sparse linear systems that can be solved using an iterative solver (e.g., Jacobi, Gauss-Seidel, conjugate gradient, etc.). Focusing on real-time 3D applications, we provide and analyze the performance of the parallel GPU-based (using CUDA) algorithms of the Jacobi, Gauss-Seidel, and conjugate gradient solvers.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114709177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Using Redundant Threads for Fault Tolerance of OpenMP Programs 利用冗余线程实现OpenMP程序的容错
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480321
Hongyi Fu, Yan Ding
{"title":"Using Redundant Threads for Fault Tolerance of OpenMP Programs","authors":"Hongyi Fu, Yan Ding","doi":"10.1109/ICISA.2010.5480321","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480321","url":null,"abstract":"As the wide application of multi-core processor architecture in the domain of high performance computing, fault tolerance for shared memory parallel programs becomes a hot spot of research. For years, checkpointing has been the dominant fault tolerance technology in this field, and recently, many research works have been engaged with it. However, to those programs which deal with large amount of data, checkpointing may induce massive I/O transfer, which will adversely affect scalability. To deal with such a problem, this paper proposes a fault tolerance approach, making use of redundancy, for shared memory parallel programs. Our scheme avoids saving and restoring computational state during the program's execution, hence does not involve I/O operations, so presents explicit advantage over checkpointing in scalability. In this paper, we introduce our approach and the related compiler tool in detail, and give the experimental evaluation result.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114715839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A CRT-Based BCH Encoding and FPGA Implementation 基于crt的BCH编码与FPGA实现
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480554
Feng Liang, L. Pan
{"title":"A CRT-Based BCH Encoding and FPGA Implementation","authors":"Feng Liang, L. Pan","doi":"10.1109/ICISA.2010.5480554","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480554","url":null,"abstract":"Additional coding gain of about 0.6 dB is observed for binary BCH codes compared to RS codes with similar code rate and codeword length under AWGN channel. This paper presents a new CRT-based (Chinese Remainder Theorem) BCH encoding. CRT-based encoding method has higher speed than original LFSR encoding method. An encoding scheme is proposed which makes trade-off between resource usage and speed possible. In the second part of this paper, high speed FPGA implementation of this new type BCH encoder is given. Large fan-out of some XOR gate in LFSR was greatly reduced using CRT-based encoder. Several new implementation steps are proposed for real implementation. To reduce resource usage, Novel pipelined polynomial multiplier architecture is used. Common Subexpression Elimination (CSE) is used for optimization. The experiment result showed 23% reduction in XOR gate and 13% reduction in register. The maximum frequency is 358 MHz when implemented using Device XC2VP30 of Vertex II PRO Family.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125625956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
DLS: Dynamic Level Session Key Revocation Protocol for Wireless Sensor Networks 无线传感器网络动态级会话密钥撤销协议
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480578
Chulhyun Park, Yi-Ying Zhang, In-Tai Kim, Myong-Soon Park
{"title":"DLS: Dynamic Level Session Key Revocation Protocol for Wireless Sensor Networks","authors":"Chulhyun Park, Yi-Ying Zhang, In-Tai Kim, Myong-Soon Park","doi":"10.1109/ICISA.2010.5480578","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480578","url":null,"abstract":"Among of Security schemes for Wireless Sensor Networks (WSNs), key management is challenging issue to ensure security of applications. The key management is to establish the required keys between nodes which exchange data. Also, key revocation scheme is required part of the key management. Among of key revocation schemes, the KeyRev is securer than previous schemes, because it depends on using session key which based on personal key share distribution in network. However, the KeyRev did not consider about duration of session and analysis of diverse attack models. Using fixed duration of session, it gives more chances to attacker which can contaminate other nodes by using compromised node for left time. It causes that other attacks can infect sensor by using compromised node as surrogate in network. Thus, we propose dynamic level session key revocation protocol (DLS) which has divided time intervals, it called level. When we use dynamic level session scheme based on detecting number of prior compromised nodes, it is immune to continuous same pattern of attack which cause next diverse attacks. Therefore, our analysis shows that the DLS are more secured than the fixed duration of session against diverse attack for WSNs.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125858287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Cleansing Noisy City Names in Spatial Data Mining 空间数据挖掘中噪声城市名称的清除
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480390
SeungJin Lim
{"title":"Cleansing Noisy City Names in Spatial Data Mining","authors":"SeungJin Lim","doi":"10.1109/ICISA.2010.5480390","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480390","url":null,"abstract":"One of the biggest adversaries to data mining from a large data warehouse is poor data quality. It is because most data mining algorithms have been designed based on the assumption that the data is clean and meaningful. Hence, poor data quality may lead to completely unexpected results. In this paper, an automatic city name correction algorithm is proposed to cleanse a large spatial database without requiring human intervention or a prior knowledge of the context. The algorithm achieves a precision of 96.6% which is significantly better than the 86.6% of the traditional Levenshtein distance and the 92% of the Longest Common Subsequence algorithm.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"24 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123809753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Low-Complexity Heterogeneous Video Transcoding by Motion Vector Clustering 基于运动向量聚类的低复杂度异构视频转码
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480281
YoonJeong Shin, NamRye Son, Nguyen Dinh Toan, Gueesang Lee
{"title":"Low-Complexity Heterogeneous Video Transcoding by Motion Vector Clustering","authors":"YoonJeong Shin, NamRye Son, Nguyen Dinh Toan, Gueesang Lee","doi":"10.1109/ICISA.2010.5480281","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480281","url":null,"abstract":"The recently developed video compression standard, H.264/AVC surpasses the performance of previous video standards, such as MPEG-2, MPEG-4(part2), and H.263 and is therefore expected to be selected as the video standard for most digital video applications. The widely distributed infrastructure, however, continues to use the previous standards. Heterogeneous video transcoding offers a significant key to the resolution of this problem. This paper suggests a new algorithm for H.264/AVC to MPEG-2 transcoding that uses motion vector clustering to reduce the computation time with no loss of quality. Such a clustering method can reduce the number of candidate motion vectors that are gathered during the H.264 decoding stage. These candidate motion vectors consider the correlation between the direction and distance of the motion vectors in the variable blocks in H.264/AVC. The candidate motion vector that has the least distortion is then selected in the MPEG-2 encoder. The MPEG-2 encoder can therefore use the best motion vector without carrying out computations for motion estimation. The experimental results show that the proposed method can maintain a good level of video quality while reducing the computational complexity by a considerable 64%, on average, compared to a cascade transcoder.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114932421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Enabling Lego Robots to Communicate Routing 使乐高机器人能够通信路由
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480305
Daesung Lee, Kuinam J. Kim
{"title":"Enabling Lego Robots to Communicate Routing","authors":"Daesung Lee, Kuinam J. Kim","doi":"10.1109/ICISA.2010.5480305","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480305","url":null,"abstract":"The LegOS (Lego Operating System) on top of an RCX system is an example of an operating system that enables infrared communication. Infrared communication is easy to implement in terms of hardware and software, but allowing three or more robots to participate in the communication is hard to accomplish through infrared techniques. This paper suggests a technique that allows communication among multiple robots in random positions through routing. It achieves this by modifying the LNP protocol of LegOS. We show the algorithm and explain what changes are made to the LegOS kernel","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"515 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116566443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Goal-Oriented Approach for Modeling and Analyzing Attack Graph 面向目标的攻击图建模与分析方法
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480282
Xuejiao Liu, Chengfang Fang, Debao Xiao, Hui Xu
{"title":"A Goal-Oriented Approach for Modeling and Analyzing Attack Graph","authors":"Xuejiao Liu, Chengfang Fang, Debao Xiao, Hui Xu","doi":"10.1109/ICISA.2010.5480282","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480282","url":null,"abstract":"As network components are often highly interdependent and interconnected,an adversary outside can take advantage of multiple vulnerabilities in unexpected ways, incrementally penetrate a network and compromise critical systems. Attack graph is commonly used for analyzing network security level for its capability in reflecting all network vulnerabilities and their inter relationships. However, attack graph assumes an over pessimistic situation by giving the attacker unlimited power of exploiting each chain of vulnerabilities in the network, leading the complexity of analyzing to grow exponentially with the size of network. Therefore, the weakest paths suggested by such analysis could be inaccurate for adversary with limited computation power. In this paper, we investigate how attackers are planning to exploit vulnerabilities towards their targets and present the idea of a goal-oriented analysis of attack graph to address this problem. We give algorithms for analyzing network vulnerabilities, predicting attackers's potential target, and giving suggestions on patching the weakest nodes based on attackers' targets.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134209842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Online Self-Optimizing QoS Control Framework in Middleware 中间件在线自优化QoS控制框架
2010 International Conference on Information Science and Applications Pub Date : 2010-04-21 DOI: 10.1109/ICISA.2010.5480311
Dahai Li, D. Levy
{"title":"An Online Self-Optimizing QoS Control Framework in Middleware","authors":"Dahai Li, D. Levy","doi":"10.1109/ICISA.2010.5480311","DOIUrl":"https://doi.org/10.1109/ICISA.2010.5480311","url":null,"abstract":"In this paper, we propose a Sarsa(λ) algorithm based online self-optimizing QoS control framework in the middleware layer to solve the differentiated average response time control problem in distributed services. Compared to other existing solutions, the proposed controller can learn control policy autonomously without the need of explicit domain expert knowledge to optimize the controller manually. We have implemented a prototype of the framework on an existing middleware platform, the Internet Communication Engine (ICE), and conducted comprehensive experiments across a wide range of workload conditions to evaluate its performance. Experimental results show that the Sarsa(λ) based controller learns the control policy efficiently and effectively. Compared with a Self-Tuning Fuzzy Controller(STFC) and a Proportional (P) controller, we find that it achieves superior performance than either of these controllers.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134486273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信