Proceedings of the International Conference on Research in Adaptive and Convergent Systems最新文献

筛选
英文 中文
OCPP security - Neural network for detecting malicious traffic OCPP安全-检测恶意流量的神经网络
A. Moroșan, Florin Pop
{"title":"OCPP security - Neural network for detecting malicious traffic","authors":"A. Moroșan, Florin Pop","doi":"10.1145/3129676.3129693","DOIUrl":"https://doi.org/10.1145/3129676.3129693","url":null,"abstract":"Because the electric mobility has its focus on eco-friendly means of transport, a distributed platform designed for a smart city environment that can manage the electrical charging stations is vital. One of the major problems of distributed systems and cloud is security. The purpose of this article is to determine the malicious traffic using a backpropagation neural network. The main focus of the paper is to present a composite network that is able to detect faulted, random and normal types of traffic.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116935734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Real-time motion blur based on per pixel fragment list 基于每像素片段列表的实时运动模糊
Jinhyung Choi, Kyoungsu Oh
{"title":"Real-time motion blur based on per pixel fragment list","authors":"Jinhyung Choi, Kyoungsu Oh","doi":"10.1145/3129676.3129692","DOIUrl":"https://doi.org/10.1145/3129676.3129692","url":null,"abstract":"Motion-blur effect helps users recognize fast-moving objects in 3D scenes and virtual environments. Recently, the post-processing technique is one of the most commonly used techniques for motion-blur rendering. However, this algorithm has artifacts when there are complex moving directions. In this paper, we present a new algorithm to resolve those artifacts. First, we find pixel locations between t0 and t1 for all moving pixels. t0 and t1 are meant the start and end time respectively, during the period of one frame in which some object moves. We find pixel locations passing between two times on the screen with Bresenham's algorithm. And we store fragments to linked-lists on this position. Theses fragments contain information depth, time and color of a pixel. After we run visibility testing for every fragment and we set the average color from t0 and t1 with determined visible fragment's data. The result of our algorithm can render similar to the accumulation buffer algorithm without artifacts in interactively. We try to contribute a better quality image for motion-blurred. And we suggest a forward processing motion blur in real-time by linked-list. This method is a part of graphics techniques for complex reality 3D scenes. Therefore, we expect to make the better quality and speed of 3D games and virtual reality though this paper.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127690249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Evolutionary Approach for Document Clustering 一种改进的文档聚类进化方法
Ruksana Akter, Yoojin Chung
{"title":"An Improved Evolutionary Approach for Document Clustering","authors":"Ruksana Akter, Yoojin Chung","doi":"10.1145/3129676.3129733","DOIUrl":"https://doi.org/10.1145/3129676.3129733","url":null,"abstract":"Traditional approaches representing chromosomes based on cluster centroids do not allow dividing cluster centroids during crossover operations. Hence, significant diversity may not be achieved while the algorithm iterates from generation to generation. In our approach presented in this paper, we allow a crossover point to be even inside a cluster centroid, modifying some cluster centroids during the crossover operations. Such modifications also guide the algorithm to get rid of the local minima. Thus the proposed approach can find a better solution than the traditional approaches.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121399286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Temporal data stream analysis for EV charging infrastructure in Jeju 济州电动汽车充电基础设施时序数据流分析
Junghoon Lee, G. Park
{"title":"Temporal data stream analysis for EV charging infrastructure in Jeju","authors":"Junghoon Lee, G. Park","doi":"10.1145/3129676.3129717","DOIUrl":"https://doi.org/10.1145/3129676.3129717","url":null,"abstract":"This paper first presents the main features of the dataset obtained from the charging station monitoring system currently in operation on Jeju island. Then, the time series analysis is conducted to find the behavioral trends according to districts and place types, based on periodic report archives from 49 fast chargers. Two most populated districts lead the occupancy rate of the whole island, while those chargers installed in administrative offices account for the most charging demand during office working hours. Combined with the dynamic time warping method, the hierarchical clustering process captures 3 main groups having the same day-by-day occupancy rate dynamics. Additionally, artificial neural network models are built to forecast the next day charging demand, and the prediction for working hours is acceptable as it is not affected by missing data. With the prediction model built upon open data and software, it is possible to develop a new smart grid application such as vehicle-to-grid and renewable energy generation.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128687183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Intelligent Orchestration Agent for Storage Platform Management 用于存储平台管理的智能编排代理
J. An, Younghwan Kim, Changkwon Park
{"title":"Intelligent Orchestration Agent for Storage Platform Management","authors":"J. An, Younghwan Kim, Changkwon Park","doi":"10.1145/3129676.3129705","DOIUrl":"https://doi.org/10.1145/3129676.3129705","url":null,"abstract":"Until recently, we have concentrated on building hardware based infrastructure such as computing resources, storage resources, and network resources to support rapidly growing big data, and we have been managing it with existing hardware infrastructure management methods. However, as the amount of data explosively increases and the number of infrastructure resources increases, the existing hardware infrastructure operation is confronted with limitations. Therefore, the need for more efficient resource management technology is increasing. This paper has designed intelligent orchestration agent which supports storage platform management with software defined storage concept. The basic structure proposed in this paper is that the orchestration agent manages performance, capacity and power saving based on a software defined storage platform.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115603640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluations of Multiple GPUs based on MPI Environments 基于MPI环境的多gpu性能评估
Bongjae Kim, Jinmang Jung, Hong Min, Junyoung Heo, Hyedong Jung
{"title":"Performance Evaluations of Multiple GPUs based on MPI Environments","authors":"Bongjae Kim, Jinmang Jung, Hong Min, Junyoung Heo, Hyedong Jung","doi":"10.1145/3129676.3129716","DOIUrl":"https://doi.org/10.1145/3129676.3129716","url":null,"abstract":"GPU-based computations are widely used in various computing areas because GPU provides very high computing performance when compared to typical CPU. In this paper, we evaluate and analyze the computing performance of multiple GPUs based on MPI environments. We examine the performance of sparse matric-vector multiply (SpMV). SpMV is one of the most heavily used components in many scientific applications. Based on the performance evaluation results, generally, the execution time of SpMV is decreased as the number of GPUs increase. In some case, the performance was reduced according to the computation overhead, the memory copy overhead among GPUs, and the characteristics of sparse matrices.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"413 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116276669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Anti-Reverse Engineering Technique using Native code and Obfuscator-LLVM for Android Applications Android应用程序中使用本机代码和混淆- llvm的反逆向工程技术
Kyeonghwan Lim, Jaemin Jeong, Seong-je Cho, Jongmoo Choi, Minkyu Park, Sangchul Han, S. Jhang
{"title":"An Anti-Reverse Engineering Technique using Native code and Obfuscator-LLVM for Android Applications","authors":"Kyeonghwan Lim, Jaemin Jeong, Seong-je Cho, Jongmoo Choi, Minkyu Park, Sangchul Han, S. Jhang","doi":"10.1145/3129676.3129708","DOIUrl":"https://doi.org/10.1145/3129676.3129708","url":null,"abstract":"Android applications are exposed to reverse engineering attacks. In particular, the applications written in Java are more prone to reverse engineering in comparison to the applications written in native-code languages such as C or C++ on the Android platform. This is because Java applications are distributed as byte codes, while applications written in native-code languages are distributed as low-level binary codes. In this paper, we propose a new technique to protect Android applications against reverse engineering. Three key characteristics of the proposed approach are as follows. First, we write the main parts of the application in native-code using Android NDK. This not only makes reverse engineering more difficult, but it is also more effective in terms of code reuse. Second, we introduce obfuscation, which hides the intent of the native codes and obscures theirs structure, at the intermediate representation (IR) level. Finally, we integrate an integrity verification scheme which detects whether the critical module of the application has been modified prior to execution of the application. Based on the results of experimentation on five known Android applications, we show that the proposed techniques can be applied without a significant effect on performance.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134102453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Contents Recommendation Scheme Considering Trust and Collaborative Filtering in Online Social Networks 基于信任和协同过滤的在线社交网络内容推荐方案
Kyoungsoo Bok, Geonsik Ko, Jongtae Lim, K. Lee, Jaesoo Yoo
{"title":"Contents Recommendation Scheme Considering Trust and Collaborative Filtering in Online Social Networks","authors":"Kyoungsoo Bok, Geonsik Ko, Jongtae Lim, K. Lee, Jaesoo Yoo","doi":"10.1145/3129676.3130217","DOIUrl":"https://doi.org/10.1145/3129676.3130217","url":null,"abstract":"With the development of smartphones and online social networks, the users are creating and sharing a large amount of content. Concurrently, there have been recommendation schemes for providing users with content that matches their preferences. In this paper, we present a content recommendation scheme that uses trust-based user filtering. To perform user filtering, the trust of a user is determined by analyzing user social activities, content usage, and social relationships. In addition, trust of the content is considered to decide the content recommendation priority order. To calculate the content trust, we analyze the expertise of the user and implicit activities. It is shown through performance evaluation that the proposed scheme outperforms the existing scheme.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121499253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MACaaS Platform for Fog Computing macas雾计算平台
Gibeom Byeon, Myungjoon Shon, Hansol Lee, Jiman Hong
{"title":"MACaaS Platform for Fog Computing","authors":"Gibeom Byeon, Myungjoon Shon, Hansol Lee, Jiman Hong","doi":"10.1145/3129676.3129718","DOIUrl":"https://doi.org/10.1145/3129676.3129718","url":null,"abstract":"With the development of the Internet of Things(IoT), where things are connected to the Internet, the number of IoT services and users is increasing day by day. Cloud computing is widely used to save and process the huge amounts of data generated by increasing IoT devices efficiently. However transmission delay problem occurs in the cloud computing environment because the huge amounts of data generated by the IoT devices is saved in the remote cloud servers. To solve this problem, fog computing emerged. Fog computing is a concept that brings cloud servers close to user area to provide high quality service by reducing the network transmission time. In this paper, we propose a Monitoring, Analyzing, and Controlling as a Service, which called MACaaS, platform for the fog computing. The proposed MACaaS platform provides services for monitoring, analyzing and controlling various IoT devices. In addition, the proposed platform can easily expand new services according to the additional requirements of IoT devices and users and provide the consistent interface for integrating various IoT devices.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"121 45","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113945743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Disambiguation and Comparison of SOA, Microservices and Self-Contained Systems SOA、微服务和自包含系统的消歧和比较
T. Cerný, M. Donahoo, J. Pechanec
{"title":"Disambiguation and Comparison of SOA, Microservices and Self-Contained Systems","authors":"T. Cerný, M. Donahoo, J. Pechanec","doi":"10.1145/3129676.3129682","DOIUrl":"https://doi.org/10.1145/3129676.3129682","url":null,"abstract":"There is an industrial shift from Service-Oriented Architectures (SOA) into Microservices; however, a quick review of online resources on these topics reveals a range of different understandings of these two architectures. Individuals often mix terms, grant false advantages or expect different quality attributes and properties. The purpose of this paper is to provide readers a solid understanding of the differences between these two architectures and their features. We provide both research and industry perspectives to point out strengths and weaknesses of both architectural directions, and we point out many shortcomings in both approaches that are not addressed by the architecture. Finally, based on this we propose challenges for future research.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130307492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信