3D facial expression recognition has gained more and more interests from affective computing society due to issues such as pose variations and illumination changes caused by 2D imaging having been eliminated. there ar...
详细信息
ISBN:
(纸本)9781479960262
3D facial expression recognition has gained more and more interests from affective computing society due to issues such as pose variations and illumination changes caused by 2D imaging having been eliminated. there are many applicationsthat can benefit from this research, such as medical applications involving the detection of pain and psychological effects in patients, in human-computer interaction tasks that intelligent systems use in today's world. In this paper, we look into 3D Facial Expression Recognition, by investigating many feature extraction methods used on the 2D textured images and 3D geometric data, fusing the 2 domains to increase the overall performance. A One Vs All Multi-class SVM Classifier has been adopted to recognize the expressions Angry, Disgust, Fear, Happy, Neutral, Sad and Surprise from the BU-3DFE and Bosphorus databases. the proposed approach displays an increase in performance when the features are fused together.
the need to manage embeddedsystems, brought forward by the wider adoption of pervasive computing, is particularly vital in the context of secure and safety-critical applications. this work presents RT-SPDM, a framewo...
详细信息
the proceedings contain 123 papers. the topics discussed include: economic feasibility of mobile broadband network for public safety and security;performance evaluation and economic modeling of PPDR communication syst...
ISBN:
(纸本)9781467377010
the proceedings contain 123 papers. the topics discussed include: economic feasibility of mobile broadband network for public safety and security;performance evaluation and economic modeling of PPDR communication systems;behavior of wireless body-to-body networks routing strategies for public protection and disaster relief;on modeling epidemics in networks using linear time-invariant dynamics;data dissemination strategies for emerging wireless body-to-body networks based Internet of humans;terahertz signal propagation analysis inside the human skin;millimeter-wave frequency reconfigurable T-shaped antenna for 5G networks;a circular patch frequency reconfigurable antenna for wearable applications;and optimal on-body relay placement for energy efficient in vivo communications.
In the majority of Digital Signal Processing (DSP) applications, such as image, audio and video processing, the final result is interpreted by human senses;and, the fact of confined perception of human senses declines...
详细信息
ISBN:
(纸本)9781479966585
In the majority of Digital Signal Processing (DSP) applications, such as image, audio and video processing, the final result is interpreted by human senses;and, the fact of confined perception of human senses declines the strict restriction on accuracy. thus, by adopting the emerging concept of approximate computing, we propose an approximate radix-2 hybrid redundant Multiply-and-Accumulate (ApproxMAC) unit which stems a novel Speed-Power-Accuracy-Area (SPAA) metrics. the Approx-MAC unit attains tremendous improvements in computational performance, energy efficiency and silicon area with a trivial degradation in the output quality. To inspect the effectiveness of the proposed approach in real-time DSP applications, we demonstrate an ApproxMAC unit embedded JPEG-E-X IP core architecture. the ApproxMAC unit with 40 approximate LSBs ensures 7.177x and 1.526x speedup, 1.594x and 4.163x energy efficiency, and 1.131x and 1.277x silicon area improvements over binary and hybrid redundant MAC units, respectively. Moreover, the ApproxMAC unit with 40 approximate LSBs decorates power-precision and delay-precision metrics by 14.71% and 32.95%, respectively.
the proceedings contain 16 papers. the topics discussed include: representing and configuring security variability in software product lines;control theory for model-based performance-driven software adaptation;archit...
ISBN:
(纸本)9781450334709
the proceedings contain 16 papers. the topics discussed include: representing and configuring security variability in software product lines;control theory for model-based performance-driven software adaptation;architecture-based assessment and planning of change requests;preemptive management of model driven technical debt for improving software quality;QoS-based feedback for service compositions;modeling fault tolerance tactics with reusable aspects;a catalog of architectural tactics for cyber-foraging;on architectural qualities and tactics for mobile sensing;scalability, elasticity, and efficiency in cloud computing: a systematic literature review of definitions and metrics;exploring performance models of Hadoop applications on cloud architect;identifying optimal sets of standardized architectural features - a method and its automotive application;investigating quality trade-offs in open source critical embeddedsystems;and automated failure propagation using inner port dependency traces.
Modern realtime Ethernet technologies rely on well-described hardware acceleration techniques to ensure that hard real-time deadlines are met. realtime Ethernet is also often used in situations where appreciable non...
详细信息
the proceedings contain 48 papers. the special focus in this conference is on Mobile, System and Software Security. the topics include: Enforcing permissions with system-wide application execution context;detection, c...
ISBN:
(纸本)9783319288642
the proceedings contain 48 papers. the special focus in this conference is on Mobile, System and Software Security. the topics include: Enforcing permissions with system-wide application execution context;detection, classification and characterization of android malware using API data dependency;improving security and usability for provider independent login architectures with mobile devices;using provenance patterns to vet sensitive behaviors in android apps;isolated execution of sensitive components for mobile applications;intrinsic code attestation by instruction chaining for embedded devices;defeating kernel driver purifier;kernel data attack is a realistic security threat;cloud-based anti-malware via reversible sketch;mining network traffic anomalies with hadoop;a secure interface for isolated execution environment to dynamically use external services;authenticating top-k results of secure multi-keyword search in cloud computing;resource efficient privacy preservation of online social media conversations;real-time privacy leakage monitoring without system modification for android;practicality of using side-channel analysis for software integrity checking of embeddedsystems;remote activation of hardware trojans via a covert temperature channel;route leaks identification by detecting routing loops;stateful black-box fuzzing of proprietary network protocols;deriving behavioral fingerprints from DNS traffic;enhancing traffic analysis resistance for tor hidden services with multipath routing;an improved method for anomaly-based network scan detection;an attribute-based signcryption scheme to secure attribute-defined multicast communications;generation of transmission control rules compliant with existing access control policies and a markov random field approach to automated protocol signature inference.
the proceedings contain 113 papers. the topics discussed include: SaaS clouds supporting non computing specialists;improve web service discovery: goal-based approach;integrated development environment for generation o...
ISBN:
(纸本)9781479971008
the proceedings contain 113 papers. the topics discussed include: SaaS clouds supporting non computing specialists;improve web service discovery: goal-based approach;integrated development environment for generation of middleware for hybrid processors based embeddedsystems;a network protection framework for DNP3 over TCP/IP protocol;classification of high dimensional educational data using particle swarm classification;a novel spreading framework using incremental clustering for viral marketing;ModConTR: a modular and configurable trust and reputation-based system for secure routing in ad-hoc networks;context-based ontology to describe system-of-systems interoperability;anomaly based intrusion detection for building automation and control networks;voice pathology detection using auto-correlation of different filters bank;P-ETL: parallel-ETL based on the MapReduce paradigm;and a metamodel for modeling cost behavior in service composition.
the proceedings contain 50 papers. the special focus in this conference is on Architecture, Modeling, Tools, applications, Network-on-a-Chip, Cryptography applications and Extended Abstracts. the topics include: Reduc...
ISBN:
(纸本)9783319162133
the proceedings contain 50 papers. the special focus in this conference is on Architecture, Modeling, Tools, applications, Network-on-a-Chip, Cryptography applications and Extended Abstracts. the topics include: Reducing storage costs of reconfiguration contexts by sharing instruction memory cache blocks;a vector caching scheme for streaming FPGA SpMV accelerators;hardware synthesis from functional embedded domain-specific languages;operand-value-based modeling of dynamic energy consumption of soft processors in FPGA;a fully parallel particle filter architecture for FPGAs;Teach advanced reconfigurable architectures and tools;dynamic memory management in vivado-HLS for scalable many-accelerator architectures;place and route tools for the mitigation of single event transients on flash-based FPGAs;advanced systemC tracing and analysis framework for extra-functional properties;run-time partial reconfiguration simulation framework based on dynamically loadable components;architecture virtualization for run-time hardware multithreading on field programmable gate arrays;survey on real-time network-on-chip architectures;hardware benchmarking of cryptographic algorithms using high-level synthesis tools;an efficient and flexible FPGA implementation of a face detection system;a dynamically reconfigurable mixed analog-digital filter bank;a timing driven cycle-accurate simulation for coarse-grained reconfigurable architectures;a novel concept for adaptive signal processing on reconfigurable hardware;modular acquisition and stimulation system for timestamp-driven neuroscience experiments;DRAM row activation energy optimization for stride memory access on FPGA-based systems;acceleration of data streaming classification using reconfigurable technology;partial reconfiguration for dynamic mapping of task graphs onto 2D mesh platform and a challenge of portable and high-speed FPGA accelerator.
Designed for efficient realtime traffic at low cycle times, EtherCAT is known to display several inefficiencies which include high quality master-slave synchronization. In this paper we examine a prototype circuit th...
详细信息
暂无评论