Malware variants refer to all the new malwares manually or automatically produced from any existing malware. However, such simple approach to produce malwares can change signatures of the original malware to confuse a...
详细信息
ISBN:
(纸本)9781424465972;9780769540115
Malware variants refer to all the new malwares manually or automatically produced from any existing malware. However, such simple approach to produce malwares can change signatures of the original malware to confuse and bypass most of popular signature-based anti-malware tools. In this paper we propose a novel byte frequency based detecting model (BFBDM) to deal with the malware variants identification issue. The primary experimental results show that our model is efficient and effective for the identification of malware variants, especially for the manual variant.
The sequence remote infrared images acquired from the intelligent substation monitoring system existed position deviation. The deviated images need to be registered in order to ensure the system accurately locating an...
详细信息
The sequence remote infrared images acquired from the intelligent substation monitoring system existed position deviation. The deviated images need to be registered in order to ensure the system accurately locating and monitoring the interested equipment. This paper has proposed a substation remote infrared image registration method based on multi-scale Harris corner and hierarchical guiding match strategy. Firstly, multi-scale Harris corners are detected in each layer of the image pyramid, and using an interpolation location approach to improve the accuracy of the corner position. Further, the corners are refined to make them well-distributed in the image space. In the matching stage, adopting different registration method in different layers to fulfill a coarse to fine registration. And the initial registration result in upper layer is transferred to the lower layer to guide the new corner matching. This matching approach greatly improves the efficiency. The final experiment indicates that our method has acquired high registration accuracy and short time and good stability, all controlled within 6~7 seconds. The algorithm can be applied to the actual system.
The Voltage magnitude reductions (dips or sags) are one of power quality issues with the greater economical impact. For this reason, often, supply sites are characterized by dip measurement campaign in order to asses ...
详细信息
ISBN:
(纸本)9781424428328;9781424428335
The Voltage magnitude reductions (dips or sags) are one of power quality issues with the greater economical impact. For this reason, often, supply sites are characterized by dip measurement campaign in order to asses the presence and the severity level of this kind of phenomena. This measurement results are important parameters for selecting equipment with proper intrinsic immunity. However, instruments devoted to dip measurement still present unresolved technical and theoretical issues related to the performance characterization. After a description of algorithms used for detection of voltage dips in agreement with standards, this paper presents, in simplified conditions, the systematic deviations that these approaches involve in event characterization. The obtained results are used during the experimental verification of the measurement accuracy of a commercial power quality instrument to asses its performance accounting the systematic deviations due to detection algorithm imposed by standard.
Among the existing malicious code detecting methods, the approach that based on code behavior is more practical. In this method, it judges if one code is malicious or not based on behavior the code generated. This way...
详细信息
Among the existing malicious code detecting methods, the approach that based on code behavior is more practical. In this method, it judges if one code is malicious or not based on behavior the code generated. This way to arbitrate malicious code is more advanced and precise. The malicious code behavior detecting model based on virtualization technology ameliorated the existing technology, it separates code behaviors into virtual behaviors and actual behaviors, then reflected them into virtual circumstance and real circumstance, respectively. Accord to the result generated from the reflect process, the malicious code behavior detecting model could achieve higher precision and reliability.
To prevent the threat of Cardiovascular Disease (CVD) related deaths, the usage of mobile phone based computational platforms, body sensors and wireless communications is proliferating. Since mobile phones have limite...
详细信息
To prevent the threat of Cardiovascular Disease (CVD) related deaths, the usage of mobile phone based computational platforms, body sensors and wireless communications is proliferating. Since mobile phones have limited computational resources, existing PC based complex CVD detection algorithms are often unsuitable for wireless telecardiology applications. Moreover, if the existing Electrocardiography (ECG) based CVD detection algorithms are adopted for mobile telecardiology applications, then there will be processing delays due to the computational complexities of the existing algorithms. However, for a CVD affected patient, seconds worth of delay could be fatal, since cardiovascular cell damage is a totally irrecoverable process. This paper proposes a fast and efficient mechanism of CVD detection from ECG signal. Unlike the existing ECG based CVD diagnosis systems that detect CVD anomalies from hundreds of sample points, the proposed mechanism identifies cardiac abnormality from only 5 sample points. Therefore, according to our experiments the proposed mechanism is up to 3 times faster than the existing techniques. Due to less computational burden, the proposed mechanism is ideal for wireless telecardiology applications running on mobile phones.
This paper proposes a new approach of mentor selection in memory-based collaborative filtering when no rating is available. Users are represented under the form of a social network. The selection of mentors is perform...
详细信息
This paper proposes a new approach of mentor selection in memory-based collaborative filtering when no rating is available. Users are represented under the form of a social network. The selection of mentors is performed through the use of a community detection algorithm used in the frame of social networks. It allows to recommend items to a given user, by applying democratic voting rules within his community.
This paper proposes an automatic method to recognize the hand in complex background. With this method, contour of hand in pictures can be figured out and the fingertips can be marked out. Skin color detection is used ...
详细信息
ISBN:
(纸本)9781424455690
This paper proposes an automatic method to recognize the hand in complex background. With this method, contour of hand in pictures can be figured out and the fingertips can be marked out. Skin color detection is used to find out the hand region out of a complex background, then a serial of morphological operations is performed to get the contour of the hand, and the computation of Fingertip-Angle is for marking out the fingertips. The simulation result shows that out method has a good performance for images with low computation cost.
We present a region-based active contour detection algorithm for objects that exhibit relatively homogeneous photometric characteristics (e.g. smooth color or gray levels), embedded in complex background clutter. Curr...
详细信息
We present a region-based active contour detection algorithm for objects that exhibit relatively homogeneous photometric characteristics (e.g. smooth color or gray levels), embedded in complex background clutter. Current methods either frame this problem in Bayesian classification terms, where precious modeling resources are expended representing the complex background away from decision boundaries, or use heuristics to limit the search to local regions around the object of interest. We propose an adaptive lookout region, whose size depends on the statistics of the data, that are estimated along with the boundary during the detection process. The result is a “curious snake” that explores the outside of the decision boundary only locally to the extent necessary to achieve a good tradeoff between missed detections and narrowest “lookout” region, drawing inspiration from the literature of minimum-latency set-point change detection and robust statistics. This development makes fully automatic detection in complex backgrounds a realistic possibility for active contours, allowing us to exploit their powerful geometric modeling capabilities compared with other approaches used for segmentation of cluttered scenes. To this end, we introduce an automatic initialization method tailored to our model that overcomes one of the primary obstacles in using active contours for fully automatic object detection.
Because of the confidential and important information contained inside the local area network (LAN) of the companies or government departments, the network interior's security problem highlights gradually. On the ...
详细信息
Because of the confidential and important information contained inside the local area network (LAN) of the companies or government departments, the network interior's security problem highlights gradually. On the basis of the fact that firewall and intrusion detection systems can not effectively protect the security in LAN, this paper proposes a multi-Agent network security audit system model, and at the same time, an improved detection algorithm based on information entropy is introduced into the audit system. During the system's running time, the improved algorithm is used to simulate and detect the DDoS attack. The experiment results prove that the multi-Agent system running in LAN can audit part of the intrusion effectively and improve log data analysis intelligence.
Image registration is of prime importance for image mosaic. It is the process of geometrically aligning one image to another image of the same scene taken from different time, from different viewpoints or by different...
详细信息
Image registration is of prime importance for image mosaic. It is the process of geometrically aligning one image to another image of the same scene taken from different time, from different viewpoints or by different sensors. In general, image registration needs a lot of time. This paper reduces the computation time from two aspects. For coarse matching, the paper combines normalized cross correlation (NCC) matching and sequential similarity detection algorithm (SSDA) to reduce unnecessary computation. For precise matching, by introducing an outlier constraint, the paper terminates computation early by comparing outliers. By adopting these improvements there may be a saving of computation time of about 92.57% and 8.17% respectively.
暂无评论