In this paper, we present a hardhat detection system using colour and contour features. For detecting hardhats, we extract moving objects using our Dynamic Background Modeling method. Then, we determine whether an obj...
详细信息
ISBN:
(纸本)9781601321190
In this paper, we present a hardhat detection system using colour and contour features. For detecting hardhats, we extract moving objects using our Dynamic Background Modeling method. Then, we determine whether an object is a person or not. For detecting people, we propose a contour-based detection algorithm. After extracting a head of an object, we retrieve colour features from the head image and recognize whether the object is wearing a hardhat or not. In order to improve hardhat detection accuracy, we analyze both RGB and HSV colour coordination information. Our experimental results show high hardhat detection success accuracy.
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is usually referred to as information flow ...
详细信息
ISBN:
(纸本)9781605587981
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is usually referred to as information flow tracking, has been widely applied to secure software execution (e.g., taint tracking), protect software privacy and improve performance (e.g., control speculation). In this paper, we propose a novel use of information flow tracking to obfuscate the whole control flow of a program with only modest performance degradation, to defeat malicious code injection, discourage software piracy and impede malware analysis. Specifically, we exploit two common features in information flow tracking: the architectural support for automatic propagation of tags and violation handling of tag misuses. Unlike other schemes that use tags as oracles to catch attacks (e.g., taint tracking) or speculation failures, we use the tags as flow-sensitive predicates to hide normal control flow transfers: the tags are used as predicates for control flow transfers to the violation handler, where the real control flow transfer happens. We have implemented a working prototype based on Itanium processors, by leveraging the hardware support for control speculation. Experimental results show that BOSH can obfuscate the whole control flow with only a mean of 26.7% (ranging from 4% to 59%) overhead on SPECINT2006. The increase in code size and compilation time is also modest. Copyright 2009 ACM.
Frequency domain linear prediction (FDLP) uses autoregressive models to represent Hilbert envelopes of relatively long segments of speech/audio signals. Although the basic FDLP audio codec achieves good quality of the...
详细信息
ISBN:
(纸本)9781615677122
Frequency domain linear prediction (FDLP) uses autoregressive models to represent Hilbert envelopes of relatively long segments of speech/audio signals. Although the basic FDLP audio codec achieves good quality of the reconstructed signal at high bit-rates, there is a need for scaling to lower bit-rates without degrading the reconstruction quality. Here, we present a method for improving the compression efficiency of the FDLP codec by the application of the modified discrete cosine transform (MDCT) for encoding the FDLP residual signals. In the subjective and objective quality evaluations, the proposed FDLP codec provides competent quality of reconstructed signal compared to the state-of-the-art audio codecs for the 32 - 64 kbps range.
In recent years, evolutionary methods have shown great success in solving many combinatorial optimization problems such as FIR (Finite Impulse Response) filter design. An ordinary method in FIR filter design problem i...
详细信息
A stock market data processing system that can handle high data volumes at low latencies is critical to market makers. Such systems play a critical role in algorithmic trading, risk analysis, market surveillance, and ...
详细信息
Test case mutation and generation (m&g) based on data samples is a n effective way to generate test cases for Knowledge-based fuzzing, but present m&g technique is only capable of one-dimensional m&g at a ...
详细信息
Test case mutation and generation (m&g) based on data samples is a n effective way to generate test cases for Knowledge-based fuzzing, but present m&g technique is only capable of one-dimensional m&g at a time based on a data sample and thus it is impossible to find a vulnerability that can only be detected by multidimensional m&g. This paper proposes a mathematical model FTSG that formally describes Fuzzing Test Suite Generation based on m&g, and can process multidimension input elements m&g, which is done by a Genetic Algorithm Mutation operator (GAMutator). By executionoriented input-output (I/O) analysis, the influence relationships between input elements and insecure functions in target application were collected. Based on these relationships, GAMutator can directly mutate corresponding input elements to trigger the suspected vulnerability in a target insecure function, which could never been found by one-dimension m&g fuzzing. Importantly, GAMutator does not bring the input combination explosion, and the number of test cases it generates is linear with the number of insecure functions. Finally, an experiment on Libpng has proved that FTSG could effectively enrich the ability of knowledge-based fuzzing technique to find vulnerabilities.
For several decades, college student retention research has focused on the importance of engaging college students in their higher education environment as a tool for helping them attain their degrees. Student Affairs...
详细信息
With the proliferation of new online services and wireless personal devices, location-based services and applications for mobile users are widespread in use today. But the privacy of these users exposes to others incr...
详细信息
ISBN:
(纸本)9781424439416
With the proliferation of new online services and wireless personal devices, location-based services and applications for mobile users are widespread in use today. But the privacy of these users exposes to others increasingly in accessing those location based services. Exposure of the location information may result in privacy threat by malicious servers and hackers. In this paper, we propose a new framework that mobile users can enjoy conveniently the services provided by location-based server (LBS), and also protect their location information. This framework prevents mobile users' location information from exposing in two ways: providing the server with fake identities;two different ways of diffusing a number of fake queries with the real query hidden when and where it was issued.
Maintenance of articular cartilage's functional mechanical properties ultimately depends on the balance between the extracellular matrix component biosynthesis, degradation, and loss. A variety of factors are know...
详细信息
We propose an automatic method for the segmentation of the brain structures in three dimensional (3D) Magnetic Resonance Images (MRI). The proposed method consists of two stages. In the first stage, we represent the s...
详细信息
暂无评论