We present a teleoperation system which supports foveated multi-resolution, wide field of view visual feedback. In the proposed system, a saliency-based visual attention system is implemented to simulate human visual ...
详细信息
We present a teleoperation system which supports foveated multi-resolution, wide field of view visual feedback. In the proposed system, a saliency-based visual attention system is implemented to simulate human visual system and to help determine the candidate visual attention area automatically. We link the visual attention system and the foveated multi-resolution image compression system to realize a real-time teleoperation system which requires less communication bandwidth to classic systems. Our experiment results show that the average operation time of the proposed system is only 57.9% comparing to a system with no visual attention clues in navigation tasks.
Cloud Computing is a hot topic in the global IT industry, which is considered as the main part of the network and computing service provider in recent years. Some security issues will be more threatening in cloud comp...
详细信息
Cloud Computing is a hot topic in the global IT industry, which is considered as the main part of the network and computing service provider in recent years. Some security issues will be more threatening in cloud computing, such as account theft and insider threat. We propose a framework to utilize anomaly detection and random re-sampling techniques for profiling user's behaviors via the frequent patterns of activated system processes. By utilizing the user profiles learned from normal data, our method can detect malicious activities and discriminate suspicious activities from different users. We use virtual machine (VM) to collect process log of normal users and malicious tools. The collected data is used on verifying if our method can detect the malicious activities on the system. The results show that all the malicious activities are detected with less than 4.6% false-positive rate. We also collect real-world data for testing the ability of discriminating activities collected from different users. The results showed that the user profiles can averagely detect 86% suspicious behaviors from different users with less than 1% false positive rate.
Mastermind is a puzzle in which a hidden code of length ? and made with k colors has to be discovered via making guesses of the code and receiving hints that express the distance from the guess to the code, in terms o...
详细信息
ISBN:
(纸本)9781467359009
Mastermind is a puzzle in which a hidden code of length ? and made with k colors has to be discovered via making guesses of the code and receiving hints that express the distance from the guess to the code, in terms of number of symbols in the right position and with the right color. Solutions to these problem are mainly heuristic and thus finding the correct parameters for these solutions has to be done via systematic experimentation. Since diversity in the population is one of the main factors affecting performance, in this paper we will experiment with selective pressure via two different parameters: population size and size of tournament in tournament *** will study the influence of them in three different measures: algorithm performance (measured in average number of guesses needed), number of evaluations and time needed to find the solution. We will prove that while, in general, increasing population size improves performance, there is an optimal size over which no further improvement is achieved. On the other hand, tournament size does not have a clear influence on performance, although it influences time needed to find the *** will also show that the number of evaluations is correlated positively with time, and it increases with population size so that a trade-off has to be found among solution quality and population size. After evaluating the result of the experiments, we will try to advance a rule of thumb for sizing population for the general MasterMind problem.
We develop a teletraffic model to evaluate the performance of two typical access schemes in two-tier wireless networks. Two of the main performance parameters are the blocking probability and carried traffic. Numerica...
详细信息
ISBN:
(纸本)9781479913510
We develop a teletraffic model to evaluate the performance of two typical access schemes in two-tier wireless networks. Two of the main performance parameters are the blocking probability and carried traffic. Numerical results show that the femtocell priority access scheme performs better than the macrocell priority access scheme as it achieves lower blocking probability and carries more traffic.
The authors analyze the policy discourse on the utility of games for society at the level of the European Union, and for five EU countries, the Netherlands, the United Kingdom, Germany, Italy and Norway. The ongoing s...
详细信息
Network services face various security challenges such as targeted attacks exploiting security vulnerabilities. Fuzz testing plays an important role in security testing of network service. However, current fuzzing app...
详细信息
ISBN:
(纸本)9781479913930
Network services face various security challenges such as targeted attacks exploiting security vulnerabilities. Fuzz testing plays an important role in security testing of network service. However, current fuzzing approaches focus on protocol syntax and packet structure, more than multi-phase behavioral interactions between client and server of network service. This paper presents a model-based behavioral fuzzing approach to discover vulnerabilities of network services, which supports state-aware and multi-phase fuzz testing. Based on the model-based fuzzing framework, a finite state machine model EXT-NSFSM is proposed to manipulate the fuzzing process and guarantee the validation of fuzz test cases. The approach is implemented and then is experimented on several network services of DBMS and FTP. The test result has proved effectiveness of this approach.
This paper presents a novel algorithm to enhance the robustness of vortex core detection that automatically learns to build a strong compound classifier based on a locally weighted combination of weak detectors and th...
详细信息
This paper presents a novel algorithm to enhance the robustness of vortex core detection that automatically learns to build a strong compound classifier based on a locally weighted combination of weak detectors and the training samples. We use semi-supervised learning with domain expert input to develop strategies for guiding the selective refinement process. This compound detector combines the advantages of each individual local detector. Our main application area is vortex detection in turbulent flows. We demonstrate the efficacy of our approach by applying the compound detector to a variety of fluid data examples.
This paper discusses the workload utilization dissemination for grid computing. The CPU is a well-known resource item and it is an integral part in most literatures while other RI's may include memory, network and...
详细信息
This paper discusses the workload utilization dissemination for grid computing. The CPU is a well-known resource item and it is an integral part in most literatures while other RI's may include memory, network and I/O overhead. The selection of resource variables and the number of RI's involved will result in different definitions of the workload. Various combination of computer RI's have been explored for studying the style of usage, techniques embedded and their capabilities. In contemplating the exploration, this study successfully describe the pattern of workload dissemination through the usage of the RI's and elicited the enhancement factors for systems performance. Among these factors are the manipulation of computer RI's, type of workload information with method of use, the workload dissemination direction along with implementation method and using certain algorithm to come out with new integrated scheduling with load balancing capability. A combination of these factors will help in developing an optimized scheduling or load balancing algorithm.
For conserving energy in the lighting of office buildings, we developed an lighting energy-saving control system by coordinating the access control system and the lighting control system. Our system controls the light...
详细信息
For conserving energy in the lighting of office buildings, we developed an lighting energy-saving control system by coordinating the access control system and the lighting control system. Our system controls the light dimming rate depending on the presence or absence of employee in a floor. By evaluating this system in an actual office building, we confirmed that it could reduce about 25% power consumption of lighting.
暂无评论