Yoking-proofs show an interesting application in Radio Frequency Identification (RFID) that a verifier can check whether two tags are simultaneously scanned by a reader. We consider a scenario that multi-group of tags...
详细信息
Research on effective and efficient mobile threat analysis becomes an emerging and important topic in cybersecurity research area. Static analysis and dynamic analysis constitute two of the most popular types of techn...
详细信息
ISBN:
(纸本)9781450336239
Research on effective and efficient mobile threat analysis becomes an emerging and important topic in cybersecurity research area. Static analysis and dynamic analysis constitute two of the most popular types of techniques for security analysis and evaluation;nevertheless, each of them has its strengths and weaknesses. To leverage the benefits of both approaches, we propose a hybrid approach that integrates the static and dynamic analysis for detecting security threats in mobile applications. The key of this approach is the unification of data states and software execution on critical test paths. The approach consists of two phases. In the first phase, a pilot static analysis is conducted to identify potential critical attack paths based on Android APIs and existing attack patterns. In the second phase, a dynamic analysis follows the identified critical paths to execute the program in a limited and focused manner. Attacks shall be detected by checking the conformance of the detected paths with existing attack patterns. The method will report the types of detected attack scenarios based on types of sensitive data that may be compromised, such as web browser cookie.
Wireless Power Transfer (WPT) has received more and more attentions because of its convenience and reliability. In this paper, we first propose the notion of omnidirectional charging by which an area is omnidirectiona...
详细信息
ISBN:
(纸本)9781509032822
Wireless Power Transfer (WPT) has received more and more attentions because of its convenience and reliability. In this paper, we first propose the notion of omnidirectional charging by which an area is omnidirectionally charged if a device with directional antennas at any position in the area with any orientation can be charged by directional chargers with power being no smaller than a given threshold. We present our empirical charging model based on field experimental results using off-the-shelf WPT products. Next, we consider the problem of detecting whether the target area achieves omnidirectional charging given a deterministic deployment of chargers. We develop piecewise constant approximation and area discretization techniques to partition the target area into subareas and approximate powers from chargers as constants. Then we propose the Minimum Coverage Set extraction technique which reduces the continuous search space to a discrete one and thereby allows a fast detection algorithm. Moreover, we consider the problem of determining the probability that the target area achieves omnidirectional charging given a random deployment of chargers. We first replace the target area by grid points on triangular lattices to reduce the search space from infinite to finite, then approximate chargers' power with reasonable relaxation, and derive an upper bound of the omnidirectional charging probability. Finally, we conduct both simulation and field experiments, and the results show that our algorithm outperforms comparison algorithms by at least 120%, and the consistency degree of our theoretical results and field experimental results is larger than 93.6%.
Role Based Access Control (RBAC) is the most widely used advanced access control model deployed in a variety of organizations. To deploy an RBAC system, one needs to first identify a complete set of roles, including p...
详细信息
Scaffolding students in open-ended learning environments (OELEs) is a difficult challenge. The open-ended nature of OELEs allows students to simultaneously pursue, modify, and abandon any of a large number of both sho...
详细信息
Scaffolding students in open-ended learning environments (OELEs) is a difficult challenge. The open-ended nature of OELEs allows students to simultaneously pursue, modify, and abandon any of a large number of both short-term and long-term approaches to completing their tasks. To overcome these challenges, we have recently developed coherence analysis, which focuses on students' ability to interpret and apply the information available in the OELE. This approach has yielded valuable dividends: by characterizing students according to the coherence of their behavior, teachers and researchers have access to easily-calculated, intuitive, and actionable measures of the quality of students' problem-solving processes. The next step in this line of research is to develop a framework for using coherence analysis to adaptively scaffold students in OELEs. In this paper, we present our initial ideas for this work and propose guidelines for the construction of a scaffolding framework.
This paper presents a formulation of a nonlinear model predictive controller for steering of a nuclear reaction in a pressurized water reactor via control rod displacement. The predictive model, based on point kinetic...
详细信息
This paper presents our recent work with the Generalized Intelligent Framework for Tutoring (GIFT) for authoring tutors and training systems in concert with already developed external applications that provide a wide ...
详细信息
This paper presents our recent work with the Generalized Intelligent Framework for Tutoring (GIFT) for authoring tutors and training systems in concert with already developed external applications that provide a wide variety of educational experiences. In this paper, we describe our efforts to extend the GIFT system to develop metacognitive tutoring support for UrbanSim, a turnbased simulation environment for learning about counterinsurgency operations. We discuss specific extensions to GIFT as well as the links we have developed between GIFT and UrbanSim to track player activities. Additionally, we discuss a conversational approach that we are designing to interpret players' strategies and provide feedback when they adopt suboptimal approaches for their counterinsurgency operations.
Deep networks like the convolutional neural network and its variants usually learn hierarchical features from labeled images, which is very expensive to obtain. How can we find an unsupervised way to effectively extra...
详细信息
ISBN:
(纸本)9781509006212
Deep networks like the convolutional neural network and its variants usually learn hierarchical features from labeled images, which is very expensive to obtain. How can we find an unsupervised way to effectively extract deep and abstract features from images without annotations? Even from large qualities of images with noise? In this paper, we propose a robust deep neural network, named as stacked convolutional denoising auto-encoders (SCDAE), which can map raw images to hierarchical representations in an unsupervised manner. Our network is elaborately designed to fit for the visual recognition tasks. It is established by stacking the denoising auto-encoders. Unlike the prior works, in the training phase, the auto-encoders are trained patch-wisely so that the latent features can be applied to powerful regularizers for better representation;in the inference phase, the denoising auto-encoders are stacked convolutionally, hence the generated feature maps in the higher layers can preserve the coherent structures within the features in the lower layers. To achieve better performance, we apply whitening to each layer to sphere the input features. Our network is evaluated on the challenging image datasets MNIST, CIFAR-10 and STL-10 and demonstrates superior performance to the state-of-the-art unsupervised networks.
Minimally invasive robotic surgery techniques are becoming popular thanks to their enhanced patient benefits, including shorter recovery time, better cosmetic results and reduced discomforts. Less invasive procedures ...
详细信息
The purpose of this paper was to expand upon an existing eye detection algorithm and to innovate an acceptable and practical solution aimed for hands-free computer *** overall goal was to create a cost-efficient real-...
详细信息
The purpose of this paper was to expand upon an existing eye detection algorithm and to innovate an acceptable and practical solution aimed for hands-free computer *** overall goal was to create a cost-efficient real-time application which aids the physically disabled by allowing navigation through the Microsoft Windows operating system using only their *** primary focus was to develop and algorithm with both a high degree of efficiency and accuracy without the use of any specialized equipment or *** concluded approximately 97% accuracy in low lit environments and 99% accuracy in well-lit environments when calibrated *** accuracy and efficiency decrease when executing in a poorly lit environment,or in a poorly calibrated system.
暂无评论