With respect to security, the use of various terminals in the mobile Internet environment is *** terminal testing methods cannot simulate actual testing environments; thus, the test results do not accurately reflect t...
详细信息
With respect to security, the use of various terminals in the mobile Internet environment is *** terminal testing methods cannot simulate actual testing environments; thus, the test results do not accurately reflect the security of terminals. To address this problem, we designed and developed a cloud platform based automated testing system for the mobile Internet. In this system, virtualization and automation technology are utilized to integrate mobile terminals into the cloud platform as a resource, to achieve a novel cloud service called Testing as a Service(Taa S). The system consists of three functional modules: web front-end module, testing environment module, and automated testing module. We adopted the permeable automated testing tool Metasploit to perform security testing. In our test experiments, we selected 100 apps with diverse vulnerability levels, ranging from secure to vulnerable, to perform a series of functional tests. The experimental results show that this system can correctly test both the number of vulnerable apps and their corresponding vulnerability levels. As such, the designed system can flexibly configure various testing environments for different testing cases or projects, and thereby perform security testing automatically.
The increasing mobile devices with better wireless communication facilities trends to be a good opportunity for the development of vehicular ad-hoc networks (VANETs). The opportunistic routing protocols are generally ...
详细信息
The increasing mobile devices with better wireless communication facilities trends to be a good opportunity for the development of vehicular ad-hoc networks (VANETs). The opportunistic routing protocols are generally developed from the Delay Tolerant network (DTN). In this paper, we propose an opportunistic routing algorithm called RSUS (Routing Scheme for Urban Scenarios) based on a grouping strategy which considers both internal property and external contacts of nodes. The nodes of network are divided into super nodes, backbone nodes and ordinary nodes. Each type of nodes uses different routing strategy respectively. Then simulations were carried out by the ONE simulator and evaluations compared with the traditional single opportunistic algorithms. Furthermore RSUS was simulated in three different cities. Results show that RSUS algorithm can obtain the optimal performance with a low network overhead ratio and a high delivery rate, it is also suitable for different urban scenarios.
In this paper, we propose a two-stage PCA algorithm to deal with the problem of target appearance changes in object tracking. Our method is based on particle filter framework and aims at building up a robust appearanc...
详细信息
ISBN:
(纸本)9781510830981
In this paper, we propose a two-stage PCA algorithm to deal with the problem of target appearance changes in object tracking. Our method is based on particle filter framework and aims at building up a robust appearance model for the target. In the first-stage, PCA is applied on several templates collected before tracking to construct a low dimensional subspace for the targets. Correspondingly, in the later tracking, all particles will be projected into this subspace to calculate the weight of particles, as well as the location of the target by weighted sum of particles. In the second-stage, PCA is adopted to decompose the reconstruction error into orthogonal basis to find the basis with biggest variance which can best present the appearance changes. Correspondingly, we uses this basis to update the old subspace. Besides, a threshold is set to decide when to update which greatly reduce the numbers of update. The two stages work together to establish a robust appearance model making our tracking algorithm more robust. Experimental results on public video sequence demonstrate the effectiveness of our proposed algorithm.
An effective algorithm for global abnormal detection from surveillance video is proposed in this paper. The algorithm is based on sparse representation. To deal with the illumination change in video scenes, specific f...
详细信息
ISBN:
(纸本)9781510830981
An effective algorithm for global abnormal detection from surveillance video is proposed in this paper. The algorithm is based on sparse representation. To deal with the illumination change in video scenes, specific feature extract methods are designed for corresponding illumination conditions. In the case of non-uniform illumination, features are extracted directly on the original image;in the case of uniform illumination, features are extracted on the binary image obtained by threshold segmentation on the difference image, where the thresholds are computed by the Otsu's method. The features extracted on normal video are used to learn an over-complete dictionary. Then, the sparse reconstruction cost over the dictionary is used to detect abnormal events. Experiments on the open global abnormal dataset and the comparison to the state-of-the-art methods validate effectiveness and quickness of our algorithm.
Due to a rapid increase in the number of functionally equivalent web services at open and dynamic Io T service environment,Qo S has become a major discrimination factor to reflect the user's expectation and experi...
详细信息
Due to a rapid increase in the number of functionally equivalent web services at open and dynamic Io T service environment,Qo S has become a major discrimination factor to reflect the user's expectation and experience of using a *** are different languages and models for expressing Qo S advertisements and requirements among service providers and ***,it leads to the issues of semantic interoperability of Qo S information and semantic similarity match between a semantic description of the service being requested by the service consumer,and a formal description of the service being offered by the service *** this paper,we propose a hierarchical two-layer semantic Qo S ontology to promote the description and declaration of Qo S-based service information in detail for any domain and ***,we develop a semantic matchmaking algorithm to compare the web services according to their Qo S information and adopt analytical hierarchy process( AHP) to make decision for the ranked services depending on the Qo S *** comparison study and experimental result show that our proposed system is superior to other service ranking approaches.
In this paper, we propose a parallel HEVC encoder scheme based on multi-core platform, which provides maximized parallel scalability by exploiting two-level parallelism, namely, the frame level parallelism and the CTB...
详细信息
ISBN:
(纸本)9781510819085
In this paper, we propose a parallel HEVC encoder scheme based on multi-core platform, which provides maximized parallel scalability by exploiting two-level parallelism, namely, the frame level parallelism and the CTB level parallelism. Inspired by the intra-CTB row level parallelism of WPP in HEVC, we investigate the inter-frame CTB prediction dependency to its reference CTBs, and find the inter-CTB correlation. Using this inter-correlation, we divide a frame into CTB units and create CTB-row level coding threads when their corresponding reference CTBs are available. Each thread is bonded to a processing core, therefore, both intra- and inter-CTB rows can be encoded in parallel. Moreover, we introduce a priority scheduling mechanism to control the coding threads. Experiments on Tilera-Gx36 multi-core platform show that, compared with serial execution, the proposed method achieves 3.6 and 4.3 times speedup for 1080 P and 720 P video sequences, respectively.
This paper proposes a new random-access protocol over 2 × M multiple-input-multiple-output (MIMO) multiaccess channels, namely, adaptive space-time diversity slotted ALOHA (ASTDSA), to address the issues on colli...
详细信息
Localized network coding is a promising technique to improve the throughput of wireless multihop networks with multiple concurrent unicast sessions. However, most existing mechanisms in this field perform network codi...
详细信息
Testing and evaluation technologies is widely recognized and plays important roles in the wirelesstechnology developments, along with the research on basic theory and key technologies. The investigation and developme...
详细信息
ISBN:
(数字)9783319618692
ISBN:
(纸本)9783319618685;9783319871813
Testing and evaluation technologies is widely recognized and plays important roles in the wirelesstechnology developments, along with the research on basic theory and key technologies. The investigation and developments on the multi-level and comprehensive evaluations for 5G new technologies, provides important performance references for the 5G technology filtering and future standardizations.
暂无评论