首页 > 最新文献

2010 2nd International Conference on Information Technology Convergence and Services最新文献

英文 中文
Integrated DDoS Attack Defense Infrastructure for Effective Attack Prevention 一体化DDoS攻击防范基础设施,有效防范攻击
Yang-Seo Choi, J. Oh, Jongsoo Jang, Jaecheol Ryou
Currently attackers are trying to paralyze servers and networks with various types of DDoS attacks. For example, on 7th July in 2009, a DDoS attack occurred against 48 web sites in South Korea and U.S.A. In this attack, the attack traffic pattern and the botnet construction methods are different from that of previous version. Due to the differences of the attack patterns, the 7.7 DDoS attack was not detected easily. These days, such new types of sophisticated attacks occur and it???s not easy to detect those attacks effectively. In fact, it???s been more than ten years since DDoS attacks discovered in late 1990s. However, DDoS attack is still one of the biggest threats in Internet infrastructure and IT environment. It is because almost all the DDoS defense techniques are not focused on general characteristics and infrastructure but on specific characteristics in each attack. In order to develop a general purpose DDoS defense technology, all the attack process and general characteristics should be analyzed. Furthermore, based on the each attack phases and location of network topology also have to be analyzed. For that, in this paper, we show a general DDoS attack process and each phase in this process. For each phase, we propose DDoS attack prevention requirements and finally suggest the integrated DDoS attack defense infrastructure. For the detailed explanation, we classify attack detection techniques into three categories.
目前,攻击者试图通过各种类型的DDoS攻击使服务器和网络瘫痪。例如,2009年7月7日,韩国和美国发生了针对48个网站的DDoS攻击。在这次攻击中,攻击流量模式和僵尸网络构建方法与以前的版本有所不同。由于攻击方式的差异,7.7 DDoS攻击不容易被检测到。这些天,这种新型的复杂攻击发生了,它??有效地检测这些攻击并不容易。事实上,它??自从20世纪90年代末发现DDoS攻击以来,已经有十多年了。然而,DDoS攻击仍然是互联网基础设施和IT环境中最大的威胁之一。这是因为几乎所有的DDoS防御技术都不是针对一般特征和基础设施,而是针对每次攻击的特定特征。为了开发一种通用的DDoS防御技术,需要对所有的攻击过程和一般特征进行分析。此外,还需要根据每个攻击阶段和所处的网络拓扑进行分析。为此,在本文中,我们展示了一个通用的DDoS攻击过程以及这个过程中的各个阶段。针对每个阶段提出了DDoS攻击防范需求,最后提出了综合DDoS攻击防范基础架构。为了详细解释,我们将攻击检测技术分为三类。
{"title":"Integrated DDoS Attack Defense Infrastructure for Effective Attack Prevention","authors":"Yang-Seo Choi, J. Oh, Jongsoo Jang, Jaecheol Ryou","doi":"10.1109/ITCS.2010.5581263","DOIUrl":"https://doi.org/10.1109/ITCS.2010.5581263","url":null,"abstract":"Currently attackers are trying to paralyze servers and networks with various types of DDoS attacks. For example, on 7th July in 2009, a DDoS attack occurred against 48 web sites in South Korea and U.S.A. In this attack, the attack traffic pattern and the botnet construction methods are different from that of previous version. Due to the differences of the attack patterns, the 7.7 DDoS attack was not detected easily. These days, such new types of sophisticated attacks occur and it???s not easy to detect those attacks effectively. In fact, it???s been more than ten years since DDoS attacks discovered in late 1990s. However, DDoS attack is still one of the biggest threats in Internet infrastructure and IT environment. It is because almost all the DDoS defense techniques are not focused on general characteristics and infrastructure but on specific characteristics in each attack. In order to develop a general purpose DDoS defense technology, all the attack process and general characteristics should be analyzed. Furthermore, based on the each attack phases and location of network topology also have to be analyzed. For that, in this paper, we show a general DDoS attack process and each phase in this process. For each phase, we propose DDoS attack prevention requirements and finally suggest the integrated DDoS attack defense infrastructure. For the detailed explanation, we classify attack detection techniques into three categories.","PeriodicalId":166169,"journal":{"name":"2010 2nd International Conference on Information Technology Convergence and Services","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127894220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
NPA: Increased Partitioning Approach for Massive Data in Real-Time Data Warehouse NPA:实时数据仓库中海量数据的增强分区方法
Jie Song, Y. Bao
In many business and scientific data warehouses, not only the data amount is growing in geometric series, but also the requirement of real-time capability is increasing. Database partitioning technique which adopts ???divide and conquer??? method can efficiently simplify the complexity of managing massive data and improve the performance of the system, especially the range partitioning. The traditional range partitioning approach brings heavy burden to the system without a increased partitioning algorithm, so it does not adapt to the real-time data warehouse partitioning. To speed up the partitioning algorithm, the current partitioning technology is well studied and three effective range partitioning algorithms for the massive data are proposed, which based on allowing the fluctuation of data amount in each range of partitions. At last, some experiments and applications show that the proposed algorithms are more effective and efficient to partitioning and repartitioning tables in the real-time data warehouse.
在许多商业和科学数据仓库中,不仅几何级数的数据量不断增长,而且对实时性的要求也越来越高。数据库分区采用了哪些技术??分而治之?该方法可以有效地简化管理海量数据的复杂性,提高系统的性能,特别是范围划分。传统的范围分区方法由于没有增加分区算法,给系统带来了较大的负担,因此不适应实时数据仓库分区。为了提高分区算法的速度,对现有的分区技术进行了深入的研究,在允许每个分区范围内数据量波动的基础上,提出了三种有效的海量数据范围分区算法。实验和应用表明,该算法对实时数据仓库中的表进行分区和重分区是有效的。
{"title":"NPA: Increased Partitioning Approach for Massive Data in Real-Time Data Warehouse","authors":"Jie Song, Y. Bao","doi":"10.1109/ITCS.2010.5581277","DOIUrl":"https://doi.org/10.1109/ITCS.2010.5581277","url":null,"abstract":"In many business and scientific data warehouses, not only the data amount is growing in geometric series, but also the requirement of real-time capability is increasing. Database partitioning technique which adopts ???divide and conquer??? method can efficiently simplify the complexity of managing massive data and improve the performance of the system, especially the range partitioning. The traditional range partitioning approach brings heavy burden to the system without a increased partitioning algorithm, so it does not adapt to the real-time data warehouse partitioning. To speed up the partitioning algorithm, the current partitioning technology is well studied and three effective range partitioning algorithms for the massive data are proposed, which based on allowing the fluctuation of data amount in each range of partitions. At last, some experiments and applications show that the proposed algorithms are more effective and efficient to partitioning and repartitioning tables in the real-time data warehouse.","PeriodicalId":166169,"journal":{"name":"2010 2nd International Conference on Information Technology Convergence and Services","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122654630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Bio-Inspired Self-Reconfigurable Architecture for Mobile Agents in Distributed and Networked Environments 分布式和网络环境下移动代理的仿生自重构体系结构
Ki-Won Yeom
This paper presents an approach to develop and manage self organizing distributed components systems in dynamically changing environments. The main idea of this approach is to construct an application by a dynamic association of bio-inspired modular agents that can migrate and reorganize by themselves while the application is being executed. An association of agents can be migrated and transformed according to agents??? local policies including deployment based on biological processes. We have designed an adaptive architecture, which can reorganize and reconfigure agents after several biological concepts and mechanisms, and implemented a platform to host the architecture on the dynamically changing environments. The agents in the proposed framework are designed based on several biological concepts. This paper depicts several key features of the agents in the framework, and describes the design and implementation of the proposed platform. Several simulation results are presented to examine scalability and efficiency of the platform.
本文提出了一种在动态变化的环境中开发和管理自组织分布式组件系统的方法。这种方法的主要思想是通过仿生模块化代理的动态关联来构建应用程序,这些代理可以在应用程序执行时自行迁移和重组。代理的关联可以根据代理进行迁移和转换。本地策略,包括基于生物过程的部署。我们设计了一个自适应的体系结构,该体系结构可以根据多种生物学概念和机制对agent进行重组和重新配置,并实现了一个平台来承载该体系结构在动态变化的环境中运行。提出的框架中的代理是基于几个生物学概念设计的。本文描述了框架中代理的几个关键特性,并描述了所提出的平台的设计和实现。仿真结果验证了该平台的可扩展性和效率。
{"title":"Bio-Inspired Self-Reconfigurable Architecture for Mobile Agents in Distributed and Networked Environments","authors":"Ki-Won Yeom","doi":"10.1109/ITCS.2010.5581271","DOIUrl":"https://doi.org/10.1109/ITCS.2010.5581271","url":null,"abstract":"This paper presents an approach to develop and manage self organizing distributed components systems in dynamically changing environments. The main idea of this approach is to construct an application by a dynamic association of bio-inspired modular agents that can migrate and reorganize by themselves while the application is being executed. An association of agents can be migrated and transformed according to agents??? local policies including deployment based on biological processes. We have designed an adaptive architecture, which can reorganize and reconfigure agents after several biological concepts and mechanisms, and implemented a platform to host the architecture on the dynamically changing environments. The agents in the proposed framework are designed based on several biological concepts. This paper depicts several key features of the agents in the framework, and describes the design and implementation of the proposed platform. Several simulation results are presented to examine scalability and efficiency of the platform.","PeriodicalId":166169,"journal":{"name":"2010 2nd International Conference on Information Technology Convergence and Services","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131118860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fast Test Architecture for Asynchronous Network-on-Chip Routing Networks 异步片上网络路由网络的快速测试体系结构
Chul-ki Baek, In-Sub Kim, Jung-Tae Kim, Yong-Hyun Kim, Hyoung B. Min, Jae-Hoon Lee
ANoC (Asynchronous Network-on-Chip) has been developed to solve problems of large number of cores in SoC (System-on-Chip) by giving asynchronism to every core. This new architecture requires new Testing methods different from the existing SoC Test, and it freshly needs the test of router and routing networks. This paper first offers high-speed testing architecture that tests more than one routers and networks at the same time in the 2-D mesh topology. Then, the structure of wrapper for realization of this method is explained. We show that the more number of routers is, the more effective performance is by checking the clock count for test of various ANoCs that have several sizes.
异步片上网络(Asynchronous Network-on-Chip, ANoC)是为了解决片上系统(System-on-Chip, SoC)中内核数量庞大的问题而发展起来的,它使每个内核都具有异步性。这种新的架构需要不同于现有SoC测试的新的测试方法,并且需要对路由器和路由网络进行新的测试。本文首先提出了在二维网格拓扑结构中同时测试多个路由器和网络的高速测试体系结构。然后,对实现该方法的包装器结构进行了说明。我们通过检查时钟计数来测试具有不同大小的各种anoc,表明路由器数量越多,性能越有效。
{"title":"A Fast Test Architecture for Asynchronous Network-on-Chip Routing Networks","authors":"Chul-ki Baek, In-Sub Kim, Jung-Tae Kim, Yong-Hyun Kim, Hyoung B. Min, Jae-Hoon Lee","doi":"10.1109/ITCS.2010.5581281","DOIUrl":"https://doi.org/10.1109/ITCS.2010.5581281","url":null,"abstract":"ANoC (Asynchronous Network-on-Chip) has been developed to solve problems of large number of cores in SoC (System-on-Chip) by giving asynchronism to every core. This new architecture requires new Testing methods different from the existing SoC Test, and it freshly needs the test of router and routing networks. This paper first offers high-speed testing architecture that tests more than one routers and networks at the same time in the 2-D mesh topology. Then, the structure of wrapper for realization of this method is explained. We show that the more number of routers is, the more effective performance is by checking the clock count for test of various ANoCs that have several sizes.","PeriodicalId":166169,"journal":{"name":"2010 2nd International Conference on Information Technology Convergence and Services","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115193560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study of Knowledge Sharings of Social and Digital Networkings 社交网络与数字网络知识共享的比较研究
Sun Moo Kim, Giseob Byun, Hyunsik Seo, Taisiya Kim, B. Lee
The purpose of this study is to investigate the impact of the activities for KM on the knowledge sharing through the social networking and digital networking. The research conducted a survey and analyzed the level of the social and digital networking, and identified the relationships with the factors of KM activities, and the knowledge sharing. As the results, the findings illustrate that the managers focused on digital networking based on IS for knowledge sharing. In contrast, for the employees, they mainly focused on social networking. Moreover, as a result of that all the social and digital networking are positive effect on the knowledge sharing, it is need to establish strategies for knowledge sharing through social networking in their organizations.
本研究的目的是探讨知识管理活动对社会网络和数字网络中知识共享的影响。本研究通过调查分析了社会网络和数字网络的水平,确定了知识管理活动因素与知识共享的关系。结果表明,管理者注重基于信息系统的数字化网络知识共享。相比之下,对于员工来说,他们主要关注社交网络。此外,由于所有的社交网络和数字网络都对知识共享有积极的影响,因此需要在组织中建立通过社交网络进行知识共享的策略。
{"title":"A Comparative Study of Knowledge Sharings of Social and Digital Networkings","authors":"Sun Moo Kim, Giseob Byun, Hyunsik Seo, Taisiya Kim, B. Lee","doi":"10.1109/ITCS.2010.5581279","DOIUrl":"https://doi.org/10.1109/ITCS.2010.5581279","url":null,"abstract":"The purpose of this study is to investigate the impact of the activities for KM on the knowledge sharing through the social networking and digital networking. The research conducted a survey and analyzed the level of the social and digital networking, and identified the relationships with the factors of KM activities, and the knowledge sharing. As the results, the findings illustrate that the managers focused on digital networking based on IS for knowledge sharing. In contrast, for the employees, they mainly focused on social networking. Moreover, as a result of that all the social and digital networking are positive effect on the knowledge sharing, it is need to establish strategies for knowledge sharing through social networking in their organizations.","PeriodicalId":166169,"journal":{"name":"2010 2nd International Conference on Information Technology Convergence and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130065623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Trust Modeling Framework for Message Propagation and Evaluation in VANETs VANETs中消息传播与评估的信任建模框架
Cheng Chen, Jie Zhang, R. Cohen, P. Ho
In this paper, we present a trust-based message propagation and evaluation framework in vehicular ad-hoc networks where peers share information regarding road condition or safety and others provide opinions about whether the information can be trusted. More specifically, our trustbased message propagation model collects and propagates peers??? opinions in an efficient, secure and scalable way by dynamically controlling information dissemination. The trust-based message evaluation model allows peers to evaluate the information in a distributed and collaborative fashion by taking into account others??? opinions. Experimental results demonstrate that our proposed framework promotes network scalability and system effectiveness in information evaluation under the pervasive presence of false information, which are the two essentially important factors for the popularization of vehicular networks.
在本文中,我们提出了一种基于信任的车载自组织网络中的消息传播和评估框架,其中节点共享有关道路状况或安全的信息,而其他人则提供有关信息是否可信的意见。更具体地说,我们基于信任的消息传播模型收集和传播对等体。通过动态控制信息传播,实现高效、安全、可扩展的意见传播。基于信任的消息评估模型允许节点通过考虑其他节点,以分布式和协作的方式评估信息。的意见。实验结果表明,在虚假信息普遍存在的情况下,我们提出的框架提高了网络的可扩展性和系统在信息评估方面的有效性,这是汽车网络普及的两个重要因素。
{"title":"A Trust Modeling Framework for Message Propagation and Evaluation in VANETs","authors":"Cheng Chen, Jie Zhang, R. Cohen, P. Ho","doi":"10.1109/ITCS.2010.5581298","DOIUrl":"https://doi.org/10.1109/ITCS.2010.5581298","url":null,"abstract":"In this paper, we present a trust-based message propagation and evaluation framework in vehicular ad-hoc networks where peers share information regarding road condition or safety and others provide opinions about whether the information can be trusted. More specifically, our trustbased message propagation model collects and propagates peers??? opinions in an efficient, secure and scalable way by dynamically controlling information dissemination. The trust-based message evaluation model allows peers to evaluate the information in a distributed and collaborative fashion by taking into account others??? opinions. Experimental results demonstrate that our proposed framework promotes network scalability and system effectiveness in information evaluation under the pervasive presence of false information, which are the two essentially important factors for the popularization of vehicular networks.","PeriodicalId":166169,"journal":{"name":"2010 2nd International Conference on Information Technology Convergence and Services","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134614948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
A Fair-Oriented Two-Level Scheduling Scheme for Downlink Traffic in WiMAX Network 面向公平的WiMAX下行流量两级调度方案
W. Nie, N. Xiong, J. Park, Sang-Soo Yeo
The IEEE 802.16 standard is proposed to provide a wide-range broadband wireless service, but it leaves the implementation of the wireless resource scheduler as an open issue. We study the scheduling algorithm and propose a fairoriented two-level scheduling scheme for downlink traffic in a WiMAX network. A central controller (Base Station) has a number of users, and different mobile subscriber stations have different channel conditions. Even the same mobile subscriber station has different service requirements in the WiMAX network. Our design improves throughput and alleviates the delay and also ensures fairness in the network. Our results show our scheduling algorithm can increase the network throughput, maintain the relative fairness, and lower delay compared with the round robin algorithm.
IEEE 802.16标准被提议提供一个宽范围的宽带无线服务,但是它把无线资源调度程序的实现作为一个开放的问题。研究了WiMAX网络下行流量的调度算法,提出了一种面向公平的两级调度方案。一个中央控制器(基站)具有多个用户,不同的移动用户站具有不同的信道条件。在WiMAX网络中,即使是同一个移动用户站也有不同的业务需求。我们的设计提高了吞吐量,减轻了延迟,同时保证了网络的公平性。结果表明,与轮循算法相比,该调度算法能够提高网络吞吐量,保持相对公平性,并具有较低的延迟。
{"title":"A Fair-Oriented Two-Level Scheduling Scheme for Downlink Traffic in WiMAX Network","authors":"W. Nie, N. Xiong, J. Park, Sang-Soo Yeo","doi":"10.1109/ITCS.2010.5581291","DOIUrl":"https://doi.org/10.1109/ITCS.2010.5581291","url":null,"abstract":"The IEEE 802.16 standard is proposed to provide a wide-range broadband wireless service, but it leaves the implementation of the wireless resource scheduler as an open issue. We study the scheduling algorithm and propose a fairoriented two-level scheduling scheme for downlink traffic in a WiMAX network. A central controller (Base Station) has a number of users, and different mobile subscriber stations have different channel conditions. Even the same mobile subscriber station has different service requirements in the WiMAX network. Our design improves throughput and alleviates the delay and also ensures fairness in the network. Our results show our scheduling algorithm can increase the network throughput, maintain the relative fairness, and lower delay compared with the round robin algorithm.","PeriodicalId":166169,"journal":{"name":"2010 2nd International Conference on Information Technology Convergence and Services","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123980574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy Preservation in SAT (Single Authentication Through) SAT中的隐私保护(通过单一认证)
G. Kim, SuGil Choi, Deok-Gyu Lee, J. Han
In SAT (Single Authentication Through) scheme, each smart camera is capable of identifying, tracking identified objects, and delivering associate ID information to sibling subjects. So in this paper, we suggest a privacy preservation scheme for preventing privacy infringement during propagation of sensitive information.
在SAT (Single Authentication Through)方案中,每个智能摄像头都能够识别、跟踪已识别的物体,并将相关ID信息传递给兄弟对象。因此,本文提出了一种防止敏感信息传播过程中隐私侵权的隐私保护方案。
{"title":"Privacy Preservation in SAT (Single Authentication Through)","authors":"G. Kim, SuGil Choi, Deok-Gyu Lee, J. Han","doi":"10.1109/ITCS.2010.5581262","DOIUrl":"https://doi.org/10.1109/ITCS.2010.5581262","url":null,"abstract":"In SAT (Single Authentication Through) scheme, each smart camera is capable of identifying, tracking identified objects, and delivering associate ID information to sibling subjects. So in this paper, we suggest a privacy preservation scheme for preventing privacy infringement during propagation of sensitive information.","PeriodicalId":166169,"journal":{"name":"2010 2nd International Conference on Information Technology Convergence and Services","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121422067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3D Model Based Face Recognition Using Inverse Compositional Image Alignment 基于逆组合图像对齐的三维模型人脸识别
Sanghoon Kim, K. Jeong, Hyeonjoon Moon
3D model based approach for face recognition has been investigated as a robust solution for pose and illumination variation. Since a generative 3D face model consists of a large number of vertices, a 3D model based face recognition system is generally inefficient in computation time and complexity. In this paper we propose a novel 3D face representation algorithm based on pixel to vertex map (PVM) to reduce number of vertices. We explore shape and texture coefficient vectors of the model by fitting it to an input face using inverse compositional image alignment (ICIA) to evaluate face recognition performance. Experimental results show that proposed face recognition system is efficient in computation time while maintaining reasonable accuracy.
基于三维模型的人脸识别方法作为姿态和光照变化的鲁棒解决方案进行了研究。由于生成式三维人脸模型包含大量的顶点,基于三维模型的人脸识别系统在计算时间和复杂度方面效率低下。本文提出了一种基于像素到顶点映射(PVM)的三维人脸表示算法,以减少顶点数。我们通过使用逆构图图像对齐(ICIA)将模型拟合到输入人脸来评估人脸识别性能,从而探索模型的形状和纹理系数向量。实验结果表明,所提出的人脸识别系统在保持合理准确率的同时,在计算时间上是有效的。
{"title":"3D Model Based Face Recognition Using Inverse Compositional Image Alignment","authors":"Sanghoon Kim, K. Jeong, Hyeonjoon Moon","doi":"10.1109/ITCS.2010.5581265","DOIUrl":"https://doi.org/10.1109/ITCS.2010.5581265","url":null,"abstract":"3D model based approach for face recognition has been investigated as a robust solution for pose and illumination variation. Since a generative 3D face model consists of a large number of vertices, a 3D model based face recognition system is generally inefficient in computation time and complexity. In this paper we propose a novel 3D face representation algorithm based on pixel to vertex map (PVM) to reduce number of vertices. We explore shape and texture coefficient vectors of the model by fitting it to an input face using inverse compositional image alignment (ICIA) to evaluate face recognition performance. Experimental results show that proposed face recognition system is efficient in computation time while maintaining reasonable accuracy.","PeriodicalId":166169,"journal":{"name":"2010 2nd International Conference on Information Technology Convergence and Services","volume":"52 361 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126160519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing Online Auction with Behavioral and Intuitive Functions 开发具有行为和直观功能的网上拍卖
Pub Date : 2010-09-23 DOI: 10.1504/IJITCC.2012.045806
Dave E. Marcial, Josel Pasilan, Andrew Glovasa, Alfran Keith Consing, Carl Louie Mamhot, Aine Aira Tomada
This paper discusses the techniques and methods in developing a web-based auction site which integrates behavioral targeting into its design. This paper further presents and explains several theorems in achieving behavioral and intuitive approaches to online auctioning process. The system, called i-BID, is developed using a Web 2.0 standards in its design to demonstrate the implementation of the behavioral and intuitive approaches. This online system is objectively developed to provide users with a rich, intuitive, and efficient interface. i-BID was rated high on the ???Ease and Intuitiveness??? criterion while the general impact of the behavioral targeting functions of the site is fairly high.
本文讨论了将行为定位技术融入到基于web的拍卖网站设计中的技术和方法。本文进一步提出并解释了实现在线拍卖过程的行为和直观方法的几个定理。该系统被称为i-BID,在其设计中使用Web 2.0标准开发,以演示行为和直观方法的实现。本在线系统的目的是为用户提供一个丰富、直观、高效的界面。i-BID在??简单和直观??而一般标准的行为定位功能对网站的影响是相当高的。
{"title":"Developing Online Auction with Behavioral and Intuitive Functions","authors":"Dave E. Marcial, Josel Pasilan, Andrew Glovasa, Alfran Keith Consing, Carl Louie Mamhot, Aine Aira Tomada","doi":"10.1504/IJITCC.2012.045806","DOIUrl":"https://doi.org/10.1504/IJITCC.2012.045806","url":null,"abstract":"This paper discusses the techniques and methods in developing a web-based auction site which integrates behavioral targeting into its design. This paper further presents and explains several theorems in achieving behavioral and intuitive approaches to online auctioning process. The system, called i-BID, is developed using a Web 2.0 standards in its design to demonstrate the implementation of the behavioral and intuitive approaches. This online system is objectively developed to provide users with a rich, intuitive, and efficient interface. i-BID was rated high on the ???Ease and Intuitiveness??? criterion while the general impact of the behavioral targeting functions of the site is fairly high.","PeriodicalId":166169,"journal":{"name":"2010 2nd International Conference on Information Technology Convergence and Services","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126924511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2010 2nd International Conference on Information Technology Convergence and Services
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1