首页 > 最新文献

2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing最新文献

英文 中文
A Parallel Multi-appliance Recognition for Smart Meter 面向智能电表的并行多家电识别
Lien-Chun Wang, Wei-Ting Cho, Y. Chiu, Chin-Feng Lai
This study proposes a non-invasive smart meter system that considers the power use habits of users unfamiliar with electric appliances, and can be used by inserting the smart meter into an electrical circuit. This study also creates a database mechanism, appliance recognition classification, and a waveform recognition method, in order to solve the large data volume problem in current appliance recognition systems. In comparison to other appliance recognition systems, the low-end embedded system chip used in this study has low power consumption, as well as high expandability and ease of use. This experiment is different from the research environments of other appliance recognition systems by considering parallel multi-appliance recognition and general users' habit of using power. This study will not make any assumption of power utilization in the experiment. The total system recognition rate is 84.42%, and the total recognition rate of a single electric appliance is 93.82%, proving the high feasibility of this study.
本研究提出了一种非侵入式智能电表系统,该系统考虑了不熟悉电器的用户的用电习惯,并且可以通过将智能电表插入电路中使用。为了解决当前家电识别系统中数据量大的问题,本研究还建立了数据库机制、家电识别分类和波形识别方法。与其他家电识别系统相比,本研究采用的低端嵌入式系统芯片具有低功耗、高扩展性和易用性的特点。本实验不同于其他家电识别系统的研究环境,考虑了多家电并行识别和一般用户的用电习惯。本研究不会对实验中的功率利用率做任何假设。系统的总识别率为84.42%,单个电器的总识别率为93.82%,证明了本研究的高可行性。
{"title":"A Parallel Multi-appliance Recognition for Smart Meter","authors":"Lien-Chun Wang, Wei-Ting Cho, Y. Chiu, Chin-Feng Lai","doi":"10.1109/DASC.2013.110","DOIUrl":"https://doi.org/10.1109/DASC.2013.110","url":null,"abstract":"This study proposes a non-invasive smart meter system that considers the power use habits of users unfamiliar with electric appliances, and can be used by inserting the smart meter into an electrical circuit. This study also creates a database mechanism, appliance recognition classification, and a waveform recognition method, in order to solve the large data volume problem in current appliance recognition systems. In comparison to other appliance recognition systems, the low-end embedded system chip used in this study has low power consumption, as well as high expandability and ease of use. This experiment is different from the research environments of other appliance recognition systems by considering parallel multi-appliance recognition and general users' habit of using power. This study will not make any assumption of power utilization in the experiment. The total system recognition rate is 84.42%, and the total recognition rate of a single electric appliance is 93.82%, proving the high feasibility of this study.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133215991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Study of the Private Set Intersection Protocol Based on Negative Databases 基于负数据库的私有集交叉协议研究
Dongdong Zhao, Wenjian Luo
Nowadays, data privacy has been widely concerned. The private set intersection means that several parties calculate the intersection of their private sets while without revealing extra information about their private data. The negative database (NDB) is a new technique for preserving privacy, and it stores information in the complementary set of a traditional database (DB). Reversing the NDB to recover the corresponding DB is an NP-hard problem, and this property is the security foundation of the NDB. Moreover, the NDB can directly support some database operations such as intersection, union, select and Cartesian product. However, so far, there is no research work about the secure multi-party computation based on NDBs. In this paper, firstly, a two-party private set intersection protocol based on NDBs is proposed, and its security and efficiency are analyzed. Then, the multi-party private set intersection protocol based on NDBs is given.
如今,数据隐私受到了广泛关注。私有集交集意味着多方计算其私有集的交集,而不透露有关其私有数据的额外信息。负数据库(NDB)是一种新的隐私保护技术,它将信息存储在传统数据库的互补集中。反转NDB以恢复相应的DB是一个NP-hard问题,这个属性是NDB的安全基础。此外,NDB还可以直接支持一些数据库操作,如交、并、选择和笛卡尔积。然而,目前还没有关于基于ndb的安全多方计算的研究工作。本文首先提出了一种基于ndb的两方私有集交叉协议,并对其安全性和效率进行了分析。然后,给出了基于ndb的多方私有集交叉协议。
{"title":"A Study of the Private Set Intersection Protocol Based on Negative Databases","authors":"Dongdong Zhao, Wenjian Luo","doi":"10.1109/DASC.2013.38","DOIUrl":"https://doi.org/10.1109/DASC.2013.38","url":null,"abstract":"Nowadays, data privacy has been widely concerned. The private set intersection means that several parties calculate the intersection of their private sets while without revealing extra information about their private data. The negative database (NDB) is a new technique for preserving privacy, and it stores information in the complementary set of a traditional database (DB). Reversing the NDB to recover the corresponding DB is an NP-hard problem, and this property is the security foundation of the NDB. Moreover, the NDB can directly support some database operations such as intersection, union, select and Cartesian product. However, so far, there is no research work about the secure multi-party computation based on NDBs. In this paper, firstly, a two-party private set intersection protocol based on NDBs is proposed, and its security and efficiency are analyzed. Then, the multi-party private set intersection protocol based on NDBs is given.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130599652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
DSNOC: A Hybrid Dense-Sparse Network-on-Chip Architecture for Efficient Scalable Computing DSNOC:一种用于高效可扩展计算的混合密集-稀疏片上网络架构
T. Xu, V. Leppänen, M. Forsell
In this paper, we propose a novel hybrid Dense-Sparse Network-on-Chip (DSNOC) design that takes advantage of both dense and sparse networks. The NoC paradigm is introduced to solve the communication bottleneck and improve system scalability for multicore processors with hundreds or even thousands of cores. Dense mesh network has been used widely in NoCs due to the simplicity of the design and implementation. However the scalability of dense network can be a bottleneck in systems with high traffic volume. Sparse network has been proposed to provide higher bandwidth and better scalability than the dense network, while the size of the interconnection system becomes impractical for large systems. By combining the benefits of both networks, system performance and efficiency can be improved with a proper hybrid design. We analyse and investigate router utilization and traffic distribution of typical mesh networks. The hybrid solution is explored with theoretical analysis and implementation considerations. Experiments are performed by using a full system simulation environment. The evaluation results show that, compared with the dense network, the average network latency and energy delay product of DSNOC are improved by 10.3% and 33% respectively.
在本文中,我们提出了一种新型的混合密集-稀疏片上网络(DSNOC)设计,它同时利用了密集和稀疏网络的优势。为了解决数百核甚至数千核多核处理器的通信瓶颈,提高系统的可扩展性,引入了NoC范式。密集网状网络由于其设计和实现的简单性,在网络通信中得到了广泛的应用。然而,密集网络的可扩展性成为大流量系统的瓶颈。稀疏网络可以提供比密集网络更高的带宽和更好的可扩展性,但对于大型系统来说,互连系统的规模变得不切实际。通过结合两种网络的优点,通过适当的混合设计可以提高系统的性能和效率。对典型网状网络的路由器利用率和流量分布进行了分析和研究。对混合方案进行了理论分析和实现考虑。实验采用全系统仿真环境进行。评价结果表明,与密集网络相比,DSNOC的平均网络时延和能量延迟积分别提高了10.3%和33%。
{"title":"DSNOC: A Hybrid Dense-Sparse Network-on-Chip Architecture for Efficient Scalable Computing","authors":"T. Xu, V. Leppänen, M. Forsell","doi":"10.1109/DASC.2013.119","DOIUrl":"https://doi.org/10.1109/DASC.2013.119","url":null,"abstract":"In this paper, we propose a novel hybrid Dense-Sparse Network-on-Chip (DSNOC) design that takes advantage of both dense and sparse networks. The NoC paradigm is introduced to solve the communication bottleneck and improve system scalability for multicore processors with hundreds or even thousands of cores. Dense mesh network has been used widely in NoCs due to the simplicity of the design and implementation. However the scalability of dense network can be a bottleneck in systems with high traffic volume. Sparse network has been proposed to provide higher bandwidth and better scalability than the dense network, while the size of the interconnection system becomes impractical for large systems. By combining the benefits of both networks, system performance and efficiency can be improved with a proper hybrid design. We analyse and investigate router utilization and traffic distribution of typical mesh networks. The hybrid solution is explored with theoretical analysis and implementation considerations. Experiments are performed by using a full system simulation environment. The evaluation results show that, compared with the dense network, the average network latency and energy delay product of DSNOC are improved by 10.3% and 33% respectively.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133941913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tunnel Congestion Exposure and Feedback 隧道拥塞暴露与反馈
Yi Lin, Xiangyang Gong, Wendong Wang, Xinpeng Wei, Lei Zhu
Tunneling technology has been widely applied in the network, but the lack of effective congestion exposure in the tunnel, seriously affect the performance of the tunnel technology. This document will focus on the tunnel scenario, to design a tunnel congestion exposure and feedback model, and the tunnel congestion marking scheme and congestion information feedback scheme. First, the document describes Tunneling Protocol, Secondly describes the congestion problems in the tunnel, Thirdly proposes a basic tunnel congestion exposure model, Finally, proposes the detail of tunnel congestion marking and feedback scheme for the model. Modifying the ECN tunnel rules of RFC3168 and RFC6040, congestion marking scheme can be applied to the feedback model. Congestion feedback scheme use GRE (Generic Routing Encapsulation) header format extension to carry the feedback information. Content and format of Congestion feedback, and the transmission of feedback information are also discussed in the document.
隧道技术在网络中得到了广泛的应用,但隧道中缺乏有效的拥塞暴露,严重影响了隧道技术的性能。本文将围绕隧道场景,设计隧道拥塞暴露与反馈模型,以及隧道拥塞标识方案和拥塞信息反馈方案。本文首先介绍了隧道协议,其次描述了隧道中的拥塞问题,然后提出了一个基本的隧道拥塞暴露模型,最后提出了隧道拥塞标记的细节和模型的反馈方案。通过修改RFC3168和RFC6040的ECN隧道规则,将拥塞标记方案应用到反馈模型中。拥塞反馈方案使用GRE (Generic Routing Encapsulation)报头格式扩展来携带反馈信息。文中还讨论了拥塞反馈的内容和格式,以及反馈信息的传递。
{"title":"Tunnel Congestion Exposure and Feedback","authors":"Yi Lin, Xiangyang Gong, Wendong Wang, Xinpeng Wei, Lei Zhu","doi":"10.1109/DASC.2013.123","DOIUrl":"https://doi.org/10.1109/DASC.2013.123","url":null,"abstract":"Tunneling technology has been widely applied in the network, but the lack of effective congestion exposure in the tunnel, seriously affect the performance of the tunnel technology. This document will focus on the tunnel scenario, to design a tunnel congestion exposure and feedback model, and the tunnel congestion marking scheme and congestion information feedback scheme. First, the document describes Tunneling Protocol, Secondly describes the congestion problems in the tunnel, Thirdly proposes a basic tunnel congestion exposure model, Finally, proposes the detail of tunnel congestion marking and feedback scheme for the model. Modifying the ECN tunnel rules of RFC3168 and RFC6040, congestion marking scheme can be applied to the feedback model. Congestion feedback scheme use GRE (Generic Routing Encapsulation) header format extension to carry the feedback information. Content and format of Congestion feedback, and the transmission of feedback information are also discussed in the document.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129660266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Data Reusing Strategy Based on Column-Stores 基于列存储的数据重用策略
Mei Wang, Jiaoling Zhou, Yue Li, Xiaoling Xia, Jiajin Le
Data reusing is an important way to save storage capacity and improve query efficiency in the management of massive data. The column-store architecture stores data from the same column continuously, which greatly improves the performance of 'read optimization' application and moreover increases the feasibility and flexibility of data reusing. In this paper, we propose a novel reusing method based on the column-store data warehouse. Firstly, we propose an improved iMAP method based on the schema mapping technique to generate as more candidate reusable columns as possible and then conduct further filter on these candidate data, which greatly reduces the complexity of reusable data detection. Based on the column-store architecture, we then propose the reuse implement at the storage layer. The method for query execution based on reusable data is provided finally. The experiment results conducted on the real data sets indicate that the presented strategy can reduce the storage space and query execution time efficiently.
在海量数据管理中,数据重用是节省存储容量、提高查询效率的重要手段。列存储结构将同一列的数据连续存储,大大提高了“读优化”应用程序的性能,增加了数据重用的可行性和灵活性。本文提出了一种基于列存储数据仓库的重用方法。首先,我们提出了一种基于模式映射技术的改进的iMAP方法,尽可能多地生成候选可重用列,然后对这些候选数据进行进一步的过滤,从而大大降低了可重用数据检测的复杂性。基于列存储体系结构,提出了存储层的重用实现。最后给出了基于可重用数据的查询执行方法。在实际数据集上的实验结果表明,该策略可以有效地减少存储空间和查询执行时间。
{"title":"A Data Reusing Strategy Based on Column-Stores","authors":"Mei Wang, Jiaoling Zhou, Yue Li, Xiaoling Xia, Jiajin Le","doi":"10.1109/DASC.2013.56","DOIUrl":"https://doi.org/10.1109/DASC.2013.56","url":null,"abstract":"Data reusing is an important way to save storage capacity and improve query efficiency in the management of massive data. The column-store architecture stores data from the same column continuously, which greatly improves the performance of 'read optimization' application and moreover increases the feasibility and flexibility of data reusing. In this paper, we propose a novel reusing method based on the column-store data warehouse. Firstly, we propose an improved iMAP method based on the schema mapping technique to generate as more candidate reusable columns as possible and then conduct further filter on these candidate data, which greatly reduces the complexity of reusable data detection. Based on the column-store architecture, we then propose the reuse implement at the storage layer. The method for query execution based on reusable data is provided finally. The experiment results conducted on the real data sets indicate that the presented strategy can reduce the storage space and query execution time efficiently.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133258106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Dynamic Detection Method to C/C++ Programs Memory Vulnerabilities Based on Pointer Analysis 基于指针分析的C/ c++程序内存漏洞动态检测方法
Rui Ma, Lingkui Chen, Changzhen Hu, Jingfeng Xue, Xiaolin Zhao
Aiming at the problem of higher memory consumption and lower execution efficiency during the dynamic detecting to C/C++ programs memory vulnerabilities, this paper presents a dynamic detection method called ISC. The ISC improves the Safe-C using pointer analysis technology. Firstly, the ISC defines a simple and efficient fat pointer representation instead of the safe pointer in the Safe-C. Furthermore, the ISC uses the unification-based analysis algorithm with one level flow static pointer. This identification reduces the number of pointers that need to be converted to fat pointers. Then in the process of program running, the ISC detects memory vulnerabilities through constantly inspecting the attributes of fat pointers. Experimental results indicate that the ISC could detect memory vulnerabilities such as buffer overflows and dangling pointers. Comparing with the Safe-C, the ISC dramatically reduces the memory consumption and lightly improves the execution efficiency.
针对C/ c++程序内存漏洞动态检测中存在的内存消耗大、执行效率低的问题,提出了一种动态检测方法ISC。ISC使用指针分析技术对Safe-C进行了改进。首先,ISC定义了一个简单有效的胖指针表示,而不是safe - c中的安全指针。此外,ISC采用基于统一的单级流静态指针分析算法。这种标识减少了需要转换为胖指针的指针的数量。然后在程序运行过程中,ISC通过不断检查fat指针的属性来检测内存漏洞。实验结果表明,ISC可以检测到缓冲区溢出和悬空指针等内存漏洞。与Safe-C相比,ISC大大降低了内存消耗,并略微提高了执行效率。
{"title":"A Dynamic Detection Method to C/C++ Programs Memory Vulnerabilities Based on Pointer Analysis","authors":"Rui Ma, Lingkui Chen, Changzhen Hu, Jingfeng Xue, Xiaolin Zhao","doi":"10.1109/DASC.2013.37","DOIUrl":"https://doi.org/10.1109/DASC.2013.37","url":null,"abstract":"Aiming at the problem of higher memory consumption and lower execution efficiency during the dynamic detecting to C/C++ programs memory vulnerabilities, this paper presents a dynamic detection method called ISC. The ISC improves the Safe-C using pointer analysis technology. Firstly, the ISC defines a simple and efficient fat pointer representation instead of the safe pointer in the Safe-C. Furthermore, the ISC uses the unification-based analysis algorithm with one level flow static pointer. This identification reduces the number of pointers that need to be converted to fat pointers. Then in the process of program running, the ISC detects memory vulnerabilities through constantly inspecting the attributes of fat pointers. Experimental results indicate that the ISC could detect memory vulnerabilities such as buffer overflows and dangling pointers. Comparing with the Safe-C, the ISC dramatically reduces the memory consumption and lightly improves the execution efficiency.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124700303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Workflow and Role Based Access Control Model for Cloud Manufacturing 基于工作流和角色的云制造访问控制模型
Xianhui Lin, Xiaomei Zhang
Cloud manufacturing employs some progressive issues, for example, the ideas of cloud computing. It extends the "Software as a Service" concept to "Manufacture as a Service", sharing the "manufacturing resources and manufacturing capability". Access control prevents illegal operations effectively by monitoring the user's behavior. This paper proposes an access control model for the cloud manufacturing environment that called WRBAC. Considering the architectures and characteristics of cloud manufacturing, the model uses layered structure to achieve the system-level access control. Based on ABAC, RBAC and TBAC, the model introduces workflow to achieve the process automation. During the mapping between tasks and services, access permission is controlled by distributed policy conditions. In order to strengthen the cross-domain cooperation access protection, this paper refines the authorization mechanism by using attributes and mirror roles. WRBAC can effectively guarantee the security of cloud manufacturing cross-domain environment. The model has strong adaptability and pertinence.
云制造采用了一些先进的问题,例如云计算的思想。将“软件即服务”的理念延伸到“制造即服务”,共享“制造资源和制造能力”。访问控制通过监控用户的行为,有效防止非法操作。本文提出了一种云制造环境的访问控制模型WRBAC。考虑到云制造的体系结构和特点,该模型采用分层结构实现系统级访问控制。该模型以ABAC、RBAC和TBAC为基础,引入工作流实现过程自动化。在任务和业务的映射过程中,访问权限由分布式策略条件控制。为了加强跨域合作访问保护,本文利用属性和镜像角色对授权机制进行了细化。WRBAC可以有效保障云制造跨域环境的安全性。该模型具有较强的适应性和针对性。
{"title":"Workflow and Role Based Access Control Model for Cloud Manufacturing","authors":"Xianhui Lin, Xiaomei Zhang","doi":"10.1109/DASC.2013.39","DOIUrl":"https://doi.org/10.1109/DASC.2013.39","url":null,"abstract":"Cloud manufacturing employs some progressive issues, for example, the ideas of cloud computing. It extends the \"Software as a Service\" concept to \"Manufacture as a Service\", sharing the \"manufacturing resources and manufacturing capability\". Access control prevents illegal operations effectively by monitoring the user's behavior. This paper proposes an access control model for the cloud manufacturing environment that called WRBAC. Considering the architectures and characteristics of cloud manufacturing, the model uses layered structure to achieve the system-level access control. Based on ABAC, RBAC and TBAC, the model introduces workflow to achieve the process automation. During the mapping between tasks and services, access permission is controlled by distributed policy conditions. In order to strengthen the cross-domain cooperation access protection, this paper refines the authorization mechanism by using attributes and mirror roles. WRBAC can effectively guarantee the security of cloud manufacturing cross-domain environment. The model has strong adaptability and pertinence.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127063871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Gesture-Based NUI Application for Real-Time Path Modification 基于手势的NUI实时路径修改应用
Hongzhe Liu, Yulong Xi, Wei Song, Kyhyun Um, Kyungeun Cho
Since the birth of Natural User Interface (NUI) concept, the NUI has become widely used. NUI-based applications have grown rapidly, particularly those using gestures, which have come to occupy a pivotal place in technology. The ever-popular Smartphone is one of the best examples. Recently, video conferencing has also begun adopting gesture-based NUIs with augmented reality (AR) technology. The NUI and AR have greatly enriched and facilitated human experience. In addition, path planning has been a popular topic in research area. Traditional path planning uses automatic navigation to solve problems, it cannot practically interact with people. Its algorithm calculates complexly, moreover, in certain extenuating circumstances, automatic real-time processing is much less efficient than human path modification. Therefore, considering such extenuating circumstances, we present a solution that employs NUI technology for 3D path modification in real time. In our proposed solution, users can manually operate and edit their own paths. The core method is based on 3D point detection to change paths. We did a simulation experiment about city path modification. Experiment resulted that computer can accurately identify a valid gesture. By using gesture it can effectively change the path. Among other applications, this solution can be used in virtual military maps and car navigation.
自自然用户界面(NUI)概念诞生以来,NUI得到了广泛的应用。基于ui的应用程序发展迅速,特别是那些使用手势的应用程序,它们已经在技术中占据了关键地位。广受欢迎的智能手机就是最好的例子之一。最近,视频会议也开始采用基于手势的ui和增强现实(AR)技术。NUI和AR极大地丰富和促进了人类的经验。此外,路径规划一直是研究领域的热门课题。传统的路径规划采用自动导航来解决问题,无法实现与人的实际交互。其算法计算复杂,而且在某些特殊情况下,自动实时处理的效率远低于人工路径修改。因此,考虑到这种情有可减的情况,我们提出了一种采用NUI技术实时修改3D路径的解决方案。在我们提出的解决方案中,用户可以手动操作和编辑他们自己的路径。该方法的核心是基于三维点检测来改变路径。我们做了一个城市道路改造的模拟实验。实验结果表明,计算机能够准确识别有效的手势。通过使用手势可以有效地改变路径。在其他应用中,该解决方案可用于虚拟军事地图和汽车导航。
{"title":"Gesture-Based NUI Application for Real-Time Path Modification","authors":"Hongzhe Liu, Yulong Xi, Wei Song, Kyhyun Um, Kyungeun Cho","doi":"10.1109/DASC.2013.104","DOIUrl":"https://doi.org/10.1109/DASC.2013.104","url":null,"abstract":"Since the birth of Natural User Interface (NUI) concept, the NUI has become widely used. NUI-based applications have grown rapidly, particularly those using gestures, which have come to occupy a pivotal place in technology. The ever-popular Smartphone is one of the best examples. Recently, video conferencing has also begun adopting gesture-based NUIs with augmented reality (AR) technology. The NUI and AR have greatly enriched and facilitated human experience. In addition, path planning has been a popular topic in research area. Traditional path planning uses automatic navigation to solve problems, it cannot practically interact with people. Its algorithm calculates complexly, moreover, in certain extenuating circumstances, automatic real-time processing is much less efficient than human path modification. Therefore, considering such extenuating circumstances, we present a solution that employs NUI technology for 3D path modification in real time. In our proposed solution, users can manually operate and edit their own paths. The core method is based on 3D point detection to change paths. We did a simulation experiment about city path modification. Experiment resulted that computer can accurately identify a valid gesture. By using gesture it can effectively change the path. Among other applications, this solution can be used in virtual military maps and car navigation.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126720363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
UbiSim: Multiple Sensors Mounted Smart House Simulator Development uisim:多传感器安装智能房屋模拟器开发
Wonsik Lee, Seoungjae Cho, Wei Song, Kyhyun Um, Kyungeun Cho
It is essential for smart house researchers to have large datasets from actual environments. However, not all researchers have sufficient budgets to build test beds. These researchers need a simulator that can synthesize realistic sensory datasets. To solve this problem, we propose the 'UbiSim' simulator for activity recognition research. UbiSim provides a 3D graphical user interface to enable spatial perception using multiple sensors, including those that detect motion, pressure, vibration, temperature, and contact, along with RFID tags and receivers. The sensors are designed to verify collisions in a virtual space as a means to operate with minimal computational costs. Our proposed methods were tested in a virtual environment. The results show that the smart house simulator achieves real-time performance.
对于智能家居研究人员来说,拥有来自实际环境的大型数据集是至关重要的。然而,并不是所有的研究人员都有足够的预算来建造试验台。这些研究人员需要一个模拟器,可以合成真实的感官数据集。为了解决这一问题,我们提出了用于活动识别研究的“UbiSim”模拟器。UbiSim提供了一个3D图形用户界面,可以使用多个传感器来实现空间感知,包括那些检测运动、压力、振动、温度和接触的传感器,以及RFID标签和接收器。这些传感器的设计目的是为了验证虚拟空间中的碰撞,从而以最小的计算成本进行操作。我们提出的方法在虚拟环境中进行了测试。结果表明,该智能家居模拟器达到了实时性。
{"title":"UbiSim: Multiple Sensors Mounted Smart House Simulator Development","authors":"Wonsik Lee, Seoungjae Cho, Wei Song, Kyhyun Um, Kyungeun Cho","doi":"10.1109/DASC.2013.105","DOIUrl":"https://doi.org/10.1109/DASC.2013.105","url":null,"abstract":"It is essential for smart house researchers to have large datasets from actual environments. However, not all researchers have sufficient budgets to build test beds. These researchers need a simulator that can synthesize realistic sensory datasets. To solve this problem, we propose the 'UbiSim' simulator for activity recognition research. UbiSim provides a 3D graphical user interface to enable spatial perception using multiple sensors, including those that detect motion, pressure, vibration, temperature, and contact, along with RFID tags and receivers. The sensors are designed to verify collisions in a virtual space as a means to operate with minimal computational costs. Our proposed methods were tested in a virtual environment. The results show that the smart house simulator achieves real-time performance.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"27 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128260335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Emulation of Network Path Quality Indicators 网络路径质量指标仿真
Ruijie Ou, Wenyu Chen, WeiShun Li, LinLi Guo
The current network emulators commonly have bad versatility and their emulation fidelity is not high. Based on the principle of network emulation, this essay designs and implements a network path quality indicators emulation system, which can be transparently series deployed on a network path and change the performance of this path. The main tasks are: achieves a "Transparent Bridge" on Windows platform, using WinPcap packet capturer, gives the quality indicators emulation algorithms and models, studies the relationships between the indicators of network quality and the emulation algorithms has been improved and optimized based on this, designs, implements and verifies the emulation system. The emulation system has good cross-platform features, it achieves the frame-level emulation in the link layer, so it has a high fidelity.
目前的网络仿真器通用性差,仿真逼真度不高。本文基于网络仿真原理,设计并实现了一个网络路径质量指标仿真系统,该系统可以透明地串行部署在某条网络路径上,并改变该路径的性能。主要任务是:利用WinPcap包捕获器在Windows平台上实现一个“透明网桥”,给出了质量指标的仿真算法和模型,研究了网络质量指标与仿真算法之间的关系,并在此基础上对仿真算法进行了改进和优化,设计、实现并验证了仿真系统。仿真系统具有良好的跨平台特性,在链路层实现帧级仿真,具有较高的保真度。
{"title":"Emulation of Network Path Quality Indicators","authors":"Ruijie Ou, Wenyu Chen, WeiShun Li, LinLi Guo","doi":"10.1109/DASC.2013.91","DOIUrl":"https://doi.org/10.1109/DASC.2013.91","url":null,"abstract":"The current network emulators commonly have bad versatility and their emulation fidelity is not high. Based on the principle of network emulation, this essay designs and implements a network path quality indicators emulation system, which can be transparently series deployed on a network path and change the performance of this path. The main tasks are: achieves a \"Transparent Bridge\" on Windows platform, using WinPcap packet capturer, gives the quality indicators emulation algorithms and models, studies the relationships between the indicators of network quality and the emulation algorithms has been improved and optimized based on this, designs, implements and verifies the emulation system. The emulation system has good cross-platform features, it achieves the frame-level emulation in the link layer, so it has a high fidelity.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125883400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1