首页 > 最新文献

Proceedings of the International Conference on Research in Adaptive and Convergent Systems最新文献

英文 中文
Gait Recognition for Human Identification using Kinect 使用Kinect的人体识别步态识别
Wonjin Kim, Yanggon Kim
Gait is a pattern of biometric movement for human identification. Unlike other biometrics such as fingerprint, iris, face, and voice recognition, human gait can be captured with unobtrusive method. In this paper, several measurements are proposed which uses body frame information in 3D space. Body frame data is generated from depth images captured using Kinect camera. The generated body frames are used for human gait analysis. The angle of lower body parts is measured in a gait cycle. In addition, the length of body parts is measured as a feature for combination with the angle measurements. The measurements are compared to each other from 5 subjects who have similar body type. The difference from comparison of the measurements indicates that the human gait has a potential pattern for human identification.
步态是一种用于人体识别的生物特征运动模式。与指纹、虹膜、面部和语音识别等其他生物识别技术不同,人类的步态可以用不显眼的方法捕获。本文提出了几种在三维空间中利用人体框架信息的测量方法。身体框架数据是由Kinect摄像头捕获的深度图像生成的。生成的身体框架用于人体步态分析。下半身的角度是用一个步态周期来测量的。此外,测量身体部位的长度作为与角度测量相结合的特征。测量结果将与5名体型相似的受试者进行比较。测量结果的对比差异表明,人类步态具有潜在的人类识别模式。
{"title":"Gait Recognition for Human Identification using Kinect","authors":"Wonjin Kim, Yanggon Kim","doi":"10.1145/3129676.3129715","DOIUrl":"https://doi.org/10.1145/3129676.3129715","url":null,"abstract":"Gait is a pattern of biometric movement for human identification. Unlike other biometrics such as fingerprint, iris, face, and voice recognition, human gait can be captured with unobtrusive method. In this paper, several measurements are proposed which uses body frame information in 3D space. Body frame data is generated from depth images captured using Kinect camera. The generated body frames are used for human gait analysis. The angle of lower body parts is measured in a gait cycle. In addition, the length of body parts is measured as a feature for combination with the angle measurements. The measurements are compared to each other from 5 subjects who have similar body type. The difference from comparison of the measurements indicates that the human gait has a potential pattern for human identification.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121024021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Applied Statistical Model and Remote Sensing for Decision Management System for Soybean 大豆决策管理系统的应用统计模型与遥感
M. Taheri, Dheeman Saha, Gary Hatfield, E. Byamukama, Sung Y. Shin
This paper proposes a Decision Management System to identify the white mold regions from the soybean fields using Autologistic Statistical Model (ASM) and Remote Sensing (RS) data analysis with commercially available Big Data sets as input data. In order to develop an identification model, numerous types of data need to be considered. In this study, the data that was used is satellite image pixel values, and data gathered from the field such as precipitation, yield, elevation, humidity, wind speed, wind direction and geospatial locations. The model evaluated the outcome using this information as input parameters and provided an overall estimation of the white mold region in the soybean fields. Based on the evaluation of the result, the accuracy rate of the proposed methods 84% which is a promising result due to the fact that each pixel of the satellite image is 30 by 30 meters.
本文提出了一种基于自统计模型(ASM)和遥感(RS)数据分析的大豆白霉区识别决策管理系统,该系统以商业大数据集为输入数据。为了开发识别模型,需要考虑许多类型的数据。本研究使用的数据为卫星图像像素值,以及从野外采集的降水、产量、高程、湿度、风速、风向、地理空间位置等数据。该模型利用这些信息作为输入参数,对结果进行了评估,并提供了大豆田中白霉菌区域的总体估计。通过对结果的评估,所提方法的准确率达到了84%,由于卫星图像的每个像素是30 × 30米,这是一个很有希望的结果。
{"title":"Applied Statistical Model and Remote Sensing for Decision Management System for Soybean","authors":"M. Taheri, Dheeman Saha, Gary Hatfield, E. Byamukama, Sung Y. Shin","doi":"10.1145/3129676.3129710","DOIUrl":"https://doi.org/10.1145/3129676.3129710","url":null,"abstract":"This paper proposes a Decision Management System to identify the white mold regions from the soybean fields using Autologistic Statistical Model (ASM) and Remote Sensing (RS) data analysis with commercially available Big Data sets as input data. In order to develop an identification model, numerous types of data need to be considered. In this study, the data that was used is satellite image pixel values, and data gathered from the field such as precipitation, yield, elevation, humidity, wind speed, wind direction and geospatial locations. The model evaluated the outcome using this information as input parameters and provided an overall estimation of the white mold region in the soybean fields. Based on the evaluation of the result, the accuracy rate of the proposed methods 84% which is a promising result due to the fact that each pixel of the satellite image is 30 by 30 meters.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125280192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Schedulability Analysis of Mode Change for Imprecise Computation on Multi-Core Platforms 多核平台上不精确计算模式变化的可调度性分析
C. Shih, Chang-Min Yang
Imprecise computation can enhance the responsiveness of computing systems but is rarely applied to embedded real-time systems due to its dynamic computation requirements. With the increasing needs of using image processing for multi-mode safety critical systems, it becomes desired on applying imprecise computation on such systems. In this paper, we extended the traditional schedulability analysis mechanisms on mode change to preemptive multi-core systems for imprecise computation so as to assure that there is no deadline miss between mode changes. The proposed method computes the mode change offset to delay the new mode up to a limit and assure that there is no deadline miss. To evaluate the schedulability of the proposed algorithms, we compare our approach with other works by simulation. The result shows that our analysis can increase schedulability by 15% to 30%, compared to the approach proposed by Lee and Shin in 2013. Moreover, the proposed approach increases the number of completed tasks during mode change up to 40%.
不精确计算可以提高计算系统的响应性,但由于其动态计算需求,很少应用于嵌入式实时系统。随着多模式安全关键系统对图像处理的需求日益增加,对多模式安全关键系统进行非精确计算成为一种需要。本文将传统的模式变换可调度性分析机制扩展到抢占式多核系统中,以保证模式变换之间不存在错过时间的情况。该方法通过计算模式变化偏移量来将新模式延迟到一定限度,并确保不会错过截止日期。为了评估所提出算法的可调度性,我们将该方法与其他工作进行了仿真比较。结果表明,与Lee和Shin在2013年提出的方法相比,我们的分析可以将可调度性提高15%到30%。此外,该方法将模式转换期间完成的任务数量增加了40%。
{"title":"Schedulability Analysis of Mode Change for Imprecise Computation on Multi-Core Platforms","authors":"C. Shih, Chang-Min Yang","doi":"10.1145/3129676.3129720","DOIUrl":"https://doi.org/10.1145/3129676.3129720","url":null,"abstract":"Imprecise computation can enhance the responsiveness of computing systems but is rarely applied to embedded real-time systems due to its dynamic computation requirements. With the increasing needs of using image processing for multi-mode safety critical systems, it becomes desired on applying imprecise computation on such systems. In this paper, we extended the traditional schedulability analysis mechanisms on mode change to preemptive multi-core systems for imprecise computation so as to assure that there is no deadline miss between mode changes. The proposed method computes the mode change offset to delay the new mode up to a limit and assure that there is no deadline miss. To evaluate the schedulability of the proposed algorithms, we compare our approach with other works by simulation. The result shows that our analysis can increase schedulability by 15% to 30%, compared to the approach proposed by Lee and Shin in 2013. Moreover, the proposed approach increases the number of completed tasks during mode change up to 40%.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122936235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implementing Hibernation-based Fast Booting as a Device Driver 实现基于休眠的快速启动作为设备驱动程序
Shiwu Lo, Yueyuan Zhang
The hibernation-based Linux fast booting method is often call the function "shrink_all_memory" in the Linux kernel, and this function is not exported to the kernel module. In this study, the fast booting is designed as a kernel module, so the same kernel module can be used in different versions of Linux kernel.
基于休眠的Linux快速启动方法通常在Linux内核中调用“shrink_all_memory”函数,该函数不导出到内核模块中。本研究将快速启动设计为一个内核模块,使得同一个内核模块可以在不同版本的Linux内核中使用。
{"title":"Implementing Hibernation-based Fast Booting as a Device Driver","authors":"Shiwu Lo, Yueyuan Zhang","doi":"10.1145/3129676.3129691","DOIUrl":"https://doi.org/10.1145/3129676.3129691","url":null,"abstract":"The hibernation-based Linux fast booting method is often call the function \"shrink_all_memory\" in the Linux kernel, and this function is not exported to the kernel module. In this study, the fast booting is designed as a kernel module, so the same kernel module can be used in different versions of Linux kernel.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126392581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparison on Sparse Coding and Moran's I Method for Image Denoising 稀疏编码与Moran’s I方法图像去噪的比较
M. Nguyen, C. Hung, Mingon Kang
Image denoising is crucial to improve the quality of image visual, their effects, and/ or facilitating image analysis and processing. Image noise can appear in many imaging applications such as remote sensing surveillance and assistant of medical surgery. Noises are often introduced during the image acquisition process when the image acquisition sensor is being interfered. Hence, the image denoising technique is commonly used to restore the original signal through the estimation and approximation. Recently, a sparse coding technique employing the dictionary learning method has been used for image denoising. In this study, we compare a recently proposed image denoising method called Moran's I Vector Median Filter (MIVMF) with the sparse coding method and a traditional scalar median filter for the impulse noise. In these preliminary results, the sparse coding does not give satisfactory results as what we expected. Instead, the MIVMF has the best denoising results.
图像去噪对于提高图像视觉质量、图像效果和/或便于图像分析和处理至关重要。图像噪声在遥感监测、医学手术辅助等许多成像应用中都会出现。在图像采集过程中,当图像采集传感器受到干扰时,往往会引入噪声。因此,通常使用图像去噪技术,通过估计和逼近来恢复原始信号。近年来,一种基于字典学习方法的稀疏编码技术被用于图像去噪。在这项研究中,我们比较了最近提出的一种称为Moran's I向量中值滤波器(MIVMF)的图像去噪方法与稀疏编码方法和传统的标量中值滤波器的脉冲噪声。在这些初步结果中,稀疏编码并没有得到预期的结果。相反,MIVMF具有最好的去噪效果。
{"title":"A Comparison on Sparse Coding and Moran's I Method for Image Denoising","authors":"M. Nguyen, C. Hung, Mingon Kang","doi":"10.1145/3129676.3129711","DOIUrl":"https://doi.org/10.1145/3129676.3129711","url":null,"abstract":"Image denoising is crucial to improve the quality of image visual, their effects, and/ or facilitating image analysis and processing. Image noise can appear in many imaging applications such as remote sensing surveillance and assistant of medical surgery. Noises are often introduced during the image acquisition process when the image acquisition sensor is being interfered. Hence, the image denoising technique is commonly used to restore the original signal through the estimation and approximation. Recently, a sparse coding technique employing the dictionary learning method has been used for image denoising. In this study, we compare a recently proposed image denoising method called Moran's I Vector Median Filter (MIVMF) with the sparse coding method and a traditional scalar median filter for the impulse noise. In these preliminary results, the sparse coding does not give satisfactory results as what we expected. Instead, the MIVMF has the best denoising results.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132355105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Tag Recommendation Method using Topic Modeling Approaches 基于主题建模方法的高效标签推荐方法
Beomseok Hong, Yanggon Kim, Sang Ho Lee
Software information sites such as Stack Overflow, Super User, and Ask Ubuntu allow users to post software-related questions, answer the questions asked by other users, and add tags to their questions. Tagging is a popular system across web communities because allowing users to classify their contents is less costly than employing an expert to categorize them. However, tagging systems suffer from the problem of the tag explosion and the tag synonym. To solve these problems, we propose a tag recommendation method using topic modeling approaches. Topic models have advantages of dimensionality reduction and document similarity. We also emphasize highest topics in calculating document similarity to retrieve more relevant documents. Our tag recommendation method considers the document similarity and the historical tag occurrence to calculate tag scores. Experiment results show that emphasizing highest topic distributions increases overall performance of tag recommendation.
软件信息网站,如Stack Overflow、Super User和Ask Ubuntu,允许用户发布与软件相关的问题,回答其他用户提出的问题,并为他们的问题添加标签。标签在网络社区中是一种流行的系统,因为允许用户对他们的内容进行分类比聘请专家进行分类要便宜。然而,标签系统存在标签爆炸和标签同义词的问题。为了解决这些问题,我们提出了一种使用主题建模方法的标签推荐方法。主题模型具有降维和文档相似的优点。我们还在计算文档相似度时强调最高主题,以检索更多相关文档。我们的标签推荐方法考虑文档相似度和历史标签出现率来计算标签分数。实验结果表明,强调最高主题分布可以提高标签推荐的整体性能。
{"title":"An Efficient Tag Recommendation Method using Topic Modeling Approaches","authors":"Beomseok Hong, Yanggon Kim, Sang Ho Lee","doi":"10.1145/3129676.3129709","DOIUrl":"https://doi.org/10.1145/3129676.3129709","url":null,"abstract":"Software information sites such as Stack Overflow, Super User, and Ask Ubuntu allow users to post software-related questions, answer the questions asked by other users, and add tags to their questions. Tagging is a popular system across web communities because allowing users to classify their contents is less costly than employing an expert to categorize them. However, tagging systems suffer from the problem of the tag explosion and the tag synonym. To solve these problems, we propose a tag recommendation method using topic modeling approaches. Topic models have advantages of dimensionality reduction and document similarity. We also emphasize highest topics in calculating document similarity to retrieve more relevant documents. Our tag recommendation method considers the document similarity and the historical tag occurrence to calculate tag scores. Experiment results show that emphasizing highest topic distributions increases overall performance of tag recommendation.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129258429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Automatic Ransomware Detection and Analysis Based on Dynamic API Calls Flow Graph 基于动态API调用流图的勒索软件自动检测与分析
Zhi-Guo Chen, Ho-Seok Kang, Shang-nan Yin, Sung-Ryul Kim
In recent cyber incidents, Ransom software (ransomware) causes a major threat to the security of computer systems. Consequently, ransomware detection has become a hot topic in computer security. Unfortunately, current signature-based and static detection model is often easily evadable by obfuscation, polymorphism, compress, and encryption. For overcoming the lack of signature-based and static ransomware detection approach, we have proposed the dynamic ransomware detection system using data mining techniques such as Random Forest (RF), Support Vector Machine (SVM), Simple Logistic (SL) and Naive Bayes (NB) algorithms for detecting known and unknown ransomware. We monitor the actual (dynamic) behaviors of software to generate API calls flow graphs (CFG) and transfer it in a feature space. Thereafter, data normalization and feature selection were applied to select informative features which are the best for discriminating between various categories of software and benign software. Finally, the data mining algorithms were used for building the detection model for judging whether the software is benign software or ransomware. Our experimental results show that our proposed system can be more effective to improve the performance for ransomware detection. Especially, the accuracy and detection rate of our proposed system with Simple Logistic (SL) algorithm can achieve to 98.2% and 97.6%, respectively. Meanwhile, the false positive rate also can be reduced to 1.2%.
在最近的网络事件中,勒索软件(ransomware)对计算机系统的安全造成了重大威胁。因此,勒索软件检测已成为计算机安全领域的研究热点。不幸的是,当前基于签名的静态检测模型通常很容易通过混淆、多态性、压缩和加密来规避。为了克服基于签名和静态勒索软件检测方法的不足,我们提出了使用随机森林(RF)、支持向量机(SVM)、简单逻辑(SL)和朴素贝叶斯(NB)算法等数据挖掘技术检测已知和未知勒索软件的动态勒索软件检测系统。我们监控软件的实际(动态)行为以生成API调用流图(CFG)并将其转移到特征空间中。然后,采用数据归一化和特征选择的方法,选择最适合区分各类软件和良性软件的信息特征。最后,利用数据挖掘算法建立检测模型,判断软件是良性软件还是勒索软件。实验结果表明,本文提出的系统可以更有效地提高勒索软件检测的性能。特别是采用Simple Logistic (SL)算法的系统,准确率和检测率分别达到98.2%和97.6%。同时,假阳性率也可以降低到1.2%。
{"title":"Automatic Ransomware Detection and Analysis Based on Dynamic API Calls Flow Graph","authors":"Zhi-Guo Chen, Ho-Seok Kang, Shang-nan Yin, Sung-Ryul Kim","doi":"10.1145/3129676.3129704","DOIUrl":"https://doi.org/10.1145/3129676.3129704","url":null,"abstract":"In recent cyber incidents, Ransom software (ransomware) causes a major threat to the security of computer systems. Consequently, ransomware detection has become a hot topic in computer security. Unfortunately, current signature-based and static detection model is often easily evadable by obfuscation, polymorphism, compress, and encryption. For overcoming the lack of signature-based and static ransomware detection approach, we have proposed the dynamic ransomware detection system using data mining techniques such as Random Forest (RF), Support Vector Machine (SVM), Simple Logistic (SL) and Naive Bayes (NB) algorithms for detecting known and unknown ransomware. We monitor the actual (dynamic) behaviors of software to generate API calls flow graphs (CFG) and transfer it in a feature space. Thereafter, data normalization and feature selection were applied to select informative features which are the best for discriminating between various categories of software and benign software. Finally, the data mining algorithms were used for building the detection model for judging whether the software is benign software or ransomware. Our experimental results show that our proposed system can be more effective to improve the performance for ransomware detection. Especially, the accuracy and detection rate of our proposed system with Simple Logistic (SL) algorithm can achieve to 98.2% and 97.6%, respectively. Meanwhile, the false positive rate also can be reduced to 1.2%.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131476727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
End-to-End Delay Minimization Approaches Using Software-Defined Networking 使用软件定义网络的端到端延迟最小化方法
Tommy Chin, M. Rahouti, Kaiqi Xiong
The design and development of an efficient wide-area communication and computing approach remains as one of the greatest challenges to harvest the gigantic volume of data for a variety of application service needs in smart cities. The data may be of a varied priority due to the different stages of application services. This paper explores and leverages Software Defined Networking (SDN) to develop a communication approach for data transfers in smart city applications. Specifically, we propose an efficient approach to minimizing the end-to-end delay for data transmission in an SDN infrastructure by using a Timestamp Recording method to compare the arrival and departure of flows and packets over a period of time. The proposed SDN-based approach is designed to be QoS-aware. Hence, network traffic can be delivered according to the priority level of the traffic service. Finally, we evaluate the proposed SDN-based approach on the Global Environment for Network Innovations (GENI) testbed. We compare the Timestamp Recording method to other common delay measurement techniques, and our analysis demonstrates the effectiveness and the proposed SDN-based approach at scale.
设计和开发高效的广域通信和计算方法仍然是获取智能城市中各种应用服务需求的海量数据的最大挑战之一。由于应用程序服务的不同阶段,数据可能具有不同的优先级。本文探讨并利用软件定义网络(SDN)开发智能城市应用中数据传输的通信方法。具体来说,我们提出了一种有效的方法,通过使用时间戳记录方法来比较一段时间内流和数据包的到达和离开,从而最大限度地减少SDN基础设施中数据传输的端到端延迟。所提出的基于sdn的方法被设计为qos感知。因此,可以根据流量业务的优先级来下发网络流量。最后,我们在全球网络创新环境(GENI)测试平台上评估了提出的基于sdn的方法。我们将时间戳记录方法与其他常见的延迟测量技术进行了比较,我们的分析证明了基于sdn的方法的有效性和规模性。
{"title":"End-to-End Delay Minimization Approaches Using Software-Defined Networking","authors":"Tommy Chin, M. Rahouti, Kaiqi Xiong","doi":"10.1145/3129676.3129731","DOIUrl":"https://doi.org/10.1145/3129676.3129731","url":null,"abstract":"The design and development of an efficient wide-area communication and computing approach remains as one of the greatest challenges to harvest the gigantic volume of data for a variety of application service needs in smart cities. The data may be of a varied priority due to the different stages of application services. This paper explores and leverages Software Defined Networking (SDN) to develop a communication approach for data transfers in smart city applications. Specifically, we propose an efficient approach to minimizing the end-to-end delay for data transmission in an SDN infrastructure by using a Timestamp Recording method to compare the arrival and departure of flows and packets over a period of time. The proposed SDN-based approach is designed to be QoS-aware. Hence, network traffic can be delivered according to the priority level of the traffic service. Finally, we evaluate the proposed SDN-based approach on the Global Environment for Network Innovations (GENI) testbed. We compare the Timestamp Recording method to other common delay measurement techniques, and our analysis demonstrates the effectiveness and the proposed SDN-based approach at scale.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121025683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Circular RNA Detection from High-throughput Sequencing 高通量测序的环状RNA检测
Mohamed Chaabane, E. Rouchka, J. Park
Alternative splicing refers to the production of multiple mRNA isoforms from a single gene due to alternative selection of exons or splice sites during pre-mRNA splicing. While canonical alternative splicing produces a linear form of RNA by joining an upstream donor site (5' splice site) with a downstream acceptor site (3' splice site), a special form of alternative splicing produces a non-coding circular form of RNA (circular RNA) by ligating a downstream donor site (5' splice site) with an upstream acceptor site (3' splice site); i.e., back-splicing. Over the past two decades, many studies have discovered this special form of alternative splicing that produces a circular form of RNA. Although these circular RNAs have garnered considerable attention in the scientific community for their biogenesis and functions, the focus of these studies has been on exonic circular RNAs (circRNAs: donor site and acceptor site are from exon boundaries) and circular intronic RNAs (ciRNAs: donor and acceptor are from a single intron). This type of approach was conducted in the relative absence of methods for searching another group of circular RNAs, or circular complex RNAs (ccRNAs: either the donor site or acceptor site is not from exon boundaries), that contains at least one exon and one or more flanking introns. Studies of ccRNAs would serve as a significant first step in filling this void. In this paper, we developed a new computational algorithm that can detect all three types of circular RNAs. We applied our algorithm on a set of RNA-seq data to examine the composition of circular RNAs in the given dataset. Surprisingly, our results showed that the new type of circular RNA (ccRNA) was the second most common type of circular RNA while circRNA was the most common type as expected.
选择性剪接是指在mRNA前剪接过程中,由于外显子或剪接位点的选择性选择,单个基因产生多个mRNA同种异构体。虽然典型的选择性剪接通过将上游供体位点(5'剪接位点)与下游受体位点(3'剪接位点)连接产生线性形式的RNA,但一种特殊形式的选择性剪接通过将下游供体位点(5'剪接位点)与上游受体位点(3'剪接位点)连接产生非编码环状RNA(环状RNA);例如,back-splicing。在过去的二十年里,许多研究已经发现了这种特殊形式的选择性剪接,它产生了环状RNA。尽管这些环状rna因其生物发生和功能在科学界引起了相当大的关注,但这些研究的重点一直是外显子环状rna (circRNAs:供体位点和受体位点来自外显子边界)和环状内含子rna (ciRNAs:供体和受体来自单个内含子)。这种方法是在相对缺乏搜索另一组环状rna或环状复杂rna (ccRNAs:供体位点或受体位点不来自外显子边界)的方法的情况下进行的,这些环状rna至少包含一个外显子和一个或多个侧翼内含子。对ccrna的研究将是填补这一空白的重要的第一步。在本文中,我们开发了一种新的计算算法,可以检测所有三种类型的环状rna。我们将算法应用于一组RNA-seq数据,以检查给定数据集中环状rna的组成。令人惊讶的是,我们的结果表明,新型环状RNA (ccRNA)是第二常见的环状RNA类型,而circRNA是最常见的环状RNA类型。
{"title":"Circular RNA Detection from High-throughput Sequencing","authors":"Mohamed Chaabane, E. Rouchka, J. Park","doi":"10.1145/3129676.3129734","DOIUrl":"https://doi.org/10.1145/3129676.3129734","url":null,"abstract":"Alternative splicing refers to the production of multiple mRNA isoforms from a single gene due to alternative selection of exons or splice sites during pre-mRNA splicing. While canonical alternative splicing produces a linear form of RNA by joining an upstream donor site (5' splice site) with a downstream acceptor site (3' splice site), a special form of alternative splicing produces a non-coding circular form of RNA (circular RNA) by ligating a downstream donor site (5' splice site) with an upstream acceptor site (3' splice site); i.e., back-splicing. Over the past two decades, many studies have discovered this special form of alternative splicing that produces a circular form of RNA. Although these circular RNAs have garnered considerable attention in the scientific community for their biogenesis and functions, the focus of these studies has been on exonic circular RNAs (circRNAs: donor site and acceptor site are from exon boundaries) and circular intronic RNAs (ciRNAs: donor and acceptor are from a single intron). This type of approach was conducted in the relative absence of methods for searching another group of circular RNAs, or circular complex RNAs (ccRNAs: either the donor site or acceptor site is not from exon boundaries), that contains at least one exon and one or more flanking introns. Studies of ccRNAs would serve as a significant first step in filling this void. In this paper, we developed a new computational algorithm that can detect all three types of circular RNAs. We applied our algorithm on a set of RNA-seq data to examine the composition of circular RNAs in the given dataset. Surprisingly, our results showed that the new type of circular RNA (ccRNA) was the second most common type of circular RNA while circRNA was the most common type as expected.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130094524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Squall: Stream Processing and Analysis Model Design 暴风:流处理与分析模型设计
J. An, J. Son, Jiwoo Kang
Recently, the importance of velocity, one of the characteristics of big data (5V: Volume, Variety, Velocity, Veracity, and Value), has been emphasized in the data processing, which has led to several studies on the real-time stream processing, a technology for quick and accurate processing and analyses of big data. In this study, we propose a Squall framework using in-memory technology. Moreover, we provide a description of Squall framework and its operations. This Squall framework can support the real-time event stream processing and micro-batch processing, showing high performance and memory efficiency for stream processing using Go's excellent concurrency and GC (Garbage Collection) available without a virtual machine. Therefore, you can run many jobs on one machine. In addition, the data flows through the memory, the number of operation steps are incorporated to improve the performance. It provides relatively good performance compared to existing Apache Storm and spark streaming. In conclusion, it can be used as a general-purpose big data processing framework because it can overcome the drawbacks of existing Apache storm or Spark streaming by introducing the advantages of Go language.
近年来,大数据(Volume, Variety, velocity, Veracity, Value)的特征之一——速度(velocity)在数据处理中的重要性得到了强调,从而导致了对实时流处理(real-time stream processing)的研究,实时流处理是一种快速准确地处理和分析大数据的技术。在这项研究中,我们提出了一个使用内存技术的Squall框架。此外,我们还提供了Squall框架及其操作的描述。Squall框架可以支持实时事件流处理和微批处理,利用Go出色的并发性和GC(垃圾收集)功能,在不需要虚拟机的情况下,显示出流处理的高性能和内存效率。因此,您可以在一台机器上运行多个作业。此外,将流经内存的数据、操作步骤的数量结合起来,提高了性能。与现有的Apache Storm和spark streaming相比,它提供了相对较好的性能。综上所述,它可以作为一个通用的大数据处理框架,因为它可以通过引入Go语言的优点来克服现有Apache storm或Spark streaming的缺点。
{"title":"Squall: Stream Processing and Analysis Model Design","authors":"J. An, J. Son, Jiwoo Kang","doi":"10.1145/3129676.3129707","DOIUrl":"https://doi.org/10.1145/3129676.3129707","url":null,"abstract":"Recently, the importance of velocity, one of the characteristics of big data (5V: Volume, Variety, Velocity, Veracity, and Value), has been emphasized in the data processing, which has led to several studies on the real-time stream processing, a technology for quick and accurate processing and analyses of big data. In this study, we propose a Squall framework using in-memory technology. Moreover, we provide a description of Squall framework and its operations. This Squall framework can support the real-time event stream processing and micro-batch processing, showing high performance and memory efficiency for stream processing using Go's excellent concurrency and GC (Garbage Collection) available without a virtual machine. Therefore, you can run many jobs on one machine. In addition, the data flows through the memory, the number of operation steps are incorporated to improve the performance. It provides relatively good performance compared to existing Apache Storm and spark streaming. In conclusion, it can be used as a general-purpose big data processing framework because it can overcome the drawbacks of existing Apache storm or Spark streaming by introducing the advantages of Go language.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128751891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the International Conference on Research in Adaptive and Convergent Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1