首页 > 最新文献

Proceedings of the International Conference on Research in Adaptive and Convergent Systems最新文献

英文 中文
Development of Inter-Leaves Weed and Plant Regions Identification Algorithm using Histogram of Oriented Gradient and K-Means Clustering 基于定向梯度直方图和k均值聚类的叶间杂草和植物区识别算法研究
Dheeman Saha, George Hamer, Ji Young Lee
This paper proposes a weed detection mechanism, where the carrot leaves are segmented from the weeds (mostly Chamomile). In the early stage, both weeds and carrot leaves are intermixed with each other and have similar color texture. This makes it difficult to identify without the help of the domain experts. Therefore, it is essential to remove the weed regions so that the carrot plants can grow without any interruptions. The process of identifying the weeds become more challenging when both plant and weed regions overlap (inter-leaves). The proposed method takes account of this problem and breaks down the identification mechanism into three major components: Image Segmentation, Feature Extraction, and Classification. In the Image Segmentation stage, K-Means clustering is applied to select the images that will be used for the identification purpose. Next, in the Feature Extraction stage structural information of the weed and leaves will be extracted from the lower unit images. Furthermore, to extract the information from the Region of Interest (ROI), Histogram of Oriented Gradient (HoG) is used to locate and label all the weed and carrot leaves regions. In the Classification stage, Support Vector Machine (SVM) analyzes all the information and labels the regions. This method of weed detection is effective as it automates the identification process and fewer herbicides will be used, which in-turn benefits the environment. The proposed method successfully classifies the plant regions at a success rate of 92% using an open dataset and outperformed some of the previous approaches.
本文提出了一种杂草检测机制,其中胡萝卜叶从杂草(主要是洋甘菊)中分离出来。在早期,杂草和胡萝卜的叶子混合在一起,颜色纹理相似。这使得在没有领域专家帮助的情况下很难进行识别。因此,必须清除杂草区域,这样胡萝卜植物才能不受任何干扰地生长。当植物和杂草区域重叠(叶间)时,识别杂草的过程变得更具挑战性。该方法考虑了这一问题,并将识别机制分为三个主要部分:图像分割、特征提取和分类。在图像分割阶段,使用K-Means聚类来选择用于识别目的的图像。接下来,在Feature Extraction阶段,将在下面的单元图像中提取杂草和叶子的结构信息。此外,为了从感兴趣区域(ROI)中提取信息,利用定向梯度直方图(HoG)对杂草和胡萝卜叶子的所有区域进行定位和标记。在分类阶段,支持向量机(SVM)分析所有信息并标记区域。这种杂草检测方法是有效的,因为它使识别过程自动化,使用的除草剂更少,这反过来又有利于环境。该方法使用开放数据集对植物区域进行分类,成功率达92%,优于以往的一些方法。
{"title":"Development of Inter-Leaves Weed and Plant Regions Identification Algorithm using Histogram of Oriented Gradient and K-Means Clustering","authors":"Dheeman Saha, George Hamer, Ji Young Lee","doi":"10.1145/3129676.3129700","DOIUrl":"https://doi.org/10.1145/3129676.3129700","url":null,"abstract":"This paper proposes a weed detection mechanism, where the carrot leaves are segmented from the weeds (mostly Chamomile). In the early stage, both weeds and carrot leaves are intermixed with each other and have similar color texture. This makes it difficult to identify without the help of the domain experts. Therefore, it is essential to remove the weed regions so that the carrot plants can grow without any interruptions. The process of identifying the weeds become more challenging when both plant and weed regions overlap (inter-leaves). The proposed method takes account of this problem and breaks down the identification mechanism into three major components: Image Segmentation, Feature Extraction, and Classification. In the Image Segmentation stage, K-Means clustering is applied to select the images that will be used for the identification purpose. Next, in the Feature Extraction stage structural information of the weed and leaves will be extracted from the lower unit images. Furthermore, to extract the information from the Region of Interest (ROI), Histogram of Oriented Gradient (HoG) is used to locate and label all the weed and carrot leaves regions. In the Classification stage, Support Vector Machine (SVM) analyzes all the information and labels the regions. This method of weed detection is effective as it automates the identification process and fewer herbicides will be used, which in-turn benefits the environment. The proposed method successfully classifies the plant regions at a success rate of 92% using an open dataset and outperformed some of the previous approaches.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127339492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reducing Dimensionality Using NMF Based Cholesky Decomposition 基于NMF的Cholesky分解降维方法
Jasem M. Alostad
This paper aims to resolve the problem associated with increased data dimensionality in datasets using modified Non-integer Matrix Factorization (NMF). Further, the increased dimensionality arising due to non-orthogonally from NMF is resolved using Cholesky decomposition (cd-NMF). The cd-NMF is used to extract the feature vector from the dataset and the data vector is linearly mapped from upper triangular matrix obtained from the Cholesky decomposition. The experiment is validated in terms of accuracy and normalized mutual information metrics again three different text databases with varied patterns. Further, the results proves that the proposed technique fits well with larger instances in finding the documents as per the query, than NMF, NPNMF, MM-NMF, RNMF, GNMF, HNMF and cd-NMF.
本文旨在利用改进的非整数矩阵分解(NMF)来解决数据集中数据维数增加的问题。此外,使用Cholesky分解(cd-NMF)解决了由NMF引起的非正交增加的维数。利用cd-NMF从数据集中提取特征向量,并将Cholesky分解得到的上三角矩阵线性映射到数据向量上。实验在准确性和规范化互信息度量方面进行了验证,再次在三个不同模式的文本数据库中。结果表明,与NMF、NPNMF、MM-NMF、RNMF、GNMF、HNMF和cd-NMF相比,该方法更适合于更大的搜索实例。
{"title":"Reducing Dimensionality Using NMF Based Cholesky Decomposition","authors":"Jasem M. Alostad","doi":"10.1145/3129676.3129697","DOIUrl":"https://doi.org/10.1145/3129676.3129697","url":null,"abstract":"This paper aims to resolve the problem associated with increased data dimensionality in datasets using modified Non-integer Matrix Factorization (NMF). Further, the increased dimensionality arising due to non-orthogonally from NMF is resolved using Cholesky decomposition (cd-NMF). The cd-NMF is used to extract the feature vector from the dataset and the data vector is linearly mapped from upper triangular matrix obtained from the Cholesky decomposition. The experiment is validated in terms of accuracy and normalized mutual information metrics again three different text databases with varied patterns. Further, the results proves that the proposed technique fits well with larger instances in finding the documents as per the query, than NMF, NPNMF, MM-NMF, RNMF, GNMF, HNMF and cd-NMF.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126876169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Fair Scheduling Algorithm for Multiprocessor Systems Using a Task Satisfaction Index 基于任务满意度指标的多处理机系统公平调度算法
Jinmang Jung, Jongho Shin, Jiman Hong, Jinwoo Lee, Tei-Wei Kuo
With the emergence of increasingly heterogeneous devices and networks, computing systems are required to support a variety of services with different quality of service requirements. The degree of heterogeneity makes it more difficult to fairly allocate resources based on the client's weight. Moreover, as the systems become larger, their performance can worsen significantly. In this paper, we present a fair scheduling algorithm for multiprocessor systems using a task satisfaction index. The proposed algorithm, called LZF, aims to achieve a high level of proportional fairness for the heterogeneous tasks. The evaluation results show that its service time error is bounded between -1 and 1, and the LZF achieves the best proportional fairness among existing scheduling algorithms with respect to the average service time error.
随着异构设备和网络的日益增多,计算系统需要支持各种业务,对服务质量有不同的要求。这种异质性的程度使得根据客户的权重公平分配资源变得更加困难。此外,随着系统变得更大,它们的性能可能会显著恶化。本文提出了一种基于任务满意度指标的多处理机系统公平调度算法。该算法被称为LZF,旨在为异构任务实现高水平的比例公平性。评价结果表明,LZF算法的服务时间误差在-1 ~ 1之间有界,相对于平均服务时间误差,LZF算法在现有调度算法中达到了最好的比例公平性。
{"title":"A Fair Scheduling Algorithm for Multiprocessor Systems Using a Task Satisfaction Index","authors":"Jinmang Jung, Jongho Shin, Jiman Hong, Jinwoo Lee, Tei-Wei Kuo","doi":"10.1145/3129676.3129736","DOIUrl":"https://doi.org/10.1145/3129676.3129736","url":null,"abstract":"With the emergence of increasingly heterogeneous devices and networks, computing systems are required to support a variety of services with different quality of service requirements. The degree of heterogeneity makes it more difficult to fairly allocate resources based on the client's weight. Moreover, as the systems become larger, their performance can worsen significantly. In this paper, we present a fair scheduling algorithm for multiprocessor systems using a task satisfaction index. The proposed algorithm, called LZF, aims to achieve a high level of proportional fairness for the heterogeneous tasks. The evaluation results show that its service time error is bounded between -1 and 1, and the LZF achieves the best proportional fairness among existing scheduling algorithms with respect to the average service time error.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132962496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Internal Quality to External Quality: an Approach to Manage Conflicts 内部质量到外部质量:一种管理冲突的方法
S. Kalra, T. Prabhakar
Software Quality Attributes (QAs) can be categorised as either internal to the system as experienced by the developers or external to the system perceived by the end users. These QA categories have trade-off among them - an emphasis on internal QA may result in a compromise of an external QA. For example, there is a trade-off between maintainability and performance. Model-driven development approaches manage this trade-off and increase the degree of internal QA maintainability. In this work, we propose an ontology-based communication mechanism among software components to handle the trade-off. The approach increases the degree of internal QAs such as modifiability, maintainability, testability during the design and development phases without compromising the external QAs for the end users during the operation phase. We also evaluate a prototype system to validate the proposed approach using Software Architecture Analysis Method (SAAM). It is also easier to integrate into the software development life cycle as compared to existing model-driven approaches.
软件质量属性(qa)可以分为开发人员体验到的系统内部属性和最终用户感知到的系统外部属性。这些QA类别之间存在权衡——强调内部QA可能会导致外部QA的妥协。例如,在可维护性和性能之间存在权衡。模型驱动的开发方法管理了这种权衡,并增加了内部QA可维护性的程度。在这项工作中,我们提出了一种基于本体的软件组件之间的通信机制来处理权衡。该方法增加了内部qa的程度,如设计和开发阶段的可修改性、可维护性、可测试性,而不会在操作阶段损害最终用户的外部qa。我们还评估了一个原型系统,以验证使用软件架构分析方法(SAAM)提出的方法。与现有的模型驱动方法相比,它也更容易集成到软件开发生命周期中。
{"title":"Internal Quality to External Quality: an Approach to Manage Conflicts","authors":"S. Kalra, T. Prabhakar","doi":"10.1145/3129676.3129714","DOIUrl":"https://doi.org/10.1145/3129676.3129714","url":null,"abstract":"Software Quality Attributes (QAs) can be categorised as either internal to the system as experienced by the developers or external to the system perceived by the end users. These QA categories have trade-off among them - an emphasis on internal QA may result in a compromise of an external QA. For example, there is a trade-off between maintainability and performance. Model-driven development approaches manage this trade-off and increase the degree of internal QA maintainability. In this work, we propose an ontology-based communication mechanism among software components to handle the trade-off. The approach increases the degree of internal QAs such as modifiability, maintainability, testability during the design and development phases without compromising the external QAs for the end users during the operation phase. We also evaluate a prototype system to validate the proposed approach using Software Architecture Analysis Method (SAAM). It is also easier to integrate into the software development life cycle as compared to existing model-driven approaches.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133581735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Prediction Comparison by Time Series Analysis Model of Load Big data 负荷大数据时间序列分析模型预测比较研究
Jaehyung Kim, Taehyoung Kim, K. Ham
As energy supply changes become more important, interest in the field of efficient energy management is increasing. In this paper, demand forecasting is performed through time series analysis of power big data. And we measured the performance through predictive comparison of time series prediction model.
随着能源供应的变化变得越来越重要,人们对高效能源管理领域的兴趣日益增加。本文通过电力大数据的时间序列分析进行需求预测。并通过时间序列预测模型的预测比较来衡量其性能。
{"title":"A Study on Prediction Comparison by Time Series Analysis Model of Load Big data","authors":"Jaehyung Kim, Taehyoung Kim, K. Ham","doi":"10.1145/3129676.3129719","DOIUrl":"https://doi.org/10.1145/3129676.3129719","url":null,"abstract":"As energy supply changes become more important, interest in the field of efficient energy management is increasing. In this paper, demand forecasting is performed through time series analysis of power big data. And we measured the performance through predictive comparison of time series prediction model.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124148946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of single and deep long short-term memory for single object tracking 单一与深度长短期记忆对单一目标追踪的比较
KangUn Jo, Jung-Hui Im, Dae-Shik Kim
Long short-term memory (LSTM) is widely used for processing time sequence data like language and human skeletal data, and its importance is continuously increasing. In particular, recent studies have shown that higher performance can be obtained by using deep LSTM instead of single LSTM for language processing and action recognition tasks. In this paper, we compared the performance between single LSTM and deep LSTM for a different time sequence processing task, single object tracking. We verified that using deep LSTM can significantly improve the performance compared to single LSTM. This implies that deep LSTM is an effective model to overcome current technical limitations such as object deformation and occlusion. We expect this study will lead to the development of a stable tracker robust to object deformation and occlusion in the near future.
长短期记忆(LSTM)被广泛应用于语言和人体骨骼数据等时间序列数据的处理,其重要性不断提高。特别是,最近的研究表明,在语言处理和动作识别任务中,使用深度LSTM而不是单一LSTM可以获得更高的性能。在本文中,我们比较了单一LSTM和深度LSTM在不同时间序列处理任务单目标跟踪中的性能。我们验证了与单个LSTM相比,使用深度LSTM可以显着提高性能。这意味着深度LSTM是克服当前技术限制(如物体变形和遮挡)的有效模型。我们期望这项研究将在不久的将来导致对物体变形和遮挡具有鲁棒性的稳定跟踪器的发展。
{"title":"Comparison of single and deep long short-term memory for single object tracking","authors":"KangUn Jo, Jung-Hui Im, Dae-Shik Kim","doi":"10.1145/3129676.3129681","DOIUrl":"https://doi.org/10.1145/3129676.3129681","url":null,"abstract":"Long short-term memory (LSTM) is widely used for processing time sequence data like language and human skeletal data, and its importance is continuously increasing. In particular, recent studies have shown that higher performance can be obtained by using deep LSTM instead of single LSTM for language processing and action recognition tasks. In this paper, we compared the performance between single LSTM and deep LSTM for a different time sequence processing task, single object tracking. We verified that using deep LSTM can significantly improve the performance compared to single LSTM. This implies that deep LSTM is an effective model to overcome current technical limitations such as object deformation and occlusion. We expect this study will lead to the development of a stable tracker robust to object deformation and occlusion in the near future.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124167338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Memory Size on Bigdata Processing based on Hadoop and Spark 基于Hadoop和Spark的内存大小对大数据处理的影响
Seunghye Han, Wonseok Choi, Rayan Muwafiq, Yunmook Nah
Hadoop and Spark are well-known big data processing platforms. The main technologies of Hadoop are Hadoop Distributed File System and MapReduce processing. Hadoop stores intermediary data on Hadoop Distributed File System, which is a disk-based distributed file system, while Spark stores intermediary data in the memories of distributed computing nodes as Resilient Distributed Dataset. In this paper, we show how memory size affects distributed processing of large volume of data, by comparing the running time of K-means algorithm of HiBench benchmark on Hadoop and Spark clusters, with different size of memories allocated to data nodes. Our results show that Spark cluster is faster than Hadoop cluster as long as the memory size is big enough for the data size. But, with the increase of the data size, Hadoop cluster outperforms Spark cluster. When data size is bigger than memory cache, Spark has to replace disk data with memory cached data, and this situation causes performance degradation.
Hadoop和Spark是知名的大数据处理平台。Hadoop的主要技术是Hadoop分布式文件系统和MapReduce处理。Hadoop将中间数据存储在基于磁盘的分布式文件系统Hadoop Distributed File System中,而Spark将中间数据存储在分布式计算节点的内存中,称为弹性分布式数据集(Resilient Distributed Dataset)。在本文中,我们通过比较HiBench基准K-means算法在Hadoop和Spark集群上,在分配给数据节点的内存大小不同的情况下的运行时间,展示了内存大小如何影响大数据量的分布式处理。我们的结果表明,只要内存大小足够大,Spark集群就比Hadoop集群快。但是,随着数据量的增加,Hadoop集群优于Spark集群。当数据大于内存缓存时,Spark需要将磁盘数据替换为内存缓存数据,这会导致性能下降。
{"title":"Impact of Memory Size on Bigdata Processing based on Hadoop and Spark","authors":"Seunghye Han, Wonseok Choi, Rayan Muwafiq, Yunmook Nah","doi":"10.1145/3129676.3129688","DOIUrl":"https://doi.org/10.1145/3129676.3129688","url":null,"abstract":"Hadoop and Spark are well-known big data processing platforms. The main technologies of Hadoop are Hadoop Distributed File System and MapReduce processing. Hadoop stores intermediary data on Hadoop Distributed File System, which is a disk-based distributed file system, while Spark stores intermediary data in the memories of distributed computing nodes as Resilient Distributed Dataset. In this paper, we show how memory size affects distributed processing of large volume of data, by comparing the running time of K-means algorithm of HiBench benchmark on Hadoop and Spark clusters, with different size of memories allocated to data nodes. Our results show that Spark cluster is faster than Hadoop cluster as long as the memory size is big enough for the data size. But, with the increase of the data size, Hadoop cluster outperforms Spark cluster. When data size is bigger than memory cache, Spark has to replace disk data with memory cached data, and this situation causes performance degradation.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124441728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Whitelist for Analyzing Android Malware Android恶意软件分析白名单
Kyoungmin Kim, Jeonghwan Lee, Seonguk Lee, Jiman Hong
The number of malicious code targeting the Android platform is increasing day by day. The biggest difficulty in analyzing the malicious code is the large amount of source code that needs to be analyzed. The larger the size of the source code, the longer the analyzing time and the longer the analyzing time, the less accurate the result of the analysis. Generally, the Android application programmers tend to use a lot of 3rd party libraries and it causes the size of the source code to increase. The use of 3rd-party library has the advantage of allowing programmers to easily develop applications, but it has the disadvantage of including unnecessary codes in the source code. For analyzing a Android application efficiently it would be better exclude well known normal code, which is called, white list from the original source code. In this paper, we present the Whitelist for Android applications. The Whitelist contains feature information from the 3rd-party library known as normal. It can be used for reducing the amount of source code to by analyzed when a Malware Analyst analyze the malicious codes in Android applications. Experiments show that the number of methods to analyze when using malicious code using Whitelist Database is greatly reduced and analysis time can be shortened.
针对Android平台的恶意代码数量日益增加。分析恶意代码的最大困难是需要分析大量的源代码。源代码的大小越大,分析时间就越长,分析时间越长,分析结果就越不准确。通常,Android应用程序程序员倾向于使用大量第三方库,这导致源代码的大小增加。使用第三方库的优点是允许程序员轻松地开发应用程序,但缺点是在源代码中包含不必要的代码。为了有效地分析Android应用程序,最好从原始源代码中排除众所周知的正常代码,即白名单。在本文中,我们提出了Android应用的白名单。白名单包含来自称为normal的第三方库的特性信息。当恶意软件分析师分析Android应用程序中的恶意代码时,它可以用于减少要分析的源代码数量。实验表明,使用白名单数据库可以大大减少恶意代码分析方法的数量,缩短分析时间。
{"title":"Whitelist for Analyzing Android Malware","authors":"Kyoungmin Kim, Jeonghwan Lee, Seonguk Lee, Jiman Hong","doi":"10.1145/3129676.3129726","DOIUrl":"https://doi.org/10.1145/3129676.3129726","url":null,"abstract":"The number of malicious code targeting the Android platform is increasing day by day. The biggest difficulty in analyzing the malicious code is the large amount of source code that needs to be analyzed. The larger the size of the source code, the longer the analyzing time and the longer the analyzing time, the less accurate the result of the analysis. Generally, the Android application programmers tend to use a lot of 3rd party libraries and it causes the size of the source code to increase. The use of 3rd-party library has the advantage of allowing programmers to easily develop applications, but it has the disadvantage of including unnecessary codes in the source code. For analyzing a Android application efficiently it would be better exclude well known normal code, which is called, white list from the original source code. In this paper, we present the Whitelist for Android applications. The Whitelist contains feature information from the 3rd-party library known as normal. It can be used for reducing the amount of source code to by analyzed when a Malware Analyst analyze the malicious codes in Android applications. Experiments show that the number of methods to analyze when using malicious code using Whitelist Database is greatly reduced and analysis time can be shortened.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116963856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MR images-Based Microwave Focusing for Thermal Therapy 基于MR图像的微波聚焦热疗
Kwang-Jae Lee, Jang‐Yeol Kim, Seong‐Ho Son, Seok-Jae Kang
A microwave (MW) focusing technique for non-invasive thermal therapy is presented. The proposed technique provides a thermal focusing at localized tissues as a cancer tissue and a deep tissue for muscular disorder treatment. We employed a time reversal technique for the targeted MW focusing and computational solvers for electromagnetic and thermal analysis are developed. To verify the proposed technique, we applied to an anatomically electromagnetic model based on magnetic resonance images. This work is a computational study to predict performances of the MW focusing system in our future work.
提出了一种用于无创热疗的微波聚焦技术。该技术提供了局部组织的热聚焦,如癌症组织和深层组织,用于肌肉疾病的治疗。我们采用了时间反转技术进行目标微波聚焦,并开发了用于电磁和热分析的计算求解器。为了验证所提出的技术,我们应用于基于磁共振图像的解剖电磁模型。本工作是对微波聚焦系统性能进行预测的一项计算研究。
{"title":"MR images-Based Microwave Focusing for Thermal Therapy","authors":"Kwang-Jae Lee, Jang‐Yeol Kim, Seong‐Ho Son, Seok-Jae Kang","doi":"10.1145/3129676.3129728","DOIUrl":"https://doi.org/10.1145/3129676.3129728","url":null,"abstract":"A microwave (MW) focusing technique for non-invasive thermal therapy is presented. The proposed technique provides a thermal focusing at localized tissues as a cancer tissue and a deep tissue for muscular disorder treatment. We employed a time reversal technique for the targeted MW focusing and computational solvers for electromagnetic and thermal analysis are developed. To verify the proposed technique, we applied to an anatomically electromagnetic model based on magnetic resonance images. This work is a computational study to predict performances of the MW focusing system in our future work.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116487064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mining intrusion detection rules with longest increasing subsequences of q-grams 利用q-g最长递增子序列挖掘入侵检测规则
Inbok Lee, Sung-il Oh
Intrusion detection has been a major issue in network security. Signature-based intrusion systems use intrusion detection rules for detecting intrusion. However, writing intrusion detection rules is difficult and requires a considerable knowledge on various fields. Also attackers can modify previous attacks to escape intrusion detection rules. In this paper we deal with the problem of detecting "modified" attacks using original intrusion detection rules. We show a simple method of reporting substrings in the network stream which have approximate matches with at least one of the network intrusion detection rules, based on the notion of q-grams and the longest increasing subsequences. Experimental results showed that our approach can detect modified attacks, which are modeled as strings which can match the intrusion detection rules after edit operations.
入侵检测一直是网络安全中的一个主要问题。基于签名的入侵系统采用入侵检测规则对入侵进行检测。然而,编写入侵检测规则是困难的,并且需要在各个领域有相当多的知识。攻击者也可以修改之前的攻击来逃避入侵检测规则。本文研究了利用原始入侵检测规则检测“修改”攻击的问题。基于q-grams和最长递增子序列的概念,我们展示了一种简单的方法来报告网络流中与至少一个网络入侵检测规则近似匹配的子字符串。实验结果表明,该方法可以检测到修改后的攻击,并将修改后的攻击建模为字符串,与入侵检测规则相匹配。
{"title":"Mining intrusion detection rules with longest increasing subsequences of q-grams","authors":"Inbok Lee, Sung-il Oh","doi":"10.1145/3129676.3129724","DOIUrl":"https://doi.org/10.1145/3129676.3129724","url":null,"abstract":"Intrusion detection has been a major issue in network security. Signature-based intrusion systems use intrusion detection rules for detecting intrusion. However, writing intrusion detection rules is difficult and requires a considerable knowledge on various fields. Also attackers can modify previous attacks to escape intrusion detection rules. In this paper we deal with the problem of detecting \"modified\" attacks using original intrusion detection rules. We show a simple method of reporting substrings in the network stream which have approximate matches with at least one of the network intrusion detection rules, based on the notion of q-grams and the longest increasing subsequences. Experimental results showed that our approach can detect modified attacks, which are modeled as strings which can match the intrusion detection rules after edit operations.","PeriodicalId":326100,"journal":{"name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127308504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the International Conference on Research in Adaptive and Convergent Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1