In this paper, we firstly propose the maximum local energy (MLE) method to calculate the low frequency coefficients of images and compare the results with those of mirror extended curve let transform, which enhance the edge features and details of images. An image fusion step was performed as follows: First, we obtained the coefficients of two different types of images through mirror extended curve let transform. Second, we selected the low frequency coefficients by maximum local energy and obtaining the high-frequency coefficients using the absolute maximum value (AMV) method. Finally, the fused image was obtained by performing an inverse mirror extended curve let transform. In addition to human vision analysis, the images were also compared through quantitative analysis. multifocus images were used in the experiments to compare the results among the beyond wavelets. The numerical experiments reveal that maximum local energy is a new strategy for attaining image fusion with satisfactory performance.
本文首先提出了最大局部能量法(maximum local energy, MLE)来计算图像的低频系数,并与镜面扩展曲线let变换的结果进行了比较,增强了图像的边缘特征和细节。图像融合步骤如下:首先,通过镜像扩展曲线let变换得到两种不同类型图像的系数;其次,利用最大局部能量选择低频系数,利用绝对最大值(AMV)法获得高频系数;最后,通过逆镜像扩展曲线let变换得到融合图像。除人眼视觉分析外,还通过定量分析对图像进行比较。实验中采用多聚焦图像,比较了不同小波之间的结果。数值实验表明,局部能量最大化是一种获得满意图像融合效果的新策略。
{"title":"Maximum Local Energy Based Multifocus Image Fusion in Mirror Extended Curvelet Transform Domain","authors":"Lifeng Zhang, Huimin Lu, Yujie Li, S. Serikawa","doi":"10.1109/SNPD.2012.16","DOIUrl":"https://doi.org/10.1109/SNPD.2012.16","url":null,"abstract":"In this paper, we firstly propose the maximum local energy (MLE) method to calculate the low frequency coefficients of images and compare the results with those of mirror extended curve let transform, which enhance the edge features and details of images. An image fusion step was performed as follows: First, we obtained the coefficients of two different types of images through mirror extended curve let transform. Second, we selected the low frequency coefficients by maximum local energy and obtaining the high-frequency coefficients using the absolute maximum value (AMV) method. Finally, the fused image was obtained by performing an inverse mirror extended curve let transform. In addition to human vision analysis, the images were also compared through quantitative analysis. multifocus images were used in the experiments to compare the results among the beyond wavelets. The numerical experiments reveal that maximum local energy is a new strategy for attaining image fusion with satisfactory performance.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114885305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The ability of robots to promptly avoid obstacles and reach a goal while accurately maintaining a formation is extremely important for many swarm robotic tasks such as terrain analysis, search and rescue, and chemical plume source tracing. In prior work, using simulation, we established how Physicomimetics can be used to maintain swarms of mobile robots in formations that move towards a goal through an obstacle field. In this paper, we demonstrate the obstacle avoidance capability of Physicomimetics control algorithm using two different mobile robot platforms with limited hardware, Maxelbot and X80Pro.
{"title":"Physicomimetics for Mobile Robot Obstacle Avoidance","authors":"S. Hettiarachchi, W. Spears","doi":"10.1109/SNPD.2012.136","DOIUrl":"https://doi.org/10.1109/SNPD.2012.136","url":null,"abstract":"The ability of robots to promptly avoid obstacles and reach a goal while accurately maintaining a formation is extremely important for many swarm robotic tasks such as terrain analysis, search and rescue, and chemical plume source tracing. In prior work, using simulation, we established how Physicomimetics can be used to maintain swarms of mobile robots in formations that move towards a goal through an obstacle field. In this paper, we demonstrate the obstacle avoidance capability of Physicomimetics control algorithm using two different mobile robot platforms with limited hardware, Maxelbot and X80Pro.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122739502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Tanimoto, Daisuke Sakurai, Yosiaki Seki, M. Iwashita, Hiroyuki Sato, Atsushi Kanai
In recent years, Ambient service has attracted attention as a ubiquitous, future intelligence infrastructure. The Ambient service provides service suitable for user needs automatically by making a sensor and a computer cooperate, and gathering and analyzing the information about each user. However, with the Ambient service, in order to manage personal information, various risks, such as an information leakage, are assumed. In this research, about a risk of being assumed with the Ambient service, it analyzes from a viewpoint by the side of service provision and service use, and clarifies the proposed measures. Specifically, risk breakdown structure and the risk matrix which are the typical risk management methods of project management were used. These results extracted 40 factors as a risk factor of the Ambient service. As the main feature of countermeasure, for Risk Transference, a countermeasure, such as preparing a third party's inspection on the service provision side, was proposed. Moreover, for Risk Mitigation, a countermeasure, such as a rule for a new specification corresponding to the Ambient service, was proposed. As mentioned above, the risk management of the Ambient service was proposed in this paper. A future subject is evaluating the effectiveness of the proposed countermeasure.
{"title":"Risk Management to User Perception of Insecurity in Ambient Service","authors":"S. Tanimoto, Daisuke Sakurai, Yosiaki Seki, M. Iwashita, Hiroyuki Sato, Atsushi Kanai","doi":"10.1109/SNPD.2012.91","DOIUrl":"https://doi.org/10.1109/SNPD.2012.91","url":null,"abstract":"In recent years, Ambient service has attracted attention as a ubiquitous, future intelligence infrastructure. The Ambient service provides service suitable for user needs automatically by making a sensor and a computer cooperate, and gathering and analyzing the information about each user. However, with the Ambient service, in order to manage personal information, various risks, such as an information leakage, are assumed. In this research, about a risk of being assumed with the Ambient service, it analyzes from a viewpoint by the side of service provision and service use, and clarifies the proposed measures. Specifically, risk breakdown structure and the risk matrix which are the typical risk management methods of project management were used. These results extracted 40 factors as a risk factor of the Ambient service. As the main feature of countermeasure, for Risk Transference, a countermeasure, such as preparing a third party's inspection on the service provision side, was proposed. Moreover, for Risk Mitigation, a countermeasure, such as a rule for a new specification corresponding to the Ambient service, was proposed. As mentioned above, the risk management of the Ambient service was proposed in this paper. A future subject is evaluating the effectiveness of the proposed countermeasure.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122777514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
No one is absolutely sure about cyber security as long as a communication system is connected to the internet, since internet is a wild that comprises all kind of people around the world from white hat to black hat. In other words, virtually any Internet connected system is vulnerable to major outrages from receiving a spam email to a botnet originated DDOS attack. But every individual, company and government wants to make sure that the security of their system is dependable so that they can use the outmost benefits of the twenty first century information society advantage. Since the problem is inevitable it very critical to understand the properties of this nefarious attacking machines from different perspective. In this paper we have developed a mathematical model to scrutinize the favouring and hindering factors for botnet propagation and growth. In addition we have proposed a detection and mitigation framework based on the model we developed.
{"title":"Understanding Botnet: From Mathematical Modelling to Integrated Detection and Mitigation Framework","authors":"Wang Yong, S. Tefera, Yonas Kibret Beshah","doi":"10.1109/SNPD.2012.78","DOIUrl":"https://doi.org/10.1109/SNPD.2012.78","url":null,"abstract":"No one is absolutely sure about cyber security as long as a communication system is connected to the internet, since internet is a wild that comprises all kind of people around the world from white hat to black hat. In other words, virtually any Internet connected system is vulnerable to major outrages from receiving a spam email to a botnet originated DDOS attack. But every individual, company and government wants to make sure that the security of their system is dependable so that they can use the outmost benefits of the twenty first century information society advantage. Since the problem is inevitable it very critical to understand the properties of this nefarious attacking machines from different perspective. In this paper we have developed a mathematical model to scrutinize the favouring and hindering factors for botnet propagation and growth. In addition we have proposed a detection and mitigation framework based on the model we developed.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124762461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Kawai, T. Yoshikawa, T. Furuhashi, E. Hirao, Ayako Kuno, T. Gotoh
Recently, the document information managed in companies tend to be more complex and various. Specification documents are used for the technical transfer and inheritance of manufactures and services. However, the description and the meaning of the component words in specifications are often inconsistent or multiple, because a specification document is made by the persons in charge of various parts. Then the readers may misunderstand the contents of specifications by them. This paper focuses on synonyms, multiple description of words for a meaning or a word, in specification documents and proposes an extraction method of them considering the co-occurrence words of component words. This paper applies the proposed method to a test data, in which some words in an actual specification document are replaced with another words, and studies the effectiveness of the proposed method.
{"title":"A Study on Extraction Method of Synonyms in Specification Documents","authors":"Y. Kawai, T. Yoshikawa, T. Furuhashi, E. Hirao, Ayako Kuno, T. Gotoh","doi":"10.1109/SNPD.2012.43","DOIUrl":"https://doi.org/10.1109/SNPD.2012.43","url":null,"abstract":"Recently, the document information managed in companies tend to be more complex and various. Specification documents are used for the technical transfer and inheritance of manufactures and services. However, the description and the meaning of the component words in specifications are often inconsistent or multiple, because a specification document is made by the persons in charge of various parts. Then the readers may misunderstand the contents of specifications by them. This paper focuses on synonyms, multiple description of words for a meaning or a word, in specification documents and proposes an extraction method of them considering the co-occurrence words of component words. This paper applies the proposed method to a test data, in which some words in an actual specification document are replaced with another words, and studies the effectiveness of the proposed method.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123103916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to avoid the problem of mismatch between the questioner and the respondent, we have conducted impression evaluation experiment and nine factors are obtained as a result. Then factor scores of any other statements have been tried to be estimated by using multiple regression analysis from feature values of statements. By adopting syntactic information of statements, word imageability and closing sentence expressions as the feature values, all the factor scores were well estimated. This paper tries to explain the estimation result with major feature values. The explanation is confirmed by comparing the features of the statements having high and low factor scores with the major features.
{"title":"Explaining Estimation of Factor Scores of Question and Answer Statements","authors":"Yuya Yokoyama, T. Hochin, Hiroki Nomiya, T. Satoh","doi":"10.1109/SNPD.2012.52","DOIUrl":"https://doi.org/10.1109/SNPD.2012.52","url":null,"abstract":"In order to avoid the problem of mismatch between the questioner and the respondent, we have conducted impression evaluation experiment and nine factors are obtained as a result. Then factor scores of any other statements have been tried to be estimated by using multiple regression analysis from feature values of statements. By adopting syntactic information of statements, word imageability and closing sentence expressions as the feature values, all the factor scores were well estimated. This paper tries to explain the estimation result with major feature values. The explanation is confirmed by comparing the features of the statements having high and low factor scores with the major features.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129542279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Service contracts function as interfaces which bridge IT implementation, business modeling, and economical analysis for service systems among various stakeholder from a holistic perspective. This paper conducts a review of recent research and practice on service contracts with focus on service contract content and service contract management. Dimensions of {Quality of data (QoD), Quality of service (QoS), Legal issue, Context, Business term} are introduced to evaluate service contract content. Dimensions of {Description of contract, Monitor/Control, Selection, Matchmaking, Composition} are introduced to evaluate service contract management Based on the survey, we propose possible directions for future efforts.
{"title":"A Survey on Service Contract","authors":"Yucong Duan","doi":"10.1109/SNPD.2012.22","DOIUrl":"https://doi.org/10.1109/SNPD.2012.22","url":null,"abstract":"Service contracts function as interfaces which bridge IT implementation, business modeling, and economical analysis for service systems among various stakeholder from a holistic perspective. This paper conducts a review of recent research and practice on service contracts with focus on service contract content and service contract management. Dimensions of {Quality of data (QoD), Quality of service (QoS), Legal issue, Context, Business term} are introduced to evaluate service contract content. Dimensions of {Description of contract, Monitor/Control, Selection, Matchmaking, Composition} are introduced to evaluate service contract management Based on the survey, we propose possible directions for future efforts.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132444351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The L2 shared cache is an important resource for multi-core system. The cache replacement algorithm of L2 shared cache is one of the key factors in judging whether the L2 shared cache of multi-core system is efficient. In this paper, we study shared-cache simulation for multi-core with the LRU2-MRU collaborative cache replacement algorithm. We propose a theoretical foundation for LRU2-MRU to show the property, test the stack distance of the LRU2-MRU algorithm. In addition, the simulation results demonstrate that the MPKI (misses per thousand instructions) of LRU2-MRU is lower than other cache replacement algorithm, and the miss ratio for shared-cache can be reduce through cache replacement algorithm optimization.
{"title":"Shared-Cache Simulation for Multi-core System with LRU2-MRU Collaborative Cache Replacement Algorithm","authors":"Shan Ding, Shiya Lui, Yuanyuan Li","doi":"10.1109/SNPD.2012.112","DOIUrl":"https://doi.org/10.1109/SNPD.2012.112","url":null,"abstract":"The L2 shared cache is an important resource for multi-core system. The cache replacement algorithm of L2 shared cache is one of the key factors in judging whether the L2 shared cache of multi-core system is efficient. In this paper, we study shared-cache simulation for multi-core with the LRU2-MRU collaborative cache replacement algorithm. We propose a theoretical foundation for LRU2-MRU to show the property, test the stack distance of the LRU2-MRU algorithm. In addition, the simulation results demonstrate that the MPKI (misses per thousand instructions) of LRU2-MRU is lower than other cache replacement algorithm, and the miss ratio for shared-cache can be reduce through cache replacement algorithm optimization.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134421647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Obfuscation methods were proposed for protecting programs from cracking. These methods convert program into incomprehensible one, such as change symbol names from meaningful to meaningless. As a result, secret information in the program can be hidden. However, obfuscation methods are not evaluated sufficiently. This paper evaluates incomprehensibility of the obfuscated programs using queue based virtual mental simulation model (VMSM) which is focused on short term memory in program comprehension. An experimental evaluation showed that VMSM was able to evaluate the incomprehensibility of data and control flow obfuscation methods.
{"title":"Program Incomprehensibility Evaluation for Obfuscation Methods with Queue-based Mental Simulation Model","authors":"Haruaki Tamada, Kazumasa Fukuda, Tomoya Yoshioka","doi":"10.1109/SNPD.2012.32","DOIUrl":"https://doi.org/10.1109/SNPD.2012.32","url":null,"abstract":"Obfuscation methods were proposed for protecting programs from cracking. These methods convert program into incomprehensible one, such as change symbol names from meaningful to meaningless. As a result, secret information in the program can be hidden. However, obfuscation methods are not evaluated sufficiently. This paper evaluates incomprehensibility of the obfuscated programs using queue based virtual mental simulation model (VMSM) which is focused on short term memory in program comprehension. An experimental evaluation showed that VMSM was able to evaluate the incomprehensibility of data and control flow obfuscation methods.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130747710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The percentage of U.S. consumers shopping and purchasing through the Internet is growing. The consumer has adapted to using the Internet to purchase products and retailers have profited from this new channel. Little is known about how a website provides competitive advantage to a retailer and what makes a website appealing to consumers. In order to address the gap in research that exists regarding why and how consumers identify with online apparel retailers, the purpose of this research is to examine the relationship between e-service quality (e.g., efficiency, fulfillment, and system availability) and consumer-company identification for online information search and purchase behavior.
{"title":"TAM's Application: E-service Quality Study in Online Apparel Store","authors":"R. Lee, P. Dion","doi":"10.1109/SNPD.2012.122","DOIUrl":"https://doi.org/10.1109/SNPD.2012.122","url":null,"abstract":"The percentage of U.S. consumers shopping and purchasing through the Internet is growing. The consumer has adapted to using the Internet to purchase products and retailers have profited from this new channel. Little is known about how a website provides competitive advantage to a retailer and what makes a website appealing to consumers. In order to address the gap in research that exists regarding why and how consumers identify with online apparel retailers, the purpose of this research is to examine the relationship between e-service quality (e.g., efficiency, fulfillment, and system availability) and consumer-company identification for online information search and purchase behavior.","PeriodicalId":387936,"journal":{"name":"2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131034496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}