首页 > 最新文献

Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media最新文献

英文 中文
A Scheduling Method to Enable Fast-forwarding for Selective Contents Broadcasting 一种选择性内容广播快速转发的调度方法
D. Fukui, Y. Gotoh
In selective contents broadcasting, i.e., watching contents users selected themselves, the server can deliver several contents to many users. However, when users watch the data continuously, waiting time is occurred by decreasing the available bandwidth and increasing the number of contents. Therefore, many researchers have proposed the scheduling methods to reduce the waiting time. Although the conventional method reduces waiting time by producing the broadcast schedule in fast-forwarding, that for playing contents in normal playback becomes lengthened. In this paper, we propose a scheduling method to enable fast-forwarding for selective contents broadcasting. Our proposed method sets the number of channels based on the configuration of the program and the available bandwidth. In addition, waiting time can be reduced by dividing each content into two types of data for fast-forwarding and normal playback and scheduling them.
在选择性内容广播中,即观看用户自己选择的内容,服务器可以向许多用户传送若干内容。但是,当用户连续观看数据时,通过减少可用带宽和增加内容数量来增加等待时间。因此,许多研究者提出了减少等待时间的调度方法。虽然传统的方法是通过快进的方式产生广播时间表来减少等待时间,但是对于正常播放的内容来说,等待时间变长了。在本文中,我们提出了一种调度方法来实现选择性内容广播的快速转发。我们提出的方法是根据程序的配置和可用带宽来设置信道的数量。此外,通过将每个内容分成快转和正常播放两种类型的数据并对其进行调度,可以减少等待时间。
{"title":"A Scheduling Method to Enable Fast-forwarding for Selective Contents Broadcasting","authors":"D. Fukui, Y. Gotoh","doi":"10.1145/3007120.3007124","DOIUrl":"https://doi.org/10.1145/3007120.3007124","url":null,"abstract":"In selective contents broadcasting, i.e., watching contents users selected themselves, the server can deliver several contents to many users. However, when users watch the data continuously, waiting time is occurred by decreasing the available bandwidth and increasing the number of contents. Therefore, many researchers have proposed the scheduling methods to reduce the waiting time. Although the conventional method reduces waiting time by producing the broadcast schedule in fast-forwarding, that for playing contents in normal playback becomes lengthened. In this paper, we propose a scheduling method to enable fast-forwarding for selective contents broadcasting. Our proposed method sets the number of channels based on the configuration of the program and the available bandwidth. In addition, waiting time can be reduced by dividing each content into two types of data for fast-forwarding and normal playback and scheduling them.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134011380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using a Mobile Game Application to Monitor Well-Being Data for Patients with Cystic Fibrosis 使用手机游戏应用程序监测囊性纤维化患者的健康数据
Y. Y. Tan, S. Tabirca, B. Plant, T. Vagg
This article, presents a smartphone game app for Android devices where the user must blow into the microphone to control the sprite's movements as opposed to tapping. The game also encompasses a questionnaire and web based data tracking system, that is targeted at adult Cystic Fibrosis patients. App data is stored on an external database and saved under a user's profile. The data is then analysed for the attention of the health care team and depending on specified alert criteria, an alert text message (SMS) is sent to the patient. The complete system was presented to the CF medical multi-disciplinary team for review and feedback. Usability testing on the mobile application and web tool was also conducted with 10 participants who specialise in usability design. It is anticipated, that this framework will have a positive effect to the health care experience of adult CF patients after passing the clinical testing.
本文介绍了一款Android设备的智能手机游戏应用,用户必须对着麦克风吹气来控制精灵的移动,而不是轻敲。该游戏还包含一个问卷调查和基于网络的数据跟踪系统,这是针对成人囊性纤维化患者。应用程序数据存储在外部数据库中,并保存在用户的个人资料下。然后对数据进行分析,以引起卫生保健小组的注意,并根据指定的警报标准向患者发送警报短信(SMS)。完整的系统提交给CF医学多学科小组进行审查和反馈。手机应用程序和网络工具的可用性测试也由10名专门从事可用性设计的参与者进行。预计该框架通过临床试验后,将对成年CF患者的医疗保健体验产生积极影响。
{"title":"Using a Mobile Game Application to Monitor Well-Being Data for Patients with Cystic Fibrosis","authors":"Y. Y. Tan, S. Tabirca, B. Plant, T. Vagg","doi":"10.1145/3007120.3007148","DOIUrl":"https://doi.org/10.1145/3007120.3007148","url":null,"abstract":"This article, presents a smartphone game app for Android devices where the user must blow into the microphone to control the sprite's movements as opposed to tapping. The game also encompasses a questionnaire and web based data tracking system, that is targeted at adult Cystic Fibrosis patients. App data is stored on an external database and saved under a user's profile. The data is then analysed for the attention of the health care team and depending on specified alert criteria, an alert text message (SMS) is sent to the patient. The complete system was presented to the CF medical multi-disciplinary team for review and feedback. Usability testing on the mobile application and web tool was also conducted with 10 participants who specialise in usability design. It is anticipated, that this framework will have a positive effect to the health care experience of adult CF patients after passing the clinical testing.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134510105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A two-layer security model for accessing multimedia content in social networks 用于访问社交网络中的多媒体内容的两层安全模型
Ali Pazahr, J. Zapater, Francisco García-Sánchez, Parisa Ganjeh, C. Botella
Securing a website is nowadays one of the major concerns for system administrators. Security is also the most important challenge that Web developers have to face when designing a trustworthy platform to provide services for public users. It is well known that multimedia content on the Web is continuously growing and recently this media type is more and more commonly used in social networks. The access to multimedia content in the context of social networks should be both easy and secure. In this paper, a semantically-empowered security model for accessing multimedia content in social networks is presented. The application of this model ensures that (1) unauthorized users cannot access to private multimedia data, and (2) the overall level of trust among social networks users who share their private and sensitive data is enhanced. Two questionnaires were developed to select the most characteristic features to consider in our model to differentiate legitimate users and attackers. By using parametric considerations, both security and users' convenience are reached which makes our proposed model more effective.
确保网站安全是当今系统管理员最关心的问题之一。安全性也是Web开发人员在设计为公共用户提供服务的可信平台时必须面对的最重要的挑战。众所周知,网络上的多媒体内容正在不断增长,最近这种媒体类型越来越普遍地应用于社交网络。在社交网络环境下访问多媒体内容应该既简单又安全。本文提出了一种基于语义的访问社交网络多媒体内容的安全模型。该模型的应用确保了(1)未经授权的用户无法访问私有多媒体数据,(2)共享其私有和敏感数据的社交网络用户之间的整体信任水平得到提高。我们开发了两份调查问卷,以选择我们模型中最具特征的特征,以区分合法用户和攻击者。通过参数化的考虑,既保证了系统的安全性,又保证了用户的便捷性,使模型更加有效。
{"title":"A two-layer security model for accessing multimedia content in social networks","authors":"Ali Pazahr, J. Zapater, Francisco García-Sánchez, Parisa Ganjeh, C. Botella","doi":"10.1145/3007120.3011490","DOIUrl":"https://doi.org/10.1145/3007120.3011490","url":null,"abstract":"Securing a website is nowadays one of the major concerns for system administrators. Security is also the most important challenge that Web developers have to face when designing a trustworthy platform to provide services for public users. It is well known that multimedia content on the Web is continuously growing and recently this media type is more and more commonly used in social networks. The access to multimedia content in the context of social networks should be both easy and secure. In this paper, a semantically-empowered security model for accessing multimedia content in social networks is presented. The application of this model ensures that (1) unauthorized users cannot access to private multimedia data, and (2) the overall level of trust among social networks users who share their private and sensitive data is enhanced. Two questionnaires were developed to select the most characteristic features to consider in our model to differentiate legitimate users and attackers. By using parametric considerations, both security and users' convenience are reached which makes our proposed model more effective.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115192447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparing the Placement of Two Arm-Worn Devices for Recognizing Dynamic Hand Gestures 动态手势识别中两种臂戴设备放置位置的比较
K. Kefer, Clemens Holzmann, R. Findling
Dynamic hand gestures have become increasingly popular as an input modality for interactive systems. There exists a variety of arm-worn devices for the recognition of hand gestures, which differ not only in their capabilities, but also in the arm positions where they are worn. The aim of this paper is to investigate the effect of placement of such devices on the accuracy for recognizing dynamic hand gestures (e.g. waving the hand). This is relevant as different devices require different positions and thus differ in the achievable recognition accuracy. We have chosen two positions on the forearm: on the wrist and right below the elbow. These positions are interesing as smartwatches are usually worn on the wrist and devices using EMG sensors for the detection of static hand gestures (e.g. spreading the fingers) have to be worn right below the elbow. We used an LG G Watch worn on the wrist and a Myo armband from Thalmic Labs worn below the elbow. Both are equipped with three-axis accelerometers, which we used for gesture recognition. Our hypothesis was that the wrist-worn device would have a better recognition accuracy, as dynamic hand gestures have a bigger action radius on the wrist and therefore lead to bigger acceleration values. We conducted a comparative study with nine participants that performed eight simple, dynamic gestures on both devices. We tested the 4320 gesture samples with different classifiers and feature sets. Although the recognition results for the wrist-worn device were higher, the difference was not significant due to the substantial variation across participants.
作为交互系统的一种输入方式,动态手势已经变得越来越流行。现在有各种各样的用于识别手势的手臂设备,它们不仅功能不同,而且佩戴的手臂位置也不同。本文的目的是研究这些设备的放置对识别动态手势(如挥手)准确性的影响。这是相关的,因为不同的设备需要不同的位置,因此在可实现的识别精度不同。我们在前臂上选择了两个位置:手腕和肘部正下方。这些姿势很有趣,因为智能手表通常戴在手腕上,而使用肌电传感器检测静态手势(例如展开手指)的设备必须戴在肘部下方。我们使用了一个戴在手腕上的LG G手表和一个戴在肘部以下的来自Thalmic Labs的Myo臂带。两者都配备了三轴加速度计,我们用它来进行手势识别。我们的假设是,手腕设备会有更好的识别精度,因为动态手势在手腕上有更大的动作半径,因此会导致更大的加速度值。我们对九名参与者进行了比较研究,他们在两个设备上都做了八种简单的动态手势。我们用不同的分类器和特征集测试了4320个手势样本。尽管腕带设备的识别结果更高,但由于参与者之间存在很大差异,差异并不显著。
{"title":"Comparing the Placement of Two Arm-Worn Devices for Recognizing Dynamic Hand Gestures","authors":"K. Kefer, Clemens Holzmann, R. Findling","doi":"10.1145/3007120.3007146","DOIUrl":"https://doi.org/10.1145/3007120.3007146","url":null,"abstract":"Dynamic hand gestures have become increasingly popular as an input modality for interactive systems. There exists a variety of arm-worn devices for the recognition of hand gestures, which differ not only in their capabilities, but also in the arm positions where they are worn. The aim of this paper is to investigate the effect of placement of such devices on the accuracy for recognizing dynamic hand gestures (e.g. waving the hand). This is relevant as different devices require different positions and thus differ in the achievable recognition accuracy. We have chosen two positions on the forearm: on the wrist and right below the elbow. These positions are interesing as smartwatches are usually worn on the wrist and devices using EMG sensors for the detection of static hand gestures (e.g. spreading the fingers) have to be worn right below the elbow. We used an LG G Watch worn on the wrist and a Myo armband from Thalmic Labs worn below the elbow. Both are equipped with three-axis accelerometers, which we used for gesture recognition. Our hypothesis was that the wrist-worn device would have a better recognition accuracy, as dynamic hand gestures have a bigger action radius on the wrist and therefore lead to bigger acceleration values. We conducted a comparative study with nine participants that performed eight simple, dynamic gestures on both devices. We tested the 4320 gesture samples with different classifiers and feature sets. Although the recognition results for the wrist-worn device were higher, the difference was not significant due to the substantial variation across participants.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121353699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
DAMN: A Debugging and Manipulation Tool for Android Applications 一个Android应用程序的调试和操作工具
Gerald Schoiber, R. Mayrhofer, M. Hölzl
Mobile developers tend to use source code obfuscation to protect their code against reverse engineering. Unfortunately, some developers rely on the idea that obfuscated applications also provide additional security. But that is not the case since mistakes in design are still present and can be used for arbitrary attacks. However, manually analyzing such obfuscated applications is time consuming for researchers due to the complexity of the generated code. Our debugging and manipulation tool (DAMN) offers a new way of investigating Android applications, including obfuscated ones. It combines static source code reversing with dynamic manipulation techniques to get rid of obfuscation penalties and supports the investigator during the analyzing process. DAMN can display the reversed source code, pause any application at any given time and allows to manipulate its state. All those features make DAMN a powerful reversing and analyzing tool for manual investigations of obfuscated Android applications.
移动开发者倾向于使用源代码混淆来保护他们的代码免受逆向工程的侵害。不幸的是,一些开发人员认为混淆的应用程序也提供了额外的安全性。但事实并非如此,因为设计中的错误仍然存在,并且可以用于任意攻击。然而,由于生成代码的复杂性,手工分析这种混淆的应用程序对研究人员来说是非常耗时的。我们的调试和操作工具(DAMN)提供了一种调查Android应用程序的新方法,包括混淆的应用程序。它将静态源代码反转与动态操作技术相结合,以摆脱混淆惩罚,并在分析过程中支持调查人员。DAMN可以显示反向的源代码,在任何给定的时间暂停任何应用程序,并允许操纵其状态。所有这些特性使DAMN成为一个强大的反转和分析工具,用于手动调查被混淆的Android应用程序。
{"title":"DAMN: A Debugging and Manipulation Tool for Android Applications","authors":"Gerald Schoiber, R. Mayrhofer, M. Hölzl","doi":"10.1145/3007120.3007161","DOIUrl":"https://doi.org/10.1145/3007120.3007161","url":null,"abstract":"Mobile developers tend to use source code obfuscation to protect their code against reverse engineering. Unfortunately, some developers rely on the idea that obfuscated applications also provide additional security. But that is not the case since mistakes in design are still present and can be used for arbitrary attacks. However, manually analyzing such obfuscated applications is time consuming for researchers due to the complexity of the generated code. Our debugging and manipulation tool (DAMN) offers a new way of investigating Android applications, including obfuscated ones. It combines static source code reversing with dynamic manipulation techniques to get rid of obfuscation penalties and supports the investigator during the analyzing process. DAMN can display the reversed source code, pause any application at any given time and allows to manipulate its state. All those features make DAMN a powerful reversing and analyzing tool for manual investigations of obfuscated Android applications.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125409556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weight Driven Cluster Head Rotation for Wireless Sensor Networks 无线传感器网络的权重驱动簇头旋转
Mohamed Eshaftri, A. Al-Dubai, I. Romdhani, Alsnousi Essa
Energy efficiency is one of the major issues in Wireless Sensor Networks (WSNs), due to the limited power and processing capabilities of the Sensor Nodes (SNs). The clustering techniques are the effective solution to improve the energy efficiency and prolong the network lifetime. However, in the data transmission task, the Cluster Heads (CHs) consume more energy than the ordinary Cluster Members (CMs). Moreover, more energy and time are wasted through the cluster selection in every round. In an attempt to fill in this gap, we propose a new protocol called Weight Driven Cluster Head Rotation for Wireless Sensor Network (WDCR). The WDCR introduces a new weight-driven rotation method to balance the energy consumption among nodes within a cluster, along with unequal clustering algorithm to balance the energy consumption among clusters. The Simulation experiments show that WDCR reduces the energy dissipation of sensor node, and improves the network lifetime compared to the existing cluster protocols.
由于传感器节点(SNs)的功率和处理能力有限,能源效率是无线传感器网络(WSNs)的主要问题之一。聚类技术是提高网络能源效率和延长网络寿命的有效解决方案。但是,在数据传输任务中,CHs (Cluster head)比普通的CMs (Cluster member)消耗更多的能量。而且,每一轮的聚类选择都浪费了更多的精力和时间。为了填补这一空白,我们提出了一种新的协议,称为权重驱动簇头旋转无线传感器网络(WDCR)。WDCR引入了一种新的权重驱动的旋转方法来平衡集群内节点之间的能量消耗,以及不均匀聚类算法来平衡集群之间的能量消耗。仿真实验表明,与现有的集群协议相比,WDCR减少了传感器节点的能量消耗,提高了网络生存时间。
{"title":"Weight Driven Cluster Head Rotation for Wireless Sensor Networks","authors":"Mohamed Eshaftri, A. Al-Dubai, I. Romdhani, Alsnousi Essa","doi":"10.1145/3007120.3007170","DOIUrl":"https://doi.org/10.1145/3007120.3007170","url":null,"abstract":"Energy efficiency is one of the major issues in Wireless Sensor Networks (WSNs), due to the limited power and processing capabilities of the Sensor Nodes (SNs). The clustering techniques are the effective solution to improve the energy efficiency and prolong the network lifetime. However, in the data transmission task, the Cluster Heads (CHs) consume more energy than the ordinary Cluster Members (CMs). Moreover, more energy and time are wasted through the cluster selection in every round. In an attempt to fill in this gap, we propose a new protocol called Weight Driven Cluster Head Rotation for Wireless Sensor Network (WDCR). The WDCR introduces a new weight-driven rotation method to balance the energy consumption among nodes within a cluster, along with unequal clustering algorithm to balance the energy consumption among clusters. The Simulation experiments show that WDCR reduces the energy dissipation of sensor node, and improves the network lifetime compared to the existing cluster protocols.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128192949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Autonomous Near Ground Quadrone Navigation with Uncalibrated Spherical Images Using Convolutional Neural Networks 基于卷积神经网络的球面图像自主近地四边形导航
Lingyan Ran, Yanning Zhang, Tao Yang, Ting Chen
This paper focuses on the use of spherical cameras for autonomous quadrone navigation tasks. Previous works of literature for navigation mainly lie in two categories: scene-oriented simultaneous localization and mapping and robot-oriented heading fields lane detection and trajectory tracking. Those methods face the challenges of either high computation cost or heavy labelling and calibration requirements. In this paper, we propose to formulate the spherical image navigation as an image classification problem, which significantly simplifies the orientation estimation and path prediction procedure and accelerates the navigation process. More specifically, we train an end-to-end convolutional network on our spherical image dataset with novel orientation categories labels. This trained network can give precise predictions on potential path directions with single spherical images. Experimental results on our Spherical-Navi dataset demonstrate that the proposed approach outperforms the comparing methods in realistic applications.
本文主要研究球面相机在自主四边形导航任务中的应用。以往导航方面的文献工作主要有两大类:面向场景的同步定位与测绘和面向机器人的航向场车道检测与轨迹跟踪。这些方法面临着计算成本高或标记和校准要求高的挑战。本文提出将球面图像导航作为一个图像分类问题,大大简化了方向估计和路径预测过程,加快了导航过程。更具体地说,我们在球形图像数据集上训练一个端到端卷积网络,并使用新的方向分类标签。这种训练好的网络可以对单个球面图像的潜在路径方向给出精确的预测。在我们的Spherical-Navi数据集上的实验结果表明,该方法在实际应用中优于比较方法。
{"title":"Autonomous Near Ground Quadrone Navigation with Uncalibrated Spherical Images Using Convolutional Neural Networks","authors":"Lingyan Ran, Yanning Zhang, Tao Yang, Ting Chen","doi":"10.1145/3007120.3011073","DOIUrl":"https://doi.org/10.1145/3007120.3011073","url":null,"abstract":"This paper focuses on the use of spherical cameras for autonomous quadrone navigation tasks. Previous works of literature for navigation mainly lie in two categories: scene-oriented simultaneous localization and mapping and robot-oriented heading fields lane detection and trajectory tracking. Those methods face the challenges of either high computation cost or heavy labelling and calibration requirements. In this paper, we propose to formulate the spherical image navigation as an image classification problem, which significantly simplifies the orientation estimation and path prediction procedure and accelerates the navigation process. More specifically, we train an end-to-end convolutional network on our spherical image dataset with novel orientation categories labels. This trained network can give precise predictions on potential path directions with single spherical images. Experimental results on our Spherical-Navi dataset demonstrate that the proposed approach outperforms the comparing methods in realistic applications.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128684902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Region-based Alignment-free Partial Fingerprint Matching 一种基于区域的无对齐部分指纹匹配方法
K. Komal, D. Albrecht, Nandita Bhattacharjee, B. Srinivasan
Fingerprint is one of the most researched biometrics and applied to many applications like boarder security, access security, security of electronic devices to name a few. However, alignment and matching of partial fingerprints convincingly is still a challenging problem. This paper proposes a region based partial fingerprint matching approach that matches the fingerprints without aligning them. The approach focuses on extracting the matching regions in unaligned fingerprints. As extraction of regions happens without alignment, a new similarity metric is proposed that can compute similarity value between unaligned fingerprints. The results demonstrate that the proposed approach can eliminate the need for aligning the fingerprints without affecting the accuracy. The popular Fingerprint Verification Competition (FVC) 2002 dataset is used for conducting experiments. Moreover, the results of fingerprint recognition are compared with the best alignment based fingerprint matching techniques.
指纹是研究最多的生物识别技术之一,应用于边境安全、访问安全、电子设备安全等诸多领域。然而,令人信服的部分指纹比对仍然是一个具有挑战性的问题。提出了一种基于区域的部分指纹匹配方法,该方法在不对齐指纹的情况下对指纹进行匹配。该方法的重点是提取未对齐指纹的匹配区域。针对指纹提取过程中不对齐的情况,提出了一种新的相似度度量,可以计算未对齐指纹之间的相似度值。实验结果表明,该方法在不影响指纹识别精度的前提下,消除了指纹对准的需要。使用流行的指纹验证大赛(FVC) 2002数据集进行实验。此外,将指纹识别结果与基于最佳对齐的指纹匹配技术进行了比较。
{"title":"A Region-based Alignment-free Partial Fingerprint Matching","authors":"K. Komal, D. Albrecht, Nandita Bhattacharjee, B. Srinivasan","doi":"10.1145/3007120.3007130","DOIUrl":"https://doi.org/10.1145/3007120.3007130","url":null,"abstract":"Fingerprint is one of the most researched biometrics and applied to many applications like boarder security, access security, security of electronic devices to name a few. However, alignment and matching of partial fingerprints convincingly is still a challenging problem. This paper proposes a region based partial fingerprint matching approach that matches the fingerprints without aligning them. The approach focuses on extracting the matching regions in unaligned fingerprints. As extraction of regions happens without alignment, a new similarity metric is proposed that can compute similarity value between unaligned fingerprints. The results demonstrate that the proposed approach can eliminate the need for aligning the fingerprints without affecting the accuracy. The popular Fingerprint Verification Competition (FVC) 2002 dataset is used for conducting experiments. Moreover, the results of fingerprint recognition are compared with the best alignment based fingerprint matching techniques.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"142 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133818128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Regression Method for real-time video quality evaluation 一种实时视频质量评价的回归方法
M. T. Vega, D. Mocanu, A. Liotta
No-Reference (NR) metrics provide a mechanism to assess video quality in an ever-growing wireless network. Their low computational complexity and functional characteristics make them the primary choice when it comes to realtime content management and mobile streaming control. Unfortunately, common NR metrics suffer from poor accuracy, particularly in network-impaired video streams. In this work, we introduce a regression-based video quality metric that is simple enough for real-time computation on thin clients, and comparably as accurate as state-of-the-art Full-Reference (FR) metrics, which are functionally and computationally inviable in real-time streaming. We benchmark our metric against the FR metric VQM (Video Quality Metric), finding a very strong correlation factor.
无参考(NR)指标提供了一种在不断增长的无线网络中评估视频质量的机制。其低计算复杂度和功能特点使其成为实时内容管理和移动流媒体控制的首选。不幸的是,普通NR指标的准确性很差,特别是在网络受损的视频流中。在这项工作中,我们引入了一种基于回归的视频质量度量,它足够简单,可以在瘦客户端上进行实时计算,并且与最先进的全参考(FR)度量相当准确,后者在功能和计算上在实时流媒体中是不可实现的。我们将我们的指标与FR指标VQM(视频质量指标)进行基准测试,发现了一个非常强的相关因素。
{"title":"A Regression Method for real-time video quality evaluation","authors":"M. T. Vega, D. Mocanu, A. Liotta","doi":"10.1145/3007120.3007125","DOIUrl":"https://doi.org/10.1145/3007120.3007125","url":null,"abstract":"No-Reference (NR) metrics provide a mechanism to assess video quality in an ever-growing wireless network. Their low computational complexity and functional characteristics make them the primary choice when it comes to realtime content management and mobile streaming control. Unfortunately, common NR metrics suffer from poor accuracy, particularly in network-impaired video streams. In this work, we introduce a regression-based video quality metric that is simple enough for real-time computation on thin clients, and comparably as accurate as state-of-the-art Full-Reference (FR) metrics, which are functionally and computationally inviable in real-time streaming. We benchmark our metric against the FR metric VQM (Video Quality Metric), finding a very strong correlation factor.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127458553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
When Game Theory Meets VANET's Security and Privacy 当博弈论遇到VANET的安全和隐私
Sara Bahamou, M. D. E. Ouadghiri, J. Bonnin
Vehicular ad hoc networks (VANET) are one of many fields that faces numerous challenges in terms of security and privacy. Risk and security assessments approaches in this kind of networks may not be able to operate correctly in all the vehicular systems, because theses analyzes aspects are based generally on theoretical ideas, which may not reflect any realistic conditions. The important motivations of VANTET applications deployment is the reduction of the accident traffic and the numbers of human deaths and injuries, hence this applications have a stiff security requirements. In order to cover all possible security requirements many research approaches were presented, such as approaches based on attack tree process, where we find also the attack-defense tree approach. This paper focus on the existed trade-off between the attacker and the defender in a vehicular system, also we tries to find an equilibrium point that reflect this relationship through the application of a mathematical analysis, which is the game theory analysis. Game theory approach where firstly deployed in the ad hoc networks by many researches, which is not the case for the vehicular systems where we find a few number of researches dedicated to the use of the game theoretic approach for the security or the privacy preserving in this kind of networks. For a better understanding, we start the paper by presenting some works that highlight the application of game theory in order to address the different forms of security and privacy issues in ad the ad hoc networks and more precisely the vehicular ad hoc networks. Where we show how different interactions between attackers and defender in the vehicular networks can be modeled as a game.
车辆自组织网络(VANET)是在安全和隐私方面面临众多挑战的众多领域之一。这种网络中的风险与安全评估方法不一定适用于所有车载系统,因为这些分析方面一般都是基于理论思想,可能无法反映任何现实情况。VANTET应用部署的重要动机是减少交通事故和人员伤亡数量,因此这种应用具有严格的安全要求。为了涵盖所有可能的安全需求,提出了许多研究方法,如基于攻击树过程的方法,其中我们也发现了攻击-防御树方法。本文主要研究车辆系统中攻击者和防御者之间存在的权衡关系,并试图通过数学分析,即博弈论分析,找到一个反映这种关系的平衡点。博弈论方法被许多研究首先部署在自组织网络中,而对于车载系统,我们发现少数研究致力于将博弈论方法用于此类网络的安全或隐私保护。为了更好地理解,我们首先介绍了一些突出博弈论应用的工作,以解决ad hoc网络(更准确地说是车载ad hoc网络)中不同形式的安全和隐私问题。我们展示了车辆网络中攻击者和防御者之间的不同互动如何被建模为一个游戏。
{"title":"When Game Theory Meets VANET's Security and Privacy","authors":"Sara Bahamou, M. D. E. Ouadghiri, J. Bonnin","doi":"10.1145/3007120.3007168","DOIUrl":"https://doi.org/10.1145/3007120.3007168","url":null,"abstract":"Vehicular ad hoc networks (VANET) are one of many fields that faces numerous challenges in terms of security and privacy. Risk and security assessments approaches in this kind of networks may not be able to operate correctly in all the vehicular systems, because theses analyzes aspects are based generally on theoretical ideas, which may not reflect any realistic conditions. The important motivations of VANTET applications deployment is the reduction of the accident traffic and the numbers of human deaths and injuries, hence this applications have a stiff security requirements. In order to cover all possible security requirements many research approaches were presented, such as approaches based on attack tree process, where we find also the attack-defense tree approach. This paper focus on the existed trade-off between the attacker and the defender in a vehicular system, also we tries to find an equilibrium point that reflect this relationship through the application of a mathematical analysis, which is the game theory analysis. Game theory approach where firstly deployed in the ad hoc networks by many researches, which is not the case for the vehicular systems where we find a few number of researches dedicated to the use of the game theoretic approach for the security or the privacy preserving in this kind of networks. For a better understanding, we start the paper by presenting some works that highlight the application of game theory in order to address the different forms of security and privacy issues in ad the ad hoc networks and more precisely the vehicular ad hoc networks. Where we show how different interactions between attackers and defender in the vehicular networks can be modeled as a game.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122580901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1