首页 > 最新文献

2012 UKSim 14th International Conference on Computer Modelling and Simulation最新文献

英文 中文
Intelligent Personalized Learning System Consideration 智能个性化学习系统的思考
Alex Pongpech
Personalised learning is a crucial key element for promoting lifelong learners. The concept of personalised learning is based on learner-centric approach, represented by different ways of adaptation of the services such as content, support, and presentation to the learner's needs. For any system to support various needs of the learners, it must offer functionality which allows learners to configure the services to meet their needs. Thus facilitates the system adaptability for providing services for each individual based on his/her needs. An adaptive system is usually defined as a system which is capable of adapting its services to meet the requirements of each user. The principles of e-learning and the expectations from learners are revisited, and several existing systems are discussed. Several difficulties of designing intelligent personalize learning machine which maybe solvable and useful in practice are then suggested.
个性化学习是促进终身学习者的关键因素。个性化学习的概念基于以学习者为中心的方法,表现为根据学习者的需要调整服务的不同方式,如内容、支持和展示。对于任何支持学习者各种需求的系统,它必须提供允许学习者配置服务以满足其需求的功能。从而促进了系统的适应性,以便根据每个人的需要为其提供服务。自适应系统通常被定义为能够调整其服务以满足每个用户需求的系统。本文回顾了电子学习的原理和学习者的期望,并讨论了几个现有的系统。提出了个性化智能学习机设计中存在的几个可解决和实用的难点。
{"title":"Intelligent Personalized Learning System Consideration","authors":"Alex Pongpech","doi":"10.1109/UKSim.2012.18","DOIUrl":"https://doi.org/10.1109/UKSim.2012.18","url":null,"abstract":"Personalised learning is a crucial key element for promoting lifelong learners. The concept of personalised learning is based on learner-centric approach, represented by different ways of adaptation of the services such as content, support, and presentation to the learner's needs. For any system to support various needs of the learners, it must offer functionality which allows learners to configure the services to meet their needs. Thus facilitates the system adaptability for providing services for each individual based on his/her needs. An adaptive system is usually defined as a system which is capable of adapting its services to meet the requirements of each user. The principles of e-learning and the expectations from learners are revisited, and several existing systems are discussed. Several difficulties of designing intelligent personalize learning machine which maybe solvable and useful in practice are then suggested.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122552032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimizing Vertices in 3D Lips Model Using Relevance Measure 利用相关性度量最小化三维唇部模型中的顶点
Pub Date : 2012-03-28 DOI: 10.1109/UKSim.2012.111
S. S. Salleh
This paper presents works involved in developing a three-dimensional lips in a visual speech synthesis system. Several works have been done in similar areas, but a systematic approach of identifying and determining appropriate number of vertices in the lips model were not explained thoroughly. Instead of the development technique, this paper is also presents an experimental set up designed to test the capabilities and flexibility of the lips in deforming speech. This paper explains on the process of capturing the lips and on the relevance measure technique used to identify optimum number of vertices to deform visemes in Standard Malay language. Results shown in this work proves that a systematic degradation by retaining 0.005% of 24,000 vertices into 120 vertices would remain the similar quality of lips deformation. Therefore, the outcome of this study justifies that an appropriate number of vertices which suitable to be used in visual speech synthesis for 3D lips model.
本文介绍了在视觉语音合成系统中开发三维嘴唇的工作。在类似的领域已经做了一些工作,但是在嘴唇模型中识别和确定适当数量的顶点的系统方法没有得到充分的解释。代替开发技术,本文还提出了一个实验装置,旨在测试嘴唇在变形语音中的能力和灵活性。本文解释了捕捉嘴唇的过程,以及在标准马来语中用于识别最佳顶点数量以变形粘体的相关测量技术。本工作的结果证明,通过将24,000个顶点保留0.005%到120个顶点的系统退化将保持唇形变形的相似质量。因此,本研究的结果证明了适当数量的顶点适合用于三维嘴唇模型的视觉语音合成。
{"title":"Minimizing Vertices in 3D Lips Model Using Relevance Measure","authors":"S. S. Salleh","doi":"10.1109/UKSim.2012.111","DOIUrl":"https://doi.org/10.1109/UKSim.2012.111","url":null,"abstract":"This paper presents works involved in developing a three-dimensional lips in a visual speech synthesis system. Several works have been done in similar areas, but a systematic approach of identifying and determining appropriate number of vertices in the lips model were not explained thoroughly. Instead of the development technique, this paper is also presents an experimental set up designed to test the capabilities and flexibility of the lips in deforming speech. This paper explains on the process of capturing the lips and on the relevance measure technique used to identify optimum number of vertices to deform visemes in Standard Malay language. Results shown in this work proves that a systematic degradation by retaining 0.005% of 24,000 vertices into 120 vertices would remain the similar quality of lips deformation. Therefore, the outcome of this study justifies that an appropriate number of vertices which suitable to be used in visual speech synthesis for 3D lips model.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120833416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ADEUS: Tool for Rapid Acceleration of Network Simulation in OMNeT++ 在omnet++中快速加速网络仿真的工具
P. Vilhan, J. Gajdos
There is lot of accessible mobile devices on the market nowadays, which caused significant rise of mobile networks. There are two main types of mobile networks, infrastructure and ad-hoc. This paper is focused on mobile ad-hoc networks also known as MANET, which are easy to build, and do not rely on fixed infrastructure. On the other side, simulation of MANET is really difficult and it is really important to properly design test and simulation scenario. There are various well known simulation environments over there, but this paper aims at OMNeT++[5]. The main contribution of this paper is to introduce ADEUS, support tool used to simplify creation and reduce the time needed to set up OMNeT++ simulation environment, for simulation of public key infrastructure, further referred as PKI, in MANET. ADEUS is graphical add-on for OMNeT++, with simple but powerful user interface.
现在市场上有很多可访问的移动设备,这导致了移动网络的显著崛起。移动网络主要有两种类型:基础设施和ad-hoc。本文的重点是移动自组织网络,也称为MANET,它易于构建,不依赖于固定的基础设施。另一方面,无线自组网的仿真难度很大,合理设计测试和仿真场景非常重要。虽然有各种知名的仿真环境,但本文针对的是omnet++[5]。本文的主要贡献是介绍了ADEUS,这是一种支持工具,用于简化创建和减少建立omnet++仿真环境所需的时间,用于模拟MANET中的公钥基础设施(进一步称为PKI)。ADEUS是omnet++的图形附加组件,具有简单但功能强大的用户界面。
{"title":"ADEUS: Tool for Rapid Acceleration of Network Simulation in OMNeT++","authors":"P. Vilhan, J. Gajdos","doi":"10.1109/UKSim.2012.90","DOIUrl":"https://doi.org/10.1109/UKSim.2012.90","url":null,"abstract":"There is lot of accessible mobile devices on the market nowadays, which caused significant rise of mobile networks. There are two main types of mobile networks, infrastructure and ad-hoc. This paper is focused on mobile ad-hoc networks also known as MANET, which are easy to build, and do not rely on fixed infrastructure. On the other side, simulation of MANET is really difficult and it is really important to properly design test and simulation scenario. There are various well known simulation environments over there, but this paper aims at OMNeT++[5]. The main contribution of this paper is to introduce ADEUS, support tool used to simplify creation and reduce the time needed to set up OMNeT++ simulation environment, for simulation of public key infrastructure, further referred as PKI, in MANET. ADEUS is graphical add-on for OMNeT++, with simple but powerful user interface.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121819891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Docking Study of Synthesized Juvenile Hormone Analogues as an Insect Growth Regulators 合成幼体激素类似物作为昆虫生长调节剂的对接研究
Pub Date : 2012-03-28 DOI: 10.1109/UKSim.2012.109
P. Awasthi, Priyanka Sharma
Molecular modeling is a basic tool to understand virtually all biological phenomena. It provides a direction to interpret theoretical understanding of structure - activity relationship in terms of physical forces responsible for receptor-ligand binding process. If a three dimensional structure of target receptor is available along with detail knowledge of the nature of the ligand binding site, ligand binding mode, the interactions between the ligand and receptor can be studied extensively in order to design and develop new target specific new compounds in short time. Juvenile Hormone Analogues, sesqui-terpenoid series of compound act as an insect growth regulators and presently in use as a potential environment friendly pesticides. Chemosterlization is the most effectual way to control the vast insect population. Computationally designing of juvenile hormone analogues are new and emerging area to counter the insect problem. We have carried out in-silico comparison between different JHAs containing sulphonamide functionality and Juvabione containing oxa and aza features as juvenile hormone analogues synthesized in our laboratory and studied their interactions against receptor protein of Galleria mellonella insect species using Auto Dock software module on Linux platform.
分子模型是理解几乎所有生物现象的基本工具。这为从受体-配体结合过程的物理力角度解释结构-活性关系的理论认识提供了方向。如果能够获得靶受体的三维结构以及对配体结合位点的性质、配体结合方式的详细了解,就可以广泛地研究配体与受体之间的相互作用,从而在短时间内设计和开发新的靶向性新化合物。幼激素类似物倍萜类化合物是一种昆虫生长调节剂,是一种潜在的环境友好型农药。化学灭菌是控制昆虫大量繁殖最有效的方法。少年激素类似物的计算设计是解决昆虫问题的新兴领域。我们利用Linux平台上的Auto Dock软件模块,对实验室合成的含磺胺功能的不同JHAs和含oxa、aza特征的Juvabione作为幼体激素类似物进行了硅质比较,并研究了它们与mellonella虫种受体蛋白的相互作用。
{"title":"Docking Study of Synthesized Juvenile Hormone Analogues as an Insect Growth Regulators","authors":"P. Awasthi, Priyanka Sharma","doi":"10.1109/UKSim.2012.109","DOIUrl":"https://doi.org/10.1109/UKSim.2012.109","url":null,"abstract":"Molecular modeling is a basic tool to understand virtually all biological phenomena. It provides a direction to interpret theoretical understanding of structure - activity relationship in terms of physical forces responsible for receptor-ligand binding process. If a three dimensional structure of target receptor is available along with detail knowledge of the nature of the ligand binding site, ligand binding mode, the interactions between the ligand and receptor can be studied extensively in order to design and develop new target specific new compounds in short time. Juvenile Hormone Analogues, sesqui-terpenoid series of compound act as an insect growth regulators and presently in use as a potential environment friendly pesticides. Chemosterlization is the most effectual way to control the vast insect population. Computationally designing of juvenile hormone analogues are new and emerging area to counter the insect problem. We have carried out in-silico comparison between different JHAs containing sulphonamide functionality and Juvabione containing oxa and aza features as juvenile hormone analogues synthesized in our laboratory and studied their interactions against receptor protein of Galleria mellonella insect species using Auto Dock software module on Linux platform.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122649983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Evaluating Qlogic's Dispersive Routing on High Performance Clusters 评价Qlogic在高性能集群上的分散路由
S. M. Sait, R. Al-Shaikh
As high performance clusters (HPC) expand in terms of nodes count and processing cores, internet work congestion and bottlenecks at the host and network levels become one of the main concerns in clustered computing. Considerably, the Infiniband Architecture (IBA) Specification provides six different routing algorithms to better optimize the HPC internet work traffic. In this paper, we present these algorithms and then evaluate QLogic's dispersive routing using a large-scale Infiniband cluster, equipped with Intel's latest Westmere processor. The paper presents the cluster configuration and evaluates its performance using High Performance LINPACK (HPL) and Intel MPI (IMB) benchmarks. Our results show that whilst the default Min Hop algorithm suits most of the serial and point-to-point benchmarks, the dispersive routing algorithm exhibits improved performance when running specific computational and parallel transfer routines.
随着高性能集群(HPC)在节点数量和处理核心方面的扩展,主机和网络层面的互联网工作拥塞和瓶颈成为集群计算中的主要问题之一。相当重要的是,ib架构(IBA)规范提供了六种不同的路由算法,以更好地优化HPC互联网工作流量。在本文中,我们提出了这些算法,然后使用配备英特尔最新Westmere处理器的大规模Infiniband集群评估QLogic的分散路由。本文介绍了集群配置,并使用高性能LINPACK (HPL)和英特尔MPI (IMB)基准测试评估其性能。我们的结果表明,虽然默认的最小跳算法适用于大多数串行和点对点基准测试,但分散路由算法在运行特定的计算和并行传输例程时表现出更好的性能。
{"title":"Evaluating Qlogic's Dispersive Routing on High Performance Clusters","authors":"S. M. Sait, R. Al-Shaikh","doi":"10.1109/UKSim.2012.75","DOIUrl":"https://doi.org/10.1109/UKSim.2012.75","url":null,"abstract":"As high performance clusters (HPC) expand in terms of nodes count and processing cores, internet work congestion and bottlenecks at the host and network levels become one of the main concerns in clustered computing. Considerably, the Infiniband Architecture (IBA) Specification provides six different routing algorithms to better optimize the HPC internet work traffic. In this paper, we present these algorithms and then evaluate QLogic's dispersive routing using a large-scale Infiniband cluster, equipped with Intel's latest Westmere processor. The paper presents the cluster configuration and evaluates its performance using High Performance LINPACK (HPL) and Intel MPI (IMB) benchmarks. Our results show that whilst the default Min Hop algorithm suits most of the serial and point-to-point benchmarks, the dispersive routing algorithm exhibits improved performance when running specific computational and parallel transfer routines.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130718410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applicability of Neural Networks to Software Security 神经网络在软件安全中的适用性
A. Adebiyi, J. Arreymbi, C. Imafidon
Software design flaws account for 50% software security vulnerability today. As attacks on vulnerable software continue to increase, the demand for secure software is also increasing thereby putting software developers under more pressure. This is especially true for those developers whose primary aim is to produce their software quickly under tight deadlines in order to release it into the market early. While there are many tools focusing on implementation problems during software development lifecycle (SDLC), this does not provide a complete solution in resolving software security problems. Therefore designing software with security in mind will go a long way in developing secure software. In this paper some of the current approaches used in integrating security at the design level of SDLC are discussed briefly and a new method of evaluating software design using neural network is presented. With the aid of the proposed neural network tool, this research found out that software design scenarios can be matched to attack patterns that identify the security flaws in the design scenarios. The result of performance of the neural network is presented in this paper.
软件设计缺陷占当今软件安全漏洞的50%。随着对脆弱软件的攻击不断增加,对安全软件的需求也在增加,从而给软件开发人员带来了更大的压力。对于那些主要目标是在紧迫的期限内快速生产软件以便尽早将其发布到市场的开发人员来说尤其如此。虽然有许多工具关注软件开发生命周期(SDLC)中的实现问题,但这并没有提供解决软件安全问题的完整解决方案。因此,在设计软件时考虑到安全性将对开发安全软件大有帮助。本文简要讨论了目前在SDLC设计层面集成安全性的一些方法,并提出了一种利用神经网络评价软件设计的新方法。利用所提出的神经网络工具,本研究发现软件设计场景可以匹配到识别设计场景中安全漏洞的攻击模式。最后给出了神经网络的性能测试结果。
{"title":"Applicability of Neural Networks to Software Security","authors":"A. Adebiyi, J. Arreymbi, C. Imafidon","doi":"10.1109/UKSim.2012.14","DOIUrl":"https://doi.org/10.1109/UKSim.2012.14","url":null,"abstract":"Software design flaws account for 50% software security vulnerability today. As attacks on vulnerable software continue to increase, the demand for secure software is also increasing thereby putting software developers under more pressure. This is especially true for those developers whose primary aim is to produce their software quickly under tight deadlines in order to release it into the market early. While there are many tools focusing on implementation problems during software development lifecycle (SDLC), this does not provide a complete solution in resolving software security problems. Therefore designing software with security in mind will go a long way in developing secure software. In this paper some of the current approaches used in integrating security at the design level of SDLC are discussed briefly and a new method of evaluating software design using neural network is presented. With the aid of the proposed neural network tool, this research found out that software design scenarios can be matched to attack patterns that identify the security flaws in the design scenarios. The result of performance of the neural network is presented in this paper.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117096494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Scatter and Doppler Effect of Wind Power Plants to Land Radars 风力发电厂对陆地雷达的散射和多普勒效应
Derya Sozen, M. Kartal
Wind power plant installations at different scales are in an increasing pattern starting from year 2000. A curiosity has been raised about 4-5 years ago for if wind turbines interfere with radars. The interference occurs when wind turbines reflect radar waves and cause missing targets and blind regions on radar images. Doppler radars are most used to discriminate between the return from a desired target and that from undesired objects, usually ground clutter [1]. There are so many resulting effects of interference such as shadowing, damage to radar equipment, larger radar cross section (RCS) and missing desired targets, etc. Both radar and wind power plant mitigations are available. But still, there is no overall solution, only case by case treatment. RADAR is an acronym for RAdio Detection And Ranging, it will be used as "radar" throughout this paper.
从2000年开始,不同规模的风力发电厂的安装呈增加趋势。大约4-5年前,人们对风力涡轮机是否会干扰雷达产生了好奇。当风力涡轮机反射雷达波时,就会产生干扰,导致雷达图像上的目标缺失和盲区。多普勒雷达最常用于区分来自期望目标和不希望目标(通常是地杂波)的回波[1]。干扰产生的影响有很多,如遮蔽、雷达设备损坏、雷达截面积(RCS)增大和目标丢失等。雷达和风力发电厂的缓解措施都可用。但是,仍然没有全面的解决方案,只能逐个处理。RADAR是RAdio Detection And Ranging(无线电探测与测距)的首字母缩写,在本文中我们将使用它作为“雷达”。
{"title":"Scatter and Doppler Effect of Wind Power Plants to Land Radars","authors":"Derya Sozen, M. Kartal","doi":"10.1109/UKSim.2012.68","DOIUrl":"https://doi.org/10.1109/UKSim.2012.68","url":null,"abstract":"Wind power plant installations at different scales are in an increasing pattern starting from year 2000. A curiosity has been raised about 4-5 years ago for if wind turbines interfere with radars. The interference occurs when wind turbines reflect radar waves and cause missing targets and blind regions on radar images. Doppler radars are most used to discriminate between the return from a desired target and that from undesired objects, usually ground clutter [1]. There are so many resulting effects of interference such as shadowing, damage to radar equipment, larger radar cross section (RCS) and missing desired targets, etc. Both radar and wind power plant mitigations are available. But still, there is no overall solution, only case by case treatment. RADAR is an acronym for RAdio Detection And Ranging, it will be used as \"radar\" throughout this paper.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116155988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Protection of Integrity and Ownership of PDF Documents Using Invisible Signature 使用隐形签名保护PDF文档的完整性和所有权
I. A. Shaikhli, A. Zeki, R. Makarim, A. Pathan
Distributing digital document through insecure channel leads to the question of the integrity and the ownership of the file on the receiver's side. Employing hash function and digital signature algorithms solves the difficulties of the receiver to proof the approval of the document from the sender as well as detecting if the file has been altered by illegitimate parties. In this paper, a method to attach digital signature in Portable Document File (PDF) as invisible watermark is proposed. We show that the space character that splits the field in cross-reference table can be overwritten without corrupting the file. The method to embed and extract the signature are proven to be efficient, since the offset index for cross-reference table are available at the end of the file. Our proposed method to embed the signature in the PDF file does not increase the size of the file and offer flexibility for the user to implements the digital signature scheme of his/her own preference.
通过不安全的渠道分发数字文件会导致接收方对文件的完整性和所有权的问题。采用哈希函数和数字签名算法解决了接收方证明发送方对文件的认可以及检测文件是否被非法方修改的困难。提出了一种将数字签名作为不可见水印附加到可移植文档文件(Portable Document File, PDF)中的方法。我们展示了在交叉引用表中分隔字段的空格字符可以被覆盖而不会损坏文件。由于交叉引用表的偏移索引在文件末尾可用,因此证明了嵌入和提取签名的方法是有效的。我们提出的在PDF文件中嵌入签名的方法不会增加文件的大小,并且为用户提供了实现自己喜欢的数字签名方案的灵活性。
{"title":"Protection of Integrity and Ownership of PDF Documents Using Invisible Signature","authors":"I. A. Shaikhli, A. Zeki, R. Makarim, A. Pathan","doi":"10.1109/UKSim.2012.81","DOIUrl":"https://doi.org/10.1109/UKSim.2012.81","url":null,"abstract":"Distributing digital document through insecure channel leads to the question of the integrity and the ownership of the file on the receiver's side. Employing hash function and digital signature algorithms solves the difficulties of the receiver to proof the approval of the document from the sender as well as detecting if the file has been altered by illegitimate parties. In this paper, a method to attach digital signature in Portable Document File (PDF) as invisible watermark is proposed. We show that the space character that splits the field in cross-reference table can be overwritten without corrupting the file. The method to embed and extract the signature are proven to be efficient, since the offset index for cross-reference table are available at the end of the file. Our proposed method to embed the signature in the PDF file does not increase the size of the file and offer flexibility for the user to implements the digital signature scheme of his/her own preference.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121283975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Low Power Study on Trace Back and Reconstruction Modules for DNA Sequences Alignment Accelerator DNA序列比对加速器溯源与重构模块的低功耗研究
A. Halim, M. Harun, S. Mohamed, Z. Majid, M. A. Mansor, S. Junid
This paper presents the low power study on trace-back and reconstruction modules for DNA sequences alignment accelerator using ASIC design flow. The objectives of this paper are to construct trace-back and reconstruction modules, to perform low power analysis technique using frequency scaling and clock gating. Another objective is to implement the designs on ASIC. This paper focuses on the power consumption of the trace-back and reconstruction modules . As the number of DNA sequence database increases exponentially, it affects the performance of Smith-Waterman algorithm in computational complexity. Therefore, researchers have explored many methods to implement this algorithm by increasing the speed, reducing the power, minimizing the area and so on . The designs were written in Verilog language and verified on Xilinx FPGA design flow. Later, the designs were functionally verified in VCS, synthesized in DC and implemented on ICC. From the analysis, the designs' power consumptions remained constant at lower frequencies and started to increase exponentially when the clock period cross 20ns and lower. A clock gating technique was implemented on at clock period of 10ns for comparison. The results showed that the power consumption reduced up to 50 percent. The design was successfully implemented on ASIC design flow.
本文介绍了基于ASIC设计流程的DNA序列比对加速器溯源与重构模块的低功耗研究。本文的目标是构建回溯和重建模块,使用频率缩放和时钟门控来执行低功耗分析技术。另一个目标是在ASIC上实现设计。本文重点研究了回溯与重构模块的功耗。随着DNA序列数据库数量呈指数增长,在计算复杂度上影响了Smith-Waterman算法的性能。因此,研究人员从提高速度、降低功耗、最小化面积等方面探索了多种方法来实现该算法。设计以Verilog语言编写,并在Xilinx FPGA设计流程上进行验证。随后在VCS中进行了功能验证,在DC中进行了综合,并在ICC上进行了实现。从分析来看,设计的功耗在较低频率下保持不变,当时钟周期超过20ns或更低时,功耗开始呈指数增长。在时钟周期为10ns的情况下,采用时钟门控技术进行比较。结果表明,功耗降低了50%。该设计在ASIC设计流程上成功实现。
{"title":"Low Power Study on Trace Back and Reconstruction Modules for DNA Sequences Alignment Accelerator","authors":"A. Halim, M. Harun, S. Mohamed, Z. Majid, M. A. Mansor, S. Junid","doi":"10.1109/UKSim.2012.26","DOIUrl":"https://doi.org/10.1109/UKSim.2012.26","url":null,"abstract":"This paper presents the low power study on trace-back and reconstruction modules for DNA sequences alignment accelerator using ASIC design flow. The objectives of this paper are to construct trace-back and reconstruction modules, to perform low power analysis technique using frequency scaling and clock gating. Another objective is to implement the designs on ASIC. This paper focuses on the power consumption of the trace-back and reconstruction modules . As the number of DNA sequence database increases exponentially, it affects the performance of Smith-Waterman algorithm in computational complexity. Therefore, researchers have explored many methods to implement this algorithm by increasing the speed, reducing the power, minimizing the area and so on . The designs were written in Verilog language and verified on Xilinx FPGA design flow. Later, the designs were functionally verified in VCS, synthesized in DC and implemented on ICC. From the analysis, the designs' power consumptions remained constant at lower frequencies and started to increase exponentially when the clock period cross 20ns and lower. A clock gating technique was implemented on at clock period of 10ns for comparison. The results showed that the power consumption reduced up to 50 percent. The design was successfully implemented on ASIC design flow.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123963604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Intelligent Fault Monitoring and Risk Management Tool for Complex Critical Infrastructures: The SERSCIS Approach in Air-Traffic Surface Control 复杂关键基础设施的智能故障监测和风险管理工具:空中交通地面管制中的SERSCIS方法
D. Kostopoulos, G. Leventakis, V. Tsoulkas, N. Nikitakos
We provide novel results on the development of an intelligent risk management and threat monitoring visualization tool realized within the EU funded project SERSCIS (Semantically Enhanced, Resilient and Secure Critical Infrastructure Services). After a brief overview of existing risk management methods for Critical Infrastructures (CIs), the SERSCIS objectives, motivation and components we proceed in describing the highly complex task of aircraft management process and the adopted risk assessment and evaluation methodology for the implementation of the threat analysis - monitoring solution in the aircraft surface operations sector. In particular our case study and proof - of - concept prototype concentrates on the technical support and information presentation capacity to decision makers and human - in the loop - operators for optimizing the dynamic and adaptive behavior of the interconnected ICT systems in an Airport Collaborative Decision making (A-CDM) test case scenario of the European Air Traffic System.
我们在欧盟资助的项目SERSCIS(语义增强、弹性和安全关键基础设施服务)中实现了智能风险管理和威胁监控可视化工具的开发,提供了新的结果。在简要概述了关键基础设施(CIs)的现有风险管理方法、SERSCIS的目标、动机和组成部分之后,我们接着描述了飞机管理过程中高度复杂的任务,以及在飞机地面操作部门实施威胁分析监测解决方案所采用的风险评估和评估方法。特别是,我们的案例研究和概念验证原型集中在技术支持和信息展示能力上,以决策者和环内人员运营商为优化欧洲空中交通系统机场协同决策(A-CDM)测试用例场景中互联ICT系统的动态和自适应行为。
{"title":"An Intelligent Fault Monitoring and Risk Management Tool for Complex Critical Infrastructures: The SERSCIS Approach in Air-Traffic Surface Control","authors":"D. Kostopoulos, G. Leventakis, V. Tsoulkas, N. Nikitakos","doi":"10.1109/UKSim.2012.37","DOIUrl":"https://doi.org/10.1109/UKSim.2012.37","url":null,"abstract":"We provide novel results on the development of an intelligent risk management and threat monitoring visualization tool realized within the EU funded project SERSCIS (Semantically Enhanced, Resilient and Secure Critical Infrastructure Services). After a brief overview of existing risk management methods for Critical Infrastructures (CIs), the SERSCIS objectives, motivation and components we proceed in describing the highly complex task of aircraft management process and the adopted risk assessment and evaluation methodology for the implementation of the threat analysis - monitoring solution in the aircraft surface operations sector. In particular our case study and proof - of - concept prototype concentrates on the technical support and information presentation capacity to decision makers and human - in the loop - operators for optimizing the dynamic and adaptive behavior of the interconnected ICT systems in an Airport Collaborative Decision making (A-CDM) test case scenario of the European Air Traffic System.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122328691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2012 UKSim 14th International Conference on Computer Modelling and Simulation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1