首页 > 最新文献

2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)最新文献

英文 中文
RealTime Wireless Monitoring System of CO2 and CH4 in Juliaca-Perú Juliaca-Perú CO2和CH4实时无线监测系统
J. M. Montoya, J. Chilo
This paper presents a measurement system to greenhouse gases (GHG) monitoring. GHGs are formed by the emission of Carbon Dioxide (CO2) and Methane (CH4) from vehicles and near located landfills in Juliaca city in Perú. A wireless system is developed using MOS sensors (MQ2, MQ4, TGS2611 and MQ-135), Arduino-nano, XBee wireless communications modules and the interface to the computer is written in Python. The system was tested in real field measurements and the results show gas concentration difference in different points of the city. We could observe that the CO2 content in places with a large number of vehicles is high and places with organic waste, like fresch product market, the CH4 content is also high.
本文介绍了一种温室气体(GHG)监测系统。温室气体是由车辆排放的二氧化碳(CO2)和甲烷(CH4)以及位于Perú的Juliaca市附近的垃圾填埋场形成的。采用MOS传感器(MQ2、MQ4、TGS2611和MQ-135)、Arduino-nano、XBee无线通信模块开发了无线系统,与计算机的接口用Python编写。该系统在实际的现场测量中进行了测试,结果显示了城市不同地点的气体浓度差异。我们可以看到,车辆较多的地方CO2含量较高,生鲜市场等有机废弃物较多的地方CH4含量也较高。
{"title":"RealTime Wireless Monitoring System of CO2 and CH4 in Juliaca-Perú","authors":"J. M. Montoya, J. Chilo","doi":"10.1109/IDAACS.2019.8924332","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924332","url":null,"abstract":"This paper presents a measurement system to greenhouse gases (GHG) monitoring. GHGs are formed by the emission of Carbon Dioxide (CO2) and Methane (CH4) from vehicles and near located landfills in Juliaca city in Perú. A wireless system is developed using MOS sensors (MQ2, MQ4, TGS2611 and MQ-135), Arduino-nano, XBee wireless communications modules and the interface to the computer is written in Python. The system was tested in real field measurements and the results show gas concentration difference in different points of the city. We could observe that the CO2 content in places with a large number of vehicles is high and places with organic waste, like fresch product market, the CH4 content is also high.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114325860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Network Intrusion Detection Based on Support Vector Machine Optimized with Grasshopper Optimization Algorithm 基于Grasshopper优化算法的支持向量机网络入侵检测研究
Z. Ye, Yiheng Sun, Shuang Sun, Sikai Zhan, Han Yu, Quanfeng Yao
As one of the most important parts of network security, more significance is attached to intrusion detection system (IDS). Numerous techniques including support vector machine (SVM) have been applied to the intrusion detection. However, many methods are utilized to improve the original SVM whose performance is markedly depended on its kernel parameters. Evolutionary algorithms such as genetic algorithm (GA) and particle swarm algorithm (PSO) are also employed to search better kernel parameters while the traditional optimization methods are vulnerable to fall into local minima with slow speed of convergence. In order to improve the precision of SVM in intrusion detection, the support vector machine based on grasshopper optimization algorithm (GOA-SVM) is proposed in the paper. To verify the practicality of the proposed method, several contrast experiments have been carried out using tool of Matlab. The experimental results finally demonstrates the superior performance of the proposed method on intrusion detection.
入侵检测系统作为网络安全的重要组成部分,越来越受到人们的重视。包括支持向量机(SVM)在内的许多技术已被应用于入侵检测。然而,许多方法被用于改进原始支持向量机,其性能明显依赖于其核参数。遗传算法(GA)和粒子群算法(PSO)等进化算法也被用于寻找更好的核参数,而传统的优化方法容易陷入局部极小,收敛速度慢。为了提高支持向量机在入侵检测中的精度,本文提出了基于蝗虫优化算法的支持向量机(GOA-SVM)。为了验证所提方法的实用性,利用Matlab工具进行了多次对比实验。实验结果最终证明了该方法在入侵检测中的优越性能。
{"title":"Research on Network Intrusion Detection Based on Support Vector Machine Optimized with Grasshopper Optimization Algorithm","authors":"Z. Ye, Yiheng Sun, Shuang Sun, Sikai Zhan, Han Yu, Quanfeng Yao","doi":"10.1109/IDAACS.2019.8924234","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924234","url":null,"abstract":"As one of the most important parts of network security, more significance is attached to intrusion detection system (IDS). Numerous techniques including support vector machine (SVM) have been applied to the intrusion detection. However, many methods are utilized to improve the original SVM whose performance is markedly depended on its kernel parameters. Evolutionary algorithms such as genetic algorithm (GA) and particle swarm algorithm (PSO) are also employed to search better kernel parameters while the traditional optimization methods are vulnerable to fall into local minima with slow speed of convergence. In order to improve the precision of SVM in intrusion detection, the support vector machine based on grasshopper optimization algorithm (GOA-SVM) is proposed in the paper. To verify the practicality of the proposed method, several contrast experiments have been carried out using tool of Matlab. The experimental results finally demonstrates the superior performance of the proposed method on intrusion detection.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114539410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Method for Decimal Number Recovery from its Residues Based on the Addition of the Product Modules 基于积模加法的十进制数残数复原方法
M. Karpinski, S. Rajba, S. Zawislak, K. Warwas, M. Kasianchuk, S. Ivasiev, I. Yakymenko
A method for decimal number recovery from its residues based on the product module addition is presented in this paper. This makes it possible to avoid a complex operation of finding a modular multiplicative inverse and replace it with the addition operation that increases the speed of the computing system. The scheme of the developed method is given in the article. Analytical and graphical comparison of the time complexities of the proposed and known approaches shows that the use of the method of adding the product modules allows reducing the time complexity of decimal number recovery from its residues in comparison with the classical ones.
本文提出了一种基于积模加法的十进制数残数恢复方法。这使得可以避免寻找模乘法逆的复杂操作,并将其替换为增加计算系统速度的加法操作。文中给出了该方法的实现方案。对所提方法和已知方法的时间复杂度进行了分析和图形比较,结果表明,与经典方法相比,使用乘积模的方法可以降低从其残数中恢复十进制数的时间复杂度。
{"title":"A Method for Decimal Number Recovery from its Residues Based on the Addition of the Product Modules","authors":"M. Karpinski, S. Rajba, S. Zawislak, K. Warwas, M. Kasianchuk, S. Ivasiev, I. Yakymenko","doi":"10.1109/IDAACS.2019.8924395","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924395","url":null,"abstract":"A method for decimal number recovery from its residues based on the product module addition is presented in this paper. This makes it possible to avoid a complex operation of finding a modular multiplicative inverse and replace it with the addition operation that increases the speed of the computing system. The scheme of the developed method is given in the article. Analytical and graphical comparison of the time complexities of the proposed and known approaches shows that the use of the method of adding the product modules allows reducing the time complexity of decimal number recovery from its residues in comparison with the classical ones.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128105775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Design for a Cryptographically Secure Pseudo Random Number Generator 一种加密安全伪随机数生成器的设计
Benjamin Williams, R. Hiromoto, Albert H Carlson
We proposes the design of a cryptographically secure pseudo random number generator (CSPRNG) that involves the permutation of the internal state of the PRNG. The design of the CSPRNG is described and Dieharder test comparisons are made against AES. The results of these tests are described and a discussion of future work concludes the paper.
提出了一种涉及伪随机数内部状态置换的加密安全伪随机数生成器(CSPRNG)。介绍了CSPRNG的设计,并与AES进行了硬硬度测试比较。本文对这些试验的结果进行了描述,并对今后的工作进行了讨论。
{"title":"A Design for a Cryptographically Secure Pseudo Random Number Generator","authors":"Benjamin Williams, R. Hiromoto, Albert H Carlson","doi":"10.1109/IDAACS.2019.8924431","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924431","url":null,"abstract":"We proposes the design of a cryptographically secure pseudo random number generator (CSPRNG) that involves the permutation of the internal state of the PRNG. The design of the CSPRNG is described and Dieharder test comparisons are made against AES. The results of these tests are described and a discussion of future work concludes the paper.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115738243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Methods of Proactive Management of Complex Projects Based on Neural Networks 基于神经网络的复杂项目主动管理方法
V. Morozov, O. Kalnichenko, M. Proskurin
In this paper, the results of research into the use of two methods of proactive change management in complex IT projects are presented based on the consideration of deviations in two key parameters of projects - in time and cost. Forecast estimates of the status of projects as a result of impacts of changes in the external and internal environment of projects are modeled using neural networks of deep training. This approach allows to predict the level of changes in the results of the project activity at any time during the implementation of projects. The evaluation of the results of modeling the effects of changes on project parameters is carried out taking into account the context characteristics of projects, including resource allocations both in time and in project work, cost allocations, etc.
本文在考虑项目的两个关键参数——时间和成本偏差的基础上,提出了在复杂IT项目中使用两种主动变更管理方法的研究结果。利用深度训练神经网络对项目外部和内部环境变化影响下的项目状态进行预测估计。这种方法允许在项目实施期间的任何时间预测项目活动结果的变化水平。对项目参数变化影响的建模结果进行评估时,要考虑到项目的环境特征,包括时间和项目工作中的资源分配、成本分配等。
{"title":"Methods of Proactive Management of Complex Projects Based on Neural Networks","authors":"V. Morozov, O. Kalnichenko, M. Proskurin","doi":"10.1109/IDAACS.2019.8924253","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924253","url":null,"abstract":"In this paper, the results of research into the use of two methods of proactive change management in complex IT projects are presented based on the consideration of deviations in two key parameters of projects - in time and cost. Forecast estimates of the status of projects as a result of impacts of changes in the external and internal environment of projects are modeled using neural networks of deep training. This approach allows to predict the level of changes in the results of the project activity at any time during the implementation of projects. The evaluation of the results of modeling the effects of changes on project parameters is carried out taking into account the context characteristics of projects, including resource allocations both in time and in project work, cost allocations, etc.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131079633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cyber Resilience Approach Based on Traffic Engineering Fast ReRoute with Policing 基于流量工程快速路由的网络弹性方法
Oleksandr V Lemeshko, Oleksandra Yeremenko, M. Yevdokymenko, A. Shapovalova, A. Hailan, A. Mersni
The paper is devoted to the research and development of the cyber resilience ensuring approach based on Traffic Engineering Fast ReRoute with the support of Traffic Policing features. The basis of the proposed approach is the mathematical model presented by the conditions of multipath routing, modified conditions of the flow conservation. It also takes into account traffic policing on the network edge, as well as conditions for protecting (reserving) the link, node, and network bandwidth adapted to cyber resilience requirements. The advantage of the proposed solution is problem formulation as a linear optimization. In the numerical example, the operability of the model and the adequacy of the results obtained on its basis have been demonstrated.
本文致力于研究和开发基于流量工程快速路由的基于流量监管特征的网络弹性保障方法。该方法基于多路径路由条件下的数学模型,修正了流量守恒条件。它还考虑了网络边缘的流量监管,以及保护(保留)适合网络弹性需求的链路、节点和网络带宽的条件。所提出的解决方案的优点是将问题表述为线性优化。算例表明了该模型的可操作性和在此基础上得到的结果的充分性。
{"title":"Cyber Resilience Approach Based on Traffic Engineering Fast ReRoute with Policing","authors":"Oleksandr V Lemeshko, Oleksandra Yeremenko, M. Yevdokymenko, A. Shapovalova, A. Hailan, A. Mersni","doi":"10.1109/IDAACS.2019.8924294","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924294","url":null,"abstract":"The paper is devoted to the research and development of the cyber resilience ensuring approach based on Traffic Engineering Fast ReRoute with the support of Traffic Policing features. The basis of the proposed approach is the mathematical model presented by the conditions of multipath routing, modified conditions of the flow conservation. It also takes into account traffic policing on the network edge, as well as conditions for protecting (reserving) the link, node, and network bandwidth adapted to cyber resilience requirements. The advantage of the proposed solution is problem formulation as a linear optimization. In the numerical example, the operability of the model and the adequacy of the results obtained on its basis have been demonstrated.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133033452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Application of Generalised Reed-Muller Expansion in Development of Programmable Logic Array 广义Reed-Muller展开在可编程逻辑阵列开发中的应用
E. Zaitseva, V. Levashenko, I. Lukyanchuk, M. Kvassay, J. Rabcan, Patrik Rusnak
The intensive development of information technologies and the need to process big information and data lead to elaboration of new technologies in the hardware design. One of the important aspects here is to increase the information capacity of gates and interconnections that is possible by application of non-binary elements. Employing non-binary (Many-Valued) cells as computing and memory units enables to pack unprecedented high-density information. In turn, use of non-binary units calls for development of new methods in logic design. These methods should be based on a non-binary logic and application of Multiple-Valued Logic in design of non-binary logical circuits and networks. In this paper, a new technique of the Programmable Logic Array design based on Many-Valued units is considered. This technique is based on the use of generalised Reed-Muller expansion of Multi-Valued Logic function representation.
信息技术的迅猛发展以及处理大信息和数据的需要,导致了硬件设计中对新技术的阐述。这里的一个重要方面是通过应用非二进制元素来增加门和互连的信息容量。采用非二进制(多值)单元作为计算和存储单元,可以打包前所未有的高密度信息。反过来,非二进制单位的使用要求在逻辑设计中开发新的方法。这些方法应以非二进制逻辑为基础,并将多值逻辑应用于非二进制逻辑电路和网络的设计。本文提出了一种基于多值单元的可编程逻辑阵列设计新技术。该技术基于多值逻辑函数表示法的广义Reed-Muller展开。
{"title":"Application of Generalised Reed-Muller Expansion in Development of Programmable Logic Array","authors":"E. Zaitseva, V. Levashenko, I. Lukyanchuk, M. Kvassay, J. Rabcan, Patrik Rusnak","doi":"10.1109/IDAACS.2019.8924457","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924457","url":null,"abstract":"The intensive development of information technologies and the need to process big information and data lead to elaboration of new technologies in the hardware design. One of the important aspects here is to increase the information capacity of gates and interconnections that is possible by application of non-binary elements. Employing non-binary (Many-Valued) cells as computing and memory units enables to pack unprecedented high-density information. In turn, use of non-binary units calls for development of new methods in logic design. These methods should be based on a non-binary logic and application of Multiple-Valued Logic in design of non-binary logical circuits and networks. In this paper, a new technique of the Programmable Logic Array design based on Many-Valued units is considered. This technique is based on the use of generalised Reed-Muller expansion of Multi-Valued Logic function representation.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114521826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Classification Based on BP Neural Network and Sine Cosine Algorithm 基于BP神经网络和正弦余弦算法的图像分类
Haoqiu Song, Z. Ye, Chunzhi Wang, Lingyu Yan
Image classification is one of the most important tasks in image analysis and computer vision. BP neural network is a successful classifier for the task. However, with regard to the low study efficiency and the slow convergence speed in BP algorithm, some optimization algorithms have been proposed for achieving better results. Among all these methods, BP neural network improved by particle swarm optimization (PSO) and genetic algorithm (GA) may be the most successful and classical ones. Nevertheless, both GA and PSO are easy to fall into the local optimal solution, which has a great impact on the precision of classification. As a result, a novel optimization algorithm called sine cosine algorithm (SCA) is presented to improve the classification performance. The experimental results manifest that the proposed method has good performances, and the classification accuracy is better than BP neural network optimized by GA, PSO or other algorithms.
图像分类是图像分析和计算机视觉中的重要任务之一。BP神经网络是一种成功的分类器。然而,针对BP算法的学习效率低、收敛速度慢的问题,已经提出了一些优化算法来取得更好的效果。在这些方法中,粒子群优化(PSO)和遗传算法(GA)改进的BP神经网络可能是最成功和经典的方法。然而,遗传算法和粒子群算法都容易陷入局部最优解,这对分类精度有很大影响。为此,提出了一种新的优化算法——正弦余弦算法(SCA)来提高分类性能。实验结果表明,该方法具有良好的性能,分类精度优于遗传算法、粒子群算法等优化后的BP神经网络。
{"title":"Image Classification Based on BP Neural Network and Sine Cosine Algorithm","authors":"Haoqiu Song, Z. Ye, Chunzhi Wang, Lingyu Yan","doi":"10.1109/IDAACS.2019.8924322","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924322","url":null,"abstract":"Image classification is one of the most important tasks in image analysis and computer vision. BP neural network is a successful classifier for the task. However, with regard to the low study efficiency and the slow convergence speed in BP algorithm, some optimization algorithms have been proposed for achieving better results. Among all these methods, BP neural network improved by particle swarm optimization (PSO) and genetic algorithm (GA) may be the most successful and classical ones. Nevertheless, both GA and PSO are easy to fall into the local optimal solution, which has a great impact on the precision of classification. As a result, a novel optimization algorithm called sine cosine algorithm (SCA) is presented to improve the classification performance. The experimental results manifest that the proposed method has good performances, and the classification accuracy is better than BP neural network optimized by GA, PSO or other algorithms.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117025399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fire Dispersal Estimation in Videos using Background Modelling and Subtraction by Tensor Decomposition 基于背景建模和张量分解减法的视频火灾扩散估计
I. Draganov, R. Mironov, A. Manolova, N. Neshov
In this paper a comparative analysis is presented among 4 algorithms employing tensor representation of videos for background modelling and subtraction aiming the estimation of fire dispersal. The algorithms are HoRPCA by IALM, Tucker-ALS, CP-ALS, and t-SVD. They are applied over a database of 6 videos containing fires at different stage of spreading, recorded at different scale and angle of perspective. In part of the videos intense smoke is also present. Decomposition times, full processing times with preprocessing stage and accuracy of fire dispersal in terms of relative number of correctly detected pixels forming the flame areas to all flame pixels from the original recordings are registered. Positive results are obtained which reveal the applicability of the tested algorithms for fire dispersal estimation and with the in-depth analysis of experimental results a selection in order of preference could be made for future applications given the circumstances at which fire breaks out.
本文对采用视频张量表示进行背景建模的4种算法进行了比较分析,并对针对火灾扩散估计的4种算法进行了减法。算法有:HoRPCA by IALM、Tucker-ALS、CP-ALS和t-SVD。它们被应用于一个包含6个视频的数据库,这些视频包含了不同蔓延阶段的火灾,以不同的规模和角度记录。在部分视频中还出现了强烈的烟雾。分解时间、预处理阶段的完整处理时间以及火焰扩散的准确性(根据形成火焰区域的正确检测像素的相对数量)与原始记录的所有火焰像素进行注册。通过对实验结果的深入分析,可以根据火灾发生的情况,按优先顺序进行选择,以供未来应用。
{"title":"Fire Dispersal Estimation in Videos using Background Modelling and Subtraction by Tensor Decomposition","authors":"I. Draganov, R. Mironov, A. Manolova, N. Neshov","doi":"10.1109/IDAACS.2019.8924377","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924377","url":null,"abstract":"In this paper a comparative analysis is presented among 4 algorithms employing tensor representation of videos for background modelling and subtraction aiming the estimation of fire dispersal. The algorithms are HoRPCA by IALM, Tucker-ALS, CP-ALS, and t-SVD. They are applied over a database of 6 videos containing fires at different stage of spreading, recorded at different scale and angle of perspective. In part of the videos intense smoke is also present. Decomposition times, full processing times with preprocessing stage and accuracy of fire dispersal in terms of relative number of correctly detected pixels forming the flame areas to all flame pixels from the original recordings are registered. Positive results are obtained which reveal the applicability of the tested algorithms for fire dispersal estimation and with the in-depth analysis of experimental results a selection in order of preference could be made for future applications given the circumstances at which fire breaks out.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"23 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116375419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Protocols Determination Based on Raw Data Analysis for Security Assesment under Uncertainty 不确定条件下基于原始数据分析的网络协议确定
D. Gaifulina, A. Fedorchenko, Igor Kotenko
The paper is devoted to issues of the network traffic analysis in conditions of uncertain network protocol specifications. We propose an approach to identify typical structures of network protocols and determine their lexical specifications based on text-inspired methods for the structural analysis of raw data. High heterogeneity, partial lexical uncertainty and use of new, proprietary or modified data transfer protocols in computer networks explain high relevance of the research topic. We present the technique of network traffic analysis and the results of experiments, that confirm the applicability of the proposed approach.
研究了不确定网络协议规范条件下的网络流量分析问题。我们提出了一种基于文本启发的方法来识别网络协议的典型结构,并确定其词法规范,用于对原始数据进行结构分析。高异质性,部分词汇的不确定性和在计算机网络中使用新的,专有的或修改的数据传输协议解释了研究课题的高度相关性。我们给出了网络流量分析技术和实验结果,验证了所提方法的适用性。
{"title":"Network Protocols Determination Based on Raw Data Analysis for Security Assesment under Uncertainty","authors":"D. Gaifulina, A. Fedorchenko, Igor Kotenko","doi":"10.1109/IDAACS.2019.8924349","DOIUrl":"https://doi.org/10.1109/IDAACS.2019.8924349","url":null,"abstract":"The paper is devoted to issues of the network traffic analysis in conditions of uncertain network protocol specifications. We propose an approach to identify typical structures of network protocols and determine their lexical specifications based on text-inspired methods for the structural analysis of raw data. High heterogeneity, partial lexical uncertainty and use of new, proprietary or modified data transfer protocols in computer networks explain high relevance of the research topic. We present the technique of network traffic analysis and the results of experiments, that confirm the applicability of the proposed approach.","PeriodicalId":415006,"journal":{"name":"2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116398883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1