Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
These days a lot of malware are generated. In order to deal with the new malware, we need new ways to detect malware. In this paper, we introduce a method to detect malware using deep learning. First, we generate images from benign files and malware. Second, by using deep learning, we train a model to detect malware. Then, by the trained model, we detect malware. By using malware images and deep learning,...
Software-Defined Networking (SDN) is an emerging network architecture that decouples the control plane and the data plane to provide unprecedented programmability, automation, and network control. The SDN controller exercises centralized control over network software, and in doing so, it can monitor and respond to malicious traffic for network protection. This paper proposes a threat-aware system...
Significant barriers to real time face detection have been the complexity of computation kernels, minimal costand superior accuracy requirements for both software and hardware implementation based on traditional high performance computing. It is desirable to develop variable precision face detection block for high dynamic range applications including night vision and infrared face detection applications...
Today's cyber-physical systems (CPS) for the emerging Smart cities includes hardware and software with intelligent sensing and controls. In Smart cities, the use of high definition images, videos, and context information has become a requirement for urban street data collection and processing. Field Programmable Gate Array enabled data centers and processing shows the great potential for its high...
In this paper, we present the Reconfigurable-Computing Environment (RCE) toolset for automatically generating VHDL models for implementation of generic applications on a Field Programmable Gate Array (FPGA). The RCE toolset automatically generates the hardware description of an Application Specific Digital Signal Processor (ASDSP) that is loaded onto an FPGA board containing multiple memories connected...
The Internet of Things (IoT) is emerging as a force to be reckoned with on the internet and in the economy overall. The IoT is being incorporated into home, hospital and smart grid infrastructures. However, the IoT brings with it a host of potential new security breaches and attacks. This paper proposes IoTGuard as a multi-dimensional security framework to protect against such IoT attacks. It is made...
We present a dataflow based performance estimation and synthesis framework that will help hardware designers quantify the algorithm performance and synthesize their HW designs onto Field Programmable Gate Arrays (FPGAs). Typically, Digital Signal Processing (DSP) systems are designed by making gradual architectural choices in HW refinement steps. These decisions are based on performance quantification...
This paper suggests a new performance metric for a mobile platform called as a posture variation index (PVI) to evaluate the smoothness of its movement, which is an important factor to predict undesired oscillations or shocks on a mobile platform while traveling on rugged terrain. The PVI consists of the height and pitch angle variations of center of mass of a mobile platform. By using the PVI, the...
We investigate the influence of offline friendship in three specific areas of Twitter networking behaviors: (a) network structure, (b) Twitter content and (c) interaction on Twitter. We observe some interesting findings through the empirical analysis of 2193 pairs of users who are online friends. When these pairs of users know each other offline, they are more likely to (1) respond to the online gesture...
Since most of the cancer markers that have been reported are obtained directly from cancer tissues, it is difficult to use them for early diagnosis of cancer without surgery. Thus, development of markers that can be detected by blood is crucial for making early diagnosis of cancer easier. One of the most feasible types of markers that can be detected by blood is a protein marker. Here, we focus on...
This paper presents a new mobile robotic platform (R-Mo) which can reduce unexpected variations in height as well as pitch angle of its main body while traversing rough terrains. As a measure for the smooth movement of mobile platform, the variations in height and pitch angle are chosen in this study. Then, the kinematic analysis on the Rocker-Bogie mechanism is carried out to investigate its variations...
With the buzz of Internet of Things (IoT), the low power sensor are getting deployed on large scale in applications such as industrial monitoring, smart homes and e-health. For the reason that the sensor devices are battery operated, though the round-robin based Time Division Multiple Access (TDMA) scheduling is the best choice for its high energy and throughput efficiency, the performance degrades...
We examine the learning curves of individual software developers in Open-Source Software (OSS) Development. We collected the dataset of multi-year code change histories from the repositories for 20 open source software projects involving more than 200 developers. We build and estimate regression models to assess individual developers' learning progress (in reducing the likelihood they make a bug)...
With growth in mobile Internet services, the relationship between mobile and fixed broadband has become an issue in telecom firm strategy. Previous research focused on aggregate penetration for mobile and fixed broadband services. Our research analyzes the economic relationship between mobile and fixed broadband services at the household level, as a basis for how senior managers should rethink their...
The Enhanced Distributed Channel Access (EDCA) mechanism is the most commonly implemented medium access scheme in today's wireless local area network (WLAN) products. With the introduction of the downlink multi-user MIMO (DL MU-MIMO) technology to the current IEEE 802.11 specification, the EDCA mechanism has been enhanced accordingly to support multiple simultaneous transmissions to different stations...
Advances in digital communications and signal processing have enabled the adaptation of advanced communication techniques in wireless LAN (WLAN) standards. Among those advanced techniques, multiple-input-multiple-output (MIMO) is now part of the high throughput (HT) WLAN standard, a.k.a. IEEE 802.11n.
In order to reduce the overhead of legacy WLANs, the IEEE 802.11n standard defines two aggregation schemes, i.e., A-MSDU and A-MPDU. In general, A-MPDU outperforms A-MSDU due to its selective retransmission capability. However, A-MPDU has a fundamental restriction on the minimum separation in time between the start of two consecutive subframes carried on the same A-MPDU. If such a gap is smaller than...
Current video compression algorithms are increasingly complicated and difficult to analyze and profile. Design tools and system level languages often prove to be inefficient and incapable of providing complexity analysis as a first step directed toward at the implementation of video compression algorithms. This paper proposes framework that will help to develop a methodology that facilitates the derivation...
In this paper, we study a relaying node re-selection problem in the IEEE 802.15.6 body area network (BAN) protocol, which requires to alleviate energy consumption burden of a relaying node and enhance the network life time. To this end, we develop a procedure for wake-up schedule control for a node that can be accommodated in the IEEE 802.15.6 standard. Numerical results show that by allowing a node...
For the first time in the WLAN technology, multi-user downlink transmission will be made possible by the upcoming IEEE standard, 802.11ac. In this paper, we will report its current status, focusing on the MAC modifications and enhancements that are necessary to support the unique feature of downlink multi-user MIMO transmission. In particular, the technique of enhancing Transmit Opportunity (TXOP)...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.