The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper aims to model the accelerometer with nonlinearity by applying least square support vector regression (LS-SVR). A one-pass modeling approach based on LS-SVR with mixed kernel function is proposed. It could construct the linear approximated model and the nonlinear characteristics at one time. A LabVIEW-based automatic measurement system for accelerometer dynamic characteristics is designed...
Many background subtraction algorithms have been proposed in the last fifteen years and an important issue is to provide a way to evaluate and compare most popular models according to criteria. This paper present a comparison among the eleven models using BMC dataset and give a guideline to choose different algorithms in different scenes by computing the F-measure, Peak Signal-Noise Ratio, Structural...
In general, highly parallelized programs executed on heterogeneous multiprocessor platforms may get better performance than homogeneous ones. OpenCL is one of the standards for parallel programming of heterogeneous multiprocessor platforms and SPIR (Standard Portable Intermediate Representation) is a portable binary format for representing OpenCL kernel code. However, the programming of these programs...
Fraud is a threat that most online service providers must address in the development of their systems to ensure an efficient security policy and the integrity of their revenue. If rule-based systems and supervised methods usually provide the best detection and prevention, labelled training datasets are often non-existent and such solutions lack reactivity when facing adaptive fraudsters. Many generic...
Vehicular ad-hoc networks (VANET) aim at exchanging traffic safety and/or general purpose data by vehicles with fixed devices and other vehicles. The IEEE 802.11p standard defines the physical and medium access control layers for VANETs. High costs of commercial devices make practical experiments quite expensive. This work proposes a low cost, customizable device that supports different VANET standards...
For many software components, it is useful and important to verify their security. This can be done by an analysis of the software itself, or by isolating the software behind a protection mechanism such as an operating system kernel (virtual-memory protection) or cryptographic authentication (don't accepted untrusted inputs). But the protection mechanisms themselves must then be verified not just...
For GPUs to achieve their peak performance, effective and efficient usage of memory bandwidth is necessary. To this end, programmers invest extensive development effort to optimize a GPU program, specially its memory bandwidth usage. The OpenACC programming model has been introduced to tackle the accelerators programming complexity. However, this model's coarse-grained control on a program can make...
The article presents a security solution of mapping RBAC model in to Linux kernel systems. RBAC management model represents an effective concept of mapping user organization structure to access control of computer systems objects. Definition of RBAC model roles allows declaring permitted operations with specified security policy. Based on the roles, system management model provides a comprehensive...
This paper addresses the orientation estimation in digital images using gradient-based methods. In particular, the second-moment matrix is used to extract the information about the local orientation and the degree of anisotropy in the image, mainly in structured and sinusoid-like textured images. Keeping in mind that the extent of gradient fields smoothing should be decent to extract as faithfully...
This work tackles two simultaneous challenges faced by autotuners: the ease ofdescribing a complex, multidimensional search space, and the speed ofevaluating that space, while applying a multitude of pruning constraints. Thisarticle presents a declarative notation for describing a search space and atranslation system for conversion to a standard C code for fast andmultithreaded, as necessary, evaluation...
Gaussian processes provide a Bayesian regression framework, commonly used in stationary regression by online learning, where the data is fed one by one. In this paper, a perturbed Gaussian process with chunk sparsification is proposed to track non-stationary systems. A chunk sparsification mechanism is designed to select the optimal bases from a chunk of data. The non-stationary system is modeled...
Large amounts of visual data are gathered from various surveillance systems across different places and times, and have to be processed in order to infer the current state of the world. One of the common problems in surveillance scenarios is person re-identification, the task of associating a person across different cameras. On the other hand, these scenarios raise privacy concerns, which lead to...
Custom hardware accelerators are widely used to improve the performance of software applications in terms of execution times and to reduce energy consumption. However the realization of an hardware accelerator and its integration in the final system is a difficult and error prone task. For this reason, both Industry and Academy are continuously developing Computer Aided Design (CAD) tools to assist...
ChaCha20 is an encryption cipher selected by Google to replace the now obsolete RC4 in the Chrome browser and Android devices. The current article discusses the performance implications of parallelizing ChaCha20 across multicore CPU and GPU. The serial implementation used to derive the parallel code is part of BoringSSL encryption library. We used OpenMP and OpenCL to accelerate the cipher and obtain...
Network Function Visualization (NFV) and Software Defined Network (SDN) currently play a key role to transform the network architecture from hardware-based to software-based. Along with cloud computing, NFV and SDN are moving network functions from dedicated hardware to software implementation (Virtual Network Functions — VNF), on Virtual Machine (VM) or other virtualization technology such as containers,...
The logarithmic number system (LNS) has always been an interesting alternative for floating point calculations since the implementation of several arithmetic operations such as divisions, exponentiations and square-roots, which are required for computationally intensive nonlinear functions, is greatly simplified in the logarithmic space. However, additions and subtractions become nonlinear operations...
Tampering images to create false ones using photo manipulation software is very easy. Tampering may be in the form of image splicing. Image Splicing involves the introduction of a selected region from one image into another with the aim to alter its content. Splicing may be in the form of blurred regions introduced via Gaussian blur. In this paper, a method based on inconsistencies in Gaussian blur...
Predicting mortality of Middle East respiratory syndrome (MERS) patients with identified outcomes is a core goal for hospitals in deciding whether a new patient should be hospitalized or not in the presence of limited resources of the hospitals. We present an oversampling approach that we call Greedy-Based Oversampling Approach (GBOA). We evaluate our approach and compare it against the standard oversampling...
Traditional suites used for benchmarking high-performance computing platforms or for architectural design space exploration use much simpler virtual memory layouts and multitasking/ multithreading schemes, which means that they cannot be used to study the complex interactions among the layers of the Android software stack. To demonstrate this, we present memory reference and concurrency data showing...
PMBOK represents an established body of knowledge in project management. Essence Kernel and Language represents an advance on dealing with software systems projects. Essence establishes a kernel that represents principles and practices of both industry and academy, despite none defined aligned with the Knowledge Areas and Processes Groups of PMBOK. This paper presents the relationship among the Essence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.