165 research outputs found

    An Efficient Alarm Notification Algorithm for Earthquake Early Warning System

    Get PDF
    Alarm Notification is a service that addresses devices and users with messages to be processed immediately or at a specific time. In this paper, we propose an efficient alarm notification algorithm for earthquake early warning system in Taiwan. Due to the lack of multicast support in the general IP network, we try to deliver notification messages to multiple receivers in time base on location information、network throughput with peering ISPs and priority with IoT devices. With the proposed algorithm, we can not only reduce the burst message traffic for network but also send the messages in time

    Counting Crowds in Bad Weather

    Full text link
    Crowd counting has recently attracted significant attention in the field of computer vision due to its wide applications to image understanding. Numerous methods have been proposed and achieved state-of-the-art performance for real-world tasks. However, existing approaches do not perform well under adverse weather such as haze, rain, and snow since the visual appearances of crowds in such scenes are drastically different from those images in clear weather of typical datasets. In this paper, we propose a method for robust crowd counting in adverse weather scenarios. Instead of using a two-stage approach that involves image restoration and crowd counting modules, our model learns effective features and adaptive queries to account for large appearance variations. With these weather queries, the proposed model can learn the weather information according to the degradation of the input image and optimize with the crowd counting module simultaneously. Experimental results show that the proposed algorithm is effective in counting crowds under different weather types on benchmark datasets. The source code and trained models will be made available to the public.Comment: including supplemental materia

    Towards a Privacy Rule Conceptual Model for Smart Toys

    Get PDF
    A smart toy is defined as a device consisting of a physical toy component that connects to one or more toy computing services to facilitate gameplay in the cloud through networking and sensory technologies to enhance the functionality of a traditional toy. A smart toy in this context can be effectively considered an Internet of Things (IoT) with Artificial Intelligence (AI) which can provide Augmented Reality (AR) experiences to users. In this paper, the first assumption is that children do not understand the concept of privacy and the children do not know how to protect themselves online, especially in a social media and cloud environment. The second assumption is that children may disclose private information to smart toys and not be aware of the possible consequences and liabilities. This paper presents a privacy rule conceptual model with the concepts of smart toy, mobile service, device, location, and guidance with related privacy entities: purpose, recipient, obligation, and retention for smart toys. Further the paper also discusses an implementation of the prototype interface with sample scenarios for future research works

    RVSL: Robust Vehicle Similarity Learning in Real Hazy Scenes Based on Semi-supervised Learning

    Full text link
    Recently, vehicle similarity learning, also called re-identification (ReID), has attracted significant attention in computer vision. Several algorithms have been developed and obtained considerable success. However, most existing methods have unpleasant performance in the hazy scenario due to poor visibility. Though some strategies are possible to resolve this problem, they still have room to be improved due to the limited performance in real-world scenarios and the lack of real-world clear ground truth. Thus, to resolve this problem, inspired by CycleGAN, we construct a training paradigm called \textbf{RVSL} which integrates ReID and domain transformation techniques. The network is trained on semi-supervised fashion and does not require to employ the ID labels and the corresponding clear ground truths to learn hazy vehicle ReID mission in the real-world haze scenes. To further constrain the unsupervised learning process effectively, several losses are developed. Experimental results on synthetic and real-world datasets indicate that the proposed method can achieve state-of-the-art performance on hazy vehicle ReID problems. It is worth mentioning that although the proposed method is trained without real-world label information, it can achieve competitive performance compared to existing supervised methods trained on complete label information.Comment: Accepted by ECCV 202

    Certified Robustness of Quantum Classifiers against Adversarial Examples through Quantum Noise

    Full text link
    Recently, quantum classifiers have been known to be vulnerable to adversarial attacks, where quantum classifiers are fooled by imperceptible noises to have misclassification. In this paper, we propose one first theoretical study that utilizing the added quantum random rotation noise can improve the robustness of quantum classifiers against adversarial attacks. We connect the definition of differential privacy and demonstrate the quantum classifier trained with the natural presence of additive noise is differentially private. Lastly, we derive a certified robustness bound to enable quantum classifiers to defend against adversarial examples supported by experimental results.Comment: Submitted to IEEE ICASSP 202

    Xprobe2++: Low volume remote network information gathering tool

    Full text link
    Active operating system fingerprinting is the process of actively determining a target network system’s underlying operating system type and characteristics by probing the target system network stack with specifically crafted packets and analyzing received response. Identifying the underlying operating system of a network host is an important char-acteristic that can be used to complement network inven-tory processes, intrusion detection system discovery mech-anisms, security network scanners, vulnerability analysis systems and other security tools that need to evaluate vul-nerabilities on remote network systems. During recent years there was a number of publications featuring techniques that aim to confuse or defeat remote network fingerprinting probes. In this paper we present a new version Xprobe2, the net-work mapping and active operating system fingerprinting tool with improved probing process, which deals with most of the defeating techniques, discussed in recent literature

    Acquiring Authentic Data in Unattended Wireless Sensor Networks

    Get PDF
    An Unattended Wireless Sensor Network (UWSN) can be used in many applications to collect valuable data. Nevertheless, due to the unattended nature, the sensors could be compromised and the sensor readings would be maliciously altered so that the sink accepts the falsified sensor readings. Unfortunately, few attentions have been given to this authentication problem. Moreover, existing methods suffer from different kinds of DoS attacks such as Path-Based DoS (PDoS) and False Endorsement-based DoS (FEDoS) attacks. In this paper, a scheme, called AAD, is proposed to Acquire Authentic Data in UWSNs. We exploit the collaboration among sensors to address the authentication problem. With the proper design of the collaboration mechanism, AAD has superior resilience against sensor compromises, PDoS attack, and FEDoS attack. In addition, compared with prior works, AAD also has relatively low energy consumption. In particular, according to our simulation, in a network with 1,000 sensors, the energy consumed by AAD is lower than 30% of that consumed by the existing method, ExCo. The analysis and simulation are also conducted to demonstrate the superiority of the proposed AAD scheme over the existing methods

    Molecular Cloning of a New Immunomodulatory Protein from Anoectochilus formosanus which Induces B Cell IgM Secretion through a T-Independent Mechanism

    Get PDF
    An immunomodulatory protein (IPAF) was purified and cloned from Anoectochilus formosanus, an Orchidaceae herbal plant in Asia. The major targeting immune cells of IPAF and its modulating effects toward B lymphocytes were investigated. Rapid amplification of cDNA ends (RACE) was conducted to clone the IPAF gene, and the obtained sequence was BLAST compared on the NCBI database. MACS-purified mouse T and B lymphocytes were stimulated with IPAF and the cell proliferation, activation, and Igs production were examined. IPAF comprised a 25 amino acids signal peptide and a 138 amino acids protein which was homologous to the lectins from Orchidaceae plant. IPAF selectively induced the cell proliferation in mouse splenic B lymphocytes but not T lymphocytes. The IPAF-induced B cells exhibited increased CD69 and MHC class II expression, and a dose- and time-dependent enhancement in IgM production. These results suggested potential benefits of IPAF to strengthen the humoral immunity
    corecore