RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Extended Information Overlap Measure Algorithm for Neighbor Vehicle Localization

        Punithan, Xavier,Seo, Seung-Woo The Institute of Electronics and Information Engin 2013 IEIE Transactions on Smart Processing & Computing Vol.2 No.4

        Early iterations of the existing Global Positioning System (GPS)-based or radio lateration technique-based vehicle localization algorithms suffer from flip ambiguities, forged relative location information and location information exchange overhead, which affect the subsequent iterations. This, in turn, results in an erroneous neighbor-vehicle map. This paper proposes an extended information overlap measure (EIOM) algorithm to reduce the flip error rates by exchanging the neighbor-vehicle presence features in binary information. This algorithm shifts and associates three pieces of information in the Moore neighborhood format: 1) feature information of the neighboring vehicles from a vision-based environment sensor system; 2) cardinal locations of the neighboring vehicles in its Moore neighborhood; and 3) identification information (MAC/IP addresses). Simulations were conducted for multi-lane highway scenarios to compare the proposed algorithm with the existing algorithm. The results showed that the flip error rates were reduced by up to 50%.

      • SCIESCOPUS

        Phase transitions in two-dimensional daisyworld with small-world effects- A study of local and long-range couplings

        Punithan, D.,McKay, R.I.(. North-Holland ; Elsevier Science Ltd 2014 Future generations computer systems Vol.33 No.-

        Watson and Lovelock's daisyworld is a coupled biotic-abiotic feedback loop exhibiting interesting planetary ecodynamics. Previous studies have shown fascinating spatio-temporal dynamics in a 2D daisyworld, with the emergence of complex spatial patterns. We introduce small-world effect into such a system. Even a small fraction of long-range couplings destroys the emergent static pattern formation, leading to completely coherent periodic dominance as observed in fully-connected graphs. This change in daisyworld behaviour depends only on the small-world effect, independent of the means by which they are induced (Watts-Strogatz, Newman-Watts and smallest-world models). The transition from static patterns in grid worlds to periodic coexisting dominance in small-worlds is relatively abrupt, exhibiting a critical region of rapid transition. The behaviours in this transition region are a mix of emergent static spatial patterns and large-scale pattern disruption.

      • King's Graph-Based Neighbor-Vehicle Mapping Framework

        Punithan, M. Xavier,Seung-Woo Seo IEEE 2013 IEEE transactions on intelligent transportation sy Vol.14 No.3

        <P>Vehicle localization algorithms aim to provide an accurate location estimation of neighbor vehicles for critical applications in intelligent vehicles. For the initial location estimation, localization algorithms use either Global Positioning System (GPS), radio-based lateration techniques, or both. These techniques suffer from three major issues, namely, flip ambiguities, location information exchange (beacon) overhead, and forged relative location information. The accuracy of these algorithms at the early iterations is primarily affected by flip ambiguities, which in turn result in erroneous initial location estimates. The errors from flip ambiguities are a monotonically increasing function of time and propagated to the subsequent iterations to build an erroneous neighbor-vehicle map. In this paper, we propose a novel GPS-free neighbor-vehicle mapping framework that provides reliable initial relative position estimates of neighbor vehicles and mitigates aforementioned issues. This framework uses presence/absence status information of neighbor vehicles in binary form from a vision-based environment sensor system to associate each vehicle's cardinal location with its identification information, such as media access control (MAC)/Internet Protocol addresses. We represent a vehicle's neighborhood region and neighborhood topology using the Moore neighborhood (MN) and King's graph (KG), respectively, by analyzing a typical vehicle formation in a multilane roadway. We also introduce a KG-based neighborhood information overlap measure (IOM) algorithm for neighbor mapping by exploiting the perspective symmetric properties of the MN. Performance analysis and simulation results show that the proposed algorithm builds an accurate relative neighbor-vehicle map and outperforms trilateration- and multilateration-based methods in mitigating flip ambiguities and location information exchange overhead.</P>

      • Cognitive Based Context Aware Reference History Management Tool

        Dharani Punithan(다라니),Bob McKay(로버트이안맥케이) 한국HCI학회 2009 한국HCI학회 학술대회 Vol.2009 No.2

        The aim of the research is to focus on the cognitive principles and to achieve human-level intelligence in referring context based browser history and the Windows history. One of the major problems faced by today's computer users is insufficient and single exclusive context based reference of the browser history and the Windows history. Today we search for the browser history and Windows history in different places even though the context is the same. For e.g., When working on a research paper or preparing a business presentation, a user may require to refer many web sites on the internet and various documents on the local computer. The browser can provide only time based history. The windows document history is also time based and limited to list only few documents. Hence, we propose a tool "Cognitive Based Context Aware Reference History Management Tool" which helps to access the exclusive reference of context and time based history in one place. The tool also proposes to store image history with urls and classifies images of a specific topic accessed in different time, bookmarks management and cross browser history management. These features are very useful as we can access all related documents (doc, docx, ppt, pptx, pdf, txt, and html), web pages, images and bookmarks in one place. The tool uses the cognitive principles like classification and association to achieve the purpose.

      • A game theoretic model for dynamic configuration of large-scale intrusion detection signatures

        Springer Science + Business Media 2016 MULTIMEDIA TOOLS AND APPLICATIONS Vol.75 No.23

        <P>In this paper, we note that the signature-based intrusion detection system (S-IDS) can cause the low accuracy against mutants of intrusion packets. This is because the S-IDS commonly detects network intrusion in data flows by identifying the existence of the predefined intrusion signatures, which is called static intrusion signature configuration (SISC). To increase the accuracy, all intrusion signatures corresponding to all possible mutants of a pertinent attack may be activated. However, the static intrusion signature configuration with all possible intrusion signatures can largely increase the size of storage and the signature search time in the process of signature analysis. To solve the problems that occur when activating all possible intrusion signatures, we propose a two-player non-cooperative zero-sum game with incomplete information for dynamic intrusion signature configuration (DISC), where the various lengths of an intrusion signature have been activated in a time-shared manner. After formulating the problem into the game theoretic approach, we found the optimal strategy for DISC in the S-IDS. To the best of our knowledge, this work is the first approach that analyzes the optimal DISC strategy against the various mutants of intrusion packets. From evaluation results, we show that the DISC by the defender is more effective than the SISC against various mutants of intrusion packets by the intruder.</P>

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼