1 |
Decentralized Indexing of Presentities over n-Dimensional Context InformationLentfort, Christian January 2012 (has links)
Modern context-aware applications no longer justify their decisions based only on their own information but on the decisions and information of other applications in a similar context. Acquiring context information of other entities in an distributed system is difficult task when using the current content centric solutions such as DHTs. This project aims to build a distributed index that provides storage for the so called Presentities solely based on the state of their context information. Furthermore, the stored Presentities must be efficiently accessible even if only some information of their current context is available. To fulfill these requirements the PAST DHT was extended to support range queries and modified to use points on a space-filling curve as index values. The simulation of the system has shown very good accuracy rates, on average 99%, for range queries by maintaining a logarithmic relationship to the amount of required messages sent in the DHT. Problems have emerged from the lack of load balancing implemented into the used DHT, but it is still the case that the proposed method of using space-filling curves to build a context centric decentralized index is both sufficient and effective. Keywords: context awareness, indexing, space-flling curves, Hilbert curve,Pastry, PAST
|
2 |
Detection Of Malicious Activity in Network Traffic on a Binary Representation using Image AnalysisHjerpe, Joar, Karlsson, Oliver January 2022 (has links)
In this thesis, we explore the idea of using binary visualization and image analysis to detect anomalous activity on an Industrial Internet of Things (IIoT) based network. The data is gathered into a pcap file and then fed into our encoder, which uses a space-filling curve to convert the 1-dimensional stream of data into pixels with a specific red, blue, and green gradient value. The pixels create an image which is then given to an image analysis system based on a Convolutional Neural Network, which classifies if the traffic supplied is malicious or not. The results show that using a Binary and Multiclass classifier approach to the image analysis both work well reaching an accuracy of 100% and 94% respectively. While the binary classifier is more accurate both succeed at separating Malicious from Benign traffic. The choice of space-filling curves in our binary visualization ended up having little to no impact on overall classification accuracy.
|
3 |
3d Object Recognition From Range ImagesIzciler, Fatih 01 September 2012 (has links) (PDF)
Recognizing generic objects by single or multi view range images is a contemporary popular problem in 3D object recognition area with developing technology of scanning devices such as laser range scanners. This problem is vital to current and future vision systems performing shape based matching and classification of the objects in an arbitrary scene. Despite improvements on scanners, there are still imperfections on range scans such as holes or unconnected parts on images. This studyobjects at proposing and comparing algorithms that match a range image to complete 3D models in a target database.The study started with a baseline algorithm which usesstatistical representation of 3D shapesbased on 4D geometricfeatures, namely SURFLET-Pair relations.The feature describes the geometrical relationof a surface-point pair and reflects local and the global characteristics of the object. With the desire of generating solution to the problem,another algorithmthat interpretsSURFLET-Pairslike in the baseline algorithm, in which histograms of the features are used,isconsidered. Moreover, two other methods are proposed by applying 2D space filing curves on range images and applying 4D space filling curves on histograms of SURFLET-Pairs. Wavelet transforms are used for filtering purposes in these algorithms. These methods are tried to be compact, robust, independent on a global coordinate frame and descriptive enough to be distinguish queries&rsquo / categories.Baseline and proposed algorithms are implemented on a database in which range scans of real objects with imperfections are queries while generic 3D objects from various different categories are target dataset.
|
4 |
A Graphics Processing Unit Based Discontinuous Galerkin Wave Equation Solver with hp-Adaptivity and Load BalancingTousignant, Guillaume 13 January 2023 (has links)
In computational fluid dynamics, we often need to solve complex problems with high precision and efficiency. We propose a three-pronged approach to attain this goal. First, we use the discontinuous Galerkin spectral element method (DG-SEM) for its high accuracy. Second, we use graphics processing units (GPUs) to perform our computations to exploit available parallel computing power. Third, we implement a parallel adaptive mesh refinement (AMR) algorithm to efficiently use our computing power where it is most needed. We present a GPU DG-SEM solver with AMR and dynamic load balancing for the 2D wave equation. The DG-SEM is a higher-order method that splits a domain into elements and represents the solution within these elements as a truncated series of orthogonal polynomials. This approach combines the geometric flexibility of finite-element methods with the exponential convergence of spectral methods. GPUs provide a massively parallel architecture, achieving a higher throughput than traditional CPUs. They are relatively new as a platform in the scientific community, therefore most algorithms need to be adapted to that new architecture. We perform most of our computations in parallel on multiple GPUs. AMR selectively refines elements in the domain where the error is estimated to be higher than a prescribed tolerance, via two mechanisms: p-refinement increases the polynomial order within elements, and h-refinement splits elements into several smaller ones. This provides a higher accuracy in important flow regions and increases capabilities of modeling complex flows, while saving computing power in other parts of the domain. We use the mortar element method to retain the exponential convergence of high-order methods at the non-conforming interfaces created by AMR. We implement a parallel dynamic load balancing algorithm to even out the load imbalance caused by solving problems in parallel over multiple GPUs with AMR. We implement a space-filling curve-based repartitioning algorithm which ensures good locality and small interfaces. While the intense calculations of the high order approach suit the GPU architecture, programming of the highly dynamic adaptive algorithm on GPUs is the most challenging aspect of this work. The resulting solver is tested on up to 64 GPUs on HPC platforms, where it shows good strong and weak scaling characteristics. Several example problems of increasing complexity are performed, showing a reduction in computation time of up to 3× on GPUs vs CPUs, depending on the loading of the GPUs and other user-defined choices of parameters. AMR is shown to improve computation times by an order of magnitude or more.
|
5 |
Range Searching Data Structures with Cache LocalityHamilton, Christopher 17 March 2011 (has links)
This thesis focuses on range searching data structures, an elementary problem in computational
geometry with research spanning decades. These problems often involve very large data sets.
Processor speeds increase faster than memory speeds, thus the gap between the rate at which CPUs can
process data and the rate at which it can be retrieved is increasing. To bridge this gap, various
levels of cache are used. Since cache misses are costly, algorithms should be cache-friendly.
The input-output (I/O) model was the first model for constructing cache-efficient algorithms,
focusing on a two-level memory hierarchy. Algorithms for this model require manual tuning to
determine optimal values for hardware dependent parameters, and are only optimal at a single level
of a memory hierarchy. Cache-oblivious (CO) algorithms are built without knowledge of the hierarchy,
allowing them to be optimal across all levels at once.
There exist strong theoretical and practical results for I/O-efficient range searching. Recently,
the CO model has received attention, but range searching remains poorly understood. This thesis
explores data structures for CO range counting and reporting. It presents the first space and
worst-case query-time optimal approximate range counting structure for a family of related problems,
and associated O(N log N)-space query-optimal reporting structures. The approximate counting
structure is the first of its kind in internal memory, I/O and CO models. Researchers have been
trying to create linear-space query-optimal CO reporting structures. This thesis shows that for a
variety of problems, linear space is in fact impossible.
Heuristics are also used for building cache-friendly algorithms. Space-filling curves are
continuous functions mapping multi-dimensional sets into one-dimensional ones. They are used to
build search structures in the hopes that objects that were close in the original space remain close
in the resulting ordering. This results in queries incurring fewer page swaps when traversing the
structure. The Hilbert curve is notably good at this, but often imposes a space or time penalty.
This thesis introduces compact Hilbert indices, which remove the ineffiency inherent for input point
sets with bounding boxes smaller than their bounding hypercubes.
|
6 |
Image Structures For Steganalysis And EncryptionSuresh, V 04 1900 (has links) (PDF)
In this work we study two aspects of image security: improper usage and illegal access of images. In the first part we present our results on steganalysis – protection against improper usage of images. In the second part we present our results on image encryption – protection against illegal access of images.
Steganography is the collective name for methodologies that allow the creation of invisible –hence secret– channels for information transfer. Steganalysis, the counter to steganography, is a collection of approaches that attempt to detect and quantify the presence of hidden messages in cover media.
First we present our studies on stego-images using features developed for data stream classification towards making some qualitative assessments about the effect of steganography on the lower order bit planes(LSB) of images. These features are effective in classifying different data streams. Using these features, we study the randomness properties of image and stego-image LSB streams and observe that data stream analysis techniques are inadequate for steganalysis purposes. This provides motivation to arrive at steganalytic techniques that go beyond the LSB properties. We then present our steganalytic approach which takes into account such properties.
In one such approach, we perform steganalysis from the point of view of quantifying the effect of perturbations caused by mild image processing operations–zoom-in/out, rotation, distortions–on stego-images. We show that this approach works both in detecting and estimating the presence of stego-contents for a particularly difficult steganographic technique known as LSB matching steganography.
Next, we present our results on our image encryption techniques. Encryption approaches which are used in the context of text data are usually unsuited for the purposes of encrypting images(and multimedia objects) in general. The reasons are: unlike text, the volume to be encrypted could be huge for images and leads to increased computational requirements; encryption used for text renders images incompressible thereby resulting in poor use of bandwidth. These issues are overcome by designing image encryption approaches that obfuscate the image by intelligently re-ordering the pixels or encrypt only parts of a given image in attempts to render them imperceptible. The obfuscated image or the partially encrypted image is still amenable to compression. Efficient image encryption schemes ensure that the obfuscation is not compromised by the inherent correlations present in the image. Also they ensure that the unencrypted portions of the image do not provide information about the encrypted parts. In this work we present two approaches for efficient image encryption.
First, we utilize the correlation preserving properties of the Hilbert space-filling-curves to reorder images in such a way that the image is obfuscated perceptually. This process does not compromise on the compressibility of the output image. We show experimentally that our approach leads to both perceptual security and perceptual encryption. We then show that the space-filling curve based approach also leads to more efficient partial encryption of images wherein only the salient parts of the image are encrypted thereby reducing the encryption load.
In our second approach, we show that Singular Value Decomposition(SVD) of images is useful from the point of image encryption by way of mismatching the unitary matrices resulting from the decomposition of images. It is seen that the images that result due to the mismatching operations are perceptually secure.
|
Page generated in 0.0788 seconds