Open Access Open Access  Restricted Access Access granted  Restricted Access Subscription Access

Vol 44, No 3 (2018)

Article

Learning the Regularization Operator for the Optical Flow Problem

Kuzmin A.I.

Abstract

The task of displacement estimation for frames of a video sequence is considered. A new convolutional neural network architecture for the optical flow problem is proposed. The method is based on learning the regularization operator for a fast optimization method. The proposed method has low computational complexity and memory footprint at test time. The neural network architecture is based on unrolling iterations of a fast primal-dual method as layers of a convolutional neural network. Iterations of the optimization method are represented as convolutions with filters that are trained on ground truth data by backpropagation. A real-time implementation using graphics processing units is proposed. Experimental results demonstrate an improved quality of the optical flow field as compared to the optimization method based on a fixed regularization operator.

Programming and Computer Software. 2018;44(3):139-147
pages 139-147 views

On the Recovery of Motion of Dynamic Objects from Stereo Images

Bobkov V.A., Kudryashov A.P., Mel’man S.V.

Abstract

An approach to the recovery of trajectories of objects in a dynamic scene from stereo images is proposed. The approach is based on the use of a point representation of objects, visual odometry, and a set of algorithms that produce point models of objects and calculate their trajectories using matched 3D point clouds. Results of numerical experiments for synthetic scenes are discussed.

Programming and Computer Software. 2018;44(3):148-158
pages 148-158 views

Schedulability Analysis for Strictly Periodic Tasks in RTOS

Zelenova S.A., Zelenov S.V.

Abstract

A new look at the problem of constructing a scheduler in the case of a group of strictly periodic tasks is proposed. The structure of the system of periods is represented in terms of graph theory. A criterion for the existence of a conflict-free schedule based on this representation is obtained, and generic schemes of algorithms for constructing such a schedule are described. The proposed approach is illustrated by building schedules for a number of strictly periodic tasks.

Programming and Computer Software. 2018;44(3):159-169
pages 159-169 views

Neuron-Like Approach to Speech Recognition

Diep N.N., Zhdanov A.A.

Abstract

In this paper, we present a new approach to speech recognition based on A. Zhdanov’s biomorphic neuron-like networks, which is also known as the autonomous adaptive control (AAC) method. In contrast to artificial neural networks (ANNs), a neuron in the AAC method is itself a self-learning pattern recognition system. We attempt to build a speech recognition system as a construction of such neurons without a program component. If this attempt is successful, then we will be able to simulate the natural principle of speech recognition not only in a program way but also via parallel hardware implementations. We understand the speech recognition problem as one of the speech processes in natural nervous systems that is to be simulated.

Programming and Computer Software. 2018;44(3):170-180
pages 170-180 views

Towards a Cloud Computing Paradigm for Big Data Analysis in Smart Cities

Massobrio R., Nesmachnow S., Tchernykh A., Avetisyan A., Radchenko G.

Abstract

In this paper, we present a Big Data analysis paradigm related to smart cities using cloud computing infrastructures. The proposed architecture follows the MapReduce parallel model implemented using the Hadoop framework. We analyse two case studies: a quality-of-service assessment of public transportation system using historical bus location data, and a passenger-mobility estimation using ticket sales data from smartcards. Both case studies use real data from the transportation system of Montevideo, Uruguay. The experimental evaluation demonstrates that the proposed model allows processing large volumes of data efficiently.

Programming and Computer Software. 2018;44(3):181-189
pages 181-189 views

Prototype of a Verified Program Code Execution System

Kozachok A.V., Kochetkov E.V.

Abstract

This paper describes technical implementation of a verified program code execution system. The functional purpose of the system is to investigate arbitrary executable files of an operating system in the absence of source codes in order to control program code execution within specified functional requirements. The prerequisites for development of such a system are outlined and a user’s operating procedure with two typical usage scenarios is described. General description of the architecture of the system and software used for its implementation, including the mechanism of interaction among system elements, is presented. A model example of implementing the system is considered. A flexible set of functional constraints based on a temporal attribute of process action is described. In conclusions, a brief comparison with the closest analogs is conducted.

Programming and Computer Software. 2018;44(3):190-199
pages 190-199 views

On the Representation of Results of Binary Code Reverse Engineering

Padaryan V.A., Ledovskikh I.N.

Abstract

A representation of algorithms extracted from binary code by reverse engineering is discussed. Both intermediate representations designed for automatic analysis and final representations passed to the end user are considered. The two main tasks of reverse engineering—automatic detection of exploitable vulnerabilities and discovery of undocumented features— are analyzed. The basic scheme of the system implementing the automatic detection of exploitable vulnerabilities is presented and the key properties of the intermediate representation designed for solving this problem using an efficient generation of a system of equations for an SMT solver are described. The workflow for discovering undocumented features is described. These steps are the localization of the algorithm, its representation in the form that is convenient for analysis, and investigation of its properties. To automate the first phase, a combined static and dynamic representation is constructed, which includes OS-level events and calls to library functions; they serve as anchor points used by the analyst for the algorithm localization. The further support of localization uses code slicing and navigation algorithms. Once the algorithm is localized, the further work goes in two directions: interactive construction of a compact annotated representation of the algorithm by a flowchart and automated investigation of the algorithm properties aimed at determining declared and undeclared data flows. The representation of the algorithm is based on the construction of simplified models of functions taking into account input and output buffers and on the automatic detection of data dependences between buffers of various function calls. The overall scenario of the analyst' work with such a flowchart in the context of discovering undocumented features is described; this scenario is based on annotating the declared data flows and on the automatic detection of undeclared data flows. In conclusion, an example of the resulting representation is discussed and the directions of further research are discussed.

Programming and Computer Software. 2018;44(3):200-206
pages 200-206 views

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies