2017
DOI: 10.14257/ijca.2017.10.10.11
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of the RSIL to LLVM IR Translator for Verification of the Intermediate Code on IoT Virtual Machine

Abstract: The phenomenon of sample impoverishment during particle filtering always contribute computation burden to the inertial-based mobile IPS systems. This is due to the factor of noise measurement and number of particle. Usually, the special strategies resampling algorithms was used. However, these algorithms just can fit in certain environment. This needs an adaptation of noise measurement and number of particle in a algorithm in order to make resampling with more intelligence, reliability and robust. In tbis pape… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…Through static analysis technology, it is easy to implement sensitive application permission analysis and analysis of usage permission schemes. In this paper, the decompilation process of the original mobile application Apk file is converted into an intermediate code by using the decompilation permission analysis tool Apktool (Son et al, 2017). On the one hand, we can directly obtain the application file with sensitive permissions of the mobile application.…”
Section: Permissions and Usage Planmentioning
confidence: 99%
“…Through static analysis technology, it is easy to implement sensitive application permission analysis and analysis of usage permission schemes. In this paper, the decompilation process of the original mobile application Apk file is converted into an intermediate code by using the decompilation permission analysis tool Apktool (Son et al, 2017). On the one hand, we can directly obtain the application file with sensitive permissions of the mobile application.…”
Section: Permissions and Usage Planmentioning
confidence: 99%