2012 Third International Conference on Emerging Security Technologies最新文献

筛选
英文 中文
Track Fusion in a New Security System for Airports 航迹融合在新型机场安全系统中的应用
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.37
R. Cardinali, Enrico Anniballi
{"title":"Track Fusion in a New Security System for Airports","authors":"R. Cardinali, Enrico Anniballi","doi":"10.1109/EST.2012.37","DOIUrl":"https://doi.org/10.1109/EST.2012.37","url":null,"abstract":"This paper proposes a new concept for increasing airport security. The key point of this innovative system is the definition of a new airport security system architecture that covers not only the access to the sterile area, but also to the public area (currently monitored mainly through CCTV). The proposed architecture achieves such by increasing the security capability by using innovative sensors able to detect metallic and non-metallic objects without the passengers collaboration. The fusion of the information obtained from sensors with different physical characteristics enhances the understanding of the monitored surroundings and provides the basis for planning and decision-making. The core of the new system is therefore the means through which it executes data management and data fusion. In this paper a feasible track fusion strategy is proposed and its performance analyzed.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126925476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Systems Biology Meets Systemic Medicine: The Old, the New and the Blue 系统生物学与系统医学:旧的,新的和蓝色
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.14
K. Mashayekhi, L. Lăbușcă
{"title":"Systems Biology Meets Systemic Medicine: The Old, the New and the Blue","authors":"K. Mashayekhi, L. Lăbușcă","doi":"10.1109/EST.2012.14","DOIUrl":"https://doi.org/10.1109/EST.2012.14","url":null,"abstract":"Breakthroughs in technology that deliver fast and accurate molecular biology data, together with the use of advanced software, and analytical methods made possible quantitative accumulation of biological information leading to a qualitative evolution. Sequencing of human genome was of the first door to the era of systemic understanding in life sciences. The paper reviews the emerging concepts of systems biology, systems medicine and their potential benefits in science and practice.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124481140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Investigation of Properties of ICmetrics Features ICmetrics特征的性质研究
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.22
Y. Kovalchuk, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier, Daniel Newman, Stephen Kelly, G. Howells
{"title":"Investigation of Properties of ICmetrics Features","authors":"Y. Kovalchuk, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier, Daniel Newman, Stephen Kelly, G. Howells","doi":"10.1109/EST.2012.22","DOIUrl":"https://doi.org/10.1109/EST.2012.22","url":null,"abstract":"The ICmetrics technology is concerned with identifying acceptable features in an electronic system's operation for encryption purposes. Ideally, the nature of the features should be identical for all of the systems considered, while the values of these features should allow for unique identification of each of the systems. This paper looks at the properties of the Program Counter of a processor core as a potential ICmetrics feature, and explores how the number of its samples being inputted into the ICmetrics system affects stability of the system's performance.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127695210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Image Enhancement vs Feature Fusion in Colour Iris Recognition 彩色虹膜识别中的图像增强与特征融合
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.33
P. Radu, K. Sirlantzis, G. Howells, Sanaul Hoque, F. Deravi
{"title":"Image Enhancement vs Feature Fusion in Colour Iris Recognition","authors":"P. Radu, K. Sirlantzis, G. Howells, Sanaul Hoque, F. Deravi","doi":"10.1109/EST.2012.33","DOIUrl":"https://doi.org/10.1109/EST.2012.33","url":null,"abstract":"In iris recognition, most of the research was conducted on operation under near infrared illumination. For an iris recognition system to be deployed on common hardware devices, such as laptops or mobile phones, its ability of working with visible spectrum iris images is necessary. Two of the main possible approaches to cope with noisy images in a colour iris recognition system are either to apply image enhancement techniques or to extract multiple types of features and subsequently to employ an efficient fusion mechanism. The contribution of the present paper consists of comparing which of the two above mentioned approaches is best in both identification and verification scenarios of a colour iris recognition system. The efficiency of the two approaches is demonstrated on UBIRISv1 dataset.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128042755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On the Helmholtz Principle for Data Mining 数据挖掘中的Helmholtz原理
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.11
Boris Dadachev, A. Balinsky, H. Balinsky, S. Simske
{"title":"On the Helmholtz Principle for Data Mining","authors":"Boris Dadachev, A. Balinsky, H. Balinsky, S. Simske","doi":"10.1109/EST.2012.11","DOIUrl":"https://doi.org/10.1109/EST.2012.11","url":null,"abstract":"Unusual behaviour detection and information extraction in streams of short documents and files (emails, news, tweets, log files, messages, etc.) are important problems in security applications. In [1], [2], a new approach to rapid change detection and automatic summarization of large documents was introduced. This approach is based on a theory of social networks and ideas from image processing and especially on the Helmholtz Principle from the Gestalt Theory of human perception. In this article we modify, optimize and verify the approach from [1], [2] to unusual behaviour detection and information extraction from small documents.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130432453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Optimum-Path Forest Classifier for Large Scale Biometric Applications 大规模生物识别应用的最优路径森林分类器
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.31
L. C. Afonso, J. Papa, A. Marana, A. Poursaberi, S. Yanushkevich, M. Gavrilova
{"title":"Optimum-Path Forest Classifier for Large Scale Biometric Applications","authors":"L. C. Afonso, J. Papa, A. Marana, A. Poursaberi, S. Yanushkevich, M. Gavrilova","doi":"10.1109/EST.2012.31","DOIUrl":"https://doi.org/10.1109/EST.2012.31","url":null,"abstract":"This paper addresses biometric identification using large databases, in particular, iris databases. In such applications, it is critical to have low response time, while maintaining an acceptable recognition rate. Thus, the trade-off between speed and accuracy must be evaluated for processing and recognition parts of an identification system. In this paper, a graph-based framework for pattern recognition, called Optimum-Path Forest (OPF), is utilized as a classifier in a pre-developed iris recognition system. The aim of this paper is to verify the effectiveness of OPF in the field of iris recognition, and its performance for various scale iris databases. The existing Gauss-Laguerre Wavelet based coding scheme is used for iris encoding. The performance of the OPF and two other - Hamming and Bayesian - classifiers, is compared using small, medium, and large-scale databases. Such a comparison shows that the OPF has faster response for large-scale databases, thus performing better than the more accurate, but slower, classifiers.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115446808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Macro-Prosodic Indications for a Romanian TtS System Based on the Functional Intonational Model 基于功能语调模型的罗马尼亚语TtS系统宏观韵律指示
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.48
V. Apopei, D. Jitca, Otilia Paduraru
{"title":"A Macro-Prosodic Indications for a Romanian TtS System Based on the Functional Intonational Model","authors":"V. Apopei, D. Jitca, Otilia Paduraru","doi":"10.1109/EST.2012.48","DOIUrl":"https://doi.org/10.1109/EST.2012.48","url":null,"abstract":"This paper presents how macro-prosodic indications can be used within our TtS system in order to drive the prosody prediction module (PPM) in generating a target intonational contour for the synthesized utterance. The previous variant of the PPM generates melodic contour descriptions only using the implicit prosodic indications deduced from the text analysis. The explicit indications are edited in the input text window and refer to the group markers applied to a text to which can be assigned a focus attribute with an indication on its strength. It can be also assigned to a group an attribute of tonal prominence (related to the tonal level of the highest peak in the group). We called these indications the macro-prosodic indications. We also defined a microprosodic indication that refers to the pitch accent type attribute at the accentual unit level that is related to F0 contour pattern. The values of this attribute are taken from the Ro-ToBI label set. Both macro and microprosodic indications lead to elicit certain intonational variants at the speech synthesis output and also can improve the Romanian intonation contour understanding.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"98 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120862667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-camera Very Wide Baseline Feature Matching Based on View-Adaptive Junction Detection 基于视角自适应连接点检测的多相机甚宽基线特征匹配
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.34
Maykel Pérez, L. Salgado, J. Arróspide, Javier Marinas, M. Nieto
{"title":"Multi-camera Very Wide Baseline Feature Matching Based on View-Adaptive Junction Detection","authors":"Maykel Pérez, L. Salgado, J. Arróspide, Javier Marinas, M. Nieto","doi":"10.1109/EST.2012.34","DOIUrl":"https://doi.org/10.1109/EST.2012.34","url":null,"abstract":"This paper presents a strategy for solving the feature matching problem in calibrated very wide-baseline camera settings. In this kind of settings, perspective distortion, depth discontinuities and occlusion represent enormous challenges. The proposed strategy addresses them by using geometrical information, specifically by exploiting epipolar-constraints. As a result it provides a sparse number of reliable feature points for which 3D position is accurately recovered. Special features known as junctions are used for robust matching. In particular, a strategy for refinement of junction end-point matching is proposed which enhances usual junction-based approaches. This allows to compute cross-correlation between perfectly aligned plane patches in both images, thus yielding better matching results. Evaluation of experimental results proves the effectiveness of the proposed algorithm in very wide-baseline environments.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116171649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Robust Multimodal Biometric Security System Using the Polynomial Curve Technique within Shamir's Secret Sharing Algorithm 基于Shamir秘密共享算法的多项式曲线鲁棒多模态生物识别安全系统
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.9
Saad Aldosary, G. Howells
{"title":"A Robust Multimodal Biometric Security System Using the Polynomial Curve Technique within Shamir's Secret Sharing Algorithm","authors":"Saad Aldosary, G. Howells","doi":"10.1109/EST.2012.9","DOIUrl":"https://doi.org/10.1109/EST.2012.9","url":null,"abstract":"This paper investigates the application of secret sharing technology to allow an encryption key to be derived from multimodal biometric samples. Within the proposed scheme, individual points on a parabolic curve are indirectly derived from individual biometric samples taken from an individual, and Shamir's Secret Sharing algorithm is applied in order to derive the required key. The proposal is robust, in that a pre-defined subset of modalities is required in order to derive the key, rendering the system able to accommodate exception handling for given modalities. The current paper reports preliminary work on how secret sharing techniques may be employed to integrate arbitrary points that may be derived from the actual biometric data.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116875877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Spontaneous Perception of Whole Persons According the Distance 根据距离对整个人的自发感知
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.28
S. Demarchi, Anais Taddei, C. Frowd
{"title":"Spontaneous Perception of Whole Persons According the Distance","authors":"S. Demarchi, Anais Taddei, C. Frowd","doi":"10.1109/EST.2012.28","DOIUrl":"https://doi.org/10.1109/EST.2012.28","url":null,"abstract":"In the field of automated facial identification, relevant facial information are not always available (disguises, poor spatial orientation, distance, etc.). As a consequence, human perception performance decreases. However, the \"whole person\" can provide useful information. In the present study, we determine the way by which a person is visually explored, in order to identify a potential chronology in visual exploration. We also investigate the consequence of increasing the distance between the observer and the target person, since in this situation identification becomes more 'global' due to less processing possible for the individual features of the face. Results showed that the spontaneous perceptual strategy evolves with distance: the more distance increases, the more the interest in the person decreases, which is observed both for the body and face. Our data provide knowledge that will help to guide conception of effective automated systems.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127014209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信