2012 Third International Conference on Emerging Security Technologies最新文献

筛选
英文 中文
A Bioinformatics Approach in Discovery Science 发现科学中的生物信息学方法
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.13
L. Lăbușcă, K. Mashayekhi
{"title":"A Bioinformatics Approach in Discovery Science","authors":"L. Lăbușcă, K. Mashayekhi","doi":"10.1109/EST.2012.13","DOIUrl":"https://doi.org/10.1109/EST.2012.13","url":null,"abstract":"Research focused in detecting cause and progression of the diseases is gathering an impressive amount of data. Integrating available information in a systemic approach requires knowledge about details as well as overview about predictable interconnections. The amount of accumulated data often underscores human mind capabilities to perceiving links and correlations. The paper offers an overview about several schools of thoughts perceiving OA as a systemic disease Bioinformatics is proposed as a tool in organizing existent knowledge aiming introduction of the discovery approach in using clinical and experimental data. Computational biology is used to detect possible correlations and links in molecular pathways and further pointed as one useful method to design focused systematic research.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116086043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finding People by their Shadows: Aerial Surveillance Using Body Biometrics Extracted from Ground Video 通过他们的影子找到人:利用从地面视频中提取的人体生物识别技术进行空中监视
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.41
Y. Iwashita, A. Stoica, R. Kurazume
{"title":"Finding People by their Shadows: Aerial Surveillance Using Body Biometrics Extracted from Ground Video","authors":"Y. Iwashita, A. Stoica, R. Kurazume","doi":"10.1109/EST.2012.41","DOIUrl":"https://doi.org/10.1109/EST.2012.41","url":null,"abstract":"Shadow analysis has been shown to enable the extension of gait biometrics to aerial surveillance. In past work the classifiers were both trained and tested on shadow features extracted by image processing. In real scenarios this requires imagery with shadows of people to be recognized. On the other hand one rarely has available the shadow information of the person sought, however direct body movement/information may be more easily obtained from ground surveillance cameras or video recordings. This paper proposes a scenario in which gait/dynamics features from body movement are obtained from a ground video and the search for matching dynamics of shadows takes place in aerial surveillance video. A common scenario would be the recording of people by ground/city surveillance cameras and the use of information to initiate a wide-area search for shadows from aerial platforms. Vice-versa, the shadow of a suspect leaving an incident area, detected by aerial surveillance, can trigger a city-wide search on body/gait biometrics as observed with city/ground surveillance cameras. To illustrate the feasibility of this approach the paper introduces a method that compares contours of bodies in ground image frames and contours of shadows in aerial image frames, for which an alignment is made and a distance is calculated, integrated over a normalized gait cycle. While the results are preliminary, for only 5 people, and using a specific walking arrangement to avoid compensation for changes in the viewing angles, the method obtains a 70% correct classification rate which is a first step in proving the feasibility of the approach.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126372664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
User-Contributory Case-Based Reasoning for Digital Forensic Investigations 基于用户贡献案例的数字法医调查推理
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.35
G. Horsman, C. Laing, Paul Vickers
{"title":"User-Contributory Case-Based Reasoning for Digital Forensic Investigations","authors":"G. Horsman, C. Laing, Paul Vickers","doi":"10.1109/EST.2012.35","DOIUrl":"https://doi.org/10.1109/EST.2012.35","url":null,"abstract":"A novel concept for approaching digital investigations is presented. User-contributory case-based reasoning (UCCBR) is a method by which previous results from digital forensic (DF) examinations are stored and reused in future investigations. The advantages of a UCCBR system are discussed which include implementing UCCBR as an auditing tool, a method for optimizing evidence retrieval and anomalous file detection.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127902620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sparse Gaussian Process for Spatial Function Estimation with Mobile Sensor Networks 移动传感器网络空间函数估计的稀疏高斯过程
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.27
Bowen Lu, Dongbing Gu, Huosheng Hu, K. Mcdonald-Maier
{"title":"Sparse Gaussian Process for Spatial Function Estimation with Mobile Sensor Networks","authors":"Bowen Lu, Dongbing Gu, Huosheng Hu, K. Mcdonald-Maier","doi":"10.1109/EST.2012.27","DOIUrl":"https://doi.org/10.1109/EST.2012.27","url":null,"abstract":"Gaussian process (GP) is well researched and used in machine learning field. Comparing with artificial neural network (ANN) and support vector regression (SVR), it provides additional covariance information for regression results. By exploiting this feature, an uncertainty based locational optimisation strategy combining with an entropy based data selection method for mobile sensor networks is presented in this paper. Centroidal Voronoi tessellation (CVT) is used as a locational optimisation framework and Informative Vector Machine (IVM) is applied for data selection. Simulations with different locational optimisation criteria are conducted and the results are given, which proved the effectiveness of presented strategy.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133610211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Direct Template-Free Encryption Key Generation from Palm-Veins 直接模板无加密密钥从掌纹生成
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.20
K. Harmer, G. Howells
{"title":"Direct Template-Free Encryption Key Generation from Palm-Veins","authors":"K. Harmer, G. Howells","doi":"10.1109/EST.2012.20","DOIUrl":"https://doi.org/10.1109/EST.2012.20","url":null,"abstract":"In this paper, an investigation into the feasibility of applying the palm-vein biometric modality within a template-free key generation framework was conducted. In partnership with iCognize GmbH, experiments were conducted on both the raw images and the encoded biometric templates. Although feature analysis suggested difficulties may ensue due to the significant overlapping between genuine and impostor distributions, it was found that the framework still performed well for dataset of 20 subjects. The experiments resulted in both the key reproducibility and key uniqueness rates achieving 100% with considerable effective key lengths. These results are highly encouraging and demonstrate that stable keys can be achieved from poorly separable features.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131676426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Secure Biometric System Design 安全生物识别系统设计
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.30
S. Yanushkevich
{"title":"Secure Biometric System Design","authors":"S. Yanushkevich","doi":"10.1109/EST.2012.30","DOIUrl":"https://doi.org/10.1109/EST.2012.30","url":null,"abstract":"The focus of this keynote is to introduce the biometric-based physical access system design approach, which allows for the thwarting of various attacks. Building a model of the attack to make predictions concerning the behavior of the system under study is the first step in designing a biometric system. In such models, effects of attacks are studied by monitoring symptoms of the attacks. For the modeling of biometric tools before they are prototyped, other modeling techniques should be used, in particular, probabilistic modeling based on belief networks.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133430924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic Sign Detection and Tracking Using Robust 3D Analysis 使用鲁棒3D分析的交通标志检测和跟踪
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.17
Javier Marinas, L. Salgado, J. Arróspide, M. Camplani
{"title":"Traffic Sign Detection and Tracking Using Robust 3D Analysis","authors":"Javier Marinas, L. Salgado, J. Arróspide, M. Camplani","doi":"10.1109/EST.2012.17","DOIUrl":"https://doi.org/10.1109/EST.2012.17","url":null,"abstract":"In this paper we present an innovative technique to tackle the problem of automatic road sign detection and tracking using an on-board stereo camera. It involves a continuous 3D analysis of the road sign during the whole tracking process. Firstly, a color and appearance based model is applied to generate road sign candidates in both stereo images. A sparse disparity map between the left and right images is then created for each candidate by using contour-based and SURF-based matching in the far and short range, respectively. Once the map has been computed, the correspondences are back-projected to generate a cloud of 3D points, and the best-fit plane is computed through RANSAC, ensuring robustness to outliers. Temporal consistency is enforced by means of a Kalman filter, which exploits the intrinsic smoothness of the 3D camera motion in traffic environments. Additionally, the estimation of the plane allows to correct deformations due to perspective, thus easing further sign classification.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128807419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Biomimetic Chaotic Sensors for Water Salinity Measurements and Conductive Titrimetry 用于水盐度测量和导电滴定的仿生混沌传感器
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.42
H. Teodorescu, V. Cojocaru
{"title":"Biomimetic Chaotic Sensors for Water Salinity Measurements and Conductive Titrimetry","authors":"H. Teodorescu, V. Cojocaru","doi":"10.1109/EST.2012.42","DOIUrl":"https://doi.org/10.1109/EST.2012.42","url":null,"abstract":"We present a simple sensor based on chaotic dynamics for the determination of water salinity. The sensor is based on the change in dynamics produced in a nonlinear dynamic circuit, which has a circuit element composed of the measured saline solution and electrodes.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116366724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A Knowledge Fusion Toolkit for Decision Making 面向决策的知识融合工具
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.39
E. Kriegel, U. Meissen, S. Pfennigschmidt, A. Voisard
{"title":"A Knowledge Fusion Toolkit for Decision Making","authors":"E. Kriegel, U. Meissen, S. Pfennigschmidt, A. Voisard","doi":"10.1109/EST.2012.39","DOIUrl":"https://doi.org/10.1109/EST.2012.39","url":null,"abstract":"This paper describes an application-independent Knowledge Fusion Toolkit to support decision-making in intelligent assistance, early warning, and security systems. The toolkit is realized on the basis of an industrial strength Java Enterprise technology, providing a runtime environment for modularized knowledge components, which contain all the application dependent functionality. We discuss here the toolkit's architecture as well as a use case from a research project carried out at Fraunhofer FOKUS.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115189510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design Approach on Human-Diminishing Devices Considered through Development of Hemiplegic Gait Simulation Device 从偏瘫步态仿真装置的研制考虑人体缩小装置的设计方法
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.29
S. Wesugi, M. Tamachi, Daichi Ojiro, Genta Kawase
{"title":"Design Approach on Human-Diminishing Devices Considered through Development of Hemiplegic Gait Simulation Device","authors":"S. Wesugi, M. Tamachi, Daichi Ojiro, Genta Kawase","doi":"10.1109/EST.2012.29","DOIUrl":"https://doi.org/10.1109/EST.2012.29","url":null,"abstract":"This position paper proposes a design approach for a \"human diminishing device\" to generate much more realistic experience of being the physically challenged, such as hemiplegic patients, in comparison to existing simulation suits, and refers to significance of the ghuman diminishing deviceh to let an able-bodied person rediscover its ability gcoveredh in daily life and exploit the ability more actively.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124307623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信