2012 Third International Conference on Emerging Security Technologies最新文献

筛选
英文 中文
MultiMind: Multi-Brain Signal Fusion to Exceed the Power of a Single Brain 多思维:多大脑信号融合超越单一大脑的能力
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.47
A. Stoica
{"title":"MultiMind: Multi-Brain Signal Fusion to Exceed the Power of a Single Brain","authors":"A. Stoica","doi":"10.1109/EST.2012.47","DOIUrl":"https://doi.org/10.1109/EST.2012.47","url":null,"abstract":"We propose a Multi-Brain (multi bio-signal) Fusion (MBF) technology, which consists in the aggregation and analysis of brain and other biometric signals collected from a number of individuals. Often performed in the context of some common stimulus, MBF aims to facilitate rapid/enhanced collective analysis and decision making, or to assess aggregate characteristics, such as a group emotional index (GEI). The wide range of potential applications may justify an ongoing, distributed program of research into the biometric correlates of conscious and unconscious human cognitive functions (practical intelligence). An example is MBF-enabled joint analysis, which would combine cues from several intelligence analysts who are examining the same visual scene in order to rapidly highlight important features that might not be salient to any individual analyst, and which might be difficult to elicit from the group by conventional means. An experiment in presented in which a GEI is obtained by aggregating the information from two people wearing EMOTIV Epoc™ 'neuroheadsets', which collect electroencephalogram (EEG) / electromyogram (EMG) signals from 14 sensors on the scalp. As subjects watch a sequence of slides with emotion-triggering content, their decoded emotions are fused to provide a group emotional response, a collective assessment of the presented information. MBF has the potential to surpass single-brain limitations by accessing and integrating more information than can be usefully shared within even small human groups by means of speech, prosody, facial expression and other nonverbal means One may speculate that the automated aggregation of signals from multiple human brains may open a path to super-human intelligence.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114088716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Going Digital -- Rethinking Cybersecurity and Confidence in a Connected World: A Challenge for Society 走向数字化——重新思考网络安全和互联世界的信心:对社会的挑战
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.16
S. Ghernaouti-Helie
{"title":"Going Digital -- Rethinking Cybersecurity and Confidence in a Connected World: A Challenge for Society","authors":"S. Ghernaouti-Helie","doi":"10.1109/EST.2012.16","DOIUrl":"https://doi.org/10.1109/EST.2012.16","url":null,"abstract":"Information and telecommunication infrastructures and services are key constitutive element of our society. They require not only cyber security but also an appropriate level of confidence in it. This paper explores at a societal level the main challenges, obstacles and constitutive elements that contribute to building confidence in cyber security by revisiting some fundamental concepts. The aims of this paper are to: (1) Identify some key global elements that should drive the development of information security from a long-term risk management perspective at a societal level; (2) Point out the complexities inherent in implementing security in vulnerable ICT environments; (3) Clarify the need for mastery of indicators and methodologies that contribute to identifying and operating good risk and security management practices and building confidence in these.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121978129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Weightless Neural System Employing Simple Sensor Data for Efficient Real-Time Round-Corner, Junction and Doorway Detection for Autonomous System Path Planning in Smart Robotic Assisted Healthcare Wheelchairs 采用简单传感器数据的无重力神经系统,用于智能机器人辅助医疗轮椅自主系统路径规划的有效实时圆角、路口和门口检测
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.21
M. Gillham, Ben McElroy, G. Howells, Stephen Kelly, S. Spurgeon, M. Pepper
{"title":"Weightless Neural System Employing Simple Sensor Data for Efficient Real-Time Round-Corner, Junction and Doorway Detection for Autonomous System Path Planning in Smart Robotic Assisted Healthcare Wheelchairs","authors":"M. Gillham, Ben McElroy, G. Howells, Stephen Kelly, S. Spurgeon, M. Pepper","doi":"10.1109/EST.2012.21","DOIUrl":"https://doi.org/10.1109/EST.2012.21","url":null,"abstract":"Human assistive devices need to be effective with real-time assistance in real world situations: powered wheelchair users require reassuring robust support, especially in the area of collision avoidance. However, it is important that the intelligent system does not take away control from the user. The patient must be allowed to provide the intelligence in the system and the assistive technology must be engineered to be sufficiently smart to recognize and accommodate this. Robotic assistance employed in the healthcare arena must therefore emphasize positive support rather than adopting an intrusive role. Weightless Neural Networks are an excellent pattern recognition tool for real-time applications. This paper introduces a technique for look-ahead identification of open doorways and junctions. Simple sensor data in real-time is used to detect open doors with inherent data uncertainties using a technique applied to a Weightless Neural Network Architecture.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114301139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Optimization and Sequence Search Based Localization in Wireless Sensor Networks 基于优化和序列搜索的无线传感器网络定位
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.25
Sen Wang, Huosheng Hu, K. Mcdonald-Maier
{"title":"Optimization and Sequence Search Based Localization in Wireless Sensor Networks","authors":"Sen Wang, Huosheng Hu, K. Mcdonald-Maier","doi":"10.1109/EST.2012.25","DOIUrl":"https://doi.org/10.1109/EST.2012.25","url":null,"abstract":"Localization is critical for various applications of Wireless Sensor Networks. This paper presents a 3D localization algorithm for high accuracy localization of a wireless sensor network, which consists of three parts: pre-localization, refinement and sequence search. It is clear that the localization accuracy partly depends on the localization sequence of the unknown nodes, which has not been investigated so far. The proposed novel algorithm aims to address this problem by searching a localization sequence corresponding to a high localization accuracy and a robust algorithm. The simulation results show that the proposed algorithm can get rid of the flip ambiguity and is more robust than several existing algorithms in terms of the localization accuracy.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"635 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115113525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Catching Even More Offenders with EvoFIT Facial Composites 用EvoFIT面部复合材料抓住更多罪犯
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.26
C. Frowd, Melanie Pitchford, F. Skelton, Anna Petkovic, C. Prosser, B. Coates
{"title":"Catching Even More Offenders with EvoFIT Facial Composites","authors":"C. Frowd, Melanie Pitchford, F. Skelton, Anna Petkovic, C. Prosser, B. Coates","doi":"10.1109/EST.2012.26","DOIUrl":"https://doi.org/10.1109/EST.2012.26","url":null,"abstract":"Facial composites are an investigative tool used by police to identify suspects of crime. Unfortunately, traditional methods to construct the face have rather low success rates. We have been developing a new recognition-based method called EvoFIT that requires eyewitnesses to select whole faces from arrays of alternatives. Both published laboratory research and existing police field-trials have found that EvoFIT produces images that are more identifiable than images from traditional systems. In the current paper, we present an evaluation of a more recent version of EvoFIT: in 2010, EvoFIT was deployed in 35 criminal investigations by Humberside police and these images directly led to identification of 21 suspects, equating to 60% success - quadruple the performance of the previous system used within the force. The evaluation also showed that identification of a suspect led to conviction in 29% of investigations (6 out of 21). Overall, a conviction occurred in 17% of cases involving use of an EvoFIT (6 out of 35). We also outline more recent developments which indicate that an arrest is now likely in three out of every four cases in which EvoFIT is used, and a conviction rate of one in five.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126036581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
FPGA-Based Platform for Real-Time Internet 基于fpga的实时互联网平台
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.18
M. Wielgosz, Mauritz Panggabean, Ameen Chilwan, L. A. Rønningen
{"title":"FPGA-Based Platform for Real-Time Internet","authors":"M. Wielgosz, Mauritz Panggabean, Ameen Chilwan, L. A. Rønningen","doi":"10.1109/EST.2012.18","DOIUrl":"https://doi.org/10.1109/EST.2012.18","url":null,"abstract":"Field-programmable gate arrays (FPGAs) are widely used in telecommunication due their substantial computational power and flexibly designed architecture. These features become especially important for applications of low transmission latency such as those supported by Distributed Multimedia Plays (DMP) architecture. Thus FPGAs are chosen in this work as the core building block of the system. Complex multi-node telecommunication systems require special design methodology contrary to small ICT applications usually implemented in HDL. The methodology should be based on the appropriate tools from FPGA vendors for support and maintenance. This paper presents an architecture of a module to be embedded in all the FPGA-based nodes constituting a platform for the Real Time Internet based on DMP. It is designed using an embedded development kit natively supported by Xilinx and flexible in available cores. We present the implementation results of the network-node module and the description of PCIe-based protocol for inter-FPGA communication.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115012235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Search and Rescue Robots: The Civil Protection Teams of the Future 搜索和救援机器人:未来的民防团队
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.40
P. Lima
{"title":"Search and Rescue Robots: The Civil Protection Teams of the Future","authors":"P. Lima","doi":"10.1109/EST.2012.40","DOIUrl":"https://doi.org/10.1109/EST.2012.40","url":null,"abstract":"After an earthquake or the collapse of a built structure, and facing a scenario of large destruction, the response time to search and locate trapped survivors is crucial. The human intervention of urban search and rescue (USAR) teams, including USAR dogs, has to be done cautiously so as to protect the rescue workers from further collapses. Debris may be so cluttered that prevent the close human access to the victims. Also, potential risk of further landslide requires the propping of the structures before human intervention. Rescue preparation operations may be time consuming, and a fast action to locate survivors and to take them human voices, light and/or water is a crucial factor for life. Therefore, there is the clear need for search and rescue robots that can be released immediately after a disaster in which the conditions are too dangerous and too cluttered for people and dogs to begin searching for victims. Teams of such robots should desirably be heterogeneous (e.g., aerial robots to perform scenario reconnaissance, powerful land robots to remove debris, small agile land robots to reach survivors buried under the debris), be able to perform with a given level of adjustable autonomy (as the presence of humans in the team to take crucial decisions will always be required) and be easy-to-learn and simple to launch and friendly to operate. In this paper we refer to some of the achievements in the area of USAR robots worldwide, and then focus on R&D work towards increasing the autonomy of USAR robots that has been done over the past 10 years at the Institute for Systems and Robotics of the Instituto Superior Te 'cnico, TU Lisbon, in collaboration with Portuguese companies and Civil Protection institutions, including a land tracked wheel robot and aerial robots of different types (blimp, quad copters).","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"15 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128186689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
ICmetrics for Low Resource Embedded Systems 低资源嵌入式系统的ICmetrics
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.23
Y. Kovalchuk, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier, G. Howells
{"title":"ICmetrics for Low Resource Embedded Systems","authors":"Y. Kovalchuk, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier, G. Howells","doi":"10.1109/EST.2012.23","DOIUrl":"https://doi.org/10.1109/EST.2012.23","url":null,"abstract":"The ICmetrics technology is based on extracting features from digital devices' operation that may be integrated together to generate unique identifiers for each of the devices or create unique profiles that describe the devices' actual behaviour. Any changes in these identifiers (profiles) during consequent devices' operation would signal about a possible safety or security breach within the electronic system. This paper explores the program counter (PC) of a processor core as a potential source for ICmetrics features and discusses several methods of feature values acquisition with the aim to achieve a maximum level of information gain with a minimal impact on a system's performance. The main finding of this study is that while isolated PC values may not always allow to generate a stable identifier (profile) for a device that would distinguish the device from the rest in the considered set, the PC sequences and frequencies in the execution flow may serve as suitable ICmetrics features, which has yet to be tested in complex scenarios.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128447914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Analysis of Social Smile Sharing Using a Wearable Device that Captures Distal Electromyographic Signals 使用可穿戴设备捕获远端肌电图信号分析社交微笑分享
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.38
A. Gruebler, Kenji Suzuki
{"title":"Analysis of Social Smile Sharing Using a Wearable Device that Captures Distal Electromyographic Signals","authors":"A. Gruebler, Kenji Suzuki","doi":"10.1109/EST.2012.38","DOIUrl":"https://doi.org/10.1109/EST.2012.38","url":null,"abstract":"In this work we present a new way to analyze human facial expressions in social situations. We are able to record the smiling expressions of multiple subjects simultaneously using a wireless wearable device that records physiological signals and allows the subjects complete freedom of movement, both of head position and in their environment. We analize the correlation of facial expressions in two situations, in a conversation between two adults and between two children playing. This work shows an effective and automatic way to analize facial expressions quantitatively and continuously, without constraining the subjects. Possible applications lie in psychological analysis of humans, improvement of customer service, expression training and analysis of social interaction as well as to create a baseline of interaction that can be used in the future to fine-tune human interaction with artificial agents such as social avatars and robots.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129181167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Information Theoretic Limit of Single-Frame Super-Resolution 单帧超分辨率的信息理论极限
2012 Third International Conference on Emerging Security Technologies Pub Date : 2012-09-05 DOI: 10.1109/EST.2012.32
Kotaro Yamaguchi, Masanori Kawakita, Norikazu Takahashi, J. Takeuchi
{"title":"Information Theoretic Limit of Single-Frame Super-Resolution","authors":"Kotaro Yamaguchi, Masanori Kawakita, Norikazu Takahashi, J. Takeuchi","doi":"10.1109/EST.2012.32","DOIUrl":"https://doi.org/10.1109/EST.2012.32","url":null,"abstract":"We elucidate the potential limit of single-frame super-resolution by information theory. Though various algorithms for super-resolution have been proposed, there exist only few works that evaluate the performance of super-resolution to our knowledge. Our key idea is that \"single-frame super-resolution task can be regarded as channel coding in information theory.\" Based on this recognition, we can apply some techniques of information theory to the analysis of single-frame super-resolution. As its first step, we clarify the potential limit of single-frame super-resolution. For this purpose, we use a model of Yang et al. (2008) as a statistical model of natural images. As a result, we elucidate the condition that\" arbitrary high-resolution natural image can be potentially recovered with arbitrarily small error by single-frame super-resolution.\" This condition depends on S/N ratio and blurring parameter. We investigate numerically whether this condition is satisfied or not for several situations.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"46 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121108109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信