Electroencephalogram (EEG) recordings of brain waves have been shown to have unique pattern for each individual and thus have potential for biometric applications. In this paper, we propose an EEG feature extraction a...
详细信息
ISBN:
(纸本)9781424423538
Electroencephalogram (EEG) recordings of brain waves have been shown to have unique pattern for each individual and thus have potential for biometric applications. In this paper, we propose an EEG feature extraction and hashing approach for person authentication. Multi-variate autoregressive (mAR) coefficients are extracted as features from multiple EEG channels and then hashed by using our recently proposed Fast Johnson-Lindenstrauss Transform (FJLT)-based hashing algorithm to obtain compact hash vectors. Based on the EEG hash vectors, a Naive Bayes probabilistic model is employed for person authentication. Our EEG hashing approach presents a fundamental departure from existing methods in EEG-biometry study. The promising results suggest that hashing may open new research directions and applications in the emerging EEG-based biometry area.
This paper focuses on protecting harbor by monitoring the behavior of ships moving in the harbor. In particular, we propose to combine a probabilistic Hidden Markov Model approach with a formal language approach to mo...
详细信息
ISBN:
(纸本)9781467308298;9781467308304
This paper focuses on protecting harbor by monitoring the behavior of ships moving in the harbor. In particular, we propose to combine a probabilistic Hidden Markov Model approach with a formal language approach to model and recognize usual and unusual ship behavior. The probabilistic approach was mainly used to recognize usual ship behavior. However, the reactive approach was used to recognize abnormal ship behavior and classify it into aggressive and transgressive. By combining probabilistic and reactive approaches, we conceived a Behavior Analysis Modulus that we called BAM. It is a decision support system for port team security that aims to generate security advice on ships as they enter into the harbor.
We show that for arbitrary positive integers a(1),..., a(m), with probability 6/pi(2) + o(1), the gcd of two linear combinations of these integers with rather small random integer coefficients coincides with gcd(a(1),...
详细信息
We show that for arbitrary positive integers a(1),..., a(m), with probability 6/pi(2) + o(1), the gcd of two linear combinations of these integers with rather small random integer coefficients coincides with gcd(a(1),..., a(m)). This naturally leads to a probabilistic algorithm for computing the gcd of several integers, with probability 6/pi(2) + o(1), via just one gcd of two numbers with about the same size as the initial data ( namely the above linear combinations). This algorithm can be repeated to achieve any desired confidence level.
Smartphones have made their inroads in enterprise environment, manifested in the Bring Your Own Device (BYOD) policy: More employees are bringing their own smartphones to work and are using them to access enterprise i...
详细信息
ISBN:
(纸本)9781467331227
Smartphones have made their inroads in enterprise environment, manifested in the Bring Your Own Device (BYOD) policy: More employees are bringing their own smartphones to work and are using them to access enterprise information assets. The dilemma between responsiveness to security incidents and convenience/cost-effectiveness demands BYOD security solutions beyond the straightforward all-inclusive full-scanning or uniformly random sampling approaches. In this paper, we propose a carefully planned but otherwise random, or strategic, sampling approach out of this dilemma. Strategic sampling provides a balance between security responsiveness and cost effectiveness by identifying and periodically sampling those representative smartphones (security-wise). We validate the efficiency and effectiveness of the proposed strategic sampling via simulations driven by publicly available, real-world collected traces.
The pseudo random number generators (PRNG) is one type of deterministic functions. The information entropy of the output sequences depends on the entropy of the input seeds. The output sequences can be predicted if at...
详细信息
ISBN:
(纸本)9781728125046
The pseudo random number generators (PRNG) is one type of deterministic functions. The information entropy of the output sequences depends on the entropy of the input seeds. The output sequences can be predicted if attackers could know or control the input seeds of PRNGs. Against that, it is necessary that the input seeds is unpredictable, that is to say, the information entropy of the seeds is high enough. However, if there is no high enough entropy sources in environment, how to generate the seeds of PRNG? In other words, how to increase the entropy of the input seeds? Many approaches for extracting entropy from physical environment have been proposed, which lack of theoretical analysis. The condition of entropy's increasing is given. A model is built to verify the condition based on the functional programming language F*. An example of entropy's increasing is proposed utilizing execution time randomness of arbitrary codes. Then an algorithm is described, which can generate the seed when the entropy value is given.
We propose a probabilistic greedy algorithm for decomposing partially specified index generation functions. These functions have numerous applications in a variety of circuit design problems. We show that finding an o...
详细信息
ISBN:
(纸本)9780769546735
We propose a probabilistic greedy algorithm for decomposing partially specified index generation functions. These functions have numerous applications in a variety of circuit design problems. We show that finding an optimal decomposition is an intractable problem, which motivates our approach.
The principal shortcoming of simulated annealing (SA) is that it takes too much computer time. We present a few “swindling” ideas for speeding up SA by simulating its action on a problem. The increase in speed is at...
详细信息
A Greedy Randomized Adaptive Search Procedure (GRASP) is a randomized heuristic that has produced high quality solutions for a wide range of combinatorial optimization problems. The NP-complete Feedback Vertex Set (FV...
详细信息
A Greedy Randomized Adaptive Search Procedure (GRASP) is a randomized heuristic that has produced high quality solutions for a wide range of combinatorial optimization problems. The NP-complete Feedback Vertex Set (FVS) Problem is to find the minimum number of vertices that need to be removed from a directed graph so that the resulting graph has no directed cycle. The FVS problem has found applications in many fields, including VLSI design, program verification, and statistical inference. In this paper, we develop a GRASP for the FVS problem. We describe GRASP construction mechanisms and local search, as well as some efficient problem reduction techniques. We report computational experience on a set of test problems using three variants of GRASP.
The well-known Miller-Rabin Primality Test MRPT is used to check naturals to be prime or composite. We study the dependence between the length of testing numbers and the number of rounds of MRPT sufficient to give the...
详细信息
The well-known Miller-Rabin Primality Test MRPT is used to check naturals to be prime or composite. We study the dependence between the length of testing numbers and the number of rounds of MRPT sufficient to give the correct answer and give some recommendations how to choose a suitable set of bases at which MRPT runs more efficiently. Concluding the paper we state a number of theoretical problems which decision allows to improve an implementation of MRPT.
This paper explores the feasibility of electric vehicle contribution to the grid ancillary services. Thanks to a probabilistic approach, the technical possibilities of Vehicle-to-grid ancillary services are assessed. ...
详细信息
ISBN:
(纸本)9781479960958
This paper explores the feasibility of electric vehicle contribution to the grid ancillary services. Thanks to a probabilistic approach, the technical possibilities of Vehicle-to-grid ancillary services are assessed. Different scenarios with respect to the number of EVs fleet and commuting behavior have been generated to assess the possibility of grid service support in sense of power, energy and appropriate time interval. Each scenario is dedicated to proper ancillary service, where the economic interest for each service has been discussed.
暂无评论