The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose a Multi-Brain (multi bio-signal) Fusion (MBF) technology, which consists in the aggregation and analysis of brain and other biometric signals collected from a number of individuals. Often performed in the context of some common stimulus, MBF aims to facilitate rapid/enhanced collective analysis and decision making, or to assess aggregate characteristics, such as a group emotional index...
Wireless Sensor Networks (WSNs) have the potential of being employed in a variety of applications ranging from battlefield surveillance to everyday applications such as smart homes and patient monitoring. Security is a major challenge that all applications based on WSNs are facing nowadays. Firstly, due to the wireless nature of WSNs, and secondly due to their ability to operate in unattended environments...
We present a simple sensor based on chaotic dynamics for the determination of water salinity. The sensor is based on the change in dynamics produced in a nonlinear dynamic circuit, which has a circuit element composed of the measured saline solution and electrodes.
This position paper proposes a design approach for a "human diminishing device" to generate much more realistic experience of being the physically challenged, such as hemiplegic patients, in comparison to existing simulation suits, and refers to significance of the ghuman diminishing deviceh to let an able-bodied person rediscover its ability gcoveredh in daily life and exploit the ability...
Breakthroughs in technology that deliver fast and accurate molecular biology data, together with the use of advanced software, and analytical methods made possible quantitative accumulation of biological information leading to a qualitative evolution. Sequencing of human genome was of the first door to the era of systemic understanding in life sciences. The paper reviews the emerging concepts of systems...
Gaussian process (GP) is well researched and used in machine learning field. Comparing with artificial neural network (ANN) and support vector regression (SVR), it provides additional covariance information for regression results. By exploiting this feature, an uncertainty based locational optimisation strategy combining with an entropy based data selection method for mobile sensor networks is presented...
Human assistive devices need to be effective with real-time assistance in real world situations: powered wheelchair users require reassuring robust support, especially in the area of collision avoidance. However, it is important that the intelligent system does not take away control from the user. The patient must be allowed to provide the intelligence in the system and the assistive technology must...
In this work we present a new way to analyze human facial expressions in social situations. We are able to record the smiling expressions of multiple subjects simultaneously using a wireless wearable device that records physiological signals and allows the subjects complete freedom of movement, both of head position and in their environment. We analize the correlation of facial expressions in two...
Information and telecommunication infrastructures and services are key constitutive element of our society. They require not only cyber security but also an appropriate level of confidence in it. This paper explores at a societal level the main challenges, obstacles and constitutive elements that contribute to building confidence in cyber security by revisiting some fundamental concepts. The aims...
In the field of automated facial identification, relevant facial information are not always available (disguises, poor spatial orientation, distance, etc.). As a consequence, human perception performance decreases. However, the "whole person" can provide useful information. In the present study, we determine the way by which a person is visually explored, in order to identify a potential...
In this paper we present an innovative technique to tackle the problem of automatic road sign detection and tracking using an on-board stereo camera. It involves a continuous 3D analysis of the road sign during the whole tracking process. Firstly, a color and appearance based model is applied to generate road sign candidates in both stereo images. A sparse disparity map between the left and right...
This paper presents a strategy for solving the feature matching problem in calibrated very wide-baseline camera settings. In this kind of settings, perspective distortion, depth discontinuities and occlusion represent enormous challenges. The proposed strategy addresses them by using geometrical information, specifically by exploiting epipolarconstraints. As a result it provides a sparse number of...
This paper presents a biometric person recognition system using electroencephalogram (EEG) signals as the source of identity information. Wavelet transform is used for extracting features from raw EEG signals which are then classified using a support vector machine and a knearestneighbour classifier to recognize the individuals. A number of stimuli are explored using up to 18 subjects to generate...
We elucidate the potential limit of single-frame super-resolution by information theory. Though various algorithms for super-resolution have been proposed, there exist only few works that evaluate the performance of super-resolution to our knowledge. Our key idea is that "single-frame super-resolution task can be regarded as channel coding in information theory." Based on this recognition,...
A novel concept for approaching digital investigations is presented. User-contributory case-based reasoning (UCCBR) is a method by which previous results from digital forensic (DF) examinations are stored and reused in future investigations. The advantages of a UCCBR system are discussed which include implementing UCCBR as an auditing tool, a method for optimizing evidence retrieval and anomalous...
The ICmetrics technology is concerned with identifying acceptable features in an electronic system's operation for encryption purposes. Ideally, the nature of the features should be identical for all of the systems considered, while the values of these features should allow for unique identification of each of the systems. This paper looks at the properties of the Program Counter of a processor core...
Authentication and Identity Management help to protect resources and justify trust in "bona fide" operation by service client and service provider. Besides, identity management can support hardware assisted integrity protection. In the Internet of Things (IoT), the high number of lightweight devices requires scalable and lightweight solutions to trust management. The paper proposes a framework...
Field-programmable gate arrays (FPGAs) are widely used in telecommunication due their substantial computational power and flexibly designed architecture. These features become especially important for applications of low transmission latency such as those supported by Distributed Multimedia Plays (DMP) architecture. Thus FPGAs are chosen in this work as the core building block of the system. Complex...
Critical applications in areas such as defence, security and space exploration will have design challenges created by factors such as cost, size and tolerance. Scaled technologies will offer a huge potential in these areas, as they are inherently faster, low-power, low-cost and more harsh-environment tolerant. Moving toward nanoscale designs will trigger many design challenges that need to be addressed...
The ICmetrics technology is based on extracting features from digital devices' operation that may be integrated together to generate unique identifiers for each of the devices or create unique profiles that describe the devices' actual behaviour. Any changes in these identifiers (profiles) during consequent devices' operation would signal about a possible safety or security breach within the electronic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.