Research focused in detecting cause and progression of the diseases is gathering an impressive amount of data. Integrating available information in a systemic approach requires knowledge about details as well as overview about predictable interconnections. The amount of accumulated data often underscores human mind capabilities to perceiving links and correlations. The paper offers an overview about several schools of thoughts perceiving OA as a systemic disease Bioinformatics is proposed as a tool in organizing existent knowledge aiming introduction of the discovery approach in using clinical and experimental data. Computational biology is used to detect possible correlations and links in molecular pathways and further pointed as one useful method to design focused systematic research.
{"title":"A Bioinformatics Approach in Discovery Science","authors":"L. Lăbușcă, K. Mashayekhi","doi":"10.1109/EST.2012.13","DOIUrl":"https://doi.org/10.1109/EST.2012.13","url":null,"abstract":"Research focused in detecting cause and progression of the diseases is gathering an impressive amount of data. Integrating available information in a systemic approach requires knowledge about details as well as overview about predictable interconnections. The amount of accumulated data often underscores human mind capabilities to perceiving links and correlations. The paper offers an overview about several schools of thoughts perceiving OA as a systemic disease Bioinformatics is proposed as a tool in organizing existent knowledge aiming introduction of the discovery approach in using clinical and experimental data. Computational biology is used to detect possible correlations and links in molecular pathways and further pointed as one useful method to design focused systematic research.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116086043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shadow analysis has been shown to enable the extension of gait biometrics to aerial surveillance. In past work the classifiers were both trained and tested on shadow features extracted by image processing. In real scenarios this requires imagery with shadows of people to be recognized. On the other hand one rarely has available the shadow information of the person sought, however direct body movement/information may be more easily obtained from ground surveillance cameras or video recordings. This paper proposes a scenario in which gait/dynamics features from body movement are obtained from a ground video and the search for matching dynamics of shadows takes place in aerial surveillance video. A common scenario would be the recording of people by ground/city surveillance cameras and the use of information to initiate a wide-area search for shadows from aerial platforms. Vice-versa, the shadow of a suspect leaving an incident area, detected by aerial surveillance, can trigger a city-wide search on body/gait biometrics as observed with city/ground surveillance cameras. To illustrate the feasibility of this approach the paper introduces a method that compares contours of bodies in ground image frames and contours of shadows in aerial image frames, for which an alignment is made and a distance is calculated, integrated over a normalized gait cycle. While the results are preliminary, for only 5 people, and using a specific walking arrangement to avoid compensation for changes in the viewing angles, the method obtains a 70% correct classification rate which is a first step in proving the feasibility of the approach.
{"title":"Finding People by their Shadows: Aerial Surveillance Using Body Biometrics Extracted from Ground Video","authors":"Y. Iwashita, A. Stoica, R. Kurazume","doi":"10.1109/EST.2012.41","DOIUrl":"https://doi.org/10.1109/EST.2012.41","url":null,"abstract":"Shadow analysis has been shown to enable the extension of gait biometrics to aerial surveillance. In past work the classifiers were both trained and tested on shadow features extracted by image processing. In real scenarios this requires imagery with shadows of people to be recognized. On the other hand one rarely has available the shadow information of the person sought, however direct body movement/information may be more easily obtained from ground surveillance cameras or video recordings. This paper proposes a scenario in which gait/dynamics features from body movement are obtained from a ground video and the search for matching dynamics of shadows takes place in aerial surveillance video. A common scenario would be the recording of people by ground/city surveillance cameras and the use of information to initiate a wide-area search for shadows from aerial platforms. Vice-versa, the shadow of a suspect leaving an incident area, detected by aerial surveillance, can trigger a city-wide search on body/gait biometrics as observed with city/ground surveillance cameras. To illustrate the feasibility of this approach the paper introduces a method that compares contours of bodies in ground image frames and contours of shadows in aerial image frames, for which an alignment is made and a distance is calculated, integrated over a normalized gait cycle. While the results are preliminary, for only 5 people, and using a specific walking arrangement to avoid compensation for changes in the viewing angles, the method obtains a 70% correct classification rate which is a first step in proving the feasibility of the approach.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126372664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A novel concept for approaching digital investigations is presented. User-contributory case-based reasoning (UCCBR) is a method by which previous results from digital forensic (DF) examinations are stored and reused in future investigations. The advantages of a UCCBR system are discussed which include implementing UCCBR as an auditing tool, a method for optimizing evidence retrieval and anomalous file detection.
{"title":"User-Contributory Case-Based Reasoning for Digital Forensic Investigations","authors":"G. Horsman, C. Laing, Paul Vickers","doi":"10.1109/EST.2012.35","DOIUrl":"https://doi.org/10.1109/EST.2012.35","url":null,"abstract":"A novel concept for approaching digital investigations is presented. User-contributory case-based reasoning (UCCBR) is a method by which previous results from digital forensic (DF) examinations are stored and reused in future investigations. The advantages of a UCCBR system are discussed which include implementing UCCBR as an auditing tool, a method for optimizing evidence retrieval and anomalous file detection.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127902620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bowen Lu, Dongbing Gu, Huosheng Hu, K. Mcdonald-Maier
Gaussian process (GP) is well researched and used in machine learning field. Comparing with artificial neural network (ANN) and support vector regression (SVR), it provides additional covariance information for regression results. By exploiting this feature, an uncertainty based locational optimisation strategy combining with an entropy based data selection method for mobile sensor networks is presented in this paper. Centroidal Voronoi tessellation (CVT) is used as a locational optimisation framework and Informative Vector Machine (IVM) is applied for data selection. Simulations with different locational optimisation criteria are conducted and the results are given, which proved the effectiveness of presented strategy.
{"title":"Sparse Gaussian Process for Spatial Function Estimation with Mobile Sensor Networks","authors":"Bowen Lu, Dongbing Gu, Huosheng Hu, K. Mcdonald-Maier","doi":"10.1109/EST.2012.27","DOIUrl":"https://doi.org/10.1109/EST.2012.27","url":null,"abstract":"Gaussian process (GP) is well researched and used in machine learning field. Comparing with artificial neural network (ANN) and support vector regression (SVR), it provides additional covariance information for regression results. By exploiting this feature, an uncertainty based locational optimisation strategy combining with an entropy based data selection method for mobile sensor networks is presented in this paper. Centroidal Voronoi tessellation (CVT) is used as a locational optimisation framework and Informative Vector Machine (IVM) is applied for data selection. Simulations with different locational optimisation criteria are conducted and the results are given, which proved the effectiveness of presented strategy.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133610211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, an investigation into the feasibility of applying the palm-vein biometric modality within a template-free key generation framework was conducted. In partnership with iCognize GmbH, experiments were conducted on both the raw images and the encoded biometric templates. Although feature analysis suggested difficulties may ensue due to the significant overlapping between genuine and impostor distributions, it was found that the framework still performed well for dataset of 20 subjects. The experiments resulted in both the key reproducibility and key uniqueness rates achieving 100% with considerable effective key lengths. These results are highly encouraging and demonstrate that stable keys can be achieved from poorly separable features.
{"title":"Direct Template-Free Encryption Key Generation from Palm-Veins","authors":"K. Harmer, G. Howells","doi":"10.1109/EST.2012.20","DOIUrl":"https://doi.org/10.1109/EST.2012.20","url":null,"abstract":"In this paper, an investigation into the feasibility of applying the palm-vein biometric modality within a template-free key generation framework was conducted. In partnership with iCognize GmbH, experiments were conducted on both the raw images and the encoded biometric templates. Although feature analysis suggested difficulties may ensue due to the significant overlapping between genuine and impostor distributions, it was found that the framework still performed well for dataset of 20 subjects. The experiments resulted in both the key reproducibility and key uniqueness rates achieving 100% with considerable effective key lengths. These results are highly encouraging and demonstrate that stable keys can be achieved from poorly separable features.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131676426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The focus of this keynote is to introduce the biometric-based physical access system design approach, which allows for the thwarting of various attacks. Building a model of the attack to make predictions concerning the behavior of the system under study is the first step in designing a biometric system. In such models, effects of attacks are studied by monitoring symptoms of the attacks. For the modeling of biometric tools before they are prototyped, other modeling techniques should be used, in particular, probabilistic modeling based on belief networks.
{"title":"Secure Biometric System Design","authors":"S. Yanushkevich","doi":"10.1109/EST.2012.30","DOIUrl":"https://doi.org/10.1109/EST.2012.30","url":null,"abstract":"The focus of this keynote is to introduce the biometric-based physical access system design approach, which allows for the thwarting of various attacks. Building a model of the attack to make predictions concerning the behavior of the system under study is the first step in designing a biometric system. In such models, effects of attacks are studied by monitoring symptoms of the attacks. For the modeling of biometric tools before they are prototyped, other modeling techniques should be used, in particular, probabilistic modeling based on belief networks.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133430924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Javier Marinas, L. Salgado, J. Arróspide, M. Camplani
In this paper we present an innovative technique to tackle the problem of automatic road sign detection and tracking using an on-board stereo camera. It involves a continuous 3D analysis of the road sign during the whole tracking process. Firstly, a color and appearance based model is applied to generate road sign candidates in both stereo images. A sparse disparity map between the left and right images is then created for each candidate by using contour-based and SURF-based matching in the far and short range, respectively. Once the map has been computed, the correspondences are back-projected to generate a cloud of 3D points, and the best-fit plane is computed through RANSAC, ensuring robustness to outliers. Temporal consistency is enforced by means of a Kalman filter, which exploits the intrinsic smoothness of the 3D camera motion in traffic environments. Additionally, the estimation of the plane allows to correct deformations due to perspective, thus easing further sign classification.
{"title":"Traffic Sign Detection and Tracking Using Robust 3D Analysis","authors":"Javier Marinas, L. Salgado, J. Arróspide, M. Camplani","doi":"10.1109/EST.2012.17","DOIUrl":"https://doi.org/10.1109/EST.2012.17","url":null,"abstract":"In this paper we present an innovative technique to tackle the problem of automatic road sign detection and tracking using an on-board stereo camera. It involves a continuous 3D analysis of the road sign during the whole tracking process. Firstly, a color and appearance based model is applied to generate road sign candidates in both stereo images. A sparse disparity map between the left and right images is then created for each candidate by using contour-based and SURF-based matching in the far and short range, respectively. Once the map has been computed, the correspondences are back-projected to generate a cloud of 3D points, and the best-fit plane is computed through RANSAC, ensuring robustness to outliers. Temporal consistency is enforced by means of a Kalman filter, which exploits the intrinsic smoothness of the 3D camera motion in traffic environments. Additionally, the estimation of the plane allows to correct deformations due to perspective, thus easing further sign classification.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128807419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We present a simple sensor based on chaotic dynamics for the determination of water salinity. The sensor is based on the change in dynamics produced in a nonlinear dynamic circuit, which has a circuit element composed of the measured saline solution and electrodes.
{"title":"Biomimetic Chaotic Sensors for Water Salinity Measurements and Conductive Titrimetry","authors":"H. Teodorescu, V. Cojocaru","doi":"10.1109/EST.2012.42","DOIUrl":"https://doi.org/10.1109/EST.2012.42","url":null,"abstract":"We present a simple sensor based on chaotic dynamics for the determination of water salinity. The sensor is based on the change in dynamics produced in a nonlinear dynamic circuit, which has a circuit element composed of the measured saline solution and electrodes.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116366724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Kriegel, U. Meissen, S. Pfennigschmidt, A. Voisard
This paper describes an application-independent Knowledge Fusion Toolkit to support decision-making in intelligent assistance, early warning, and security systems. The toolkit is realized on the basis of an industrial strength Java Enterprise technology, providing a runtime environment for modularized knowledge components, which contain all the application dependent functionality. We discuss here the toolkit's architecture as well as a use case from a research project carried out at Fraunhofer FOKUS.
{"title":"A Knowledge Fusion Toolkit for Decision Making","authors":"E. Kriegel, U. Meissen, S. Pfennigschmidt, A. Voisard","doi":"10.1109/EST.2012.39","DOIUrl":"https://doi.org/10.1109/EST.2012.39","url":null,"abstract":"This paper describes an application-independent Knowledge Fusion Toolkit to support decision-making in intelligent assistance, early warning, and security systems. The toolkit is realized on the basis of an industrial strength Java Enterprise technology, providing a runtime environment for modularized knowledge components, which contain all the application dependent functionality. We discuss here the toolkit's architecture as well as a use case from a research project carried out at Fraunhofer FOKUS.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115189510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This position paper proposes a design approach for a "human diminishing device" to generate much more realistic experience of being the physically challenged, such as hemiplegic patients, in comparison to existing simulation suits, and refers to significance of the ghuman diminishing deviceh to let an able-bodied person rediscover its ability gcoveredh in daily life and exploit the ability more actively.
{"title":"Design Approach on Human-Diminishing Devices Considered through Development of Hemiplegic Gait Simulation Device","authors":"S. Wesugi, M. Tamachi, Daichi Ojiro, Genta Kawase","doi":"10.1109/EST.2012.29","DOIUrl":"https://doi.org/10.1109/EST.2012.29","url":null,"abstract":"This position paper proposes a design approach for a \"human diminishing device\" to generate much more realistic experience of being the physically challenged, such as hemiplegic patients, in comparison to existing simulation suits, and refers to significance of the ghuman diminishing deviceh to let an able-bodied person rediscover its ability gcoveredh in daily life and exploit the ability more actively.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124307623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}