35,312 research outputs found

    Dysfunctions of highly parallel real-time machines as 'developmental disorders': Security concerns and a Caveat Emptor

    Get PDF
    A cognitive paradigm for gene expression in developmental biology that is based on rigorous application of the asymptotic limit theorems of information theory can be adapted to highly parallel real-time computing. The coming Brave New World of massively parallel 'autonomic' and 'Self-X' machines driven by the explosion of multiple core and molecular computing technologies will not be spared patterns of canonical and idiosyncratic failure analogous to the developmental disorders affecting organisms that have had the relentless benefit of a billion years of evolutionary pruning. This paper provides a warning both to potential users of these machines and, given that many such disorders can be induced by external agents, to those concerned with larger scale matters of homeland security

    Application of an AIS to the problem of through life health management of remotely piloted aircraft

    Get PDF
    The operation of RPAS includes a cognitive problem for the operators(Pilots, maintainers, ,managers, and the wider organization) to effectively maintain their situational awareness of the aircraft and predict its health state. This has a large impact on their ability to successfully identify faults and manage systems during operations. To overcome these system deficiencies an asset health management system that integrates more cognitive abilities to aid situational awareness could prove beneficial. This paper outlines an artificial immune system (AIS) approach that could meet these challenges and an experimental method within which to evaluate it

    Кибербезопасность в образовательных сетях

    Get PDF
    The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”. “A Human” is considered in general meaning, mainly as a learner. The analysis is provided on the basis of experience of hybrid war in Ukraine that have demonstrated the change of the target of military operations from military personnel and critical infrastructure to a human in general. Young people are the vulnerable group that can be the main goal of cognitive operations in long-term perspective, and they are the weakest link of the System.У статті обговорюється можливий вплив цифрового простору на людину, а також пов'язані з людиною напрямки кібербезпеки в освіті: рівні кібербезпеки, роль соціального інжинірингу в кібербезпеці освіти, «когнітивна вакцинація». «Людина» розглядається в загальному значенні, головним чином як та, що навчається. Аналіз надається на основі досвіду гібридної війни в Україні, яка продемонструвала зміну цілей військових операцій з військовослужбовців та критичної інфраструктури на людину загалом. Молодь - це вразлива група, яка може бути основною метою таких операцій в довгостроковій перспективі, і вони є найслабшою ланкою системи.В документе обсуждается возможное влияние цифрового пространства на человека, а также связанные с ним направления в анализе кибербезопасности в образовании: уровни кибербезопасности, роль социальной инженерии в кибербезопасности образования, «когнитивная вакцинация». «Человек» рассматривается в общем смысле, в основном как ученик. Анализ представлен на основе опыта гибридной войны в Украине, которая продемонстрировала изменение цели военных действий с военного персонала и критической инфраструктуры на человека в целом. Молодые люди являются уязвимой группой, которая может быть главной целью когнитивных операций в долгосрочной перспективе, и они являются самым слабым звеном Систем

    ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System

    Full text link
    Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems against threats to confidentiality, integrity, and availability. There are two types of intruders: the external intruders who are unauthorized users of the machines they attack, and internal intruders, who have permission to access the system with some restrictions. Due to the fact that it is more and more improbable to a system administrator to recognize and manually intervene to stop an attack, there is an increasing recognition that ID systems should have a lot to earn on following its basic principles on the behavior of complex natural systems, namely in what refers to self-organization, allowing for a real distributed and collective perception of this phenomena. With that aim in mind, the present work presents a self-organized ant colony based intrusion detection system (ANTIDS) to detect intrusions in a network infrastructure. The performance is compared among conventional soft computing paradigms like Decision Trees, Support Vector Machines and Linear Genetic Programming to model fast, online and efficient intrusion detection systems.Comment: 13 pages, 3 figures, Swarm Intelligence and Patterns (SIP)- special track at WSTST 2005, Muroran, JAPA

    Structured Psychosocial Stress and Therapeutic Intervention: Toward a Realistic Biological Medicine

    Get PDF
    Using generalized 'language of thought' arguments appropriate to interacting cognitive modules, we explore how disease states can interact with medical treatment, including, but not limited to, drug therapy. The feedback between treatment and response creates a kind of idiotypic 'hall of mirrors' generating a pattern of 'efficacy', 'treatment failure', and 'adverse reactions' which will, from a Rate Distortion perspective, embody a distorted image of externally-imposed structured psychosocial stress. This analysis, unlike current pharmacogenetics, does not either reify 'race' or blame the victim by using genetic structure to place the locus-of-control within a group or individual. Rather, it suggests that a comparatively simple series of questions to identify longitudinal and cross-sectional stressors may provide more effective guidance for specification of individual therapy than complicated genotyping strategies of dubious meaning. These latter are likely to be both very expensive and utterly blind to the impact of structured psychosocial stress -- a euphemism for various forms of racism and ethnic cleansing -- which, we contend, is often a principal determinant of treatment outcome at both individual and community levels of organization. We propose, to effectively address 'health disparities' between populations, and in contrast to current biomedical ideology based on a simplistic genetic determinism, a richer program of biological medicine reflecting Lewontin's 'triple helix' of genes, environment, and development, a program more in concert with the realities of a basic human biology marked by hypersociality unusual in vertibrates. Aggressive social, economic, and other policies of affirmative action to redress the persisting burdens of history would be an integral component of any such project
    corecore