34 research outputs found
Proceedings of the 7th Sound and Music Computing Conference
Proceedings of the SMC2010 - 7th Sound and Music Computing Conference, July 21st - July 24th 2010
Recommended from our members
Free-text keystroke dynamics authentication with a reduced need for training and language independency
This research aims to overcome the drawback of the large amount of training data required
for free-text keystroke dynamics authentication. A new key-pairing method, which is based
on the keyboard’s key-layout, has been suggested to achieve that. The method extracts
several timing features from specific key-pairs. The level of similarity between a user’s
profile data and his or her test data is then used to decide whether the test data was provided
by the genuine user. The key-pairing technique was developed to use the smallest amount of
training data in the best way possible which reduces the requirement for typing long text in
the training stage. In addition, non-conventional features were also defined and extracted
from the input stream typed by the user in order to understand more of the users typing
behaviours. This helps the system to assemble a better idea about the user’s identity from the
smallest amount of training data. Non-conventional features compute the average of users
performing certain actions when typing a whole piece of text. Results were obtained from the
tests conducted on each of the key-pair timing features and the non-conventional features,
separately. An FAR of 0.013, 0.0104 and an FRR of 0.384, 0.25 were produced by the timing
features and non-conventional features, respectively. Moreover, the fusion of these two
feature sets was utilized to enhance the error rates. The feature-level fusion thrived to reduce
the error rates to an FAR of 0.00896 and an FRR of 0.215 whilst decision-level fusion
succeeded in achieving zero FAR and FRR. In addition, keystroke dynamics research suffers
from the fact that almost all text included in the studies is typed in English. Nevertheless, the
key-pairing method has the advantage of being language-independent. This allows for it to be
applied on text typed in other languages. In this research, the key-pairing method was applied
to text in Arabic. The results produced from the test conducted on Arabic text were similar to
those produced from English text. This proves the applicability of the key-pairing method on
a language other than English even if that language has a completely different alphabet and
characteristics. Moreover, experimenting with texts in English and Arabic produced results
showing a direct relation between the users’ familiarity with the language and the
performance of the authentication system
Biometric Systems
Because of the accelerating progress in biometrics research and the latest nation-state threats to security, this book's publication is not only timely but also much needed. This volume contains seventeen peer-reviewed chapters reporting the state of the art in biometrics research: security issues, signature verification, fingerprint identification, wrist vascular biometrics, ear detection, face detection and identification (including a new survey of face recognition), person re-identification, electrocardiogram (ECT) recognition, and several multi-modal systems. This book will be a valuable resource for graduate students, engineers, and researchers interested in understanding and investigating this important field of study
Extension and hardware implementation of the comprehensive integrated security system concept
Merged with duplicate record (10026.1/700) on 03.01.2017 by CS (TIS)This is a digitised version of a thesis that was deposited in the University Library. If you are the author please contact PEARL Admin ([email protected]) to discuss options.The current strategy to computer networking is to increase the accessibility that legitimate
users have to their respective systems and to distribute functionality. This creates a more
efficient working environment, users may work from home, organisations can make better
use of their computing power. Unfortunately, a side effect of opening up computer systems
and placing them on potentially global networks is that they face increased threats from
uncontrolled access points, and from eavesdroppers listening to the data communicated
between systems. Along with these increased threats the traditional ones such as
disgruntled employees, malicious software, and accidental damage must still be countered.
A comprehensive integrated security system ( CISS ) has been developed to provide
security within the Open Systems Interconnection (OSI) and Open Distributed Processing
(ODP) environments. The research described in this thesis investigates alternative methods
for its implementation and its optimisation through partial implementation within hardware
and software and the investigation of mechanismsto improve its security.
A new deployment strategy for CISS is described where functionality is divided amongst
computing platforms of increasing capability within a security domain. Definitions are given
of a: local security unit, that provides terminal security; local security servers that serve the
local security units and domain management centres that provide security service coordination
within a domain.
New hardware that provides RSA and DES functionality capable of being connected to Sun
microsystems is detailed. The board can be used as a basic building block of CISS,
providing fast cryptographic facilities, or in isolation for discrete cryptographic services.
Software written for UNIX in C/C++ is described, which provides optimised security
mechanisms on computer systems that do not have SBus connectivity.
A new identification/authentication mechanism is investigated that can be added to existing
systems with the potential for extension into a real time supervision scenario. The
mechanism uses keystroke analysis through the application of neural networks and genetic
algorithms and has produced very encouraging results.
Finally, a new conceptual model for intrusion detection capable of dealing with real time
and historical evaluation is discussed, which further enhances the CISS concept
Machine learning techniques for identification using mobile and social media data
Networked access and mobile devices provide near constant data generation and collection. Users, environments, applications, each generate different types of data; from the voluntarily provided data posted in social networks to data collected by sensors on mobile devices, it is becoming trivial to access big data caches. Processing sufficiently large amounts of data results in inferences that can be characterized as privacy invasive. In order to address privacy risks we must understand the limits of the data exploring relationships between variables and how the user is reflected in them. In this dissertation we look at data collected from social networks and sensors to identify some aspect of the user or their surroundings. In particular, we find that from social media metadata we identify individual user accounts and from the magnetic field readings we identify both the (unique) cellphone device owned by the user and their course-grained location. In each project we collect real-world datasets and apply supervised learning techniques, particularly multi-class classification algorithms to test our hypotheses. We use both leave-one-out cross validation as well as k-fold cross validation to reduce any bias in the results. Throughout the dissertation we find that unprotected data reveals sensitive information about users. Each chapter also contains a discussion about possible obfuscation techniques or countermeasures and their effectiveness with regards to the conclusions we present. Overall our results show that deriving information about users is attainable and, with each of these results, users would have limited if any indication that any type of analysis was taking place
Proceedings of the 12th International Conference on Technology in Mathematics Teaching ICTMT 12
Innovation, inclusion, sharing and diversity are some of the words that briefly and suitably characterize the ICTMT series of biennial international conferences – the International Conference
on Technology in Mathematics Teaching. Being the twelfth of a series which began in Birmingham,
UK, in 1993, under the influential enterprise of Professor Bert Waits from Ohio State University,
this conference was held in Portugal for the first time. The 12th International Conference on
Technology in Mathematics Teaching was hosted by the Faculty of Sciences and Technology of the
University of Algarve, in the city of Faro, from 24 to 27 June 2015, and was guided by the original
spirit of its foundation.
The integration of digital technologies in mathematics education across school levels and countries,
from primary to tertiary education, together with the understanding of the phenomena involved in
the teaching and learning of mathematics in technological environments have always been driving
forces in the transformation of pedagogical practices. The possibility of joining at an international
conference a wide diversity of participants, including school mathematics teachers, lecturers,
mathematicians, mathematics educators and researchers, software designers, and curriculum
developers, is one facet that makes this conference rather unique. At the same time, it seeks to foster
the sharing of ideas, experiences, projects and studies while providing opportunities to try-out and
assess tools or didactical proposals during times of hands-on work. The ICTMT 12 had this same
ambition, when embracing and welcoming just over 120 delegates who actively and enthusiastically
contributed to a very packed program of scientific proposals and sessions on various topics
Recent Developments in Smart Healthcare
Medicine is undergoing a sector-wide transformation thanks to the advances in computing and networking technologies. Healthcare is changing from reactive and hospital-centered to preventive and personalized, from disease focused to well-being centered. In essence, the healthcare systems, as well as fundamental medicine research, are becoming smarter. We anticipate significant improvements in areas ranging from molecular genomics and proteomics to decision support for healthcare professionals through big data analytics, to support behavior changes through technology-enabled self-management, and social and motivational support. Furthermore, with smart technologies, healthcare delivery could also be made more efficient, higher quality, and lower cost. In this special issue, we received a total 45 submissions and accepted 19 outstanding papers that roughly span across several interesting topics on smart healthcare, including public health, health information technology (Health IT), and smart medicine
Technology 2000, volume 1
The purpose of the conference was to increase awareness of existing NASA developed technologies that are available for immediate use in the development of new products and processes, and to lay the groundwork for the effective utilization of emerging technologies. There were sessions on the following: Computer technology and software engineering; Human factors engineering and life sciences; Information and data management; Material sciences; Manufacturing and fabrication technology; Power, energy, and control systems; Robotics; Sensors and measurement technology; Artificial intelligence; Environmental technology; Optics and communications; and Superconductivity
Pattern Recognition
A wealth of advanced pattern recognition algorithms are emerging from the interdiscipline between technologies of effective visual features and the human-brain cognition process. Effective visual features are made possible through the rapid developments in appropriate sensor equipments, novel filter designs, and viable information processing architectures. While the understanding of human-brain cognition process broadens the way in which the computer can perform pattern recognition tasks. The present book is intended to collect representative researches around the globe focusing on low-level vision, filter design, features and image descriptors, data mining and analysis, and biologically inspired algorithms. The 27 chapters coved in this book disclose recent advances and new ideas in promoting the techniques, technology and applications of pattern recognition