22,834 research outputs found
Lattice Gaussian Sampling by Markov Chain Monte Carlo: Bounded Distance Decoding and Trapdoor Sampling
Sampling from the lattice Gaussian distribution plays an important role in
various research fields. In this paper, the Markov chain Monte Carlo
(MCMC)-based sampling technique is advanced in several fronts. Firstly, the
spectral gap for the independent Metropolis-Hastings-Klein (MHK) algorithm is
derived, which is then extended to Peikert's algorithm and rejection sampling;
we show that independent MHK exhibits faster convergence. Then, the performance
of bounded distance decoding using MCMC is analyzed, revealing a flexible
trade-off between the decoding radius and complexity. MCMC is further applied
to trapdoor sampling, again offering a trade-off between security and
complexity. Finally, the independent multiple-try Metropolis-Klein (MTMK)
algorithm is proposed to enhance the convergence rate. The proposed algorithms
allow parallel implementation, which is beneficial for practical applications.Comment: submitted to Transaction on Information Theor
The ALICE electromagnetic calorimeter high level triggers
The ALICE (A Large Ion Collider Experiment) detector yields a huge sample of
data from different sub-detectors. On-line data processing is applied to select
and reduce the volume of the stored data. ALICE applies a multi-level hardware
trigger scheme where fast detectors are used to feed a three-level (L0, L1, and
L2) deep chain. The High-Level Trigger (HLT) is a fourth filtering stage
sitting logically between the L2 trigger and the data acquisition event
building. The EMCal detector comprises a large area electromagnetic calorimeter
that extends the momentum measurement of photons and neutral mesons up to
GeV/c, which improves the ALICE capability to perform jet
reconstruction with measurement of the neutral energy component of jets. An
online reconstruction and trigger chain has been developed within the HLT
framework to sharpen the EMCal hardware triggers, by combining the central
barrel tracking information with the shower reconstruction (clusters) in the
calorimeter. In the present report the status and the functionality of the
software components developed for the EMCal HLT online reconstruction and
trigger chain will be discussed, as well as preliminary results from their
commissioning performed during the 2011 LHC running period.Comment: Proceeding for the CHEP 2012 Conferenc
Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography
Several recent works have proposed and implemented cryptography as a means to
preserve privacy and security of patients health data. Nevertheless, the
weakest point of electronic health record (EHR) systems that relied on these
cryptographic schemes is key management. Thus, this paper presents the
development of privacy and security system for cryptography-based-EHR by taking
advantage of the uniqueness of fingerprint and iris characteristic features to
secure cryptographic keys in a bio-cryptography framework. The results of the
system evaluation showed significant improvements in terms of time efficiency
of this approach to cryptographic-based-EHR. Both the fuzzy vault and fuzzy
commitment demonstrated false acceptance rate (FAR) of 0%, which reduces the
likelihood of imposters gaining successful access to the keys protecting
patients protected health information. This result also justifies the
feasibility of implementing fuzzy key binding scheme in real applications,
especially fuzzy vault which demonstrated a better performance during key
reconstruction
Genetic Programming for Multibiometrics
Biometric systems suffer from some drawbacks: a biometric system can provide
in general good performances except with some individuals as its performance
depends highly on the quality of the capture. One solution to solve some of
these problems is to use multibiometrics where different biometric systems are
combined together (multiple captures of the same biometric modality, multiple
feature extraction algorithms, multiple biometric modalities...). In this
paper, we are interested in score level fusion functions application (i.e., we
use a multibiometric authentication scheme which accept or deny the claimant
for using an application). In the state of the art, the weighted sum of scores
(which is a linear classifier) and the use of an SVM (which is a non linear
classifier) provided by different biometric systems provide one of the best
performances. We present a new method based on the use of genetic programming
giving similar or better performances (depending on the complexity of the
database). We derive a score fusion function by assembling some classical
primitives functions (+, *, -, ...). We have validated the proposed method on
three significant biometric benchmark datasets from the state of the art
- …