3,028 research outputs found

    Overcoming Inter-Subject Variability in BCI Using EEG-Based Identification

    Get PDF
    The high dependency of the Brain Computer Interface (BCI) system performance on the BCI user is a well-known issue of many BCI devices. This contribution presents a new way to overcome this problem using a synergy between a BCI device and an EEG-based biometric algorithm. Using the biometric algorithm, the BCI device automatically identifies its current user and adapts parameters of the classification process and of the BCI protocol to maximize the BCI performance. In addition to this we present an algorithm for EEG-based identification designed to be resistant to variations in EEG recordings between sessions, which is also demonstrated by an experiment with an EEG database containing two sessions recorded one year apart. Further, our algorithm is designed to be compatible with our movement-related BCI device and the evaluation of the algorithm performance took place under conditions of a standard BCI experiment. Estimation of the mu rhythm fundamental frequency using the Frequency Zooming AR modeling is used for EEG feature extraction followed by a classifier based on the regularized Mahalanobis distance. An average subject identification score of 96 % is achieved

    Trusted interoperability and the patient safety issues of parasitic health care software

    No full text
    With the proliferation of software systems and products in the healthcare environment, it is increasingly common for such software products to be constructed in a modular design. However, for modular software to be securely interoperable with other software products requires agreed consistent and accountable interfaces. This agreement may take the form of bilateral vendor to vendor arrangements or via a trusted external third-party who coordinates agreed interaction methods, such as a jurisdiction. Standards are a particular form of mutually trusted third party. Unfortunately, this agreed method of interoperability is not always present in vendor software. Where one software product or module interacts with another, in the absence of any agreement, it is referred to as ―bolt-on‖. It is perhaps more descriptive to refer to such software in terms of its potential to cause harm and refer to it using the biological analogy of ―parasitic‖ software and associated ―host‖ software. Analogous to biological systems, parasitic software can operate by data injection into or data extraction from, the associated host database. Both forms of parasitic software exploit access mechanisms or security flaws in the host software independent of the host vendor and in ways not intended or supported by the host vendor. This paper discusses the mechanics of this security vulnerability and more importantly, the potential adverse consequences to patient safety of such susceptibilities. As Australia moves to a national connected e-health system these issues are causes for grave concern. This paper provides a case study of this insecurity to highlight the problem, promote discussion and encourage potential change

    Parasitic Databases

    Get PDF
    A parasitic database combines the fundamental principles of parasitic storage with those of traditional database theory to create a distributed data storage strategy that provides basic database functionality in a design specifically intended to ensure high data security. This approach is inspired by parasitic network storage in which information is stored within network traffic across many machines, usually unbeknownst to their owners, using a communication protocol such as Internet Control Message Protocol (ICMP), etc. The basis for parasitic data storage is that highly confidential user data is physically stored through continuous packet transfer between various nodes within a network. This thesis builds upon this initial idea and presents a possible design approach that uses standard ICMP packet architecture. Database data rows are divided across multiple packets on multiple network nodes by splitting and distributing them in the Data fields of ICMP packets. These database data packets can then be managed by a specially designed parasitic database management system with a client-server architecture

    Trusted interoperability and the patient safety issues of parasitic health care software

    Get PDF
    With the proliferation of software systems and products in the healthcare environment, it is increasingly common for such software products to be constructed in a modular design. However, for modular software to be securely interoperable with other software products requires agreed consistent and accountable interfaces. This agreement may take the form of bilateral vendor to vendor arrangements or via a trusted external third-party who coordinates agreed interaction methods, such as a jurisdiction. Standards are a particular form of mutually trusted third party. Unfortunately, this agreed method of interoperability is not always present in vendor software. Where one software product or module interacts with another, in the absence of any agreement, it is referred to as “bolt-on”. It is perhaps more descriptive to refer to such software in terms of its potential to cause harm and refer to it using the biological analogy of “parasitic” software and associated “host” software. Analogous to biological systems, parasitic software can operate by data injection into or data extraction from, the associated host database. Both forms of parasitic software exploit access mechanisms or security flaws in the host software independent of the host vendor and in ways not intended or supported by the host vendor. This paper discusses the mechanics of this security vulnerability and more importantly, the potential adverse consequences to patient safety of such susceptibilities. As Australia moves to a national connected e-health system these issues are causes for grave concern. This paper provides a case study of this insecurity to highlight the problem, promote discussion and encourage potential change

    Using a One Health approach to assess the impact of parasitic disease in livestock: how does it add value?

    Get PDF
    Human population increases, with greater food demands, have resulted in a rapid evolution of livestock food systems, leading to changes in land and water use. The scale of global livestock systems mean that changes in animal health status, particularly in parasite levels, have impacts that go beyond farm and sector levels. To quantify the true impact of parasites in livestock, frameworks that look at both resources and services valued in markets and those that have no true market value are required. Mitigating the effects of parasitic disease in livestock will not only increase productivity, but also improve animal welfare and human health, whilst reducing the environmental burden of livestock production systems. To measure these potential benefits, a One Health approach is needed. This paper discusses the types of methods and the data collection tools needed for a more holistic perspective and provides a framework with its application to coccidiosis in poultry. To build a body of knowledge that allows the ranking of parasite diseases in a wider animal health setting, such One Health frameworks need to be applied more frequently and with rigour. The outcome will improve the allocation of resources to critical constraints on parasite management
    • …
    corecore