598 research outputs found

    International Federation of Clinical Neurophysiology (IFCN) – EEG research workgroup: Recommendations on frequency and topographic analysis of resting state EEG rhythms. Part 1: Applications in clinical research studies

    Get PDF
    In 1999, the International Federation of Clinical Neurophysiology (IFCN) published “IFCN Guidelines for topographic and frequency analysis of EEGs and EPs” (Nuwer et al., 1999). Here a Workgroup of IFCN experts presents unanimous recommendations on the following procedures relevant for the topographic and frequency analysis of resting state EEGs (rsEEGs) in clinical research defined as neurophysiological experimental studies carried out in neurological and psychiatric patients: (1) recording of rsEEGs (environmental conditions and instructions to participants; montage of the EEG electrodes; recording settings); (2) digital storage of rsEEG and control data; (3) computerized visualization of rsEEGs and control data (identification of artifacts and neuropathological rsEEG waveforms); (4) extraction of “synchronization” features based on frequency analysis (band-pass filtering and computation of rsEEG amplitude/power density spectrum); (5) extraction of “connectivity” features based on frequency analysis (linear and nonlinear measures); (6) extraction of “topographic” features (topographic mapping; cortical source mapping; estimation of scalp current density and dura surface potential; cortical connectivity mapping), and (7) statistical analysis and neurophysiological interpretation of those rsEEG features. As core outcomes, the IFCN Workgroup endorsed the use of the most promising “synchronization” and “connectivity” features for clinical research, carefully considering the limitations discussed in this paper. The Workgroup also encourages more experimental (i.e. simulation studies) and clinical research within international initiatives (i.e., shared software platforms and databases) facing the open controversies about electrode montages and linear vs. nonlinear and electrode vs. source levels of those analyses

    Accelerating the simulation of wireless cellular systems

    Get PDF
    The simulation of comprehensive models for cellular wireless systems poses a computational burden of great proportions. When a sub-model for transmitter power level control is included in the simulation, a continuous process in discrete-time is introduced, requiring traditional execution to advance in small, regular time-steps. to accelerate these simulations, we propose the use of interval jumping, a novel technique which allows time to progress in adaptive, irregularly-sized jumps in time. The foundations for this mechanism are laid out in the light of the simulation of a complex simulation model which includes teletraffic, radio propagation, channel allocation, transmitter power control, and user mobility. We demonstrate the performance of this method through the use of sequential and parallel simulation.;Approaching the problem of accelerating the simulation of wireless systems from a different angle, we also identify a second important performance bottleneck. Calculations for interference computation, which may be carried out hundreds of times for each second of simulated time, require the evaluation of O(N2) interactions, for a system with N transmitter/receiver pairs. In order to provide a computationally cheaper and more scalable alternative to these operations, we study the applicability of an N-body algorithm, which brings time complexity down to O(N log N)

    Mecanismos dinâmicos de segurança para redes softwarizadas e virtualizadas

    Get PDF
    The relationship between attackers and defenders has traditionally been asymmetric, with attackers having time as an upper hand to devise an exploit that compromises the defender. The push towards the Cloudification of the world makes matters more challenging, as it lowers the cost of an attack, with a de facto standardization on a set of protocols. The discovery of a vulnerability now has a broader impact on various verticals (business use cases), while previously, some were in a segregated protocol stack requiring independent vulnerability research. Furthermore, defining a perimeter within a cloudified system is non-trivial, whereas before, the dedicated equipment already created a perimeter. This proposal takes the newer technologies of network softwarization and virtualization, both Cloud-enablers, to create new dynamic security mechanisms that address this asymmetric relationship using novel Moving Target Defense (MTD) approaches. The effective use of the exploration space, combined with the reconfiguration capabilities of frameworks like Network Function Virtualization (NFV) and Management and Orchestration (MANO), should allow for adjusting defense levels dynamically to achieve the required security as defined by the currently acceptable risk. The optimization tasks and integration tasks of this thesis explore these concepts. Furthermore, the proposed novel mechanisms were evaluated in real-world use cases, such as 5G networks or other Network Slicing enabled infrastructures.A relação entre atacantes e defensores tem sido tradicionalmente assimétrica, com os atacantes a terem o tempo como vantagem para conceberem uma exploração que comprometa o defensor. O impulso para a Cloudificação do mundo torna a situação mais desafiante, pois reduz o custo de um ataque, com uma padronização de facto sobre um conjunto de protocolos. A descoberta de uma vulnerabilidade tem agora um impacto mais amplo em várias verticais (casos de uso empresarial), enquanto anteriormente, alguns estavam numa pilha de protocolos segregados que exigiam uma investigação independente das suas vulnerabilidades. Além disso, a definição de um perímetro dentro de um sistema Cloud não é trivial, enquanto antes, o equipamento dedicado já criava um perímetro. Esta proposta toma as mais recentes tecnologias de softwarização e virtualização da rede, ambas facilitadoras da Cloud, para criar novos mecanismos dinâmicos de segurança que incidem sobre esta relação assimétrica utilizando novas abordagens de Moving Target Defense (MTD). A utilização eficaz do espaço de exploração, combinada com as capacidades de reconfiguração de frameworks como Network Function Virtualization (NFV) e Management and Orchestration (MANO), deverá permitir ajustar dinamicamente os níveis de defesa para alcançar a segurança necessária, tal como definida pelo risco actualmente aceitável. As tarefas de optimização e de integração desta tese exploram estes conceitos. Além disso, os novos mecanismos propostos foram avaliados em casos de utilização no mundo real, tais como redes 5G ou outras infraestruturas de Network Slicing.Programa Doutoral em Engenharia Informátic

    Efficient algorithms for passive network measurement

    Get PDF
    Network monitoring has become a necessity to aid in the management and operation of large networks. Passive network monitoring consists of extracting metrics (or any information of interest) by analyzing the traffic that traverses one or more network links. Extracting information from a high-speed network link is challenging, given the great data volumes and short packet inter-arrival times. These difficulties can be alleviated by using extremely efficient algorithms or by sampling the incoming traffic. This work improves the state of the art in both these approaches. For one-way packet delay measurement, we propose a series of improvements over a recently appeared technique called Lossy Difference Aggregator. A main limitation of this technique is that it does not provide per-flow measurements. We propose a data structure called Lossy Difference Sketch that is capable of providing such per-flow delay measurements, and, unlike recent related works, does not rely on any model of packet delays. In the problem of collecting measurements under the sliding window model, we focus on the estimation of the number of active flows and in traffic filtering. Using a common approach, we propose one algorithm for each problem that obtains great accuracy with significant resource savings. In the traffic sampling area, the selection of the sampling rate is a crucial aspect. The most sensible approach involves dynamically adjusting sampling rates according to network traffic conditions, which is known as adaptive sampling. We propose an algorithm called Cuckoo Sampling that can operate with a fixed memory budget and perform adaptive flow-wise packet sampling. It is based on a very simple data structure and is computationally extremely lightweight. The techniques presented in this work are thoroughly evaluated through a combination of theoretical and experimental analysis.Postprint (published version

    Contention techniques for opportunistic communication in wireless mesh networks

    Get PDF
    Auf dem Gebiet der drahtlosen Kommunikation und insbesondere auf den tieferen Netzwerkschichten sind gewaltige Fortschritte zu verzeichnen. Innovative Konzepte und Technologien auf der physikalischen Schicht (PHY) gehen dabei zeitnah in zelluläre Netze ein. Drahtlose Maschennetzwerke (WMNs) können mit diesem Innovationstempo nicht mithalten. Die Mehrnutzer-Kommunikation ist ein Grundpfeiler vieler angewandter PHY Technologien, die sich in WMNs nur ungenügend auf die etablierte Schichtenarchitektur abbilden lässt. Insbesondere ist das Problem des Scheduling in WMNs inhärent komplex. Erstaunlicherweise ist der Mehrfachzugriff mit Trägerprüfung (CSMA) in WMNs asymptotisch optimal obwohl das Verfahren eine geringe Durchführungskomplexität aufweist. Daher stellt sich die Frage, in welcher Weise das dem CSMA zugrunde liegende Konzept des konkurrierenden Wettbewerbs (engl. Contention) für die Integration innovativer PHY Technologien verwendet werden kann. Opportunistische Kommunikation ist eine Technik, die die inhärenten Besonderheiten des drahtlosen Kanals ausnutzt. In der vorliegenden Dissertation werden CSMA-basierte Protokolle für die opportunistische Kommunikation in WMNs entwickelt und evaluiert. Es werden dabei opportunistisches Routing (OR) im zustandslosen Kanal und opportunistisches Scheduling (OS) im zustandsbehafteten Kanal betrachtet. Ziel ist es, den Durchsatz von elastischen Paketflüssen gerecht zu maximieren. Es werden Modelle für Überlastkontrolle, Routing und konkurrenzbasierte opportunistische Kommunikation vorgestellt. Am Beispiel von IEEE 802.11 wird illustriert, wie der schichtübergreifende Entwurf in einem Netzwerksimulator prototypisch implementiert werden kann. Auf Grundlage der Evaluationsresultate kann der Schluss gezogen werden, dass die opportunistische Kommunikation konkurrenzbasiert realisierbar ist. Darüber hinaus steigern die vorgestellten Protokolle den Durchsatz im Vergleich zu etablierten Lösungen wie etwa DCF, DSR, ExOR, RBAR und ETT.In the field of wireless communication, a tremendous progress can be observed especially at the lower layers. Innovative physical layer (PHY) concepts and technologies can be rapidly assimilated in cellular networks. Wireless mesh networks (WMNs), on the other hand, cannot keep up with the speed of innovation at the PHY due to their flat and decentralized architecture. Many innovative PHY technologies rely on multi-user communication, so that the established abstraction of the network stack does not work well for WMNs. The scheduling problem in WMNs is inherent complex. Surprisingly, carrier sense multiple access (CSMA) in WMNs is asymptotically utility-optimal even though it has a low computational complexity and does not involve message exchange. Hence, the question arises whether CSMA and the underlying concept of contention allows for the assimilation of advanced PHY technologies into WMNs. In this thesis, we design and evaluate contention protocols based on CSMA for opportunistic communication in WMNs. Opportunistic communication is a technique that relies on multi-user diversity in order to exploit the inherent characteristics of the wireless channel. In particular, we consider opportunistic routing (OR) and opportunistic scheduling (OS) in memoryless and slow fading channels, respectively. We present models for congestion control, routing and contention-based opportunistic communication in WMNs in order to maximize both throughput and fairness of elastic unicast traffic flows. At the instance of IEEE 802.11, we illustrate how the cross-layer algorithms can be implemented within a network simulator prototype. Our evaluation results lead to the conclusion that contention-based opportunistic communication is feasible. Furthermore, the proposed protocols increase both throughput and fairness in comparison to state-of-the-art approaches like DCF, DSR, ExOR, RBAR and ETT

    Proceedings of the Fall 1995 Advanced Digital Communication Systems

    Get PDF
    Coordinated Science Laboratory was formerly known as Control Systems Laborator

    Backtranslation of EEG biomarkers of Alzheimer's disease from patients to mouse model

    Get PDF
    The present Ph.D. thesis has been mainly developed on the data of the project with the short name PharmaCog (2010-2015), granted by the European Framework Programme 7 with about 28 millions of Euro (i.e. Innovative Medicine Initiative, IMI, grant agreement n°115009; www.pharmacog.org). This project involved 15 academic institutions, 12 global pharmaceutical companies, and 5 small and medium sized enterprises (SMEs). The PharmaCog project aimed at improving the pathway of drug discovery in Alzheimer’s disease (AD), based on a major interest of pharma companies, namely the validation of electrophysiological, neuroimaging, and blood biomarkers possibly sensitive to the effect of disease-modifying drugs reducing Ab42 in the brain in AD patients at the prodromal stage of amnesic mild cognitive impairment (aMCI). The core concept of the PharmaCog project was that the pathway of drug discovery in AD may be enhanced by (1) the validation of biomarkers derived from blood, EEG, magnetic resonance imaging (MRI), and positron emission tomography (PET) in patients with aMCI due to AD diagnosed by in-vivo measurement of Ab42 and phospho-tau in the brain and (2) the evaluation of the translational value of those human biomarkers in wild type (WT) mice and animal models of AD including transgenic mice with the mutation of PS1 and/or APP (i.e. PDAPP and TASTPM strains). Those genetic factors induce an abnormal accumulation of Ab42 in the brain and related cognitive deficits. The expected results may be (1) the identification of a matrix of biomarkers sensitive to the prodromal AD (aMCI cognitive status) and its progression in patients and (2) the selection of similar biomarkers related to AD neuropathology and cognitive deficits in PDAPP and TASTPM strains. These biomarkers were expected to be very useful in clinical trials testing the efficacy and neurobiological impact of new disease-modifying drugs against prodromal AD. For the development of this Ph.D. thesis, the access to the experiments and the data of the PharmaCog project was allowed by Prof. Claudio Babiloni, leader of an Italian Unit (University of Foggia in 2010-2012 and Sapienza University of Rome in 2013-2015) of the PharmaCog Consortium and coordinator of study activities relative to biomarkers derived from electroencephalographic (EEG) signals recorded from human subjects and animals in that project. Specifically, Prof. Claudio Babiloni was in charge for the centralized qualification and analysis of EEG data recorded from aMCI patients (Work Package 5, WP5) and transgenic mouse models of AD such as PDAPP and TASTPM strains (WP6). The data of the present Ph.D. thesis mostly derived from the WP5 and WP6. This document illustrating the Ph.D. thesis is structured in three main Sections: ▪ An Introductive part illustrating concisely the AD neuropathology, the mouse models of AD used in this thesis, and basic concepts of EEG techniques useful to understand the present study results; ▪ An Experimental part describing the result of the four research studies led in the framework of this Ph.D. project. Two of these studies were published in international journals registered in ISI/PubMed with impact factor, while the other two are being currently under minor revisions in those journals; ▪ A Conclusion section
    • …
    corecore