6,502 research outputs found

    Inferring Information Flow in Spike-train Data Sets using a Trial-Shuffle Method

    Full text link
    Understanding information processing in the brain requires the ability to determine the functional connectivity between the different regions of the brain. We present a method using transfer entropy to extract this flow of information between brain regions from spike-train data commonly obtained in neurological experiments. Transfer entropy is a statistical measure based in information theory that attempts to quantify the information flow from one process to another, and has been applied to find connectivity in simulated spike-train data. Due to statistical error in the estimator, inferring functional connectivity requires a method for determining significance in the transfer entropy values. We discuss the issues with numerical estimation of transfer entropy and resulting challenges in determining significance before presenting the trial-shuffle method as a viable option. The trial-shuffle method, for spike-train data that is split into multiple trials, determines significant transfer entropy values independently for each individual pair of neurons by comparing to a created baseline distribution using a rigorous statistical test. This is in contrast to either globally comparing all neuron transfer entropy values or comparing pairwise values to a single baseline value. In establishing the viability of this method by comparison to several alternative approaches in the literature, we find evidence that preserving the inter-spike-interval timing is important. We then use the trial-shuffle method to investigate information flow within a model network as we vary model parameters. This includes investigating the global flow of information within a connectivity network divided into two well-connected subnetworks, going beyond local transfer of information between pairs of neurons.Comment: 24 pages, 6 figure

    Design-for-delay-testability techniques for high-speed digital circuits

    Get PDF
    The importance of delay faults is enhanced by the ever increasing clock rates and decreasing geometry sizes of nowadays' circuits. This thesis focuses on the development of Design-for-Delay-Testability (DfDT) techniques for high-speed circuits and embedded cores. The rising costs of IC testing and in particular the costs of Automatic Test Equipment are major concerns for the semiconductor industry. To reverse the trend of rising testing costs, DfDT is\ud getting more and more important

    Adaptive OFDM Radar for Target Detection and Tracking

    Get PDF
    We develop algorithms to detect and track targets by employing a wideband orthogonal frequency division multiplexing: OFDM) radar signal. The frequency diversity of the OFDM signal improves the sensing performance since the scattering centers of a target resonate variably at different frequencies. In addition, being a wideband signal, OFDM improves the range resolution and provides spectral efficiency. We first design the spectrum of the OFDM signal to improve the radar\u27s wideband ambiguity function. Our designed waveform enhances the range resolution and motivates us to use adaptive OFDM waveform in specific problems, such as the detection and tracking of targets. We develop methods for detecting a moving target in the presence of multipath, which exist, for example, in urban environments. We exploit the multipath reflections by utilizing different Doppler shifts. We analytically evaluate the asymptotic performance of the detector and adaptively design the OFDM waveform, by maximizing the noncentrality-parameter expression, to further improve the detection performance. Next, we transform the detection problem into the task of a sparse-signal estimation by making use of the sparsity of multiple paths. We propose an efficient sparse-recovery algorithm by employing a collection of multiple small Dantzig selectors, and analytically compute the reconstruction performance in terms of the ell1ell_1-constrained minimal singular value. We solve a constrained multi-objective optimization algorithm to design the OFDM waveform and infer that the resultant signal-energy distribution is in proportion to the distribution of the target energy across different subcarriers. Then, we develop tracking methods for both a single and multiple targets. We propose an tracking method for a low-grazing angle target by realistically modeling different physical and statistical effects, such as the meteorological conditions in the troposphere, curved surface of the earth, and roughness of the sea-surface. To further enhance the tracking performance, we integrate a maximum mutual information based waveform design technique into the tracker. To track multiple targets, we exploit the inherent sparsity on the delay-Doppler plane to develop an computationally efficient procedure. For computational efficiency, we use more prior information to dynamically partition a small portion of the delay-Doppler plane. We utilize the block-sparsity property to propose a block version of the CoSaMP algorithm in the tracking filter

    On the track for an efficient detection of Escherichia coli in water : A review on PCR-based methods

    Get PDF
    Ensuring water safety is an ongoing challenge to public health providers. Assessing the presence of fecal contamination indicators in water is essential to protect public health from diseases caused by waterborne pathogens. For this purpose, the bacteria Escherichia coli has been used as the most reliable indicator of fecal contamination in water. The methods currently in use for monitoring the microbiological safety of water are based on culturing the microorganisms. However, these methods are not the desirable solution to prevent outbreaks as they provide the results with a considerable delay, lacking on specificity and sensitivity. Moreover, viable but non-culturable microorganisms, which may be present as a result of environmental stress or water treatment processes, are not detected by culture-based methods and, thus, may result in false-negative assessments of E. coli in water samples. These limitations may place public health at significant risk, leading to substantial monetary losses in health care and, additionally, in costs related with a reduced productivity in the area affected by the outbreak, and in costs supported by the water quality control departments involved. Molecular methods, particularly polymerase chain reaction-based methods, have been studied as an alternative technology to overcome the current limitations, as they offer the possibility to reduce the assay time, to improve the detection sensitivity and specificity, and to identify multiple targets and pathogens, including new or emerging strains. The variety of techniques and applications available for PCR-based methods has increased considerably and the costs involved have been substantially reduced, which together have contributed to the potential standardization of these techniques. However, they still require further refinement in order to be standardized and applied to the variety of environmental waters and their specific characteristics. The PCR-based methods under development for monitoring the presence of E. coli in water are here discussed. Special emphasis is given to methodologies that avoid pre-enrichment during the water sample preparation process so that the assay time is reduced and the required legislated sensitivity is achieved. The advantages and limitations of these methods are also reviewed, contributing to a more comprehensive overview toward a more conscious research in identifying E. coli in water.Diana Mendes (SFRH/BDE/33752/2009) was recipient of a fellowship from the Fundacao para a Ciencia e a Tecnologia (FCT, Portugal) and Frilabo, Lda. The authors thank Tatiana Aguiar (Centre of Biological Engineering) for English proofreading, the financial support from the Project "Desenvolvimento de um kit de detecao e quantificacao de E. coli e bacterias coliformes em aguas", Ref. 2009/5787, Programa Operacional Regional do Norte (ON.2 - O Novo Norte), QREN, FEDER, the FCT Strategic Project PEst-OE/EQB/LA0023/2013 and the Project "Biolnd-Biotechnology and Bioengineering for improved Industrial and processes", REF. NORTE-07-0124-FEDER-000028 Co-funded by the Programa Operacional Regional do Norte (ON.2 - O Novo Norte), QREN, FEDER

    A survey of defense mechanisms against distributed denial of service (DDOS) flooding attacks

    Get PDF
    Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for security professionals. DDoS flooding attacks are typically explicit attempts to disrupt legitimate users' access to services. Attackers usually gain access to a large number of computers by exploiting their vulnerabilities to set up attack armies (i.e., Botnets). Once an attack army has been set up, an attacker can invoke a coordinated, large-scale attack against one or more targets. Developing a comprehensive defense mechanism against identified and anticipated DDoS flooding attacks is a desired goal of the intrusion detection and prevention research community. However, the development of such a mechanism requires a comprehensive understanding of the problem and the techniques that have been used thus far in preventing, detecting, and responding to various DDoS flooding attacks. In this paper, we explore the scope of the DDoS flooding attack problem and attempts to combat it. We categorize the DDoS flooding attacks and classify existing countermeasures based on where and when they prevent, detect, and respond to the DDoS flooding attacks. Moreover, we highlight the need for a comprehensive distributed and collaborative defense approach. Our primary intention for this work is to stimulate the research community into developing creative, effective, efficient, and comprehensive prevention, detection, and response mechanisms that address the DDoS flooding problem before, during and after an actual attack. © 1998-2012 IEEE

    Detection of repackaged mobile applications through a collaborative approach

    Get PDF
    none4noRepackaged applications are based on genuine applications, but they subtlety include some modifications. In particular, trojanized applications are one of the most dangerous threats for smartphones. Malware code may be hidden inside applications to access private data or to leak user credit. In this paper, we propose a contract-based approach to detect such repackaged applications, where a contract specifies the set of legal actions that can be performed by an application. Current methods to generate contracts lack information from real usage scenarios, thus being inaccurate and too coarse-grained. This may result either in generating too many false positives or in missing misbehaviors when verifying the compliance between the application and the contract. In the proposed framework, application contracts are generated dynamically by a central server merging execution traces collected and shared continuously by collaborative users executing the application. More precisely, quantitative information extracted from execution traces is used to define a contract describing the expected application behavior, which is deployed to the cooperating users. Then, every user can use the received contract to check whether the related application is either genuine or repackaged. Such a verification is based on an enforcement mechanism that monitors the application execution at run-time and compares it against the contract through statistical tests.openAlessandro Aldini; Fabio Martinelli; Andrea Saracino; Daniele SgandurraAldini, Alessandro; Fabio, Martinelli; Andrea, Saracino; Daniele, Sgandurr

    Online Timing Slack Measurement and its Application in Field-Programmable Gate Arrays

    Get PDF
    Reliability, power consumption and timing performance are key concerns for today's integrated circuits. Measurement techniques capable of quantifying the timing characteristics of a circuit, while it is operating, facilitate a range of benefits. Delay variation due to environmental and operational conditions, and degradation can be monitored by tracking changes in timing performance. Using the measurements in a closed-loop to control power supply voltage or clock frequency allows for the reduction of timing safety margins, leading to improvements in power consumption or throughput performance through the exploitation of better-than worst-case operation. This thesis describes a novel online timing slack measurement method which can directly measure the timing performance of a circuit, accurately and with minimal overhead. Enhancements allow for the improvement of absolute accuracy and resolution. A compilation flow is reported that can automatically instrument arbitrary circuits on FPGAs with the measurement circuitry. On its own this measurement method is able to track the "health" of an integrated circuit, from commissioning through its lifetime, warning of impending failure or instigating pre-emptive degradation mitigation techniques. The use of the measurement method in a closed-loop dynamic voltage and frequency scaling scheme has been demonstrated, achieving significant improvements in power consumption and throughput performance.Open Acces

    Techniques for Improving Security and Trustworthiness of Integrated Circuits

    Get PDF
    The integrated circuit (IC) development process is becoming increasingly vulnerable to malicious activities because untrusted parties could be involved in this IC development flow. There are four typical problems that impact the security and trustworthiness of ICs used in military, financial, transportation, or other critical systems: (i) Malicious inclusions and alterations, known as hardware Trojans, can be inserted into a design by modifying the design during GDSII development and fabrication. Hardware Trojans in ICs may cause malfunctions, lower the reliability of ICs, leak confidential information to adversaries or even destroy the system under specifically designed conditions. (ii) The number of circuit-related counterfeiting incidents reported by component manufacturers has increased significantly over the past few years with recycled ICs contributing the largest percentage of the total reported counterfeiting incidents. Since these recycled ICs have been used in the field before, the performance and reliability of such ICs has been degraded by aging effects and harsh recycling process. (iii) Reverse engineering (RE) is process of extracting a circuit’s gate-level netlist, and/or inferring its functionality. The RE causes threats to the design because attackers can steal and pirate a design (IP piracy), identify the device technology, or facilitate other hardware attacks. (iv) Traditional tools for uniquely identifying devices are vulnerable to non-invasive or invasive physical attacks. Securing the ID/key is of utmost importance since leakage of even a single device ID/key could be exploited by an adversary to hack other devices or produce pirated devices. In this work, we have developed a series of design and test methodologies to deal with these four challenging issues and thus enhance the security, trustworthiness and reliability of ICs. The techniques proposed in this thesis include: a path delay fingerprinting technique for detection of hardware Trojans, recycled ICs, and other types counterfeit ICs including remarked, overproduced, and cloned ICs with their unique identifiers; a Built-In Self-Authentication (BISA) technique to prevent hardware Trojan insertions by untrusted fabrication facilities; an efficient and secure split manufacturing via Obfuscated Built-In Self-Authentication (OBISA) technique to prevent reverse engineering by untrusted fabrication facilities; and a novel bit selection approach for obtaining the most reliable bits for SRAM-based physical unclonable function (PUF) across environmental conditions and silicon aging effects
    • …
    corecore