2,322 research outputs found
Daily Stress Recognition from Mobile Phone Data, Weather Conditions and Individual Traits
Research has proven that stress reduces quality of life and causes many
diseases. For this reason, several researchers devised stress detection systems
based on physiological parameters. However, these systems require that
obtrusive sensors are continuously carried by the user. In our paper, we
propose an alternative approach providing evidence that daily stress can be
reliably recognized based on behavioral metrics, derived from the user's mobile
phone activity and from additional indicators, such as the weather conditions
(data pertaining to transitory properties of the environment) and the
personality traits (data concerning permanent dispositions of individuals). Our
multifactorial statistical model, which is person-independent, obtains the
accuracy score of 72.28% for a 2-class daily stress recognition problem. The
model is efficient to implement for most of multimedia applications due to
highly reduced low-dimensional feature space (32d). Moreover, we identify and
discuss the indicators which have strong predictive power.Comment: ACM Multimedia 2014, November 3-7, 2014, Orlando, Florida, US
The chaining lemma and its application
We present a new information-theoretic result which we call the Chaining Lemma. It considers a so-called âchainâ of random variables, defined by a source distribution X(0)with high min-entropy and a number (say, t in total) of arbitrary functions (T1,âŠ, Tt) which are applied in succession to that source to generate the chain (Formula presented). Intuitively, the Chaining Lemma guarantees that, if the chain is not too long, then either (i) the entire chain is âhighly randomâ, in that every variable has high min-entropy; or (ii) it is possible to find a point j (1 †j †t) in the chain such that, conditioned on the end of the chain i.e. (Formula presented), the preceding part (Formula presented) remains highly random. We think this is an interesting information-theoretic result which is intuitive but nevertheless requires rigorous case-analysis to prove. We believe that the above lemma will find applications in cryptography. We give an example of this, namely we show an application of the lemma to protect essentially any cryptographic scheme against memory tampering attacks. We allow several tampering requests, the tampering functions can be arbitrary, however, they must be chosen from a bounded size set of functions that is fixed a prior
Cost-Effective and Non-Invasive Automated Benign & Malignant Thyroid Lesion Classification in 3D Contrast-Enhanced Ultrasound Using Combination of Wavelets and Textures: A Class of ThyroScanâą Algorithms
Ultrasound has great potential to aid in the differential diagnosis of malignant and benign thyroid lesions, but interpretative pitfalls exist and the accuracy is still poor. To overcome these difficulties, we developed and analyzed a range of knowledge representation techniques, which are a class of ThyroScanâą algorithms from Global Biomedical Technologies Inc., California, USA, for automatic classification of benign and malignant thyroid lesions. The analysis is based on data obtained from twenty nodules (ten benign and ten malignant) taken from 3D contrast-enhanced ultrasound images. Fine needle aspiration biopsy and histology confirmed malignancy. Discrete Wavelet Transform (DWT) and texture algorithms are used to extract relevant features from the thyroid images. The resulting feature vectors are fed to three different classifiers: K-Nearest Neighbor (K-NN), Probabilistic Neural Network (PNN), and Decision Tree (DeTr). The performance of these classifiers is compared using Receiver Operating Characteristic (ROC) curves. Our results show that combination of DWT and texture features coupled with K-NN resulted in good performance measures with the area of under the ROC curve of 0.987, a classification accuracy of 98.9%, a sensitivity of 98%, and a specificity of 99.8%. Finally, we have proposed a novel integrated index called Thyroid Malignancy Index (TMI), which is made up of texture features, to diagnose benign or malignant nodules using just one index. We hope that this TMI will help clinicians in a more objective detection of benign and malignant thyroid lesions
Efficient public-key cryptography with bounded leakage and tamper resilience
We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks. For signatures we obtain the first construction in the standard model; for public-key encryption we obtain the first construction free of pairing (avoiding non-interactive zero-knowledge proofs). Our constructions are based on generic building blocks, and, as we show, also admit efficient instantiations under fairly standard number-theoretic assumptions.
The model of bounded tamper resistance was recently put forward by DamgÄrd et al. (Asiacrypt 2013) as an attractive path to achieve security against arbitrary memory tampering attacks without making hardware assumptions (such as the existence of a protected self-destruct or key-update mechanism), the only restriction being on the number of allowed tampering attempts (which is a parameter of the scheme). This allows to circumvent known impossibility results for unrestricted tampering (Gennaro et al., TCC 2010), while still being able to capture realistic tampering attack
Chosen-ciphertext security from subset sum
We construct a public-key encryption (PKE) scheme whose
security is polynomial-time equivalent to the hardness of the Subset Sum problem. Our scheme achieves the standard notion of indistinguishability against chosen-ciphertext attacks (IND-CCA) and can be used to encrypt messages of arbitrary polynomial length, improving upon a previous construction by Lyubashevsky, Palacio, and Segev (TCC 2010) which achieved only the weaker notion of semantic security (IND-CPA) and whose concrete security decreases with the length of the message being encrypted. At the core of our construction is a trapdoor technique which originates in the work of Micciancio and Peikert (Eurocrypt 2012
Evolving Reinforcement Learning Algorithms
We propose a method for meta-learning reinforcement learning algorithms by
searching over the space of computational graphs which compute the loss
function for a value-based model-free RL agent to optimize. The learned
algorithms are domain-agnostic and can generalize to new environments not seen
during training. Our method can both learn from scratch and bootstrap off known
existing algorithms, like DQN, enabling interpretable modifications which
improve performance. Learning from scratch on simple classical control and
gridworld tasks, our method rediscovers the temporal-difference (TD) algorithm.
Bootstrapped from DQN, we highlight two learned algorithms which obtain good
generalization performance over other classical control tasks, gridworld type
tasks, and Atari games. The analysis of the learned algorithm behavior shows
resemblance to recently proposed RL algorithms that address overestimation in
value-based methods.Comment: ICLR 2021 Oral. See project website at
https://sites.google.com/view/evolvingr
Recommended from our members
Thermo-Responsive Ultrafiltration Block Copolymer Membranes Based on Polystyrene-block-poly(diethyl acrylamide)
Within the present work, a thermo-responsive ultrafiltration membrane is manufactured based on a polystyrene-block-poly(diethyl acrylamide) block copolymer (BCP). The poly(diethyl acrylamide) block segment features a lower critical solution temperature (LCST) in water, similar to the well-known poly(N-isopropylacrylamide), but having increased biocompatibility and without exhibiting a hysteresis of the thermally induced switching behavior. The BCP is synthesized via sequential âlivingâ anionic polymerization protocols and analyzed by 1H-NMR spectroscopy, size exclusion chromatography, and differential scanning calorimetry. The resulting morphology in the bulk state is investigated by transmission electron microscopy (TEM) and small-angle X-ray scattering (SAXS) revealing the intended hexagonal cylindrical morphology. The BCPs form micelles in a binary mixture of tetrahydrofuran and dimethylformamide, where BCP composition and solvent affinities are discussed in light of the expected structure of these micelles and the resulting BCP membrane formation. The membranes are manufactured using the non-solvent induced phase separation (NIPS) process and are characterized via scanning electron microscopy (SEM) and water permeation measurements. The latter are carried out at room temperature and at 50 °C revealing up to a 23-fold increase of the permeance, when crossing the LCST of the poly(diethyl acrylamide) block segment in water
- âŠ