60 research outputs found

    Systems and Methods for Diagnosis and Treatment of Psychiatric Disorders

    Get PDF
    A device for diagnosing and treating psychiatric disorders is described. The device may be configured to provide a graphical user interface that enables a user to select at least one of: entering information related to a diagnosis of the psychiatric disorder and alleviating symptoms caused by the psychiatric disorder. Upon a user selecting entering information related to the diagnosis of a psychiatric disorder, the device may receive information related to the diagnosis of the psychiatric disorder. The device may determine the severity of a user\u27s condition based at least in part on the received information. The device may provide a treatment based on the determined severity of the user\u27s condition. A treatment may include providing feedback to a user

    Secure Communications Over Hybrid Military Networks

    Get PDF
    Stealthiness can be described as a disposition to be sly and to do things surreptitiously. This paper presents a new architecture for flexible and secure networking in battlefields that enables stealthy and covert communication in the presence of node mobility. Our architecture is based on the combination of optical (fiber) and wireless links. Our objective is to be able to carry on undeterred communication without the attack/eavesdropping nodes being able to detect the presence of any communication. This objective is not only crucial for successful completion of the operation, but also for the safety of our mobile nodes, by not giving out their locations. We combine the advantages of optical links, such as high bandwidth, low delays, low error rates, good security, with the advantages of wireless links, such as mobility and flexibility, along with directional antennas for communication. From security point of view, we also assume presence of red zones, which are the ones controlled by the adversary or where the adversary can trace wireless activities

    Systems and Methods for Emergency Situation Communications

    Get PDF
    A system for enabling communications during an emergency situation is described. A system may be configured to generate graphical user interfaces including a map displaying a location and a status of the one or more users located at the scene of an emergency situation. The graphical user interfaces may be displayed on a user\u27s portable computing device. The graphical user interfaces may be displayed at a computing device located at a dispatcher site

    Automating the Surveillance of Mosquito Vectors from Trapped Specimens Using Computer Vision Techniques

    Full text link
    Among all animals, mosquitoes are responsible for the most deaths worldwide. Interestingly, not all types of mosquitoes spread diseases, but rather, a select few alone are competent enough to do so. In the case of any disease outbreak, an important first step is surveillance of vectors (i.e., those mosquitoes capable of spreading diseases). To do this today, public health workers lay several mosquito traps in the area of interest. Hundreds of mosquitoes will get trapped. Naturally, among these hundreds, taxonomists have to identify only the vectors to gauge their density. This process today is manual, requires complex expertise/ training, and is based on visual inspection of each trapped specimen under a microscope. It is long, stressful and self-limiting. This paper presents an innovative solution to this problem. Our technique assumes the presence of an embedded camera (similar to those in smart-phones) that can take pictures of trapped mosquitoes. Our techniques proposed here will then process these images to automatically classify the genus and species type. Our CNN model based on Inception-ResNet V2 and Transfer Learning yielded an overall accuracy of 80% in classifying mosquitoes when trained on 25,867 images of 250 trapped mosquito vector specimens captured via many smart-phone cameras. In particular, the accuracy of our model in classifying Aedes aegypti and Anopheles stephensi mosquitoes (both of which are deadly vectors) is amongst the highest. We present important lessons learned and practical impact of our techniques towards the end of the paper

    PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries

    Get PDF
    Securely authenticating a human user without assistance from any auxiliary device in the presence of powerful passive adversaries is an important and challenging problem. Passive adversaries are those that can passively monitor, intercept, and analyze every part of the authentication procedure, except for an initial secret shared between the user and the server. In this paper, we propose a new secure authentication scheme called predicate-based authentication service (PAS). In this scheme, for the first time, the concept of a predicate is introduced for authentication. We conduct analysis on the proposed scheme and implement its prototype system. Our analytical data and experimental data illustrate that the PAS scheme can simultaneously achieve a desired level of security and user friendliness

    Localizing sensor networks in un-friendly environments

    Get PDF
    In this paper, we study the issue of defending against a wireless sensor network (WSN) that has been deployed by a malicious enemy agent in an area of interest to us. While there can be many approaches to defend against maliciously deployed WSNs, we propose the design of a localization centric approach. Specifically, the problem we address is: given an enemy deployed WSN in an area of interest to us, how can we determine locations of the sensors without co-operating with the sensors themselves during localization. In our approach, we employ a physically mobile agent called the localizer (e.g., a mobile robot) to move in the sensor network and detect raw sensor-to-sensor communication signals. However, the localizer has no information on the message content or the sensor id of any signal (possibly due to message encryption) since the sensors belong to an enemy agent. Based on estimating the angle of arrival and the received signal strength, we design a protocol for the localizer to determine sensor positions. The salient features of our protocol are efficient association of signals with sensors, and filtering many likely false locations over time. Sound theoretical analysis and extensive simulations are used to demonstrate the performance of our protocol from the perspective of localization accuracy
    • …
    corecore