26 research outputs found

    Towards New Classes of Intelligent Cognitive Information Systems for Semantic Pattern Classification

    Get PDF
    This paper introduces two new classes of specialised vision systems called UBIAS and E-UBIAS. Such systems belong to the group of cognitive reasoning systems and are designed for the semantic analysis of visual patterns in the form of medical images. Proposed systems are predecessors of a new generation of intelligent systems dedicated for understanding medical diagnostic visualization and using this data as biometric characteristics

    次世代コンピュータシステムのための人間中心コンピューティング

    Get PDF
    博士(工学)法政大学 (Hosei University

    METHODS OF COGNITIVE ANALYSIS IN MEDICAL INFORMATION SYSTEMS OF DSS-TYPE

    Get PDF
    This paper demonstrates that AI methods, in particular linguistic mechanisms of semanticmeaning reasoning can be applied to the development of intelligent IT systems. They enablealso conducting an in-depth meaning analysis in the presented DDS information systems.This paper presents also IT mechanisms of object meaning description on selected examplesof spinal cord image analysis. The procedures for such semantic reasoning are based on themodel of cognitive resonance. They have been applied to the task of meaning interpretationof a selected type of central nervous system diagnostic images, as an intelligent analysismodule in IT systems. The application presented in this paper is of research character and itserves the preparation of efficient lesion detection methods applied to a dataset originatingfrom magnetic and resonance examinations of the spinal cord structures

    Human-artificial intelligence approaches for secure analysis in CAPTCHA codes

    Get PDF
    CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) has long been used to keep automated bots from misusing web services by leveraging human-artificial intelligence (HAI) interactions to distinguish whether the user is a human or a computer program. Various CAPTCHA schemes have been proposed over the years, principally to increase usability and security against emerging bots and hackers performing malicious operations. However, automated attacks have effectively cracked all common conventional schemes, and the majority of present CAPTCHA methods are also vulnerable to human-assisted relay attacks. Invisible reCAPTCHA and some approaches have not yet been cracked. However, with the introduction of fourth-generation bots accurately mimicking human behavior, a secure CAPTCHA would be hardly designed without additional special devices. Almost all cognitive-based CAPTCHAs with sensor support have not yet been compromised by automated attacks. However, they are still compromised to human-assisted relay attacks due to having a limited number of challenges and can be only solved using trusted devices. Obviously, cognitive-based CAPTCHA schemes have an advantage over other schemes in the race against security attacks. In this study, as a strong starting point for creating future secure and usable CAPTCHA schemes, we have offered an overview analysis of HAI between computer users and computers under the security aspects of open problems, difficulties, and opportunities of current CAPTCHA schemes.Web of Science20221art. no.

    Chatbots: Security, privacy, data protection, and social aspects

    Get PDF
    Chatbots are artificial communication systems becoming increasingly popular and not all their security questions are clearly solved. People use chatbots for assistance in shopping, bank communication, meal delivery, healthcare, cars, and many other actions. However, it brings an additional security risk and creates serious security challenges which have to be handled. Understanding the underlying problems requires defining the crucial steps in the techniques used to design chatbots related to security. There are many factors increasing security threats and vulnerabilities. All of them are comprehensively studied, and security practices to decrease security weaknesses are presented. Modern chatbots are no longer rule-based models, but they employ modern natural language and machine learning techniques. Such techniques learn from a conversation, which can contain personal information. The paper discusses circumstances under which such data can be used and how chatbots treat them. Many chatbots operate on a social/messaging platform, which has their terms and conditions about data. The paper aims to present a comprehensive study of security aspects in communication with chatbots. The article could open a discussion and highlight the problems of data storage and usage obtained from the communication user-chatbot and propose some standards to protect the user.Web of Scienceart. no. e642

    Crypto-Biometric Models for Information Secrecy

    No full text
    Part 2: 4th International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2014)International audienceIn this paper will be presented some advances in crypto-biometric procedures used for encryption and division of secret data, as well as modern approaches for strategic management of divided information. Computer techniques for secret information sharing aim to secure information against disclosure to unauthorized persons. The paper will present algorithms dedicated for information division and sharing on the basis of biometric or personal features. Computer techniques for classified information sharing should also be useful in the process of shared information generation and distribution. For this purpose there will be presented a new approach for information management based on cognitive systems

    Advances in Cognitive Information Systems

    No full text
    The development of computer science is now so rapid that we, the readers, in-creasingly receive technology news about new solutions and applications which very often straddle the border between the real and the virtual worlds. Computer science is also the area in which cognitive science is witnessing a renaissance, be-cause its combination with technical sciences has given birth to a broad scientific discipline called cognitive informatics. And it is this discipline which has become the main theme of this monograph, which is also to serve as a kind of guide to cognitive informatics problems. This book is the result of work on systems for the cognitive analysis and inter-pretation of various data. The purpose of such an analytical approach is to show that for an in-depth analysis of data, the layers of semantics contained in these sets must be taken into account. The interdisciplinary nature of the solutions proposed means that the subject of cognitive systems forming part of cognitive informatics becomes a new challenge for the research and application work carried out. The authors of this monograph hope that it will guide Readers on an interesting and accurate journey through the intricacies of information and cognitive science

    Strategic Information Splitting Using Biometric Patterns

    No full text
    Abstract In this paper will be proposed a new algorithm for secure strategic information sharing using biometric information. In classic cryptographic threshold schemes used for secret splitting and sharing there aren't any connection between generated shares and particular participants of threshold protocol. In fact sometimes it may be useful to generate a special personalized shadows, which allow not only reveal the original secret information, but also to identify who is the owner of particular shares or information shadow

    Ocena użyteczności metod analizy kognitywnej w wybranych systemach informacyjnych : rozprawa doktorska /

    No full text
    Recenzenci pracy: Mariusz Flasiński, Ewa Dudek-Dyduch.Praca doktorska. Akademia Górniczo-Hutnicza im. Stanisława Staszica (Kraków), 2005.Bibliogr. k. 89-98.Charakterystyka, budowa inteligentnych systemów informacyjnych, IS, inteligentne systemy informacyjne, medyczne, kognitywne, ekonomiczne, produkcyjne, logistyczne, wojskowe systemy informacyjne, techniki sztucznej inteligencji w systemach informacyjnych korzystających z kognitywnej analizy danych, ogólny zarys metod analizy kognitywnej, psychologiczne, neurofizjologiczne podstawy, charakterystyka podejścia kognitywnego w odniesieniu do zagadnienia systemów informacyjnych, podstawowe formalizmy lingwistycznej percepcji i rozumienia danych na przykładzie obrazów, algorytmy semantycznego wnioskowania, model przykładowego inteligentnego systemu informatycznego do percepcyjnej analizy i rozumienia obrazów diagnostycznych, CUN, anatomiczne aspekty budowy rdzenia kręgowego, budowa zewnętrzna, wewnętrzna, diagnostyka obrazowa, klasyfikacja jednostek chorobowych rdzenia kręgowego, wrodzone, dziedziczne, rodzinne, choroby o różnej etiologii, zapalne choroby, choroby naczyń krwionośnych, charakterystyka zbioru badawczego obrazów, zastosowanie analizy kognitywnej w rozpoznawaniu zmian patologicznych, analiza, rozpoznawanie, rozumienie obrazu, cech kształtu, dyskusja użyteczności metod analizy kognitywnej na przykładzie systemu informatycznego dokonującego analizy obrazów medycznych obrazujących zjawiska patologiczn
    corecore