10 research outputs found
A functional interpretation for nonstandard arithmetic
We introduce constructive and classical systems for nonstandard arithmetic
and show how variants of the functional interpretations due to Goedel and
Shoenfield can be used to rewrite proofs performed in these systems into
standard ones. These functional interpretations show in particular that our
nonstandard systems are conservative extensions of extensional Heyting and
Peano arithmetic in all finite types, strengthening earlier results by
Moerdijk, Palmgren, Avigad and Helzner. We will also indicate how our rewriting
algorithm can be used for term extraction purposes. To conclude the paper, we
will point out some open problems and directions for future research and
mention some initial results on saturation principles
Automatic Classification of Attacks on IP Telephony
This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application
Different Approaches for Face Authentication as Part of a Multimodal Biometrics System
This paper describes different approaches for the face authentication from the features and classification abilities point of view. Authors compare two types of features - Histogram of Oriented Gradients (HOG) and Local Binary Patterns (LBP) including their combination. These parameters are classified using Multilayer Neural Network (MLNN) and Support Vector Machines (SVM). Face authentication consists of several steps. The first step contains Viola-Jones algorithm for face detection. Authors resize the detected face for a fixed vector and afterwards, it is converted into grayscale. Next, feature extraction with a simple Min-Max normalization is applied. Obtained parameters are evaluated by classifiers and for each detected face, authors get posterior probability as the output of the classifier. Different approaches for face authentication are compared with each other using False Acceptance Rate (FAR), False Rejection Rate (FRR), Equal Error Rate (EER), Receiver Operating Characteristic (ROC) and Detection Error Tradeoff (DET) curves. The results are verified with AR Face Database and elaborated in a feature extraction and classifier design point of view. Best results were achieved by HOG feature for SVM classifier. Detailed results are listed in the text below
Metadata record for: COVIDiSTRESS Global Survey dataset on psychological and behavioural consequences of the COVID-19 outbreak
This dataset contains key characteristics about the data described in the Data Descriptor COVIDiSTRESS Global Survey dataset on psychological and behavioural consequences of the COVID-19 outbreak. Contents: 1. human readable metadata summary table in CSV format 2. machine readable metadata file in JSON forma