10 research outputs found

    A functional interpretation for nonstandard arithmetic

    Get PDF
    We introduce constructive and classical systems for nonstandard arithmetic and show how variants of the functional interpretations due to Goedel and Shoenfield can be used to rewrite proofs performed in these systems into standard ones. These functional interpretations show in particular that our nonstandard systems are conservative extensions of extensional Heyting and Peano arithmetic in all finite types, strengthening earlier results by Moerdijk, Palmgren, Avigad and Helzner. We will also indicate how our rewriting algorithm can be used for term extraction purposes. To conclude the paper, we will point out some open problems and directions for future research and mention some initial results on saturation principles

    On the extraction of computational content from noneffective convergence proofs in analysis

    No full text

    Automatic Classification of Attacks on IP Telephony

    No full text
    This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application

    Different Approaches for Face Authentication as Part of a Multimodal Biometrics System

    Get PDF
    This paper describes different approaches for the face authentication from the features and classification abilities point of view. Authors compare two types of features - Histogram of Oriented Gradients (HOG) and Local Binary Patterns (LBP) including their combination. These parameters are classified using Multilayer Neural Network (MLNN) and Support Vector Machines (SVM). Face authentication consists of several steps. The first step contains Viola-Jones algorithm for face detection. Authors resize the detected face for a fixed vector and afterwards, it is converted into grayscale. Next, feature extraction with a simple Min-Max normalization is applied. Obtained parameters are evaluated by classifiers and for each detected face, authors get posterior probability as the output of the classifier. Different approaches for face authentication are compared with each other using False Acceptance Rate (FAR), False Rejection Rate (FRR), Equal Error Rate (EER), Receiver Operating Characteristic (ROC) and Detection Error Tradeoff (DET) curves. The results are verified with AR Face Database and elaborated in a feature extraction and classifier design point of view. Best results were achieved by HOG feature for SVM classifier. Detailed results are listed in the text below

    Metadata record for: COVIDiSTRESS Global Survey dataset on psychological and behavioural consequences of the COVID-19 outbreak

    No full text
    This dataset contains key characteristics about the data described in the Data Descriptor COVIDiSTRESS Global Survey dataset on psychological and behavioural consequences of the COVID-19 outbreak. Contents: 1. human readable metadata summary table in CSV format 2. machine readable metadata file in JSON forma
    corecore