Search results for "Computer Science"
showing 10 items of 22367 documents
Image-Evoked Affect and its Impact on Eeg-Based Biometrics
2019
Electroencephalography (EEG) signals provide a representation of the brain’s activity patterns and have been recently exploited for user identification and authentication due to their uniqueness and their robustness to interception and artificial replication. Nevertheless, such signals are commonly affected by the individual’s emotional state. In this work, we examine the use of images as stimulus for acquiring EEG signals and study whether the use of images that evoke similar emotional responses leads to higher identification accuracy compared to images that evoke different emotional responses. Results show that identification accuracy increases when the system is trained with EEG recordin…
ES1D: A Deep Network for EEG-Based Subject Identification
2017
Security systems are starting to meet new technologies and new machine learning techniques, and a variety of methods to identify individuals from physiological signals have been developed. In this paper, we present ESID, a deep learning approach to identify subjects from electroencephalogram (EEG) signals captured by using a low cost device. The system consists of a Convolutional Neural Network (CNN), which is fed with the power spectral density of different EEG recordings belonging to different individuals. The network is trained for a period of one million iterations, in order to learn features related to local patterns in the spectral domain of the original signal. The performance of the…
Towards a Security Competence of Software Developers
2020
Software growth has been explosive as people depend heavily on software on daily basis. Software development is a human-intensive effort, and developers' competence in software security is essential for secure software development. In addition, ubiquitous computing provides an added complexity to software security. Studies have treated security competences of software developers as a subsidiary of security engineers' competence instead of software engineers' competence, limiting the full knowledge of the security competences of software developers. This presents a crucial challenge for developers, educators, and users to maintain developers' competences in security. As a first step in pushi…
Finding Software Bugs in Embedded Devices
2021
AbstractThe goal of this chapter is to introduce the reader to the domain of bug discovery in embedded systems which are at the core of the Internet of Things. Embedded software has a number of particularities which makes it slightly different to general purpose software. In particular, embedded devices are more exposed to software attacks but have lower defense levels and are often left unattended. At the same time, analyzing their security is more difficult because they are very “opaque”, while the execution of custom and embedded software is often entangled with the hardware and peripherals. These differences have an impact on our ability to find software bugs in such systems. This chapt…
Análisis de la siniestralidad en ciclistas 2008-2013
2016
[ES] Los accidentes con víctimas ciclistas han sufrido un continuo ascenso en los últimos años. A fin de conocer cuáles son las características tanto del ciclista implicado en un accidente, como de las circunstancias en las que éste se ha producido, se ha realizado un estudio en el que se analiza la siniestralidad de los ciclistas registrada en España en el período comprendido entre 2008 a 2013. La investigación se ha realizado a partir de la base de datos de accidentes oficial de la Dirección General de Tráfico (base ARENA). En total se han analizado 25.439 accidentes con ciclistas implicados y 24.520 víctimas ciclistas. Los principales resultados de este estudio muestran que el número de …
Methodological Aspects of Infrared Thermography in Human Assessment
2016
Infrared thermography presents some important advantages in the determination of skin temperature, as it is a safe, non-invasive and non-contact technique with wide applications in the field of sports sciences. Like many others techniques, valid measurement in thermography requires following strict methodological steps from data acquisition to analyses and interpretation. In this chapter, we discuss the methodological aspects that must be taken into account when acquiring thermic images, along with some practical examples and recommendations based on the current literature.
Performance Estimation using the Fitness-Fatigue Model with Kalman Filter Feedback
2016
Abstract Tracking and predicting the performance of athletes is of great interest, not only in training science but also, increasingly, for serious hobbyists. The increasing availability and use of smart watches and fitness trackers means that abundant data is becoming available, and the interest to optimally use this data for performance tracking and training optimization is great. One competitive model in this domain is the 3-time-constant fitness-fatigue model by Busso based on the model by Banister and colleagues. In the following, we will show that this model can be written equivalently as a linear, time-variant state-space model. With this understanding, it becomes clear that all meth…
Formation-based modelling and simulation of success in soccer
2018
Abstract The players’ positions of tactical groups in soccer can be mapped to formation-patterns by means of artificial neural networks (Kohonen, 1995). This way, the hundreds of positional situations of one half of a match can be reduced to about 20 to 30 types of formations (Grunz, Perl & Memmert, 2012; Perl, 2015), the coincidences of which can be used for describing and simulating tactical processes of the teams (Memmert, Lemmink & Sampaio, 2017): Developing and changing formations in the interaction with the opponent activities can be understood as a tactical game in the success context of ball control, space control and finally generating dangerous situations. As such it can b…
Estimation of Location and Activation Time of Purkinje Myocardial Junctions from Sparse and Noisy Endocardial Electrical Samples
2017
The activation of the myocardial muscle is triggered by Purkinje-myocardial junctions (PMJs), which are the terminal sites of the specialised cardiac conduction system (CCS). Obtaining the location of the PMJs and other sources of endocardial ectopic activity would be desirable for building computer models of cardiac electrophysiology and planning ablation interventions. We present a method to estimate the location and activation times of endocardial electrical sources in a 3D model of the ventricles. The algorithm requires a set of discrete electrical samples on the endocardium, which can include errors in location and activation time. The estimated sources are properly placed with a locat…
Inteligencia artificial, big data y aplicaciones contra la COVID-19: privacidad y protección de datos
2020
espanolEl big data y la IA han fracasado en la prevencion, pero pueden ser muy utiles frente a la COVID-19 e incluso para evitar confinamientos y otras restricciones de derechos que provoca. La IA puede ser extremadamente eficaz para integrar, estructurar y extraer informacion y conocimiento de ingente cantidad y variedad de big data para la investigacion biomedica. Tambien es util para mejorar la atencion e informacion ciudadana y de salud, la telemedicina y la mejor asignacion de los recursos humanos y materiales. Mas amenazante para la privacidad puede ser el desarrollo de apps, pasaportes biologicos electronicos o sistemas de geolocalizacion, trazabilidad y monitoreo de personas impleme…