Search results for "Computer Science"

showing 10 items of 22367 documents

Image-Evoked Affect and its Impact on Eeg-Based Biometrics

2019

Electroencephalography (EEG) signals provide a representation of the brain’s activity patterns and have been recently exploited for user identification and authentication due to their uniqueness and their robustness to interception and artificial replication. Nevertheless, such signals are commonly affected by the individual’s emotional state. In this work, we examine the use of images as stimulus for acquiring EEG signals and study whether the use of images that evoke similar emotional responses leads to higher identification accuracy compared to images that evoke different emotional responses. Results show that identification accuracy increases when the system is trained with EEG recordin…

021110 strategic defence & security studiesmedicine.diagnostic_testBiometricsComputer scienceSpeech recognition0211 other engineering and technologies02 engineering and technologyElectroencephalographyStimulus (physiology)Statistical classification0202 electrical engineering electronic engineering information engineeringTask analysismedicine020201 artificial intelligence & image processingMel-frequency cepstrum2019 IEEE International Conference on Image Processing (ICIP)
researchProduct

ES1D: A Deep Network for EEG-Based Subject Identification

2017

Security systems are starting to meet new technologies and new machine learning techniques, and a variety of methods to identify individuals from physiological signals have been developed. In this paper, we present ESID, a deep learning approach to identify subjects from electroencephalogram (EEG) signals captured by using a low cost device. The system consists of a Convolutional Neural Network (CNN), which is fed with the power spectral density of different EEG recordings belonging to different individuals. The network is trained for a period of one million iterations, in order to learn features related to local patterns in the spectral domain of the original signal. The performance of the…

021110 strategic defence & security studiesmedicine.diagnostic_testbusiness.industryComputer scienceDeep learningFeature extractionSIGNAL (programming language)0211 other engineering and technologiesSpectral densityPattern recognition02 engineering and technologyElectroencephalographyConvolutional neural networkConvolutionIdentification (information)0202 electrical engineering electronic engineering information engineeringmedicine020201 artificial intelligence & image processingArtificial intelligencebusiness2017 IEEE 17th International Conference on Bioinformatics and Bioengineering (BIBE)
researchProduct

Towards a Security Competence of Software Developers

2020

Software growth has been explosive as people depend heavily on software on daily basis. Software development is a human-intensive effort, and developers' competence in software security is essential for secure software development. In addition, ubiquitous computing provides an added complexity to software security. Studies have treated security competences of software developers as a subsidiary of security engineers' competence instead of software engineers' competence, limiting the full knowledge of the security competences of software developers. This presents a crucial challenge for developers, educators, and users to maintain developers' competences in security. As a first step in pushi…

021110 strategic defence & security studiesohjelmistokehittäjätKnowledge managementbusiness.industryComputer scienceohjelmistotuotanto0211 other engineering and technologies020207 software engineering02 engineering and technologySoftwarekompetenssi0202 electrical engineering electronic engineering information engineeringammattitaitotietoturvaohjelmistokehitysbusinessCompetence (human resources)
researchProduct

Finding Software Bugs in Embedded Devices

2021

AbstractThe goal of this chapter is to introduce the reader to the domain of bug discovery in embedded systems which are at the core of the Internet of Things. Embedded software has a number of particularities which makes it slightly different to general purpose software. In particular, embedded devices are more exposed to software attacks but have lower defense levels and are often left unattended. At the same time, analyzing their security is more difficult because they are very “opaque”, while the execution of custom and embedded software is often entangled with the hardware and peripherals. These differences have an impact on our ability to find software bugs in such systems. This chapt…

021110 strategic defence & security studiessulautettu tietotekniikkaComputer sciencebusiness.industryembedded devices0211 other engineering and technologies020207 software engineering02 engineering and technologysecurityField (computer science)Domain (software engineering)Embedded softwareSoftwareSoftware bugohjelmointivirheetSoftware deploymentEmbedded systemsoftware bugs0202 electrical engineering electronic engineering information engineeringtietoturvabusinessInternet of ThingsGeneral purpose software
researchProduct

Análisis de la siniestralidad en ciclistas 2008-2013

2016

[ES] Los accidentes con víctimas ciclistas han sufrido un continuo ascenso en los últimos años. A fin de conocer cuáles son las características tanto del ciclista implicado en un accidente, como de las circunstancias en las que éste se ha producido, se ha realizado un estudio en el que se analiza la siniestralidad de los ciclistas registrada en España en el período comprendido entre 2008 a 2013. La investigación se ha realizado a partir de la base de datos de accidentes oficial de la Dirección General de Tráfico (base ARENA). En total se han analizado 25.439 accidentes con ciclistas implicados y 24.520 víctimas ciclistas. Los principales resultados de este estudio muestran que el número de …

03 medical and health sciences0302 clinical medicineComputer scienceAccidentalidad030212 general & internal medicine010501 environmental sciencesCiclistasBicicleta01 natural sciencesHumanitiesSostenibilidad0105 earth and related environmental sciencesLibro de Actas CIT2016. XII Congreso de Ingeniería del Transporte
researchProduct

Methodological Aspects of Infrared Thermography in Human Assessment

2016

Infrared thermography presents some important advantages in the determination of skin temperature, as it is a safe, non-invasive and non-contact technique with wide applications in the field of sports sciences. Like many others techniques, valid measurement in thermography requires following strict methodological steps from data acquisition to analyses and interpretation. In this chapter, we discuss the methodological aspects that must be taken into account when acquiring thermic images, along with some practical examples and recommendations based on the current literature.

03 medical and health sciences0302 clinical medicineData acquisitionComputer scienceThermographySystems engineeringSkin temperature030204 cardiovascular system & hematology030217 neurology & neurosurgeryField (computer science)Human assessment
researchProduct

Performance Estimation using the Fitness-Fatigue Model with Kalman Filter Feedback

2016

Abstract Tracking and predicting the performance of athletes is of great interest, not only in training science but also, increasingly, for serious hobbyists. The increasing availability and use of smart watches and fitness trackers means that abundant data is becoming available, and the interest to optimally use this data for performance tracking and training optimization is great. One competitive model in this domain is the 3-time-constant fitness-fatigue model by Busso based on the model by Banister and colleagues. In the following, we will show that this model can be written equivalently as a linear, time-variant state-space model. With this understanding, it becomes clear that all meth…

03 medical and health sciences0302 clinical medicineGeneral Computer ScienceComputer scienceControl theoryPerformance estimation05 social sciencesBiomedical Engineering050301 education030229 sport sciencesKalman filterddc:7960503 educationInternational Journal of Computer Science in Sport
researchProduct

Formation-based modelling and simulation of success in soccer

2018

Abstract The players’ positions of tactical groups in soccer can be mapped to formation-patterns by means of artificial neural networks (Kohonen, 1995). This way, the hundreds of positional situations of one half of a match can be reduced to about 20 to 30 types of formations (Grunz, Perl & Memmert, 2012; Perl, 2015), the coincidences of which can be used for describing and simulating tactical processes of the teams (Memmert, Lemmink & Sampaio, 2017): Developing and changing formations in the interaction with the opponent activities can be understood as a tactical game in the success context of ball control, space control and finally generating dangerous situations. As such it can b…

03 medical and health sciences0302 clinical medicineGeneral Computer ScienceManagement scienceComputer scienceBiomedical Engineering030229 sport sciences030212 general & internal medicinePhysical educationInternational Journal of Computer Science in Sport
researchProduct

Estimation of Location and Activation Time of Purkinje Myocardial Junctions from Sparse and Noisy Endocardial Electrical Samples

2017

The activation of the myocardial muscle is triggered by Purkinje-myocardial junctions (PMJs), which are the terminal sites of the specialised cardiac conduction system (CCS). Obtaining the location of the PMJs and other sources of endocardial ectopic activity would be desirable for building computer models of cardiac electrophysiology and planning ablation interventions. We present a method to estimate the location and activation times of endocardial electrical sources in a 3D model of the ventricles. The algorithm requires a set of discrete electrical samples on the endocardium, which can include errors in location and activation time. The estimated sources are properly placed with a locat…

03 medical and health sciences0302 clinical medicineObservational errorTerminal (electronics)Computer scienceCardiac electrophysiologyTime error3d model030204 cardiovascular system & hematologyElectrical conduction system of the heartEndocardium030218 nuclear medicine & medical imagingBiomedical engineeringComputing in Cardiology Conference (CinC)
researchProduct

Inteligencia artificial, big data y aplicaciones contra la COVID-19: privacidad y protección de datos

2020

espanolEl big data y la IA han fracasado en la prevencion, pero pueden ser muy utiles frente a la COVID-19 e incluso para evitar confinamientos y otras restricciones de derechos que provoca. La IA puede ser extremadamente eficaz para integrar, estructurar y extraer informacion y conocimiento de ingente cantidad y variedad de big data para la investigacion biomedica. Tambien es util para mejorar la atencion e informacion ciudadana y de salud, la telemedicina y la mejor asignacion de los recursos humanos y materiales. Mas amenazante para la privacidad puede ser el desarrollo de apps, pasaportes biologicos electronicos o sistemas de geolocalizacion, trazabilidad y monitoreo de personas impleme…

03 medical and health sciences0302 clinical medicineSociology and Political ScienceComputer Science (miscellaneous)030216 legal & forensic medicine030226 pharmacology & pharmacyLawIDP. Revista de Internet Derecho y Política
researchProduct