Mouse Biometric Authentication

Size: px
Start display at page:

Download "Mouse Biometric Authentication"

Transcription

1 Proceedngs of Student-Faculty Research Day, CSIS, Pace Unversty, May nd, 014 Mouse Bometrc Authentcaton Francsco Betances, Adam Pne, Gerald Thompson, Hedeh Zandkarm, and Vnne Monaco Sedenberg School of CSIS, Pace Unversty, Whte Plans, New York Abstract Increased securty concerns wthn the computng world have forced securty-mnded users and developers to push for greater bometrc verfcaton technques. The use of a mouse as a bometrc verfcaton devce through the dentfcaton of unque user movements has ganed tracton and support wthn the ndustry. Although there s nterest n the subject, there s queston to the vablty of such a concept and ts ablty to wthstand unauthorzed access attempts by malcous users. Studes wthn the ndustry have shown that whle vablty exsts, mplementaton for end-user customers may be more dffcult than ntally planned. Index Terms Authentcaton, Mouse Bometrcs, Mouse Clcks, Mouse Velocty 1) INTRODUCTION development of advanced computng systems and Tthe transton of major ndustral, commercal, and consumer level tasks to a purely computng envronment has created a great concern n terms of computer securty. Whle passwords and tradtonal methods of computer securty are effectve, they are unable to verfy the bometrc dentty of the user; ths creates a weakness that can be exploted through varous access attempts to unverfable access tokens. The dea of usng a mouse or touchpad devce as a means of user authentcaton has potental as a method of bometrc securty, as such nputs would be dffcult to mtate by other ndvduals. Ths s based on the premse that ndvdual mouse movements are unque to the ndvdual, as no two users engage wth computer nterfaces n the same manner. To support ths research, a number of studes have shown promsng development through the dentfcaton of unque user patterns toward computer behavor. As such, mouse dynamcs serve as a potental behavoral dynamc that would be dffcult to mtate wthout drect knowledge of user actvtes. Mouse dynamcs has ts orgns n the concept of keyboard dynamcs, n whch the dentfcaton of userspecfc typng rhythms s used as a means of verfyng user dentty. From ths perspectve, mouse dynamcs are a natural next-step n the process and can be used n combnaton wth other behavoral bometrc methods to verfy user dentty. Whle keyboard dynamcs has been studed for several decades, the use of mouse dynamcs n ths concept s a recent phenomenon and remans largely untested, as t has not faced a smlar type of scrutny from the securty communty. However, several studes have reaffrmed that there s a hgh success rate n dentfyng users wth a very low rate of false postves and false negatves [1]. Although successful, there are varous methodologes for the mplementaton of the bometrc readngs wth degrees of accuracy. Most mportant, the need for bometrc authentcaton through behavoral readngs must be able to dentfy users whle preventng mtators from ganng successful entry nto the system. Because of the lmtatons of mouse dynamcs and authentcaton, t has been argued that ths form of bometrc dentfcaton s best equpped n a form that complements a prmary method, rather than relyng on ths type of method for the prmary dentfcaton method. ) MOUSE AND BIOMETRICS BACKGROUND a. Mouse Devce Background A mouse s synonymous wth computer use but not many people know exactly how t works. A mouse s a pontng devce that functons by detectng twodmensonal moton relatve to ts supportng surface []. The mouse devce s usually made up of two buttons and a scroll wheel, whch can also work as a thrd button. The left button s used for selectng tems for draggng and droppng, and t s also used for pressng buttons. By clckng the rght button, a user can access edtng propertes that the fle, webpage or applcaton may have. For mouse devces that have a scroll wheel, ths can be used for scrollng up or down on a webpage, an applcaton or a folder. The scroll wheel button also can be pressed and n certan stuatons t wll automatcally scroll the page n the drecton that mouse s movng, and ths stops by clckng the scroll wheel agan. In certan games, t can be mapped to do another functon and can be used lke a regular mouse button or keyboard button for accessng tems or certan objects n the game. b. Bometrcs Background Bometrcs s a way to dentfy people based on a partcular dstnctveness or a certan pattern. These patterns or dstnctveness can be a physcal trat or another B5.1

2 notceable characterstc that can be used to dentfy the user. There are certan types of characterstcs that are used to dentfy a person, ths ncludes ther fngerprnt, retnal scan, DNA, and facal or voce recognton. Based on the fact that bometrcs s based on a partcular dentfable trat, t s a good way to dentfy a person and as far as computer securty goes, be able to grant access to that person. There s usually some type of sensor that wll get the nformaton based on the gven trat and check t aganst a database of what the characterstc should be. For physcal trats, a camera can be used as a sensor because physcal characterstcs can be notceable. For bometrcs through computers, an applcaton can be used that ether logs keyboard strokes or mouse movements. Once the data s gathered, the acqured data s checked aganst the database to determne f the bometrc data, n fact, matches the ndvdual. data, the quantty of nput data s often used rather than tme..1 Related Research a. Identfyng Game Players Unversty of Washngton The Unversty of Washngton worked on dentfyng game players usng mouse movement n two popular vdeo games, Soltare, and StarCraft [4]. The process of collectng data s to perform the baselne experments, playng Soltare, and playng StarCraft. The players were all female and the experment ran on the same computer to ensure that all the parameters were consstent for all the users; n contrast to our data collecton we gather data usng dfferent computers. In the baselne experment, an applcaton was developed to gather data n a controlled envronment for each ndvdual; ths applcaton could capture three major mouse actons: mouse moves, clcks, and drags. The frst task requres users to clck rapdly and accurately between two targets, the second task requres the users to drag a crcular shape n a specfc range, and the fnal task requres users to double clck on a target. In the Soltare and StarCraft experment all the users play the game ndvdually and then the data s collected. Fg. 1. Ths mage shows the steps necessary for bometrc authentcaton [3]. c. False Acceptance and Rejecton Rate When dong a study on behavoral bometrcs, and user verfcaton usng a mouse, t s mperatve to study peers research on the topc. Ths has recently become a topc of great nterest, and t s mportant to examne current research. Many good deas have been developed on ths topc, but there are stll mprovements to be made. When lookng at two related research papers, t s not clear what the most effectve method would be to test for a proper valdaton system. Bometrc systems are typcally evaluated wth the followng varables [6]: False Acceptance Rate (FAR) - the probablty that the system wll ncorrectly label the actve user as the same user that produced the enrollment sgnature. False Rejecton Rate (FRR) - the probablty that the system wll ncorrectly label the actve user as an mpostor, when n fact t s not. Equal Error Rate (EER) - the error rate when the system's parameters (such as the decson threshold) are set such that the FRR and FAR are equal. A lower EER ndcates a more accurate system. Verfcaton tme- the tme requred by the system to collect suffcent behavoral data to make an authentcaton decson. Because there can be sgnfcant pauses n the Fg..Baselne program, clckng tasks, draggng tasks, and double clckng tasks [4]. B5.

3 In ther experment, they developed a C# program to log low-level mouse movements. Fg. 3. Vsualzaton of the frst three movement n a Soltare game. Frst column: locaton of a mouse event comprsng the acton. Second column: normalzed velocty for each mouse event [4]. After gatherng the data from the players, they used SVM, 1-Nearest Neghbor, and 7-Nearest Neghbor models. The Neghbor s model work more accurately than the SVM model accordng to ther experment. The models they constructed do not perform well across a game doman. However, t s accurate enough to dentfy cheatng players or unauthorzed users. b. Authentcaton Methods San Jose State Unversty San Jose State Unversty worked on mouse movement as a bometrc. They proposed two authentcaton methods, one for ntal logn of users and another for securty purposes to montor a computer for suspcous usage patterns, bascally ther authentcaton models works n two phases: enrollment and verfcaton [5]. The user enrolls n the system by movng the mouse to follow a sequence of dots presented on the screen. Durng the verfcaton phase, the user tres to logn by movng the mouse on the same pattern of dots as were presented durng the regstraton phase. The purpose of these experments s to calculate the error rate of ther authentcaton scheme and compare wth other bometrc research. In the enrollment phase the user logs nto the system, and they re supposed to move the mouse towards the dot that appears on the screen, clck on t, and the dot wll dsappear. Ths process has to be repeated ten tmes. Based on the user s mouse movements, the coordnates of the mouse are recorded. Speed, devaton from the straght lne and angles are calculated. The data collected n ths phase s beng used n the verfcaton phase when the user tres to log n. In the verfcaton phase, the system checks to see f the user s credentals are correct based on the data collected n the enrollment phase. To log n, the user follows the same pattern as the enrollment phase. In ther scheme, t takes 0 seconds for the user to complete logn verfcaton. The result from ths phase wll be compared wth the result calculated durng the regstraton. Ths model had been tested on 15 users all usng the same computer to ensure all the parameters that affect the accuracy of the system could reman constant. Ther system computed the error rate, n ther case the error-rate was 0%. Eventually ther goal s to have a system that works on a broad range of devces wth less false acceptance rate as well as false rejecton rate. c. Other Valdaton Systems Recent research nvestgated the possblty of determnng whether the user was an mposter or not [7]. When determnng verfcaton accuracy, one must look at the FRR and the FAR. FRR, or the false rejecton rate, s the probablty that the user s wrongly dentfed as an mposter. The FAR, or false acceptance rate, s when the mposter s ncorrectly dentfed as the user. In ths research, t was found that there was a FAR Ths s B5.3

4 too hgh of a false acceptance rate, the European Standard for Access Control Systems requres under a.001% false acceptance rate. The FRR was recorded at 5.65, agan, the European Standard for Access Control Systems requres under a 1% false rejecton rate. Partcpants entered a nne dgt numbered code. The partcpants would enter ths code n wth a mouse, nto a, 0 9, keypad. Speed n a drecton, and dstance traveled were recorded. Ths study was done usng ten undergraduate students, ages -5. Possble ssues can arse wth such a small sample sze. It s not a good ndcaton of the general populaton. Another problem wth ths study s the testng method. The task chosen appears very smple. A task that s too smple could lead to a hgh FAR, whch makes the verfcaton method nsecure. It seems hghly lkely that an mposter may have very smlar behavoral movements for such short tmes and dstances; also t would seem to be easy to mmc another user s patterns n such a task. One addtonal test method for ths task could provde an mprovement. Perhaps f the angle n whch the user moves the mouse was also tested, t would decrease the FAR and FRR. It would add a unque behavor to the task, makng t more dffcult for an mposter to mmc. In a study by Zheng, Palosk, and Wang, research was done on how the mouse was moved versus where the mouse was moved [8]. User sessons were recorded, and the users mouse data were recorded. Ther study looked at the dfferent angles and trajectores the users had durng the user s sesson. The average FRR n ths study was.86% ant the average FAR was.96%.whle these numbers are much better than Sngh s study, t stll does not meet the requrements for the European Standard for Access Control Systems. 3) MEASURING MOUSE BIOMETRICS Mouse trajectores can arse from the followng actons: a. System wake up the mouse s moved or jggled to wake up the operatng system (no mouse clcks at ether end of the ) [9]. b. Move and clck the mouse s moved to a locaton on the screen to perform an acton such as clckng on an object, etc. The begns wthout a mouse event and ends n a mouse clck. c. Hghlght a secton of text or an object s hghlghted. Ths acton begns wth a left mouse clck/hold to begn the hghlghtng and ends wth the mouse release. d. Drag and drop an object s dragged and dropped. Ths acton begns wth a left mouse clck/hold and ends wth the mouse release. The above categores combned wth sesson level mouse trajectores produce 45 features shown n Table 1. Acton System wake up: The mouse s moved or gggled to wake up the operatng system (no mouse clcks at ether end of the ) Move and clck: The mouse s moved to a locaton on the screen to perform an acton such as clckng on an object, etc. The begns wthout a mouse event and ends n a mouse clck. Hghlght: A secton of text or an object s hghlghted. Ths acton begns wth a left mouse clck/hold to begn the hghlghtng and ends wth the mouse release. Basc Feature Measurements 1. From the number of ponts. From the tme of the 3. From the pont-to-pont dstance 4. From the length of the 5. From the pont-to-pont veloctes 6. From the pont-to-pont acceleratons 7. From the pont-to-pont drecton angle changes 8. From the number of nflecton ponts 9. From the curvness of the 1. From the number of ponts. From the tme of the 3. From the pont-to-pont dstance 4. From the length of the 5. From the pont-to-pont veloctes 6. From the pont-to-pont acceleratons 7. From the pont-to-pont drecton angle changes 8. From the number of nflecton ponts 9. From the curvness of the 1. From the number of ponts. From the tme of the 3. From the pont-to-pont dstance 4. From the length of the 5. From the pont-to-pont veloctes 6. From the pont-to-pont acceleratons 7. From the pont-to-pont drecton angle changes 8. From the number of nflecton ponts 9. From the curvness of the Sample For Each Feature mean (average), medan, mnmum, maxmum, standard devaton mean (average), medan, mnmum, maxmum, standard devaton mean (average), medan, mnmum, maxmum, standard devaton B5.4

5 Drag and drop: An object s dragged and dropped. Ths acton begns wth a left mouse clck/hold and ends wth the mouse release. 1. From the number of ponts. From the tme of the 3. From the pont-to-pont dstance 4. From the length of the 5. From the pont-to-pont veloctes 6. From the pont-to-pont acceleratons 7. From the pont-to-pont drecton angle changes 8. From the number of nflecton ponts 9. From the curvness of the Table 1: Sesson-Level Mouse Trajectory Features mean (average), medan, mnmum, maxmum, standard devaton There are dfferent formulas that can help n acqurng the data necessary to authentcate a user usng mouse bometrcs. The formulas below are used to get the wanted nformaton. a) Amount of ponts n ( p ) = 1 The number of ponts consttutes the entre ; ths formula determnes the number of ponts nvolved n the entre [9]. b) Amount of tme to complete n ( t - t 1) = Ths formula measures the amount of tme that the took to fnsh from the begnnng untl t reached the last pont. c) Length of the n ( x x 1 ) + ( y y 1) = Ths determnes the length of the by addng all of the pont to pont dstances, whch s determned by the formula nsde the square root. d) Velocty from pont to pont n the ( x x 1 ) + ( y y 1) V = t t 1 Ths formula takes nto account the length of the from one pont to another dvded by the tme that t took to go from the prevous pont to the current pont, so t calculates how rapdly t moved, whch s the velocty from pont to pont. a e) Acceleraton from pont to pont n the = V V 1 ( t t )/ 1 The velocty of the two ponts s dvded by the length of tme that t took to get from one pont to the next gets the acceleraton between the two ponts. f) Drecton angle from pont to pont The formula to get the angle s m = y x y x 1 1 Then, to get the change n angle between the two ponts, the formula s m m 1 3.1Mouse Clck Characterstcs A mouse clck takes place when a button of the mouse or the scroll wheel n the mddle s pressed and then released [9]. The fve types of mouse clck events: left clck, rght clck, double clck, hghlght, and drag and drop. The hghlght and drag-and-drop events are combned and are referred here as drag-and-drop events. Table dsplays the 9 features that were mplemented. Mouse Clck Event Rato of left clcks Rato of rght clcks Rato of double clcks Rato of drag-and-drop clcks Average number of mouse clcks Average number of left clcks Average number of rght clcks Average number of double clcks Average number of drag-anddrop Mean dwell tme Medan dwell tme Mnmum dwell tme Maxmum dwell tme Mean dwell tme Medan dwell tme Mnmum dwell tme Maxmum dwell tme Mean dwell tme Medan dwell tme Mnmum dwell tme Maxmum dwell tme Mouse Clck Features To the total number of mouse clcks Clcks per mnute Of all left or rght mouse clcks Of all left mouse clcks Of all rght mouse clcks B5.5

6 Mean transton tme Medan transton tme Mnmum transton tme Maxmum transton tme Mean transton tme Medan transton tme Mnmum transton tme Maxmum transton tme Table : Mouse Clck Features 3. Mouse Scroll Characterstcs Of all double clcks Of all drag-and-drop clcks Mouse scrollng refers to the turnng of the wheel n between the two buttons of the mouse. It can scroll up or down whle makng the applcaton move n that drecton respectvely. Table 3: Mouse Wheel Spn/ Scroll Features 4) MOUSE BIOMETRIC DATA In order for the key-logger to be runnng, the user has to go to the webste and log nto hs/her account or regster f they have not sgned up before. The user can pck Free Input from the drop-down menu and clck on the launch button to start. The followng 40 features shown n table 3 were mplemented [9]: Mouse Wheel Spn /Scroll Event Rato of scroll up Rato of scroll down Rato of tme spent n wheel events Mean duraton n seconds Medan duraton n seconds Mnmum duraton n seconds Maxmum duraton n seconds Mean duraton n seconds Medan duraton n seconds Mnmum duraton n seconds Maxmum duraton n seconds Mean duraton n seconds Medan duraton n seconds Mnmum duraton n seconds Maxmum duraton n seconds Mean scrolled dstance Medan scrolled dstance Mnmum scrolled dstance Maxmum scrolled dstance Mean scrolled dstance Medan scrolled dstance Mnmum scrolled dstance Maxmum scrolled dstance Mean scrolled dstance Medan scrolled dstance Mnmum scrolled dstance Maxmum scrolled dstance Mean speed (speed=dstance/tme) Medan speed Mnmum speed Maxmum speed Mean speed (speed=dstance/tme) Medan speed Mnmum speed Maxmum speed Mean speed (speed=dstance/tme) Medan speed Mnmum speed Maxmum speed Rato Mouse Wheel Spn/ Scroll Features To total number of wheel events To the total sample sesson tme For a wheel spn event For a scroll up event For a scroll down event For a scroll up or down event For a scroll up event For a scroll down event Of wheel spn events Of scroll up events Of scroll down events Of scroll up to scroll down events (default zero) Fg. 4. Webpage where key-logger app can be launched after loggng n. A fle s downloaded and opened wth Java Web Start. When ths fle runs t opens the key-logger and data can be seen beng outputted by the applcaton any tme the mouse cursor moves or the buttons are clcked. Fg. 5.Key-logger outputtng mouse data as the mouse moves or the buttons are clcked. Whle the applcaton s runnng, the bubble applcaton can be opened and the data from the user clckng on the bubbles wll be outputted to the key-logger applcaton. After the applcaton has attaned enough data from the sesson, the key-logger applcaton s ended and the data wll be uploaded nto the database. 5) TESTING THE MOUSE a) Bubble Clck Applcaton We have an applcaton n mnd that would make a bubble appear n a random spot on the screen, and the user s supposed to clck on the bubble. Some bubbles need to be clcked once and some dstngushable bubbles need to be clcked on twce. The bubble wll keep dsappearng as the user clcks on them untl the maxmum amount of B5.6

7 bubbles has been reached, whch s 0 bubbles. From the 0 bubbles that the user wll encounter, fve of them wll have an nner shaded crcle; these have to be doubleclcked by the user n order for the next bubble to appear. Fg. 6.Bubble comes out n a random part of screen, and after beng clcked appears n another part of the screen. As mentoned before, some of the bubbles wll be notceably dfferent from the rest and these have to be double-clcked as opposed to beng sngle clcked. They wll have an nner crcle that wll be shaded n. These are to test the user s double-clck speed as well as the velocty and the dstance that the mouse traveled. Is t yet another test to determne authentcaton accurately. The randomness of where the bubbles appear depends on a random generator that outputs a certan locaton on the screen. The random generator outputs a heght and a wdth output and these numbers are used to tell the bubble where on the screen to appear. The random generator also takes nto consderaton the tmestamp, so t s hghly unlkely that a bubble wll appear n the same exact spot as the prevous one. b) Bubble Data Gatherng Once the user has fnshed clckng on all of the bubbles and the key-logger has ended collectng the data, the data wll be uploaded nto the database where once we are granted access we can experment and run tests on the data usng the prevous formulas for determnng velocty, dstance, acceleraton, and angle change and can determne patterns or certan trats that we can use to authentcate the user. The bubble applcaton works by measurng a person s acceleraton and velocty once a bubble appears on the screen, t measures the user s clck speed when the user clcks on the bubble. The velocty and acceleraton are once agan tested when the clcked bubble dsappears and a new one appears on the screen. The double-clck speed of the user s tested when they encounter a bubble wth a shaded nner crcle. The double-clcked bubbles are to ensure authentcaton because certan users can have the same sngle-clck speed but by addng a double-clck test, the chances of t beng multple users greatly dmnshes. c) User Authentcaton A user s authentcaton can be determned by quantfyng the data nto measurable chunks that can be used to determne specfc characterstcs and trats. The user data s compared to logged data, and a match can be determned dependng on the smlartes between the unknown user and the data on the database. If a match s confrmed based on the velocty, acceleraton, dstance, and sngle and double-clcked speeds the user s authentcated and access s granted to the user. Ths s certanly another vable method for user authentcaton through a computer than just the common methods that we have seen n the past. d) Smlartes n Applcatons The bubble applcaton has some fun aspects about t because the user s expectng a bubble to appear but they do not know where t wll appear. The bubble applcaton has some smlartes to some well-known games, whch makes t a good method for user authentcaton. The fact that the user wll be actvely engaged n the bometrc nstead of dong t wthout any energy or desre means that they wll not get skewed results. The bubble applcaton s smlar to soltare n the sense that the user can clck on the deck to get the next card, the user can drag and drop cards, the user can double clck tems to put them on the stacks and the user has to move the mouse to dfferent parts of the screen before tme runs out. Fg. 7. Soltare applcaton showng the mouse clckng and draggng a card to another stack. 6) FUTURE STUDY Whle mouse dynamcs offers a mostly effectve authentcaton method n certan envronments, t may suffer from rather glarng ssues that prevent ts use on an end-user bass. One of the most problematc ssues s the length of tme that verfcaton requres n such mplementatons. Although studes menton successful verfcaton statstcs, the vast majorty of such studes fal to dentfy the exact length of the tmes used by such neural networks. In further analyss, t was determned that very few of the systems had an mplementaton tme of under %, whch hghly restrcts ther deploy ablty and marketablty to the consumer and commercal markets. Users are hghly pcky toward the wat tmes wth the use of verfcaton technologes, and a wat tme of over a B5.7

8 mnute would render such a system neffectve as there would be very few advantages f t prevents a natural computng workflow from occurrng. Whle ths may be negated through software nnovaton and dfferent modelng technques, t does not remove the realty that such methods requre statstcal computaton that s tedous to effectvely ntegrate and mplement. Furthermore, such systems cannot fully control varous varables that exst wthn a workng envronment, whch may sgnfcantly ncrease the rate of false postves n such systems. Users mght be usng dfferent mouse devces or dfferent hardware and the results can be nfluenced by those varables, and the authentcaton mght not be accurate [6]. Changes n workflows through dfferent machnes and tasks can render such analyss moot as dfferent workng envronments create a shft n behavor wthn the ndvdual. Ths unpredctablty wll not be able to be accounted for by the behavoral bometrc analyss technques, and would serve as an neffectve dentfcaton of the user. As such, nnovatons such as remote desktop use and the use of other nput technologes would render ths use moot. 7) CONCLUSION Whle ntally promsng, the mplementaton of mouse dynamcs suffers from varous theoretcal and physcal flaws that leave such a system as unusable and counterproductve n a workplace scenaro. Even when the system has demonstrated a sgnfcant level of success n dentfyng the user of a system, t s ether slow, nflexble to meet worker demand or s worthless as a stand-alone verfcaton system due to bult-n weaknesses. As such, even a fully mplemented system would functon best as a complement to a much more effectve system rather than as the prmary system tself. The fuson of dual bometrc systems mght seem lke a more vable method for authentcaton [10]. Combnng mouse bometrcs would yeld more accurate results, and t would be a seamless transton for the users because other perpherals lke the keyboard have to be used for normal computer use [6]. Ultmately, whle research has been nconclusve toward the role that mouse dynamcs wll play n verfcaton technques, there s sgnfcant doubt toward ts mplementaton and general vablty as a bometrcal system. Due to the shft n nput methods n recent tmes, such a system may be wholly outdated. [3] Wkpeda contrbutors. (013, October 16). Bometrcs [Onlne]. Avalable: [4] R. Kamnsky, M. Enev,E. Andersen, Identfyng Game Players wth Mouse Bometrcs. Unversty of Washngton, Seattle, WA, 008. Avalable: [5] S. Hasha, C. Pollett, M. Stamp, On Usng Mouse Movements as a Bometrc.San Jose State Unversty, San Jose, CA,005. Avalable: sters/sprng04/shvan/shvanpaper.pdf [6] Z. Jorgensen, T. Yu, On Mouse Dynamcs as a Behavoral Bometrc for Authentcaton.North Carolna State Unversty, Ralegh, NC, 011. Avalable: jorgensen.pdf [7] S. Sngh, K. Arya, Mouse Interacton based Authentcaton System byclassfyng the Dstance Travelled by the Mouse. Internatonal Journal of Computer Applcatons, vol. 17, pp , March 011. Avalable: pdf [8] N. Zheng, A. Palosk, H. Wang, An Effcent User Verfcaton System va Mouse Movements.The College of Wllam and Mary, Wllamsburg, VA, 011. Avalable: [9] P. Xaver de Olvera, V. Channarayappa, E. O'Donnel, B. Snha, A. Vadakkencherry, T. Londhe, U. Gatkal, N. Bakelman, J.V. Monaco, and C.C. Tappert, "Mouse Movement Bometrc System," Proc. CSIS Research Day, Pace Unversty, NY, May 013. Avalable: [10] A. Ross, A. Jan, Informaton fuson n bometrcs. Mchgan State Unversty, East Lansng, MI, 003. Avalable: tons/multbometrcs/rossjan_bometrcfuson_prl03.pdf REFERENCES [1] C. Brodley, M. Pusara, User Re-Authentcaton va Mouse Movements. ACM workshop on Vsualzaton and Data Mnng for Computer Securty (VzSEC/DMSEC '04), 004. Avalable: [] Wkpeda contrbutors. (013, October 16). Mouse (computng) [Onlne]. Avalable: B5.8

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Optimizing Document Scoring for Query Retrieval

Optimizing Document Scoring for Query Retrieval Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Computer models of motion: Iterative calculations

Computer models of motion: Iterative calculations Computer models o moton: Iteratve calculatons OBJECTIVES In ths actvty you wll learn how to: Create 3D box objects Update the poston o an object teratvely (repeatedly) to anmate ts moton Update the momentum

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

with Optic65 and Optic25 Cameras FOR OUTDOOR TRACKING ONLY unless used in conjunction with the Indoor Tracking Accessory.

with Optic65 and Optic25 Cameras FOR OUTDOOR TRACKING ONLY unless used in conjunction with the Indoor Tracking Accessory. wth Optc6 and Optc Cameras Quck Start Gude FOR OUTDOOR TRACKING ONLY unless used n conjuncton wth the Indoor Trackng Accessory. CONGRATULATIONS ON SCORING YOUR SOLOSHOT Our category-creatng lne of personal

More information

Solution Brief: Creating a Secure Base in a Virtual World

Solution Brief: Creating a Secure Base in a Virtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Brave New World Pseudocode Reference

Brave New World Pseudocode Reference Brave New World Pseudocode Reference Pseudocode s a way to descrbe how to accomplsh tasks usng basc steps lke those a computer mght perform. In ths week s lab, you'll see how a form of pseudocode can be

More information

Hierarchical clustering for gene expression data analysis

Hierarchical clustering for gene expression data analysis Herarchcal clusterng for gene expresson data analyss Gorgo Valentn e-mal: valentn@ds.unm.t Clusterng of Mcroarray Data. Clusterng of gene expresson profles (rows) => dscovery of co-regulated and functonally

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

One-handed Keystroke Biometric Identification Competition

One-handed Keystroke Biometric Identification Competition One-handed Keystroke Bometrc Identfcaton Competton John V. Monaco 1, Gonzalo Perez 1, Charles C. Tappert 1, Patrck Bours 2, Soumk Mondal 2, Sudala Rajkumar 3, Aytham Morales 4, Julan Ferrez 4 and Javer

More information

Signature and Lexicon Pruning Techniques

Signature and Lexicon Pruning Techniques Sgnature and Lexcon Prunng Technques Srnvas Palla, Hansheng Le, Venu Govndaraju Centre for Unfed Bometrcs and Sensors Unversty at Buffalo {spalla2, hle, govnd}@cedar.buffalo.edu Abstract Handwrtten word

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

PRÉSENTATIONS DE PROJETS

PRÉSENTATIONS DE PROJETS PRÉSENTATIONS DE PROJETS Rex Onlne (V. Atanasu) What s Rex? Rex s an onlne browser for collectons of wrtten documents [1]. Asde ths core functon t has however many other applcatons that make t nterestng

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

5.0 Quality Assurance

5.0 Quality Assurance 5.0 Dr. Fred Omega Garces Analytcal Chemstry 25 Natural Scence, Mramar College Bascs of s what we do to get the rght answer for our purpose QA s planned and refers to planned and systematc producton processes

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Sixth Indian Conference on Computer Vision, Graphics & Image Processing

Sixth Indian Conference on Computer Vision, Graphics & Image Processing Sxth Indan Conference on Computer Vson, Graphcs & Image Processng Incorporatng Cohort Informaton for Relable Palmprnt Authentcaton Ajay Kumar Bometrcs Research Laboratory, Department of Electrcal Engneerng

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Wireless Temperature Monitoring Overview

Wireless Temperature Monitoring Overview Wreless Temperature Montorng Overvew Wreless Temperature Montorng and Alerts. Your Dashboard gves you advanced montorng, alerts (SMS or Emals), graphng and PDF reports from anywhere n the world. Product

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

A Fingerprint Matching Model using Unsupervised Learning Approach

A Fingerprint Matching Model using Unsupervised Learning Approach A Fngerprnt Matchng Model usng Unsupervsed Learnng Approach Nasser S. Abouzakhar and Muhammed Bello Abdulazeez School of Computer Scence, The Unversty of Hertfordshre, College Lane, Hatfeld AL 10 9AB,

More information

3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method

3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method NICOGRAPH Internatonal 2012, pp. 114-119 3D Vrtual Eyeglass Frames Modelng from Multple Camera Image Data Based on the GFFD Deformaton Method Norak Tamura, Somsangouane Sngthemphone and Katsuhro Ktama

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Setup and Use. Version 3.7 2/1/2014

Setup and Use. Version 3.7 2/1/2014 Verson 3.7 2/1/2014 Setup and Use MaestroSoft, Inc. 1750 112th Avenue NE, Sute A200, Bellevue, WA 98004 425.688.0809 / 800.438.6498 Fax: 425.688.0999 www.maestrosoft.com Contents Text2Bd checklst 3 Preparng

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

News. Recap: While Loop Example. Reading. Recap: Do Loop Example. Recap: For Loop Example

News. Recap: While Loop Example. Reading. Recap: Do Loop Example. Recap: For Loop Example Unversty of Brtsh Columba CPSC, Intro to Computaton Jan-Apr Tamara Munzner News Assgnment correctons to ASCIIArtste.java posted defntely read WebCT bboards Arrays Lecture, Tue Feb based on sldes by Kurt

More information

Multi-view 3D Position Estimation of Sports Players

Multi-view 3D Position Estimation of Sports Players Mult-vew 3D Poston Estmaton of Sports Players Robbe Vos and Wlle Brnk Appled Mathematcs Department of Mathematcal Scences Unversty of Stellenbosch, South Afrca Emal: vosrobbe@gmal.com Abstract The problem

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

FIBARO WALL PLUG OPERATING MANUAL FGBWHWPE-102/FGBWHWPF-102 CONTENTS

FIBARO WALL PLUG OPERATING MANUAL FGBWHWPE-102/FGBWHWPF-102 CONTENTS OPERATING MANUAL EN FIBARO WALL PLUG FGBWHWPE-102/FGBWHWPF-102 CONTENTS #1: Descrpton and features 3 #2: Parng the accessory 4 #3: Reset 5 #4: Functonalty 6 v1.0 #5: W-F 8 #6: Confgurable parameters 9

More information

Simulation: Solving Dynamic Models ABE 5646 Week 11 Chapter 2, Spring 2010

Simulation: Solving Dynamic Models ABE 5646 Week 11 Chapter 2, Spring 2010 Smulaton: Solvng Dynamc Models ABE 5646 Week Chapter 2, Sprng 200 Week Descrpton Readng Materal Mar 5- Mar 9 Evaluatng [Crop] Models Comparng a model wth data - Graphcal, errors - Measures of agreement

More information

Synthesizer 1.0. User s Guide. A Varying Coefficient Meta. nalytic Tool. Z. Krizan Employing Microsoft Excel 2007

Synthesizer 1.0. User s Guide. A Varying Coefficient Meta. nalytic Tool. Z. Krizan Employing Microsoft Excel 2007 Syntheszer 1.0 A Varyng Coeffcent Meta Meta-Analytc nalytc Tool Employng Mcrosoft Excel 007.38.17.5 User s Gude Z. Krzan 009 Table of Contents 1. Introducton and Acknowledgments 3. Operatonal Functons

More information

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES Ruxandra Olmd Faculty of Mathematcs and Computer Scence, Unversty of Bucharest Emal: ruxandra.olmd@fm.unbuc.ro Abstract Vsual secret sharng schemes

More information

A Background Subtraction for a Vision-based User Interface *

A Background Subtraction for a Vision-based User Interface * A Background Subtracton for a Vson-based User Interface * Dongpyo Hong and Woontack Woo KJIST U-VR Lab. {dhon wwoo}@kjst.ac.kr Abstract In ths paper, we propose a robust and effcent background subtracton

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

11. HARMS How To: CSV Import

11. HARMS How To: CSV Import and Rsk System 11. How To: CSV Import Preparng the spreadsheet for CSV Import Refer to the spreadsheet template to ad algnng spreadsheet columns wth Data Felds. The spreadsheet s shown n the Appendx, an

More information

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated.

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated. Some Advanced SP Tools 1. umulatve Sum ontrol (usum) hart For the data shown n Table 9-1, the x chart can be generated. However, the shft taken place at sample #21 s not apparent. 92 For ths set samples,

More information

Intro. Iterators. 1. Access

Intro. Iterators. 1. Access Intro Ths mornng I d lke to talk a lttle bt about s and s. We wll start out wth smlartes and dfferences, then we wll see how to draw them n envronment dagrams, and we wll fnsh wth some examples. Happy

More information

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1 4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:

More information

Avaya T3 Telephones connected to Integral 5 Setting up and using conference bridge Appendix to user s guide

Avaya T3 Telephones connected to Integral 5 Setting up and using conference bridge Appendix to user s guide Avaya T3 Telephones connected to Integral 5 Settng up and usng conference brdge Appendx to user s gude Issue 1 Integral 5 Software Release 2.6 September 2009 Use conference room Use conference room Your

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

user journey: a series of steps (typically 4-12) which represent a scenario in which a user might interact with the thing you are designing.

user journey: a series of steps (typically 4-12) which represent a scenario in which a user might interact with the thing you are designing. Topc Dscovery user journey: a seres of steps (typcally 4-12) whch represent a scenaro n whch a user mght nteract wth the thng you are desgnng. Two (2) man uses: 1. demonstratng the way users currently

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions Sortng Revew Introducton to Algorthms Qucksort CSE 680 Prof. Roger Crawfs Inserton Sort T(n) = Θ(n 2 ) In-place Merge Sort T(n) = Θ(n lg(n)) Not n-place Selecton Sort (from homework) T(n) = Θ(n 2 ) In-place

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

On Evaluating Open Biometric Identification Systems

On Evaluating Open Biometric Identification Systems Proceedngs of Student/Faculty Research Day, CSIS, Pace Unversty, May 6th, 2005 On Evaluatng Open Bometrc Identfcaton Systems Mchael Gbbons, Sungsoo Yoon, Sung-Hyuk Cha and Charles Tappert mkegbb@us.bm.com,

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

SMART PHOTO PRINTER USER'S GUIDE. Version V MODEL SmartD90-EV

SMART PHOTO PRINTER USER'S GUIDE. Version V MODEL SmartD90-EV SMART PHOTO PRINTER MODEL SmartD90-EV USER'S GUIDE Verson V1.5.2.0 1 TABLE OF CONTENTS Introducton Introducton 3 Bascs 4 Constructon of compostons 5 Operaton Easy Prnt Servce 8 Fun Prnt Servce 10 Sharng

More information

Classifier Swarms for Human Detection in Infrared Imagery

Classifier Swarms for Human Detection in Infrared Imagery Classfer Swarms for Human Detecton n Infrared Imagery Yur Owechko, Swarup Medasan, and Narayan Srnvasa HRL Laboratores, LLC 3011 Malbu Canyon Road, Malbu, CA 90265 {owechko, smedasan, nsrnvasa}@hrl.com

More information

Security. Workplace Manager

Security. Workplace Manager User Gude Manageablty and Securty Workplace Manager Congratulatons on your purchase of an nnovatve product from Fujtsu. The latest nformaton about our products, tps, updates etc. can be found on the Internet

More information

Setup and Use. For events not using AuctionMaestro Pro. Version /7/2013

Setup and Use. For events not using AuctionMaestro Pro. Version /7/2013 Verson 3.1.2 2/7/2013 Setup and Use For events not usng AuctonMaestro Pro MaestroSoft, Inc. 1750 112th Avenue NE, Sute A200, Bellevue, WA 98004 425.688.0809 / 800.438.6498 Fax: 425.688.0999 www.maestrosoft.com

More information

APPLICATION OF A COMPUTATIONALLY EFFICIENT GEOSTATISTICAL APPROACH TO CHARACTERIZING VARIABLY SPACED WATER-TABLE DATA

APPLICATION OF A COMPUTATIONALLY EFFICIENT GEOSTATISTICAL APPROACH TO CHARACTERIZING VARIABLY SPACED WATER-TABLE DATA RFr"W/FZD JAN 2 4 1995 OST control # 1385 John J Q U ~ M Argonne Natonal Laboratory Argonne, L 60439 Tel: 708-252-5357, Fax: 708-252-3 611 APPLCATON OF A COMPUTATONALLY EFFCENT GEOSTATSTCAL APPROACH TO

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Sorting. Sorting. Why Sort? Consistent Ordering

Sorting. Sorting. Why Sort? Consistent Ordering Sortng CSE 6 Data Structures Unt 15 Readng: Sectons.1-. Bubble and Insert sort,.5 Heap sort, Secton..6 Radx sort, Secton.6 Mergesort, Secton. Qucksort, Secton.8 Lower bound Sortng Input an array A of data

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

Identification of a Person using Multimodal Biometric System

Identification of a Person using Multimodal Biometric System Internatonal Journal of Computer Applcatons (0975 8887) Identfcaton of a Person usng Multmodal Bometrc System.C. Sabareeswar M.E-Appled Electroncs Anna Unversty, runelvel. S. Lenty Stuwart Assstant Professor,

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Real-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution

Real-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution Real-tme Moton Capture System Usng One Vdeo Camera Based on Color and Edge Dstrbuton YOSHIAKI AKAZAWA, YOSHIHIRO OKADA, AND KOICHI NIIJIMA Graduate School of Informaton Scence and Electrcal Engneerng,

More information

Secure and Fast Fingerprint Authentication on Smart Card

Secure and Fast Fingerprint Authentication on Smart Card SETIT 2005 3 rd Internatonal Conference: Scences of Electronc, Technologes of Informaton and Telecommuncatons March 27-31, 2005 TUNISIA Secure and Fast Fngerprnt Authentcaton on Smart Card Y. S. Moon*,

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

Agenda & Reading. Simple If. Decision-Making Statements. COMPSCI 280 S1C Applications Programming. Programming Fundamentals

Agenda & Reading. Simple If. Decision-Making Statements. COMPSCI 280 S1C Applications Programming. Programming Fundamentals Agenda & Readng COMPSCI 8 SC Applcatons Programmng Programmng Fundamentals Control Flow Agenda: Decsonmakng statements: Smple If, Ifelse, nested felse, Select Case s Whle, DoWhle/Untl, For, For Each, Nested

More information

Harvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6)

Harvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6) Harvard Unversty CS 101 Fall 2005, Shmon Schocken Assembler Elements of Computng Systems 1 Assembler (Ch. 6) Why care about assemblers? Because Assemblers employ some nfty trcks Assemblers are the frst

More information

Two-Factor User Authentication in Multi-Server Networks

Two-Factor User Authentication in Multi-Server Networks Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

CSE 326: Data Structures Quicksort Comparison Sorting Bound

CSE 326: Data Structures Quicksort Comparison Sorting Bound CSE 326: Data Structures Qucksort Comparson Sortng Bound Bran Curless Sprng 2008 Announcements (5/14/08) Homework due at begnnng of class on Frday. Secton tomorrow: Graded homeworks returned More dscusson

More information

Electrical analysis of light-weight, triangular weave reflector antennas

Electrical analysis of light-weight, triangular weave reflector antennas Electrcal analyss of lght-weght, trangular weave reflector antennas Knud Pontoppdan TICRA Laederstraede 34 DK-121 Copenhagen K Denmark Emal: kp@tcra.com INTRODUCTION The new lght-weght reflector antenna

More information