Continuous Authentication for Mouse Dynamics: A Pattern-Growth Approach

Size: px
Start display at page:

Download "Continuous Authentication for Mouse Dynamics: A Pattern-Growth Approach"

Transcription

1 Continuous Authentication for Mouse Dynamics: A Pattern-Growth Approach Chao Shen 1 cshen@sei.xjtu.edu.cn Zhongmin Cai 1, * zmcai@sei.xjtu.edu.cn Xiaohong Guan 1, 2 xhguan@sei.xjtu.edu.cn l MOE KLNNIS Lab, Xi'an Jiaotong University, Xi'an, China 2 Center for Intelligent and Networked Systems and TNLIST Lab, Tsinghua University, Beijing, China Abstract-Mouse dynamics is the process of identifying individual users based on their mouse operating characteristics. Although previous work has reported some promising results, mouse dynamics is still a newly emerging technique and has not reached an acceptable level of performance. One of the major reasons is intrinsic behavioral variability. This study presents a novel approach by using pattern-growth-based mining method to extract frequentbehavior segments in obtaining stable mouse characteristics, employing one-class classification algorithms to perform the task of continuous user authentication. Experimental results show that mouse characteristics extracted from frequentbehavior segments are much more stable than those from holistic behavior, and the approach achieves a practically useful level of performance with FAR of 0.37% and FRR of 1.12%. These findings suggest that mouse dynamics suffice to be a significant enhancement for a traditional authentication system. Our dataset is publicly available to facilitate future research. Keywords- mouse dynamics; one-class learning; anomaly detection; pattern mining; human computer interaction I. INTRODUCTION External and internal attackers masquerading as legitimate users have always been a serious problem in cyber-security settings. The threats from these attackers, who misuse their privileges for malicious purposes, have overtaken viruses and malware as the most reported security incident according to a report from the US Computer Security Institute (CSI) [24]. Thanks to leaked or fabricated identity credentials, impostors can access computer systems easily, and then abuse any privileges available to the masquerading user. The most common approach to address this problem is the use of a user authentication mechanism. Unfortunately, most existing computer and network systems authenticate a user only at the initial login session. Since this authentication occurs only once, the attacker may still take control of the session and steal secret information. In contrast, continuous (re)authentication, which is done throughout the session, can prevent such an attack. Moreover, to achieve a timely and accurately response without active user involvement, continuous (re)authentication is passive and transparent to users. Of the various potential solutions to this problem, one promising direction is mouse dynamics. This approach *Corresponding author. utilizes inherent behavioral features in mouse operations to detect masqueraders. Compared with other biometric techniques such as fingerprints or voice, mouse dynamics does not require specialized hardware to collect the data. In addition, the detection process can be integrated seamlessly into users' normal computer operations, and thus provide a non-intrusive solution for identity monitoring or continuous authentication after the initial authentication by passwords or other credentials. Yampolskiy et at. provide a good review of mouse dynamics [23]. Mouse dynamics has attracted more and more research interests over the last decade. Although previous work has reported some promising results, mouse dynamics is still a newly emerging technique and has not reached an acceptable level of performance. One of the major reasons is intrinsic behavioral variability, in contrast with other physiological biometric characteristics, such as face [3] or fingerprint patterns [7]. Behavioral variability occurs between two immediately consecutive samplings, even if the subject providing the samples strives to maintain a uniform way of mouse operation. This variability often comes from intrinsic human factors or external environmental variables, such as changes in software environments, task or interaction modes; it sometimes relates to variations in biological or emotional status of the operators [10]. This may explain partially why accuracies of mouse dynamics are reported with mixed results, with the equal-error rate (ERR) ranging from 26.8% to 2.46% [1, 4-6, 8, 11-12, 16, 20, 21, 23, 25]. Although behavioral variability is an important issue in mouse dynamics, almost all previous approaches focus on the discriminative power of this technique, and the issue of behavioral variability has never been carefully considered. It should be also noted that, in most previous research, samples from both the impostors and the legitimate user are required for training the classification or detection model. This is not realistic in practice since it is impossible to collect enough data to represent all of the imposters. Besides, there is no public data set in mouse dynamics research, which makes it difficult for third-party verification of published work and precludes objective comparisons between different approaches. Faced with the above challenges, this study utilizes recurring behavior segments in mouse behavior to extract stable behavioral features, and employs one-class classification algorithms to perform the task of continuous /12/$ IEEE

2 user authentication. Specifically, the major contributions of this work include: 1. We address the problem of behavioral variability by proposing a novel approach using a pattern-growthbased mining method to extract frequent-behavior segments for obtaining stable mouse characteristics. This leads to a more accurate and fine-grained characterization of mouse behavior. 2. We employ one-class learning methods to perform the task of continuous user authentication, so that the detection model can be trained solely on the samples from the legitimate user; samples from impostors are no longer required. This is a more practical approach for real-world applications. 3. Using a newly established mouse behavioral data set, we develop a repeatable and objective evaluation procedure to investigate the efficacy of our proposed approach through a series of experiments, and we analyze the tradeoff between security and usability. To our knowledge, this study is the first to make a mouse behavioral data set publicly available. 4. In general, we develop a simple and efficient continuous user authentication method. Experimental results show that mouse characteristics extracted from frequentbehavior segments are much more stable than those from holistic behavior, and the approach achieves a practically useful level of performance with FAR of 0.37% and FRR of 1.12%. These results suggest that mouse dynamics suffice to be a significant enhancement for a traditional authentication system. The remainder of this paper is organized as follows: In Section 2, we review mouse dynamics research relevant to continuous authentication. In Section 3, we present our data collection process. In Section 4, we introduce the mouse dynamics behavior. In Section 5-7, we describe the behavior pattern mining method, and develop a repeatable evaluation procedure. Section 8 presents experimental results. In Section 9, we offer a discussion and possible extensions. Section 10 offers concluding remarks. II. BACKGROUND AND RELATED WORK In this section, we briefly review previous approaches in mouse dynamics research, and then focus on the issue of continuous user authentication. A. Review of Mouse Dynamics Mouse dynamics, a method of behavioral biometrics [23] using human interface devices (HIDs) to record data, such as keyboard and mouse, provides user authentication in an accessible and convenient manner. Since Everitt and McOwan [21] first investigated in 2003 whether users could be distinguished by the way of their mouse operating styles, several different techniques and usages of mouse dynamics biometric have been proposed. Pusara and Brodley [1] proposed a re-authentication scheme as a standalone biometric for user verification. Ahmed and Traore [6, 12] analyzed the feasibility of mouse dynamics by aggregating low-level mouse events, and proposed an approach combining keystroke dynamics with mouse dynamics. Gamboa and Fred [5, 11] studied the possibility of user authentication based on mouse dynamics in graphical interactions. Kaminsky et al. [20] investigated the use of mouse dynamics in identifying online game players. Aksari et al. [4] presented an active authentication frame for authenticating users based on their mouse movements. More recently, Jorgensen and Yu [16] tested this technique under different access scenarios, and also examined the impact of different device types. Nan et al. [25] presented a mouse dynamics based user verification system using newlydefined angle-based metrics, which is able to re-authenticate a user to a high accuracy. The interesting outcomes of previous research are that mouse dynamics can be used as a source of information to discriminate among users, whether the operating conditions and settings are fixed or different for the users. B. Continuous Authentication Based on Mouse Dynamics Among the investigations of user authentication based on the mouse dynamics biometric, there are really two tasks of interest. One task is static authentication, which checks the user only once, typically at login time. Another is continuous authentication, which checks the user continuously throughout the session. The main strength of mouse dynamics biometric technology is in its ability to constantly monitor the legitimate and illegitimate users based on their sessional usage of a computer system. In this study, we focus on continuous (re)authentication for mouse dynamics. Pusara and Brodley [1] proposed a re-authentication scheme in which raw mouse data was preprocessed and grouped into data points, each corresponding to a summary of mouse events over a window of configurable size. They set up a personalized model for each user using C5.0 decision trees. Using data from 11 users, collected on their own personal computers under a free environment, an average false-acceptance rate (FAR) of 1.75% and average false-rejection rate (FRR) of 0.43% were reported. The verification time ranged from 1 minute to 15 minutes because the parameters were chosen independently for each user. This result suggests mouse dynamics may reach a practically useful level, but a sample size of 11 users is relatively small and the issue of behavioral variability is not addressed. Ahmed and Traore [6, 12] aggregated low-level mouse events as higher-level actions such as point-and-clicks. They defined seven feature vectors. Biometric analysis was conducted by concatenating these feature vectors into a 39- dimensional global feature vector and using a neural network for model training and classification. The proposed method was assessed with 22 subjects, achieving an average equalerror rate of 2.46%. The length of data session used in the experiment was around 17 minutes (the session length was not explicitly stated; however, it stated that an average of 12 hours 55 minutes of data was captured from each subject, representing an average of 45 sessions). A supplementary experiment with 7 participants, each of whom was asked to provide three sessions with a period of 30 minutes for each session using the same hardware and software application, resulted in an FRR of 6.25% and FAR of 1.25%. Recently,

3 Nan et at. [25] presented a user verification system based on mouse dynamics using newly-defined angle-based metrics, which is able to re-authenticate a user with high accuracy. Note that in the approaches of Ahemd et at. and Nan et ai., both the impostors' and the legitimate users' mouse feature samples were used for training. This is not realistic since it might be impossible to collect a large amount of data from all potential impostors in practice. Gamboa and Fred [5, 11] presented a continuous authentication approach, in which every movement was considered as a 'stroke', to capture and extract the characteristics of mouse behavior. Each stroke was characterized by a 63-dimensional feature vector including spatial parameters such as angle and curvature, and temporal parameters such as velocity, and acceleration. This feature space was reduced to the best subset of features for each user through a greedy feature selection process. The authentication decisions were made based on the average classification outcome of a sequence of individual strokes using a statistical model. Experiments on data from 50 users collected under a free environment, found that sequences of 1 stroke, 50 strokes and 100 strokes yielded an equal error rate of 48.9%, 2% and 0.7% respectively (equivalent to verification time about 2 seconds, 50 seconds and 100 seconds respectively). However, in this approach the test data was also used for feature selection, which may lead to an overly optimistic result of the detector's performance. The key observation from the above survey is that the issue of behavioral variability of the mouse dynamics biometric has not been carefully considered. Additionally, we know that most previous research uses both the legitimate user's and impostors' samples to train their models, which are not practical in realistic applications; and no other groups that provide a shared data set. In this study, we addressed this problem by using a novel pattern-growth-based mining method and one-class learning algorithms, and obtained a practically useful level of authentication performance. III. A. Data Collection DATA COLLECTION A free experimental environment was established to collect mouse behavior data in this study. We developed data collection software that runs as a background job, starts monitoring the subject's actions when the subject's login occurs and stops running when the subject's logout occurs; the software is totally transparent and does not affect other applications. Mouse behavior data were collected during subjects' routine computing activities, which mainly cover the mouse actions under the applications of Internet surfing, word processing, online chatting, programming, and online games. This setting reflects a real computing environment. During the course of data collection, all subjects were asked to use a mouse to do their routine work for about thirty minutes, representing one data collection session. Whenever the subject moves or clicks the mouse, the data collection software records the event type (i.e., mouse move or mouse click), the position at which the event occurred, the timestamp when the event occurred, and the application information in which the event occurred. In this way, mouse activity data are collected in terms of sessions, and every session consists of about thirty minutes of a user's mouse activity data. B. Apparatus We set up several desktops to collect the data, and all of them were connected to a central server via the Internet. The server stores the collected data in an internal database, along with the subject ID. The desktops are HP workstations with a Core 2 Duo 3.0 GHz processor and 2.0GB of RAM; they are equipped with identical 17" HP LCD monitors (set at 1280x1024 resolution). We equipped the computers with a USB HP optical mouse, running the Windows XP operating system. The server configuration is a Dell PowerEdge server with an Intel Xeon X GHz Quad Core Processor and 12.0 GB of RAM, running the Windows Server 2003 operating system. C. Running Subjects Subjects were 28 volunteer students, all experienced computer users, many from within our lab, but some from the university at large. All subjects had been using the mouse for a minimum of two years. We required subjects to conduct the data collection one session at a time for about half an hour, and wait at least 24 hours between each of their 30 sessions, so each session was recorded on a separate day (ensuring that some day-to-day variation existed within our samples). All 28 subjects remained in the study, each contributing around 90,000 mouse operating actions over 30 sessions, and subjects took between 30 days and 60 days to complete all sessions. This data set will be published to foster future research on mouse dynamics l. IV. MOUSE BEHA VIOR ANALYSIS In this section, we provide the details of the main tasks performed by the behavior analysis process, and define the mouse behavior pattern as a basic concept to address the problem of behavioral variability. A. Atouse Event Mouse behavior is commonly described as the stream of mouse events received from the mouse input device for a specific user while interacting with a specific graphical user interface. Therefore, the first step to understand mouse behavior is to recognize mouse events from the collected raw data stream. Mouse events are usually viewed as system messages sending to some receiving applications to inform current cursor position and mouse button status. In general, the collected data is a list of events such as mouse movement, mouse button down, mouse button up, and so on. Table I shows relevant mouse events in mouse behavior. B. Atouse Operation While user-mouse interaction can be interpreted in an event-driven manner by the OS, such raw events do not provide meaningful information for analyzing behavior. I The mouse behavioral data set is available directly from:

4 Event Name Mouse Down Mouse Up Mouse Wheel Mouse Move TABLE I. MOUSE EVENTS Description This event occurs when a mouse left/right/middle button is pressed. This event occurs when a mouse left/right/middle button is released. This event occurs when the wheel has been moved, if the mouse has a wheel. This event occurs when the user moves the mouse. Consequently, it is necessary and reasonable to translate those events into meaningful actions. Table II lists common mouse actions and corresponding event-level interpretation. Each action corresponds to a set of continuous mouse events. In this study, we encoded mouse action into mouse operation, along with relevant application information. Each mouse operation is represented as a tuple of multi-attributes and timestamp, which is in the form of <action-type, application-type, screen-area, window-position, timestamp>. Detailed information of mouse operation defined in this study is shown in Table III; the third column is the encoding number used in this work. C. Mouse-Behavior Pattern Through a preliminary analysis of mouse operations, we discovered that some behavior segments, consisting of a series of consecutive operations, would recur frequently in users' routine mouse usage. In this paper, we refer to this recurring and fixed behavior segment as behavior pattern. This study divides behavior patterns into two categories: micro-habitual patterns and task-intended patterns. Microhabitual patterns characterize the subconscious and habitual constituents of mouse activities urging GUI interactions, such as some habitual mouse operations on the desktop. For instance, most subjects are accustomed to repeatedly refresh the computer screen, which means the subject would click the right mouse button on an empty area of the desktop, then select "Refresh" from the contextual menu, corresponding to a series of consecutive mouse operations: right single click - > mouse movement -> left single click. Task-intended patterns characterize the operating agility and habits of individual mouse activities under certain applications, such as regularly utilizing some certain functions in a particular application. Concretely, if the subject wants to create a new document in word processor, he/she would first click the left mouse button on the menu of the word processor, next select "New" from the contextual menu, and then select the "blank document" from the new contextual panel and double click it, which corresponds to a group of consecutive mouse operations: left single click -> movement -> left single click -> mouse movement -> left double click. More specifically, upon a closer examination of the behavior pattern, we found the relevant measurements extracted from these behavior patterns appeared much more stable than those from holistic behavior. We conjectured that the improved stability may be due to repeatedly recurring behavior segments providing more stable and habitual information about mouse behavior. Therefore, we made an Mouse Actions Single click Double click Common Movement Point and click movement Drag and drop movement Silence TABLE II. MOUSE ACTIONS Description Mouse down event followed by mouse up event of left/right/middle buttons A continuous operation of mouse down, up, down and up event of left/right/middle buttons General mouse movement involving no clicks A mouse movement followed by single or double clicks at the end. An action starting with mouse button down event, followed by a movement and ending with mouse button up event. The standstill of mouse cursor, i.e., a situation without any mouse operations TABLE III. MOUSE OPERATION INFORMATION Attribute Descriptions Encoding Mouse Corresponding to the actions defined in action type Table Application in which the action Application occurred, including surfing the Internet, Type word processing, online chatting, and 0-3 playing games. Screen area Area of the mouse cursor on the screen, which is evenly divided into 9 regions. 0-8 The position of window, including client Window area, close area, maximum area, position minimum area, menu, bar, title bar. 0-6 Timestamp The timestamp when the action occurred assumption that frequent behavior segments in mouse behavior could provide more stable and discriminative features or measurements, and allow one to more accurately characterize the discriminable components of mouse behavior. This assumption was later verified by a series of experiments in this work. V. MOUSE BEHA VIOR PATTERN MINING In this section, we define the problem of mouse behavior pattern mining, and then extract behavior patterns from holistic behavior. A. Problem of Mouse-Behavior Pattern Mining Because our overall goal is to extract frequent mouse behavior patterns from holistic behavior, we first defined the problem of mouse behavior pattern mining. Let I= {ij, ib..., in} be a set of all mouse operations. An operation-set is a subset of mouse operations. A sequence is an ordered list of operation-sets by User ID and timestamp, and is denoted as s by {SjS2"'S/}, where Sj is an operation-set, i.e., S j C I, for 1 :S j :S I. Sj is also called an element of the sequence, and denoted as {Xb X2,..., xm}, where Xk is a mouse operation. An operation can occur multiple times in an element of a sequence. The number of instances of mouse operations in a sequence is called the length of the sequence. A sequence with length I is called an I-sequence. A mouse operation sequence database S is a set of triples <ID, sid, s>, where ID is the user ID, sid is a sequence ID and S is a sequence. A

5 User ID TABLE IV. AN EXCERPT FROM SEQUENCE DATABASE Sequence ID Sequence 1 1 («1,3,4,0», <(1,3,4,0), (2,1,4,0), (3,1,4,0»,..., «2,1,2,1»} 1 2 {(2,1,4,0), (1,1,5,1),..., (3,1,4,0)} 1 3 ((2,3,4,0), (1,1,3,0),..., (1,2,2,5)} triple <ID, sid, s> is said to contain a sequence a, if a is a subsequence of s. The support of a sequence a in a database S is the number of tuples in the databases containing a. It can be denoted as support(a) if the sequence database is clear from the context. Given a positive integer :; as the support threshold, a sequence a is called a sequential pattern in sequence database S if the sequence is contained by at least:; tuples in the database, i.e., supports(a) :;. A sequential pattern with length I is called an I-pattern. In this study, we recorded all mouse operations in a sequence database, and each sequence is composed by some consecutive operations between two adjacent silence actions. An excerpt from our mouse operation sequence database is shown in Table IV, and the third column corresponds to the items defined in Table III. Taking the first entry in Table IV as an example, a sequence {<(1,3,4,0», «1,3,4,0), (2,1,4,0), (3,1,4,0», «2,1,2,1»} has elements: <(1,3,4,0», <(1,3,4,0), (2,1,4,0), (3,1,4,0»,..., where mouse operation (1,3,4,0) appears more than once respectively in different elements. Mouse operation (1,3,4,0) happens twice in this sequence, so it contributes 2 to the length of the sequence. Also, the sequence {<(1,3,4,0»} is a subsequence of <(1,3,4,0), (2,1,4,0), (3,1,4,0». Problem Statement. Given a mouse operation sequence database S and a minimum support threshold :;, the problem of sequential mouse behavior pattern mining is to find the complete set of frequent mouse behavior patterns in the database. B. Mouse Behavior Pattern Mining Method In this study, we employed PrefixSpan [19], a new pattern-growth based sequential mining method, as the basic engine for mining mouse behavior patterns from the observed mouse activities. Its basic idea is to examine only the prefix subsequences and project only their corresponding suffix subsequences into projected database. In each projected database, sequential patterns grow by exploring only local frequent patterns. It mines the complete set of sequential patterns and substantially reduces the efforts of candidate subsequence generation. Thus, we first introduced the basic concept of prefix, suffix and projected database. Prefix: Given a sequence a = (e,e2".en), a sequence f3 = (e, ' e2 ' em ')(m < n) is called a prefix of a if and only if (1) ej ' =ej for (i :OS:m-1) ; (2) em ' em ; and (3) all the items in (em - em ') are alphanumerically after those in em '. Suffix: Given a sequence a=(e,e2 en) (where each ei corresponds to a frequent element in S). Let Input: a mouse operation sequence database S, and a minimum support threshold.;. Output: Complete set of frequent mouse behavior patterns P. Method: MouseBehaviorPatternMiningO Call MouseBehaviorPatternMining «>, S, (J Begin (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (II) (12) Let a be a sequential mouse operation pattern; ifa;i<> Let Sin be the a-projected database; else Sla= S; end Let l be the length of a; for each mouse operation in Sia do begin Find the set of frequent item b; if the product of frequency of b in Sia and (1+ I) is larger than.; then begin if b can be assembled to the last element of form a new set B = B U (b) ; (13) end (14) end (15) end (16) for each frequent operation b in B do begin (17) a'=au(b}; (18) form a new a '-projected database Sla'; (19) Call MouseBehaviorPatternMining (a', Sin', (J; (20) end end Figure 1. Mouse Behavior Pattern Mining Algorithm j3= (e,'e2' em') (m<n) be the prefix of a. Sequence r = (e " e,'" e ) is called the suffix of a with regards to III 111+ II prefix (3, denoted as y=al(3, where e: = (em - em ' ). Note that if (3 is not a subsequence of a, the suffix of a with respect to (3 is empty. Projected database: Let a be a sequential pattern in sequence database S. The a-projected database, denoted as Sla. is the collection of suffixes of sequences in S W.r.t. prefix a. The behavior patterns are incrementally extracted from our mouse operation sequence database using the algorithm in Figure l. This procedure first scans the mouse operation database S once to find length- l sequential mouse behavior patterns, then divides the search space into prefixes, and finally constructs the corresponding set of projected databases, each of which would be mined recursively, to find subsets of sequential mouse behavior patterns. C. Reference-Behavior Pattern Generation and Matching When applying the proposed pattern mining method to extract behavior patterns from holistic mouse behavior, the first aim is to create "baseline" normal behavior patterns as a reference-behavior pattern set for each legitimate subject. We first mined behavior patterns from each training data session, and then incrementally merged these patterns to form an aggregate pattern set. This aggregate set, generated from these initial mouse behavior operations, would be viewed as the reference-behavior pattern set for each subject. Then given the reference-behavior patterns and new coming mouse operation sequences from a new data session, we can easily identify the matching patterns using the following procedure:

6 TABLE V. AVERAGE RATIO OF THE NUMBER OF OPERATIONS IN BEHA VIOR OF DIFFERENT LENGTHS OF BEHA VIOR PATTERNS TO TOTAL NUMBER OF OPERATIONS IN HOLISTIC BEHAVIOR Minimum Length-! Lenth-2 Other All support pattern Pattern Patterns Patterns 2% 23.64% 32.15% 25.22% % 5% 16.08% 22.06% 24.90% 63.04% 8% 12.29% 17.65% 17.34% 47.19% 20% 0.95% 1.26% 0% 2.21% Step1: For each operation sequence in the new data session, sequentially search matches given reference-behavior patterns. Step2: Output all matching patterns to represent the new data samples. This procedure considers a behavior segment from a new coming data sample as a behavior pattern as long as it has a matching with one of the reference-behavior patterns. D. Behavior Pattern Analysis The collected data for mining the mouse behavior patterns and generating the reference-behavior patterns consisted of 15 sessions for each of 28 subjects, and based on these results, we can then construct the feature vectors and build the profile of an individual user's mouse behavior. Table V shows the average ratio of the number of operations in different lengths of behavior patterns to total number of operations in holistic behavior over 420 sessions of 28 subjects. Within this table, we observe that the ratios for different lengths of behavior patterns all decreased as the minimum support increases. When the minimum support comes to 20%, the ratio for all patterns is just 2.21 %. This may make the mined patterns provide no meaningful information for analyzing the behavior. While, in contrast, if we set the minimum support as a smaller value, for example, 2% in our study, it will generate more behavior patterns, but this may induce increasingly unstable and inconsistent mouse behavior, which may lead to lower authentication performance. Therefore, to obtain stable and applicable mouse behavior patterns, a balance should be obtained between minimum support and true effectiveness of behavior patterns. In this study, we set the minimum support to be a trade-off value of 8% for usage, under which the corresponding ratio value for mined length- I, length-2 and length-n (n 2: 3) behavior pattern are 12.29%, 17.65% and 17.34% respectively. Note that for easy presentation, we only present the ratio value in Table V at an average level. However, a similar observation holds for every subject. VI. FEATURE CONSTRUCTION A. Feature Construction from Mined Patterns The mined frequent-behavior patterns cannot be used directly by a detector or classifier. Instead, dynamic features are extracted from these patterns. These features are typically organized into a vector to represent behavior patterns from each data session. To construct the feature vectors determining users' mouse behavior and validating hislher identity, we first characterized mouse operations based on two basic physical properties: space and time. Each property was then analyzed individually, and converted into several features, to form the feature vector. This study defined four fine-grained, space and time based feature metrics to depict mouse behavior patterns, which can accurately and stably characterize a user's unique mouse behavior. Click Elapsed Time. The click elapsed time is the time spent by the user to perform a click action, including left/right single clicks and left/right double clicks. For single click, mean and standard deviation of overall time are extracted' and for double click, mean and standard deviation of on overall time and three interval times are used in this study. Movement speed. The average movement speed for different types of mouse movements. This study divided mouse movements into 24 types, depending on 8 different movement directions and 3 different movement distances which covers most common and discriminative mous actions in users' daily use of mouse operations [6, 8]. Movement acceleration. The average movement acceleration for different types of mouse movements. Those features are extracted in a similar way as movement speed. Relative-Position of Extreme Speed. For further characterizing the mouse movement, we calculated the relative position of the maximum speed value over the movement speed curve. Concretely, if the maximum speed value locates at the middle position of the movement speed curve, the relative position has the value of 0.5. As stated in Section IV, mouse activity data are collected in terms of sessions. Therefore, a set of features is extracted from the mined behavior patterns in each data session. In this paper, there are 20 click-related features, 24 movementrelated features, 24 acceleration-related features, and 24 extreme-speed-related features, which would be taken together to form a 92-dimentional feature vector for representing each data session for subjects, and ' thus validating their identity. It should be noted that there are three types of mouse movement considered in this study, as shown in Table II. However, all movement-related features are extracted from common movement and point-and-c1ick movement, and we chose to omit the drag-and-drop. The reason is that this type of movement is rare for most subjects in our study, and has a strong variability over time even in behavior patterns. B. Empirical Feature Study In this section, we made a systematic exploration to see how well, and to what degree behavioral variability can be lessened or reduced in behavior patterns compared with those in holistic behavior. 1) Stability of Features in Behavior Pattern One problem we came cross in analyzing original mouse behavioral data is that the stability of mouse dynamics may be subject to behavioral variability. The data might be affected by inconsistent environmental variables or intrinsic human factors. Thus, the features extracted directly from original behavioral data are usually poor choices for determining an individual user's mouse behavior. The reason is that these features can be skewed by differences in environmental variables or human factors. More specifically,

7 Subject 1 (Behavior pattern) ----A- Subjectt (General behavior) Subject 1 (Behavior pattern) ----A- Subjectt (General behavior) Subject2(Behavior pattern) ---B- Subject2(General behavior) Subject2(Behavior pattern) ---B- Subject2(General behavior) LL 0 Il Q15 LL 0 Il.. 0.Q Movement distance: 524 pixels Left sjngle click time (milliseconds) (a) Average movement speed (pixels/milliseconds) (b) Subjectl (Behavior pattern) ----A- Subjectl (General behavior) --+- Subject2(Behavior pattern) ---B- Subject2(General behavior) Subject 1 (Behavior pattern) ----A- Subject 1 (General behavior) --+- Subject2(Behavior pattern) B- Subject2(General behavior) LL 0 Il Movement direction: diagonal Movement distance: 524 pixels LL 0 Il Movement direction: diagonal Movement distance: 524 pixels o o Average movement acceleration (pixels 2 /milliseconds) (c) Relative position of extreme speed (percent) Figure 2. Mouse features extracted from behavior pattern and holistic behavior for two different subjects. Panel (a) (b) (c) (d) show the probability distribution function (PDF) curves of some typical mouse features used for two different subjects, including left single click time, average movement velocity, average movement acceleration, and relative position of extreme speed. The features are extracted from both behavior pattern and holistic behavior. (d) features such as click time are highly dependent on the agility of a user's finger or a subject's intent; features such as movement speed or acceleration are contingent upon the motion habits of individual mouse actions or the scenario in which a subject is under way. For example, a subject tends to move and click faster when he/she knows where the files are, and hesitates for a longer time if he/she is trying to find that document. Therefore, this makes a good case to use the features extracted from mouse behavior pattern for comparison among subjects. We used the kernel density estimation [13] method, a non-parametric way of estimating the probability density function (PDF) of a random variable, to compute the PDF of each mouse feature from both behavior patterns and holistic behavior for two different subjects. Each feature's PDF is computed over 300 corresponding mouse operations from both mined behavior pattern and holistic behavior. Figure 2 shows the comparison of some typical features for two different subjects. We can observe that the PDF curves for the features extracted from behavior patterns appear much more compact and concentrated than those from holistic behavior, which indicates that the characteristics in a behavior pattern may allow one to more accurately characterize of mouse behavior. We conjecture this may be due to repeatedly recurring behavior segments providing more fine-grained and invariant information about mouse behavior. This also suggests that the features extracted from frequent behavior patterns are more stable and probably lead to a high detection performance. Similar results can be observed for other subjects. 2) Discriminability of Features in Behavior Patterns Another unique trait of the features extracted from behavior patterns is that they are more distinctive among subjects than those from holistic behavior. Not only does the same subject have relatively stable feature values in his/her behavior patterns, but different subjects have distinct feature values, which are more discriminable than those from holistic behavior. As Figure 2 shows, we observe that the PDF curves of features from holistic behavior overlap each other for two different subjects in a relatively large region, which makes it difficult to discriminate among subjects. As a comparison, there is a clearly distinctive gap between different subjects' PDF curves of features from behavior patterns, indicating

8 TABLE VI. AVERAGE DISPERSION METRICS OF MOUSE FEATURES FOR HOLISTIC BEHAVIOR AND BEHAVIOR PATTERNS. Features Holistic Behavior Behavior Pattern Left single click time (-91.7%) Left double click time (-66.2%) Right single click time (-72.2%) Right double click time (-61.3%) Average movement speed* (-62.4%) Average movement acceleration* (-61.4%) Relative position of extreme speed* (-54.94%) features from behavior patterns hold more discriminating power, and may boost detector performance for user discrimination tasks. Specifically, the average movement speed (panel (b» and acceleration (panel (c» from behavior patterns are separated completely for two different subjects, while those from holistic behavior are overlapping. This implies a noticeable difference among users' behavior when using the features extracted from behavior patterns, whereas it could be very hard to uniquely differentiate subjects using the features extracted from holistic behavior. Together with the feature stability discussed before, this makes the features extracted from behavior pattern evidently superior to those extracted from holistic behavior. Note that for easy presentation, we only compare the difference between a pair of subjects. However, a similar observation holds for other subjects. 3) Statistical Dispersion of Features Across Subjects Further to investigate the stability and discriminability of features extracted from frequent behavior patterns, we defined a simple and effective dispersion metric based on Gini's Mean Difference [2]. The measurement of this metric is a real number that is zero if all the data are identical (or stable and unique), and increases as the data become more diverse, with the same scale as the quantity being measured. For each feature fk used in this study, with a sequence of values {x; hxii, (nk is the number of feature samples), the dispersion metric DM(Jk) can be defined as: 1 11k 11k LL:!x: - xjl DM( fk) = nk (nk - 1) i=1 j=1 The dispersion metric of each feature for every subject is computed over 300 corresponding mouse operations. Then we calculated the average dispersion metric for each feature over all 28 subjects. Table VI shows the average dispersion metrics for some typical features extracted from behavior patterns, in comparison with those extracted from holistic behavior. In addition to the dispersion metrics, the table includes a percentage in parentheses, which indicates the percent decrease in dispersion metrics of behavior patterns over 'This study extracted average movement speeds for 24 types of mouse movement (same setting for average movement acceleration and relative position of maximal speed), based on 8 different movement directions and 3 different movement distances. Note that for easy presentation, we only present one case of speed features with the diagonal direction and 524 pixels' distance. However, the similar observation holds for the other speed features. those of holistic behavior. By comparing the second and third columns of Table VI, it is clear to see that features extracted from behavior patterns are much more stable and discriminative than those extracted from holistic behavior. We observe the significant decrease percentage over all the dispersion metrics for features from behavior patterns. Specifically, almost all the metrics for behavior patterns decrease over 50%. What's more, the decreased percentage for left single click time is up to 91.7%. This implies that the features in behavior patterns have their own inherently unique attributes which are much more stable and discriminative than features in holistic behavior. This may allow more fine-grained and accurate characterization of mouse behavior among subjects, and may result in a high performance boost for user discrimination task. VII. DETECTOR IMPLEMENTATION In this section, we develop three types of one-class detector. By ensuring that we have diversity in the set of detectors, we can examine whether or not an observed effect is specific to one type of detector or more generally true for a range of detectors. A. One-Class Detector Overview User authentication is still a challenging task from the pattern classification viewpoint. It is a two class (legitimate user vs. impostors) problem, but only the patterns from the legitimate user are available in advance. Most previous research used both the legitimate user's and impostors' samples to train their models. Yet this is not practical in realistic applications since there may be thousands of potential impostors' data samples at the risk of fatal intrusion. Therefore, a better solution is to build a model only based on the legitimate user's data samples, and then use it to detect impostors who are using some sort of similarity measures. This type of problem is known as one-class classification [14] or anomaly detection [15]. In this study, we constrained our attention to one-class anomaly detectors that behave similarity in terms of their input and output. B. Detector 1: Nearest-Neighbor Detector A nearest-neighbor based detector models a user's mouse behavior based on the assumption that new mouse behaviorpattern feature vectors from the user will resemble one or more of those in the training data. During training, the detector estimated the covariance matrix of the training feature vectors, and saved each mouse behavior-pattern feature vector. After multiple tests with k changing from 1 to 5 we obtained the best results with k=3, which will be shown in section 9. During testing, the detector calculated Mahalanobis distances (using the covariance matrix of the training data), and distance was calculated from the new feature-distance vector to each of the vectors in the training data. The distance from the new vector to the nearest vector from the training data was used as the anomaly score. C. Detector 2: Neural Network Detector Neural networks have been used successfully in many applications. In this paper, we considered single-hidden-layer

9 neural networks. In the training phase, a network was built with p input nodes, one output node, and L 2 p / 3 J hidden nodes. The network weights were randomly initialized, and then the detector was trained to produce a 1.0 on the output node for every training feature vector. We trained for 500 epochs using a learning-rate parameter of In the testing phase, the test vector was run through the network, and the output of the network was recorded. Denote s to be the output of the network; intuitively, if s is close to 1.0, the test vector is similar to the training vectors, and with s close to -1.0, it is dissimilar. D. Detector 3: Support Vector Machine (one-class) A one-class SVM generalizes the idea of mapping the data into a high dimensional feature space via a kernel function, and treating the origin as the only example from other classes. In the training phase, the detector was built using the training vectors. In the testing phase, the test vector was projected into the same high-dimensional space and the distance from the linear separator was calculated. The anomaly score was calculated as this distance, with the sign inverted, so that positive scores are separated from the data. We used a REF kernel function in this study, and the SVM parameter g and nu (using LibSVM [18]) were set to 0.01 and 0.02 respectively. Then the decision function was calculated. The function would generate "+ 1" if the authorized user's test set is input, otherwise it is a false rejection case. On the contrary, "-1" should be obtained if the impostors' test set is the input; otherwise a false acceptance case occurs. VIII. EVALUATION METHODOLOGY This section explains how we set up the detector training and testing, and calculates the detector performance. A. Training and Testing Procedure We started by designating one of our 28 subjects as the legitimate user, and the rest as impostors. We trained each detector and tested its ability to recognize the legitimate user and impostors as follows: Step 1: We ran the training phase of the detector on the randomly-selected half of feature samples generated by the legitimate subject. The detector builds a profile of that user. Step 2: We ran the testing phase of the detector on the feature samples from the remaining half of the data generated by the legitimate user. We recorded the anomaly scores assigned to each feature sample as user scores. Step 3: We ran the testing phase of the detector on the feature samples from data generated by the impostors. We recorded the anomaly scores assigned to each feature sample as impostor scores. This process was then repeated, designating each of other subjects as the legitimate user in turn. For choosing parameters of interest, lo-fold cross validation was employed. Since we used a random sampling to divide the data into training and testing sets, and we want to account for the effect of this randomness, we repeated the above procedure ten times, each time with an independently selected draw from the entire data set. B. Calculating Detection Peiformance To convert these sets of detection scores of legitimate users and impostors into aggregate measures of detector performance, we compute the false-acceptance rate (FAR) and false-rejection rate (FRR). The FAR is the measure of the likelihood that the biometric security system will incorrectly accept an access attempt by an unauthorized user. The FRR is the measure of the likelihood that the biometric security system will incorrectly reject an access attempt by an authorized user. The lower the FRR and FAR, the more accurate the approach. We also brought FAR and FRR together to generate a graphical summary of performance called an ROC curve [17]. Whether or not mouse operating behavior generates an alarm depends on how the threshold on the anomaly scores is chosen. An anomaly score over the threshold indicates an impostor, while a score under the threshold indicates a legitimate user. The choice of threshold establishes the operating point of the detector on the curve. Over the continuum of possible thresholds, the ROC curve illustrates the FARs and FRRs that would be attained at each possible detector operating point. Moreover, the threshold can be increased or decreased from the default value of 0.0 to bias the classifier towards authentic users or impostors, lowering the FRR or FAR, respectively. After multiple tests, we observe that setting the threshold value of 0.45 yields a relatively low FAR on average*. Therefore, throughout this paper, we would show results with a threshold value of 0.45 in most cases. IX. RESULTS AND ANALYSIS In this section, we present an objective evaluation on the effectiveness of the proposed approach through a series of experiments, and then investigate the performance at varying session lengths, trying to find a balance between security and usability. A. Detector Peiformance Table VII shows the average FARs and FRRs of continuous authentication for each of three detectors over all subjects, with the input set to be feature samples from behavior patterns and feature samples from holistic behavior (as mentioned in Section 8.2, these tests are performed with the threshold of 0.45.). Additionally, to further analyze the efficacy of features from behavior patterns, Figure 3 shows the ROC curve for each of three detectors. Our first observation is that the best performance has a FAR of 0.37% and FRR of 1.12%, obtained by the One Class SVM detector, which is impressive and achieves an acceptable level of accuracy for realistic application. It is also competitive with the best results previously reported, while being subject to more variability of mouse dynamics compared with previous work, because they represent activities in a longer period of observation. We also observe that the average error rates for features from the holistic *Note that for different detectors, there are different threshold intervals. For instance, the threshold interval for the neural network detector is [0, 1], and for the one-class SVM, it is [-1, 1]. For uniform presentation, we mapped all intervals to [0, 1].

10 TABLE VII. FARs AND FRRs OF THE THREE DETECTORS (WITH Q) en Cii I..L. STANDARD DEVIATION IN PARENTHESES) Behavior Pattern Holistic Behavior Detector FAR FRR FAR FRR Nearest Neighbor Neural Network One-Class SVM 2.73% 3.67% 8.87% 9.63% (0.0124) (0.0089) (0.0936) (0.0923) 0.89% 2.15% 6.36% 6.95% (0.0057) (0.0065) (0.0534) (0.0653) 0.37% l.l2% 5.57% 6.73% (0.0062) (0.0067) (0.0502) (0.0493) 40, _.,8".- One-Class SVM -e- Neural Network Nearest Neighbor False Acceptance Rate (FAR %) Figure 3. ROC curves for three different classifiers using features from behavior pattern: One-class SVM, neural network and nearest neighbor. behavior are much higher than those from behavior patterns. We conjecture that these results may be due to stable and fine-grained characterization of mouse behavior by using behavior patterns, and is also a demonstration of the true effectiveness of pattern mining methods in dealing with variable behavior data. Besides, it should be noted that our result is very close to the European standard for access control, which requires near-perfect accuracy of % false acceptance rate and 1 % false rejection rate [9]. While it might be unwise to rely solely on an authentication method which is not up to the European standard, it does seem that mouse dynamics could provide evidence in a user discrimination task. Another thing to note from Table VII is that the standard deviations of error rates from features from behavior patterns are much smaller than that of features from holistic behavior for all detectors, suggesting that behavior patterns might be more stable and robust to the variability of mouse behavior. Our second observation is that the one-class SVM detector has a much better performance than all other detectors considered in this study. This may be due to the fact that SVMs can convert the problem of classification into qu. adratic optimization in the case of relative insufficiency of pno. knowledge, and still maintain high accuracy and stability. Moreover, the standard deviation of FAR and FRR for the one-class SVM is competitive with other methods indicating that it may be robust to variable behavior data and different parameter selection procedures. Besides, we also TABLE VIII. FARs AND FRRs FOR VARIOUS DATA SESSION LENGTHS Operation lenj!th FAR FRR Authentication time % 34.78% about 1 minute % 9.45% about 5 minutes % 3.39% about 10 minutes % 1.69% about 20 minutes % l.l2% about 30 minutes observe that the performance obtained by nearest neighbor is of FAR=2.7 %, FRR=3.67%, which may be not encouraging comp ed WIth other two detectors in our study. We gauge that this may be due to lacking of self-learning ability using this method. Furthermore, to statistically and systematically evaluate the performance obtained from the proposed approach, we conduct a statistical test using the half total error rate (HTER) and confidence interval [22]. This statistical test shows that the proposed approach provides the lowest HTER among three detectors, and with 95% confidence, the confidence interval lies in between 0.75%±1. 15%. B. Effect of Session Length The session length corresponds to the number of mouse operations to accomplish a data collection session. Session length may play an important role in mouse dynamics for continuous user authentication since it represents the window of opportunities for an impostor, and even a few minutes is nough for an adversary to compromise the system. To InVestIgate the effect of session length on the accuracy of the detector, we conducted a test on the same data set with varying session lengths, trying to find a balance between security and usability. Table VIII shows the FARs and FRRs at varying session lengths, using a One-Class SVM detector. In addition to the FAR and FRR, the table includes the authentication time in minutes corresponding to the varying session lengths. The authentication time refers to the sum of average time needed to collect a data session, and the average time needed to make the decision. The FAR and FRR obtained on the ses ion leng h of 100 is 44.56% and 34.78% respectively, which IS akin to random guessing, but the authentication time only took about 1 minute. As the session length increases, the FAR and FRR drop to 2.75% and 3.39%, with the authentication time about 10 minutes. Therefore, we may draw a conclusion that the accuracies of detectors almost certainly get improved as the session length increases. What's more, the FAR and FRR drop to 0.37% and 1.12% after observing 3000 mouse operations, which achieves a practically useful level of performance, but having a authentication time up to 30 minutes. This may limit the applicability for a large scale deployment in real systems. Thus a tradeoff must be made between security (FAR and FRR) and user acceptability (authentication time), and more investigations and improvements should be performed to place it in more realistic settings.

LiteLink mini USB. Diatransfer 2

LiteLink mini USB. Diatransfer 2 THE ART OF MEDICAL DIAGNOSTICS LiteLink mini USB Wireless Data Download Device Diatransfer 2 Diabetes Data Management Software User manual Table of Contents 1 Introduction... 3 2 Overview of operating

More information

Incorporation of Imaging-Based Functional Assessment Procedures into the DICOM Standard Draft version 0.1 7/27/2011

Incorporation of Imaging-Based Functional Assessment Procedures into the DICOM Standard Draft version 0.1 7/27/2011 Incorporation of Imaging-Based Functional Assessment Procedures into the DICOM Standard Draft version 0.1 7/27/2011 I. Purpose Drawing from the profile development of the QIBA-fMRI Technical Committee,

More information

Measuring Focused Attention Using Fixation Inner-Density

Measuring Focused Attention Using Fixation Inner-Density Measuring Focused Attention Using Fixation Inner-Density Wen Liu, Mina Shojaeizadeh, Soussan Djamasbi, Andrew C. Trapp User Experience & Decision Making Research Laboratory, Worcester Polytechnic Institute

More information

Analyzing Spammers Social Networks for Fun and Profit

Analyzing Spammers Social Networks for Fun and Profit Chao Yang Robert Harkreader Jialong Zhang Seungwon Shin Guofei Gu Texas A&M University Analyzing Spammers Social Networks for Fun and Profit A Case Study of Cyber Criminal Ecosystem on Twitter Presentation:

More information

Content Part 2 Users manual... 4

Content Part 2 Users manual... 4 Content Part 2 Users manual... 4 Introduction. What is Kleos... 4 Case management... 5 Identity management... 9 Document management... 11 Document generation... 15 e-mail management... 15 Installation

More information

AC : USABILITY EVALUATION OF A PROBLEM SOLVING ENVIRONMENT FOR AUTOMATED SYSTEM INTEGRATION EDUCA- TION USING EYE-TRACKING

AC : USABILITY EVALUATION OF A PROBLEM SOLVING ENVIRONMENT FOR AUTOMATED SYSTEM INTEGRATION EDUCA- TION USING EYE-TRACKING AC 2012-4422: USABILITY EVALUATION OF A PROBLEM SOLVING ENVIRONMENT FOR AUTOMATED SYSTEM INTEGRATION EDUCA- TION USING EYE-TRACKING Punit Deotale, Texas A&M University Dr. Sheng-Jen Tony Hsieh, Texas A&M

More information

Error Detection based on neural signals

Error Detection based on neural signals Error Detection based on neural signals Nir Even- Chen and Igor Berman, Electrical Engineering, Stanford Introduction Brain computer interface (BCI) is a direct communication pathway between the brain

More information

EECS 433 Statistical Pattern Recognition

EECS 433 Statistical Pattern Recognition EECS 433 Statistical Pattern Recognition Ying Wu Electrical Engineering and Computer Science Northwestern University Evanston, IL 60208 http://www.eecs.northwestern.edu/~yingwu 1 / 19 Outline What is Pattern

More information

ABSTRACT I. INTRODUCTION. Mohd Thousif Ahemad TSKC Faculty Nagarjuna Govt. College(A) Nalgonda, Telangana, India

ABSTRACT I. INTRODUCTION. Mohd Thousif Ahemad TSKC Faculty Nagarjuna Govt. College(A) Nalgonda, Telangana, India International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018 IJSRCSEIT Volume 3 Issue 1 ISSN : 2456-3307 Data Mining Techniques to Predict Cancer Diseases

More information

Remarks on Bayesian Control Charts

Remarks on Bayesian Control Charts Remarks on Bayesian Control Charts Amir Ahmadi-Javid * and Mohsen Ebadi Department of Industrial Engineering, Amirkabir University of Technology, Tehran, Iran * Corresponding author; email address: ahmadi_javid@aut.ac.ir

More information

Incorporation of Imaging-Based Functional Assessment Procedures into the DICOM Standard Draft version 0.2 8/10/2011 I. Purpose

Incorporation of Imaging-Based Functional Assessment Procedures into the DICOM Standard Draft version 0.2 8/10/2011 I. Purpose Incorporation of Imaging-Based Functional Assessment Procedures into the DICOM Standard Draft version 0.2 8/10/2011 I. Purpose Drawing from the profile development of the QIBA-fMRI Technical Committee,

More information

Detection and Recognition of Sign Language Protocol using Motion Sensing Device

Detection and Recognition of Sign Language Protocol using Motion Sensing Device Detection and Recognition of Sign Language Protocol using Motion Sensing Device Rita Tse ritatse@ipm.edu.mo AoXuan Li P130851@ipm.edu.mo Zachary Chui MPI-QMUL Information Systems Research Centre zacharychui@gmail.com

More information

Data mining for Obstructive Sleep Apnea Detection. 18 October 2017 Konstantinos Nikolaidis

Data mining for Obstructive Sleep Apnea Detection. 18 October 2017 Konstantinos Nikolaidis Data mining for Obstructive Sleep Apnea Detection 18 October 2017 Konstantinos Nikolaidis Introduction: What is Obstructive Sleep Apnea? Obstructive Sleep Apnea (OSA) is a relatively common sleep disorder

More information

A STATISTICAL PATTERN RECOGNITION PARADIGM FOR VIBRATION-BASED STRUCTURAL HEALTH MONITORING

A STATISTICAL PATTERN RECOGNITION PARADIGM FOR VIBRATION-BASED STRUCTURAL HEALTH MONITORING A STATISTICAL PATTERN RECOGNITION PARADIGM FOR VIBRATION-BASED STRUCTURAL HEALTH MONITORING HOON SOHN Postdoctoral Research Fellow ESA-EA, MS C96 Los Alamos National Laboratory Los Alamos, NM 87545 CHARLES

More information

J2.6 Imputation of missing data with nonlinear relationships

J2.6 Imputation of missing data with nonlinear relationships Sixth Conference on Artificial Intelligence Applications to Environmental Science 88th AMS Annual Meeting, New Orleans, LA 20-24 January 2008 J2.6 Imputation of missing with nonlinear relationships Michael

More information

Dosimeter Setting Device

Dosimeter Setting Device Instruction Manual Dosimeter Setting Device For Electronic Personal Dosimeter Dose-i (Unit:Sv, Version:1.05 English) WTA529748 a 1 / 38 Foreword Thank you for purchasing the Dosimeter Setting Device; a

More information

Pushing the Right Buttons: Design Characteristics of Touch Screen Buttons

Pushing the Right Buttons: Design Characteristics of Touch Screen Buttons 1 of 6 10/3/2009 9:40 PM October 2009, Vol. 11 Issue 2 Volume 11 Issue 2 Past Issues A-Z List Usability News is a free web newsletter that is produced by the Software Usability Research Laboratory (SURL)

More information

EasyComp. The TPN Compatibility Software. Clinical Nutrition

EasyComp. The TPN Compatibility Software. Clinical Nutrition EasyComp The TPN Compatibility Software Clinical Nutrition Content 1. General Information 5 1.1 What is EasyComp? 4 1.2 Features and functions of EasyComp 5 1.3 IT requirements 5 t2. Starting EasyComp

More information

Gene Selection for Tumor Classification Using Microarray Gene Expression Data

Gene Selection for Tumor Classification Using Microarray Gene Expression Data Gene Selection for Tumor Classification Using Microarray Gene Expression Data K. Yendrapalli, R. Basnet, S. Mukkamala, A. H. Sung Department of Computer Science New Mexico Institute of Mining and Technology

More information

11. NATIONAL DAFNE CLINICAL AND RESEARCH DATABASE

11. NATIONAL DAFNE CLINICAL AND RESEARCH DATABASE 11. NATIONAL DAFNE CLINICAL AND RESEARCH DATABASE The National DAFNE Clinical and Research database was set up as part of the DAFNE QA programme (refer to section 12) to facilitate Audit and was updated

More information

A Bayesian Network Model of Knowledge-Based Authentication

A Bayesian Network Model of Knowledge-Based Authentication Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2007 Proceedings Americas Conference on Information Systems (AMCIS) December 2007 A Bayesian Network Model of Knowledge-Based Authentication

More information

WFS. User Guide. thinkwhere Glendevon House Castle Business Park Stirling FK9 4TZ Tel +44 (0) Fax +44 (0)

WFS. User Guide. thinkwhere Glendevon House Castle Business Park Stirling FK9 4TZ   Tel +44 (0) Fax +44 (0) WFS User Guide thinkwhere Glendevon House Castle Business Park Stirling FK9 4TZ www.thinkwhere.com Tel +44 (0)1786 476060 Fax +44 (0)1786 47609 Table of Contents WHAT IS A WEB FEATURE SERVICE?... 3 Key

More information

Elemental Kinection. Requirements. 2 May Version Texas Christian University, Computer Science Department

Elemental Kinection. Requirements. 2 May Version Texas Christian University, Computer Science Department Elemental Kinection Requirements Version 2.1 2 May 2016 Elemental Kinection Requirements i Revision History All revision history listed below. Version Change Summary Date 1.0 Initial Draft 10 November

More information

Agile Product Lifecycle Management for Process

Agile Product Lifecycle Management for Process Nutrition Surveillance Management User Guide Release 5.2.1 Part No. E13901-01 September 2008 Copyrights and Trademarks Copyright 1995, 2008, Oracle Corporation and/or its affiliates. All rights reserved.

More information

Personalized Colorectal Cancer Survivability Prediction with Machine Learning Methods*

Personalized Colorectal Cancer Survivability Prediction with Machine Learning Methods* Personalized Colorectal Cancer Survivability Prediction with Machine Learning Methods* 1 st Samuel Li Princeton University Princeton, NJ seli@princeton.edu 2 nd Talayeh Razzaghi New Mexico State University

More information

IMPaLA tutorial.

IMPaLA tutorial. IMPaLA tutorial http://impala.molgen.mpg.de/ 1. Introduction IMPaLA is a web tool, developed for integrated pathway analysis of metabolomics data alongside gene expression or protein abundance data. It

More information

HOW TO USE THE BENCHMARK CALENDAR SYSTEM

HOW TO USE THE BENCHMARK CALENDAR SYSTEM HOW TO USE THE BENCHMARK CALENDAR SYSTEM 1. Go to Website http://doris.clk.co.st-johns.fl.us/benchmarkweb 2. You can use Firefox or Internet Explorer 11 to login to Benchmark. Compatibility mode is no

More information

Terran Lane. aids a single user in protecting his or her account. Lee et al., 1997). The learning task for our domain

Terran Lane. aids a single user in protecting his or her account. Lee et al., 1997). The learning task for our domain Filtering Techniques for Rapid User Classication Terran Lane School of Electrical and Computer Engineering Purdue University, West Lafayette, IN 47907-1287 terran@ecn.purdue.edu Abstract In the computer

More information

Evaluating Classifiers for Disease Gene Discovery

Evaluating Classifiers for Disease Gene Discovery Evaluating Classifiers for Disease Gene Discovery Kino Coursey Lon Turnbull khc0021@unt.edu lt0013@unt.edu Abstract Identification of genes involved in human hereditary disease is an important bioinfomatics

More information

Pupil Dilation as an Indicator of Cognitive Workload in Human-Computer Interaction

Pupil Dilation as an Indicator of Cognitive Workload in Human-Computer Interaction Pupil Dilation as an Indicator of Cognitive Workload in Human-Computer Interaction Marc Pomplun and Sindhura Sunkara Department of Computer Science, University of Massachusetts at Boston 100 Morrissey

More information

Probability-Based Protein Identification for Post-Translational Modifications and Amino Acid Variants Using Peptide Mass Fingerprint Data

Probability-Based Protein Identification for Post-Translational Modifications and Amino Acid Variants Using Peptide Mass Fingerprint Data Probability-Based Protein Identification for Post-Translational Modifications and Amino Acid Variants Using Peptide Mass Fingerprint Data Tong WW, McComb ME, Perlman DH, Huang H, O Connor PB, Costello

More information

Evaluation of CBT for increasing threat detection performance in X-ray screening

Evaluation of CBT for increasing threat detection performance in X-ray screening Evaluation of CBT for increasing threat detection performance in X-ray screening A. Schwaninger & F. Hofer Department of Psychology, University of Zurich, Switzerland Abstract The relevance of aviation

More information

CHAPTER 6 HUMAN BEHAVIOR UNDERSTANDING MODEL

CHAPTER 6 HUMAN BEHAVIOR UNDERSTANDING MODEL 127 CHAPTER 6 HUMAN BEHAVIOR UNDERSTANDING MODEL 6.1 INTRODUCTION Analyzing the human behavior in video sequences is an active field of research for the past few years. The vital applications of this field

More information

Item Analysis Explanation

Item Analysis Explanation Item Analysis Explanation The item difficulty is the percentage of candidates who answered the question correctly. The recommended range for item difficulty set forth by CASTLE Worldwide, Inc., is between

More information

Classification of Epileptic Seizure Predictors in EEG

Classification of Epileptic Seizure Predictors in EEG Classification of Epileptic Seizure Predictors in EEG Problem: Epileptic seizures are still not fully understood in medicine. This is because there is a wide range of potential causes of epilepsy which

More information

Evaluation of CBT for increasing threat detection performance in X-ray screening

Evaluation of CBT for increasing threat detection performance in X-ray screening Evaluation of CBT for increasing threat detection performance in X-ray screening A. Schwaninger & F. Hofer Department of Psychology, University of Zurich, Switzerland Abstract The relevance of aviation

More information

Conditional Outlier Detection for Clinical Alerting

Conditional Outlier Detection for Clinical Alerting Conditional Outlier Detection for Clinical Alerting Milos Hauskrecht, PhD 1, Michal Valko, MSc 1, Iyad Batal, MSc 1, Gilles Clermont, MD, MS 2, Shyam Visweswaran MD, PhD 3, Gregory F. Cooper, MD, PhD 3

More information

Unit 1 Exploring and Understanding Data

Unit 1 Exploring and Understanding Data Unit 1 Exploring and Understanding Data Area Principle Bar Chart Boxplot Conditional Distribution Dotplot Empirical Rule Five Number Summary Frequency Distribution Frequency Polygon Histogram Interquartile

More information

Appendix B. Nodulus Observer XT Instructional Guide. 1. Setting up your project p. 2. a. Observation p. 2. b. Subjects, behaviors and coding p.

Appendix B. Nodulus Observer XT Instructional Guide. 1. Setting up your project p. 2. a. Observation p. 2. b. Subjects, behaviors and coding p. 1 Appendix B Nodulus Observer XT Instructional Guide Sections: 1. Setting up your project p. 2 a. Observation p. 2 b. Subjects, behaviors and coding p. 3 c. Independent variables p. 4 2. Carry out an observation

More information

Nature Neuroscience: doi: /nn Supplementary Figure 1. Behavioral training.

Nature Neuroscience: doi: /nn Supplementary Figure 1. Behavioral training. Supplementary Figure 1 Behavioral training. a, Mazes used for behavioral training. Asterisks indicate reward location. Only some example mazes are shown (for example, right choice and not left choice maze

More information

1. INTRODUCTION. Vision based Multi-feature HGR Algorithms for HCI using ISL Page 1

1. INTRODUCTION. Vision based Multi-feature HGR Algorithms for HCI using ISL Page 1 1. INTRODUCTION Sign language interpretation is one of the HCI applications where hand gesture plays important role for communication. This chapter discusses sign language interpretation system with present

More information

Proteome Discoverer Version 1.3

Proteome Discoverer Version 1.3 Xcalibur Proteome Discoverer Version 1.3 Installation Guide XCALI-97359 Revision A May 2011 2011 Thermo Fisher Scientific Inc. All rights reserved. Xcalibur is a registered trademark of Thermo Fisher Scientific

More information

Mammogram Analysis: Tumor Classification

Mammogram Analysis: Tumor Classification Mammogram Analysis: Tumor Classification Term Project Report Geethapriya Raghavan geeragh@mail.utexas.edu EE 381K - Multidimensional Digital Signal Processing Spring 2005 Abstract Breast cancer is the

More information

Controlled Experiments

Controlled Experiments CHARM Choosing Human-Computer Interaction (HCI) Appropriate Research Methods Controlled Experiments Liz Atwater Department of Psychology Human Factors/Applied Cognition George Mason University lizatwater@hotmail.com

More information

AudioConsole. User Guide. Doc. No EN/01 Part No EN

AudioConsole. User Guide. Doc. No EN/01 Part No EN AudioConsole Doc. No. 7-50-2180-EN/01 Part No. 7-50-21800-EN Copyright notice [2003], 2018 Inmedico A/S. All rights reserved. Oscilla is aregistered trademark of Inmedico A/S in the U.S.A. and/or other

More information

Conditional spectrum-based ground motion selection. Part II: Intensity-based assessments and evaluation of alternative target spectra

Conditional spectrum-based ground motion selection. Part II: Intensity-based assessments and evaluation of alternative target spectra EARTHQUAKE ENGINEERING & STRUCTURAL DYNAMICS Published online 9 May 203 in Wiley Online Library (wileyonlinelibrary.com)..2303 Conditional spectrum-based ground motion selection. Part II: Intensity-based

More information

Clay Tablet Connector for hybris. User Guide. Version 1.5.0

Clay Tablet Connector for hybris. User Guide. Version 1.5.0 Clay Tablet Connector for hybris User Guide Version 1.5.0 August 4, 2016 Copyright Copyright 2005-2016 Clay Tablet Technologies Inc. All rights reserved. All rights reserved. This document and its content

More information

TITLE: A Data-Driven Approach to Patient Risk Stratification for Acute Respiratory Distress Syndrome (ARDS)

TITLE: A Data-Driven Approach to Patient Risk Stratification for Acute Respiratory Distress Syndrome (ARDS) TITLE: A Data-Driven Approach to Patient Risk Stratification for Acute Respiratory Distress Syndrome (ARDS) AUTHORS: Tejas Prahlad INTRODUCTION Acute Respiratory Distress Syndrome (ARDS) is a condition

More information

Data processing software for TGI/TGE series

Data processing software for TGI/TGE series 1/19 1. Overview Used with TGI or TGE series tensile and compression testing machines, the software enables efficient static strength testing in single tests, cyclical tests, or controlled (customized)

More information

RetCAD 1.3.0: White paper

RetCAD 1.3.0: White paper RetCAD 1.3.0: White paper 18 July 2018 Computer aided detection for Age-related Macular Degeneration and Diabetic Retinopathy About this white paper This white paper applies to RetCAD 1.3.0 and describes

More information

Learning Patterns from Unix Process Execution Traces for Intrusion Detection 1

Learning Patterns from Unix Process Execution Traces for Intrusion Detection 1 Learning Patterns from Unix Process Execution Traces for Intrusion Detection 1 Wenke Lee and Salvatore J. Stolfo Computer Science Department Columbia University 500 West 120 th Street New York, NY 10027

More information

Identification of Neuroimaging Biomarkers

Identification of Neuroimaging Biomarkers Identification of Neuroimaging Biomarkers Dan Goodwin, Tom Bleymaier, Shipra Bhal Advisor: Dr. Amit Etkin M.D./PhD, Stanford Psychiatry Department Abstract We present a supervised learning approach to

More information

Desktop Fitting Guide for Phonak Brio 3

Desktop Fitting Guide for Phonak Brio 3 Phonak Target 5.3.3 Desktop Fitting Guide for Phonak Brio 3 The Phonak Target fitting software is intended to be used by qualified hearing care professionals to configure, program, and fit hearing aids

More information

Doing Quantitative Research 26E02900, 6 ECTS Lecture 6: Structural Equations Modeling. Olli-Pekka Kauppila Daria Kautto

Doing Quantitative Research 26E02900, 6 ECTS Lecture 6: Structural Equations Modeling. Olli-Pekka Kauppila Daria Kautto Doing Quantitative Research 26E02900, 6 ECTS Lecture 6: Structural Equations Modeling Olli-Pekka Kauppila Daria Kautto Session VI, September 20 2017 Learning objectives 1. Get familiar with the basic idea

More information

A Comparison of Collaborative Filtering Methods for Medication Reconciliation

A Comparison of Collaborative Filtering Methods for Medication Reconciliation A Comparison of Collaborative Filtering Methods for Medication Reconciliation Huanian Zheng, Rema Padman, Daniel B. Neill The H. John Heinz III College, Carnegie Mellon University, Pittsburgh, PA, 15213,

More information

OECD QSAR Toolbox v.4.2. An example illustrating RAAF scenario 6 and related assessment elements

OECD QSAR Toolbox v.4.2. An example illustrating RAAF scenario 6 and related assessment elements OECD QSAR Toolbox v.4.2 An example illustrating RAAF scenario 6 and related assessment elements Outlook Background Objectives Specific Aims Read Across Assessment Framework (RAAF) The exercise Workflow

More information

A NOVEL VARIABLE SELECTION METHOD BASED ON FREQUENT PATTERN TREE FOR REAL-TIME TRAFFIC ACCIDENT RISK PREDICTION

A NOVEL VARIABLE SELECTION METHOD BASED ON FREQUENT PATTERN TREE FOR REAL-TIME TRAFFIC ACCIDENT RISK PREDICTION OPT-i An International Conference on Engineering and Applied Sciences Optimization M. Papadrakakis, M.G. Karlaftis, N.D. Lagaros (eds.) Kos Island, Greece, 4-6 June 2014 A NOVEL VARIABLE SELECTION METHOD

More information

9 research designs likely for PSYC 2100

9 research designs likely for PSYC 2100 9 research designs likely for PSYC 2100 1) 1 factor, 2 levels, 1 group (one group gets both treatment levels) related samples t-test (compare means of 2 levels only) 2) 1 factor, 2 levels, 2 groups (one

More information

AUTOMATING NEUROLOGICAL DISEASE DIAGNOSIS USING STRUCTURAL MR BRAIN SCAN FEATURES

AUTOMATING NEUROLOGICAL DISEASE DIAGNOSIS USING STRUCTURAL MR BRAIN SCAN FEATURES AUTOMATING NEUROLOGICAL DISEASE DIAGNOSIS USING STRUCTURAL MR BRAIN SCAN FEATURES ALLAN RAVENTÓS AND MOOSA ZAIDI Stanford University I. INTRODUCTION Nine percent of those aged 65 or older and about one

More information

RESULTS REPORTING MANUAL. Hospital Births Newborn Screening Program June 2016

RESULTS REPORTING MANUAL. Hospital Births Newborn Screening Program June 2016 RESULTS REPORTING MANUAL Hospital Births Newborn Screening Program June 2016 CONTENTS GETTING STARTED... 1 Summary... 1 Logging In... 1 Access For New Hires... 2 Reporting Parental Refusals... 3 Adding

More information

Module 3: Pathway and Drug Development

Module 3: Pathway and Drug Development Module 3: Pathway and Drug Development Table of Contents 1.1 Getting Started... 6 1.2 Identifying a Dasatinib sensitive cancer signature... 7 1.2.1 Identifying and validating a Dasatinib Signature... 7

More information

Phonak Target 4.3. Desktop Fitting Guide. Content. March 2016

Phonak Target 4.3. Desktop Fitting Guide. Content. March 2016 Phonak Target 4.3 March 2016 Desktop Fitting Guide This guide provides you with a detailed introduction to latest hearing instrument fitting with Phonak Target. www.phonakpro.com/target_guide Please also

More information

NeuroMem. RBF Decision Space Mapping

NeuroMem. RBF Decision Space Mapping NeuroMem RBF Decision Space Mapping Version 4.2 Revised 01/04/2017 This manual is copyrighted and published by General Vision Inc. All rights reserved. Contents 1 Introduction to a decision space... 3

More information

Facial Expression Biometrics Using Tracker Displacement Features

Facial Expression Biometrics Using Tracker Displacement Features Facial Expression Biometrics Using Tracker Displacement Features Sergey Tulyakov 1, Thomas Slowe 2,ZhiZhang 1, and Venu Govindaraju 1 1 Center for Unified Biometrics and Sensors University at Buffalo,

More information

Introduction. What s new in Genie 2? New Fitting features. Support for new hearing aids:

Introduction. What s new in Genie 2? New Fitting features. Support for new hearing aids: Guide 207. Introduction Genie 2 and Genie have been updated with a variety of new features and enhancements. Please find a quick overview of these below: What s new in Genie 2? Support for new hearing

More information

CS 520: Assignment 3 - Probabilistic Search (and Destroy)

CS 520: Assignment 3 - Probabilistic Search (and Destroy) CS 520: Assignment 3 - Probabilistic Search (and Destroy) Raj Sundhar Ravichandran, Justin Chou, Vatsal Parikh November 20, 2017 Source Code and Contributions Git Repository: https://github.com/rsundhar247/ai-bayesiansearch

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 1, Jan Feb 2017

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 1, Jan Feb 2017 RESEARCH ARTICLE Classification of Cancer Dataset in Data Mining Algorithms Using R Tool P.Dhivyapriya [1], Dr.S.Sivakumar [2] Research Scholar [1], Assistant professor [2] Department of Computer Science

More information

MSc Software Testing MSc Prófun hugbúnaðar

MSc Software Testing MSc Prófun hugbúnaðar MSc Software Testing MSc Prófun hugbúnaðar Fyrirlestrar 43 & 44 Evaluating Test Driven Development 15/11/2007 Dr Andy Brooks 1 Case Study Dæmisaga Reference Evaluating Advantages of Test Driven Development:

More information

An Improved Algorithm To Predict Recurrence Of Breast Cancer

An Improved Algorithm To Predict Recurrence Of Breast Cancer An Improved Algorithm To Predict Recurrence Of Breast Cancer Umang Agrawal 1, Ass. Prof. Ishan K Rajani 2 1 M.E Computer Engineer, Silver Oak College of Engineering & Technology, Gujarat, India. 2 Assistant

More information

Automated Medical Diagnosis using K-Nearest Neighbor Classification

Automated Medical Diagnosis using K-Nearest Neighbor Classification (IMPACT FACTOR 5.96) Automated Medical Diagnosis using K-Nearest Neighbor Classification Zaheerabbas Punjani 1, B.E Student, TCET Mumbai, Maharashtra, India Ankush Deora 2, B.E Student, TCET Mumbai, Maharashtra,

More information

Section 6: Analysing Relationships Between Variables

Section 6: Analysing Relationships Between Variables 6. 1 Analysing Relationships Between Variables Section 6: Analysing Relationships Between Variables Choosing a Technique The Crosstabs Procedure The Chi Square Test The Means Procedure The Correlations

More information

Red Light - Green Light

Red Light - Green Light iworx Physiology Lab Experiment Experiment HN-9 Red Light - Green Light Background Setup Lab Note: The lab presented here is intended for evaluation purposes only. iworx users should refer to the User

More information

Using the CFS Infrastructure

Using the CFS Infrastructure CHAPTER 13 The Cisco MDS SAN-OS software uses the Cisco Fabric Services (CFS) infrastructure to enable efficient database distribution and to foster device flexibility. It simplifies SAN provisioning by

More information

OneTouch Reveal Web Application. User Manual for Healthcare Professionals Instructions for Use

OneTouch Reveal Web Application. User Manual for Healthcare Professionals Instructions for Use OneTouch Reveal Web Application User Manual for Healthcare Professionals Instructions for Use Contents 2 Contents Chapter 1: Introduction...4 Product Overview...4 Intended Use...4 System Requirements...

More information

Process Mining to enhance security of Web information systems

Process Mining to enhance security of Web information systems Process Mining to enhance security of Web information systems Simona Bernardi, Raúl Piracés Alastuey, and Raquel Trillo Lado Paris, 29th April 2017 Simona Bernardi, Raúl Piracés Alastuey, and Raquel Trillo

More information

Audit Firm Administrator steps to follow

Audit Firm Administrator steps to follow Contents Audit Firm Administrator steps to follow... 3 What to know before you start... 3 Understanding CaseWare Cloud in a nutshell... 3 How to do the once off set up for the Audit Firm or Organisation...

More information

Predicting Breast Cancer Recurrence Using Machine Learning Techniques

Predicting Breast Cancer Recurrence Using Machine Learning Techniques Predicting Breast Cancer Recurrence Using Machine Learning Techniques Umesh D R Department of Computer Science & Engineering PESCE, Mandya, Karnataka, India Dr. B Ramachandra Department of Electrical and

More information

CHAPTER 6 DESIGN AND ARCHITECTURE OF REAL TIME WEB-CENTRIC TELEHEALTH DIABETES DIAGNOSIS EXPERT SYSTEM

CHAPTER 6 DESIGN AND ARCHITECTURE OF REAL TIME WEB-CENTRIC TELEHEALTH DIABETES DIAGNOSIS EXPERT SYSTEM 87 CHAPTER 6 DESIGN AND ARCHITECTURE OF REAL TIME WEB-CENTRIC TELEHEALTH DIABETES DIAGNOSIS EXPERT SYSTEM 6.1 INTRODUCTION This chapter presents the design and architecture of real time Web centric telehealth

More information

Assessment of Reliability of Hamilton-Tompkins Algorithm to ECG Parameter Detection

Assessment of Reliability of Hamilton-Tompkins Algorithm to ECG Parameter Detection Proceedings of the 2012 International Conference on Industrial Engineering and Operations Management Istanbul, Turkey, July 3 6, 2012 Assessment of Reliability of Hamilton-Tompkins Algorithm to ECG Parameter

More information

Qualys PC/SCAP Auditor

Qualys PC/SCAP Auditor Qualys PC/SCAP Auditor Getting Started Guide November 15, 2017 COPYRIGHT 2011-2017 BY QUALYS, INC. ALL RIGHTS RESERVED. QUALYS AND THE QUALYS LOGO ARE REGISTERED TRADEMARKS OF QUALYS, INC. ALL OTHER TRADEMARKS

More information

STAT 113: PAIRED SAMPLES (MEAN OF DIFFERENCES)

STAT 113: PAIRED SAMPLES (MEAN OF DIFFERENCES) STAT 113: PAIRED SAMPLES (MEAN OF DIFFERENCES) In baseball after a player gets a hit, they need to decide whether to stop at first base, or try to stretch their hit from a single to a double. Does the

More information

Artificial Intelligence

Artificial Intelligence Artificial Intelligence Intelligent Agents Chapter 2 & 27 What is an Agent? An intelligent agent perceives its environment with sensors and acts upon that environment through actuators 2 Examples of Agents

More information

Skin color detection for face localization in humanmachine

Skin color detection for face localization in humanmachine Research Online ECU Publications Pre. 2011 2001 Skin color detection for face localization in humanmachine communications Douglas Chai Son Lam Phung Abdesselam Bouzerdoum 10.1109/ISSPA.2001.949848 This

More information

TRAINING MANUAL. VIDEO Camera, Probe and Lightsource OTOSCOPES.

TRAINING MANUAL. VIDEO Camera, Probe and Lightsource OTOSCOPES. TRAINING MANUAL VIDEO Camera, Probe and Lightsource OTOSCOPES www.medrx-int.com Contents Video Otoscope Drivers & Software USB CAMERA Getting to Know Your Video Otoscope... 3 Computer Requirements... 4

More information

Jitter-aware time-frequency resource allocation and packing algorithm

Jitter-aware time-frequency resource allocation and packing algorithm Jitter-aware time-frequency resource allocation and packing algorithm The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As

More information

A New Approach for Detection and Classification of Diabetic Retinopathy Using PNN and SVM Classifiers

A New Approach for Detection and Classification of Diabetic Retinopathy Using PNN and SVM Classifiers IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 5, Ver. I (Sep.- Oct. 2017), PP 62-68 www.iosrjournals.org A New Approach for Detection and Classification

More information

A Learning Method of Directly Optimizing Classifier Performance at Local Operating Range

A Learning Method of Directly Optimizing Classifier Performance at Local Operating Range A Learning Method of Directly Optimizing Classifier Performance at Local Operating Range Lae-Jeong Park and Jung-Ho Moon Department of Electrical Engineering, Kangnung National University Kangnung, Gangwon-Do,

More information

CSE Introduction to High-Perfomance Deep Learning ImageNet & VGG. Jihyung Kil

CSE Introduction to High-Perfomance Deep Learning ImageNet & VGG. Jihyung Kil CSE 5194.01 - Introduction to High-Perfomance Deep Learning ImageNet & VGG Jihyung Kil ImageNet Classification with Deep Convolutional Neural Networks Alex Krizhevsky, Ilya Sutskever, Geoffrey E. Hinton,

More information

Classification and Statistical Analysis of Auditory FMRI Data Using Linear Discriminative Analysis and Quadratic Discriminative Analysis

Classification and Statistical Analysis of Auditory FMRI Data Using Linear Discriminative Analysis and Quadratic Discriminative Analysis International Journal of Innovative Research in Computer Science & Technology (IJIRCST) ISSN: 2347-5552, Volume-2, Issue-6, November-2014 Classification and Statistical Analysis of Auditory FMRI Data Using

More information

Pyxis MedStation System. Guide for Managing Patient-Specific Medication

Pyxis MedStation System. Guide for Managing Patient-Specific Medication Pyxis MedStation System Guide for Managing Patient-Specific Medication April 2012 CareFusion, Pyxis, Pyxis MedStation, and the CareFusion logo are trademarks or registered trademarks of CareFusion Corporation

More information

BACKPROPOGATION NEURAL NETWORK FOR PREDICTION OF HEART DISEASE

BACKPROPOGATION NEURAL NETWORK FOR PREDICTION OF HEART DISEASE BACKPROPOGATION NEURAL NETWORK FOR PREDICTION OF HEART DISEASE NABEEL AL-MILLI Financial and Business Administration and Computer Science Department Zarqa University College Al-Balqa' Applied University

More information

Detection of suspicious lesion based on Multiresolution Analysis using windowing and adaptive thresholding method.

Detection of suspicious lesion based on Multiresolution Analysis using windowing and adaptive thresholding method. Detection of suspicious lesion based on Multiresolution Analysis using windowing and adaptive thresholding method. Ms. N. S. Pande Assistant Professor, Department of Computer Science and Engineering,MGM

More information

for hearing impaired people

for hearing impaired people TCT Education of Disabilities, 2002 Vol. 1 (1) Computer education and assistive equipment for hearing impaired people Hiroshi MURAKAMI, Hiroki MINAGAWA, Tomoyuki NISHIOKA and Yutaka SHIMIZU Department

More information

The Hospital Anxiety and Depression Scale Guidance and Information

The Hospital Anxiety and Depression Scale Guidance and Information The Hospital Anxiety and Depression Scale Guidance and Information About Testwise Testwise is the powerful online testing platform developed by GL Assessment to host its digital tests. Many of GL Assessment

More information

CaseBuilder - Quick Reference Guide

CaseBuilder - Quick Reference Guide ADP UNEMPLOYMENT COMPENSATION MANAGEMENT CaseBuilder - Quick Reference Guide After signing into CaseBuilder, the first screen the user will see is called the Dashboard. The user can then navigate to any

More information

ONE MONITORING SOLUTION TO MEASURE MORE. Zephyr Performance Systems for academics and researchers

ONE MONITORING SOLUTION TO MEASURE MORE. Zephyr Performance Systems for academics and researchers ONE MONITORING SOLUTION TO MEASURE MORE Zephyr Performance Systems for academics and researchers GettyImages-530750346.jpg Vital signs and accelerometry. Tracking both is integral to your research. But

More information

Mammogram Analysis: Tumor Classification

Mammogram Analysis: Tumor Classification Mammogram Analysis: Tumor Classification Literature Survey Report Geethapriya Raghavan geeragh@mail.utexas.edu EE 381K - Multidimensional Digital Signal Processing Spring 2005 Abstract Breast cancer is

More information

Intelligent Edge Detector Based on Multiple Edge Maps. M. Qasim, W.L. Woon, Z. Aung. Technical Report DNA # May 2012

Intelligent Edge Detector Based on Multiple Edge Maps. M. Qasim, W.L. Woon, Z. Aung. Technical Report DNA # May 2012 Intelligent Edge Detector Based on Multiple Edge Maps M. Qasim, W.L. Woon, Z. Aung Technical Report DNA #2012-10 May 2012 Data & Network Analytics Research Group (DNA) Computing and Information Science

More information

Artificial Intelligence Lecture 7

Artificial Intelligence Lecture 7 Artificial Intelligence Lecture 7 Lecture plan AI in general (ch. 1) Search based AI (ch. 4) search, games, planning, optimization Agents (ch. 8) applied AI techniques in robots, software agents,... Knowledge

More information