Investigation of Different Classification Algorithms for Predicting Occupant Injury Criterion to Decide the Required Restraint Strategy

Author(s):  
Gerald Joy Sequeira ◽  
Robert Lugner ◽  
Thomas Brandrneier ◽  
Elnagdy Elnagdy ◽  
Gokulesh Danapal ◽  
...  
2000 ◽  
Vol 14 (3) ◽  
pp. 151-158 ◽  
Author(s):  
José Luis Cantero ◽  
Mercedes Atienza

Abstract High-resolution frequency methods were used to describe the spectral and topographic microstructure of human spontaneous alpha activity in the drowsiness (DR) period at sleep onset and during REM sleep. Electroencephalographic (EEG), electrooculographic (EOG), and electromyographic (EMG) measurements were obtained during sleep in 10 healthy volunteer subjects. Spectral microstructure of alpha activity during DR showed a significant maximum power with respect to REM-alpha bursts for the components in the 9.7-10.9 Hz range, whereas REM-alpha bursts reached their maximum statistical differentiation from the sleep onset alpha activity at the components between 7.8 and 8.6 Hz. Furthermore, the maximum energy over occipital regions appeared in a different spectral component in each brain activation state, namely, 10.1 Hz in drowsiness and 8.6 Hz in REM sleep. These results provide quantitative information for differentiating the drowsiness alpha activity and REM-alpha by studying their microstructural properties. On the other hand, these data suggest that the spectral microstructure of alpha activity during sleep onset and REM sleep could be a useful index to implement in automatic classification algorithms in order to improve the differentiation between the two brain states.


Author(s):  
Y.A. Hamad ◽  
K.V. Simonov ◽  
A.S. Kents

The paper considers general approaches to image processing, analysis of visual data and computer vision. The main methods for detecting features and edges associated with these approaches are presented. A brief description of modern edge detection and classification algorithms suitable for isolating and characterizing the type of pathology in the lungs in medical images is also given.


2011 ◽  
Vol 31 (4) ◽  
pp. 1133-1137 ◽  
Author(s):  
Chang-hui ZHOU ◽  
Yong-jian HU ◽  
Li-ling TAN

Entropy ◽  
2019 ◽  
Vol 21 (5) ◽  
pp. 513 ◽  
Author(s):  
Héctor D. Menéndez ◽  
José Luis Llorente

The quality of anti-virus software relies on simple patterns extracted from binary files. Although these patterns have proven to work on detecting the specifics of software, they are extremely sensitive to concealment strategies, such as polymorphism or metamorphism. These limitations also make anti-virus software predictable, creating a security breach. Any black hat with enough information about the anti-virus behaviour can make its own copy of the software, without any access to the original implementation or database. In this work, we show how this is indeed possible by combining entropy patterns with classification algorithms. Our results, applied to 57 different anti-virus engines, show that we can mimic their behaviour with an accuracy close to 98% in the best case and 75% in the worst, applied on Windows’ disk resident malware.


Sign in / Sign up

Export Citation Format

Share Document