+ All Categories
Home > Documents > Dr Les Ball Intelligent Systems

Dr Les Ball Intelligent Systems

Date post: 13-Jan-2016
Category:
Upload: rodd
View: 18 times
Download: 0 times
Share this document with a friend
Description:
Related to lip press. Dr Les Ball Intelligent Systems Division Of Computing, School of Computing, Engineering and Applied Mathematics, University of Abertay Dundee. Social Network Analysis. Intelligence & CyberSecurity. Keyboard Dynamics & Stress Signatures. - PowerPoint PPT Presentation
1
Poster template by ResearchPosters.co.za Dr Les Ball Intelligent Systems Division Of Computing, School of Computing, Engineering and Applied Mathematics, University of Abertay Dundee. Intelligence & CyberSecurity Who Are You? About the Author What Do You Think? Keyboard Dynamics & Stress Signatures eHealth Indicators References Contact Me Biometrics Dr Les Ball is a lecturer within the School of Computing, Engineering and Applied Mathematics. He teaches principally how computer algorithms can be used to enhance decision- making processes in the fields of Intelligence and Security Informatics and eHealth. Dr Les Ball. School of Computing, Engineering and Applied Mathematics, University of Abertay Dundee, Bell Street, Dundee, DD1 1HG. T : 01382 308251 E : [email protected] For further information about the author use your smart phone to capture the QR code or go to http://www.aberta y.ac.uk Social Network Analysis Ball L, Bradley D, Brownsell S: 2011 Emotive Computing may have a Role in Telecare, Journal of Telemedicine and Telecare, 17(6): 279-280. Ball L, Bradley D, Szymkowiak A, Brownsell S: 2011 Linking Recorded Data with Emotive and Adaptive Computing in eHealth, IEEE HISB 2011, 26-29 July San Jose, 198-204. Dowman M, Szymkowiak A, Coull N, Hapca S, Ball L: 2011 A Biometric System for Identifying Individuals and their emotional states from keystroke metrics, in prep for submission to PNAS. Martin C, Ball L, Archibald J: 2011 Emotion recognition in Self-Service Interactions, Third International Conference on Intelligent Human Computer Interaction, 29-31 August, Prague. The post-event Social Network Analysis model of the 9/11 attacks showing hijacker pilots (squared), densest section (left dashed box) incorporates 3 of the pilots and all of Mohamed Atta’s associates (circles), the chained structure of UA#175 associates (triangles), Hani Hanjour and associates (rhombi) are distinctly separated from the other hijacker pilots (right dashed box). Source: http://orgnet.com/tnet.html Did you know that your keyboard typing rhythm (dwell and flight times) is your digital equivalent to your handwritten signature? Well, we can also analyse and determine whether you are under stress when you are typing from the changes in your rhythm. 0 10 20 30 40 50 60 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 FacialA ction U nit O ccurrences Related to lip press Sensors Sentiment Analysis/Opinion Mining Who Do You Know? How Do You Feel? Ball L, Bradley D, Szymkowiak A, Brownsell Social network analysis has been around for a long time within the social sciences. It is now, however, being applied to digital data from open sources. Its significance is that it can bring to light the emergence of a new criminal or terrorist cell in terms of its communications structure. If the key actors and substructures can be identified then intelligence can strategically target their elimination and disrupt or weaken the network. The following diagram was constructed by Valdis Krebs from open source information after the 9/11 attacks. Textual data are being deposited exponentially at social networking sites such as Twitter and Facebook. This presents an opportunity to analyse these data to answer questions such as “what do people think about our new product?” or “what is current opinion on the issue of Scottish independence?”. Opinion mining and sentiment analysis are two synonymous techniques that use computational linguistics to solve these problems and offer rapid results that would otherwise be extremely time consuming to organise. The diagram below shows a typical architecture for a computer system to perform automatic extraction from social media to analyse political opinion. Gesture Recognition Fingerprints have a long history in terms of identification. However, with improvements in technology biometric software is now capable of acquiring and analysing high-resolution data for identification and verification purposes. Moreover, multimodal biometrics systems research is now coming to the fore whereby more accurate predictions are made by combining, say, face recognition with fingerprint data as below. These systems are very important in high security domains such as at airports and other border controls. www.hitachi.com http:// www.inmagine.com/ phins104/ phins104098-photo Your facial expressions can tell us a lot about the type of emotion you are feeling by the detection of Facial Action Units. Experimental data below show that most people purse their lips when experience trouble using self-service checkouts i.e. a feeling of frustration. Martin C, Ball L, Archibald J. By sensing an outpatient’s data from everyday use such as movement within the house, keyboard usage or eye movements, we might detect a deviation or divergence from your normal pattern, which may in itself be an indicator of a change in health condition e.g. the onset of Alzheimer’s. We know that computers are great at number crunching and that they are also getting better at detecting who you are. Have you however ever wondered though if your computer might be able to understand how you feel? Affecting Computing is a discipline addressing this very question. We show what is called human ‘affect’ when we are under stress or in an emotional state. So, wouldn’t it be good if a computer could detect your mood by analysing your actions or expressions? The following three diagrams illustrate how keyboard dynamics, facial expression recognition and behaviour change could be used within the contexts of security, retail shopping and eHealth. My research interests are centred on Intelligent Systems and their ability to enhance decision-making processes by quantitative analyses of intelligence data. Intelligence data relate predominantly to issues of national security but also concern commercial applications and health informatics. In security, applications are focused on preventative measures of what we term the ‘pre-attack’ phase (see diagram below). This involves the acquisition of biometric data and intelligence gathering from open sources. Understanding the ‘mood’ of someone also plays a part in assessing threats to security, while also finding application in customer satisfaction during purchasing transactions and in matters of health diagnosis where a patient may exhibit changes in their everyday behaviour. My work specifically addresses the questions ‘who are you?’, ‘who do you know?’, ‘what do you think?’ and ‘how do you feel?’. sion of the School’s Security Research Group identifies three phases on a temporal basis Dowman M, Szymkowiak A, Coull N, Hapca S, Ball L.
Transcript
Page 1: Dr Les Ball Intelligent Systems

Poster template by ResearchPosters.co.za

Dr Les BallIntelligent Systems

Division Of Computing, School of Computing, Engineering and Applied Mathematics, University of Abertay Dundee.

Intelligence & CyberSecurity

Who Are You?

About the Author

What Do You Think?

Keyboard Dynamics & Stress Signatures

eHealth Indicators

References

Contact Me

Biometrics

Dr Les Ball is a lecturer within the School of Computing, Engineering and Applied Mathematics. He teaches principally how computer algorithms can be used to enhance decision-making processes in the fields of Intelligence and Security Informatics and eHealth.

Dr Les Ball.School of Computing, Engineering and Applied Mathematics,University of Abertay Dundee,Bell Street,Dundee, DD1 1HG.T : 01382 308251E : [email protected]

For further information about the author use your smart phone to capture the QR code or go to http://www.abertay.ac.uk

Social Network Analysis

Ball L, Bradley D, Brownsell S: 2011 Emotive Computing may have a Role in Telecare, Journal of Telemedicine and Telecare, 17(6): 279-280.

Ball L, Bradley D, Szymkowiak A, Brownsell S: 2011 Linking Recorded Data with Emotive and Adaptive Computing in eHealth, IEEE HISB 2011, 26-29 July San Jose, 198-204.

Dowman M, Szymkowiak A, Coull N, Hapca S, Ball L: 2011 A Biometric System for Identifying Individuals and their emotional states from keystroke metrics, in prep for submission to PNAS.

Martin C, Ball L, Archibald J: 2011 Emotion recognition in Self-Service Interactions, Third International Conference on Intelligent Human Computer Interaction, 29-31 August, Prague.

The post-event Social Network Analysis model of the 9/11 attacks showing hijacker pilots (squared), densest section (left dashed box) incorporates 3 of the pilots and all of Mohamed Atta’s associates (circles), the chained structure of UA#175 associates (triangles), Hani Hanjour and associates (rhombi) are distinctly separated from the other hijacker pilots (right dashed box). Source: http://orgnet.com/tnet.html

Did you know that your keyboard typing rhythm (dwell and flight times) is your digital equivalent to your handwritten signature? Well, we can also analyse and determine whether you are under stress when you are typing from the changes in your rhythm.

0

10

20

30

40

50

60

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30

Facial Action Unit

Occ

urr

ence

s

Related to lip press

Sensors

Sentiment Analysis/Opinion Mining

Who Do You Know?

How Do You Feel?

Ball L, Bradley D, Szymkowiak A, Brownsell S.

Social network analysis has been around for a long time within the social sciences. It is now, however, being applied to digital data from open sources. Its significance is that it can bring to light the emergence of a new criminal or terrorist cell in terms of its communications structure. If the key actors and substructures can be identified then intelligence can strategically target their elimination and disrupt or weaken the network. The following diagram was constructed by Valdis Krebs from open source information after the 9/11 attacks.

Textual data are being deposited exponentially at social networking sites such as Twitter and Facebook. This presents an opportunity to analyse these data to answer questions such as “what do people think about our new product?” or “what is current opinion on the issue of Scottish independence?”. Opinion mining and sentiment analysis are two synonymous techniques that use computational linguistics to solve these problems and offer rapid results that would otherwise be extremely time consuming to organise. The diagram below shows a typical architecture for a computer system to perform automatic extraction from social media to analyse political opinion.

Gesture Recognition

Fingerprints have a long history in terms of identification. However, with improvements in technology biometric software is now capable of acquiring and analysing high-resolution data for identification and verification purposes. Moreover, multimodal biometrics systems research is now coming to the fore whereby more accurate predictions are made by combining, say, face recognition with fingerprint data as below. These systems are very important in high security domains such as at airports and other border controls.

www.hitachi.com

http://www.inmagine.com/phins104/phins104098-photo

Your facial expressions can tell us a lot about the type of emotion you are feeling by the detection of Facial Action Units. Experimental data below show that most people purse their lips when experience trouble using self-service checkouts i.e. a feeling of frustration.

Martin C, Ball L, Archibald J.

By sensing an outpatient’s data from everyday use such as movement within the house, keyboard usage or eye movements, we might detect a deviation or divergence from your normal pattern, which may in itself be an indicator of a change in health condition e.g. the onset of Alzheimer’s.

We know that computers are great at number crunching and that they are also getting better at detecting who you are. Have you however ever wondered though if your computer might be able to understand how you feel? Affecting Computing is a discipline addressing this very question. We show what is called human ‘affect’ when we are under stress or in an emotional state. So, wouldn’t it be good if a computer could detect your mood by analysing your actions or expressions? The following three diagrams illustrate how keyboard dynamics, facial expression recognition and behaviour change could be used within the contexts of security, retail shopping and eHealth.

My research interests are centred on Intelligent Systems and their ability to enhance decision-making processes by quantitative analyses of intelligence data. Intelligence data relate predominantly to issues of national security but also concern commercial applications and health informatics. In security, applications are focused on preventative measures of what we term the ‘pre-attack’ phase (see diagram below). This involves the acquisition of biometric data and intelligence gathering from open sources. Understanding the ‘mood’ of someone also plays a part in assessing threats to security, while also finding application in customer satisfaction during purchasing transactions and in matters of health diagnosis where a patient may exhibit changes in their everyday behaviour. My work specifically addresses the questions ‘who are you?’, ‘who do you know?’, ‘what do you think?’ and ‘how do you feel?’.

The vision of the School’s Security Research Group identifies three phases on a temporal basis

Dowman M, Szymkowiak A, Coull N, Hapca S, Ball L.

Recommended