-
Algorithmic Clustering based on String Compression to Extract P300 Structure in EEG Signals
Authors:
Guillermo Sarasa,
Ana Granados,
Francisco B Rodríguez
Abstract:
P300 is an Event-Related Potential widely used in Brain-Computer Interfaces, but its detection is challenging due to inter-subject and temporal variability. This work introduces a clustering methodology based on Normalized Compression Distance (NCD) to extract the P300 structure, ensuring robustness against variability. We propose a novel signal-to-ASCII transformation to generate compression-frie…
▽ More
P300 is an Event-Related Potential widely used in Brain-Computer Interfaces, but its detection is challenging due to inter-subject and temporal variability. This work introduces a clustering methodology based on Normalized Compression Distance (NCD) to extract the P300 structure, ensuring robustness against variability. We propose a novel signal-to-ASCII transformation to generate compression-friendly objects, which are then clustered using a hierarchical tree-based method and a multidimensional projection approach. Experimental results on two datasets demonstrate the method's ability to reveal relevant P300 structures, showing clustering performance comparable to state-of-the-art approaches. Furthermore, analysis at the electrode level suggests that the method could assist in electrode selection for P300 detection. This compression-driven clustering methodology offers a complementary tool for EEG analysis and P300 identification.
△ Less
Submitted 31 January, 2025;
originally announced February 2025.
-
Simulating carbon mineralization at pore scale in capillary networks of digital rock
Authors:
David A. Lazo Vasquez,
Jaione Tirapu Azpiroz,
Rodrigo Neumann Barros Ferreira,
Ronaldo Giro,
Manuela Fernandes Blanco Rodriguez,
Matheus Esteves Ferreira,
Mathias B. Steiner
Abstract:
Predicting the geometrical evolution of the pore space in geological formations due to fluid-solid interactions has applications in reservoir engineering, oil recovery, and geological storage of carbon dioxide. However, modeling frameworks that combine fluid flow with physical and chemical processes at a rock's pore scale are scarce. Here, we report a method for modeling a rock's pore space as a n…
▽ More
Predicting the geometrical evolution of the pore space in geological formations due to fluid-solid interactions has applications in reservoir engineering, oil recovery, and geological storage of carbon dioxide. However, modeling frameworks that combine fluid flow with physical and chemical processes at a rock's pore scale are scarce. Here, we report a method for modeling a rock's pore space as a network of connected capillaries and to simulate the capillary diameter modifications caused by reactive flow processes. Specifically, we model mineral erosion, deposition, dissolution, and precipitation processes by solving the transport equations iteratively, computing diameter changes within each capillary of the network simultaneously. Our automated modeling framework enables simulations on digital rock samples as large as (1.125mm)$^3$ with 125$\times 10^6$ voxels within seconds of CPU time per iteration. As an application of the computational method, we have simulated brine injection and calcium carbonate precipitation in sandstone. For quantitatively comparing simulation results obtained with models predicting either a constant or a flow-rate dependent precipitation, we track the time-dependent capillary diameter distribution as well as the permeability of the connected pore space. For validation and reuse, we have made the automated simulation workflow, the reactive flow model library, and the digital rock samples available in public repositories.
△ Less
Submitted 4 July, 2024;
originally announced July 2024.
-
Optimizing carbon dioxide trapping for geological storage
Authors:
Jaione Tirapu Azpiroz,
Ronaldo Giro,
Rodrigo Neumann Barros Ferreira,
Marcio Nogueira Pereira da Silva,
Manuela Fernandes Blanco Rodriguez,
Adolfo E. Correa Lopez,
David A. Lazo Vasquez,
Matheus Esteves Ferreira,
Mariana Del Grande,
Ademir Ferreira Da Silva,
Mathias B. Steiner
Abstract:
Carbon dioxide (CO2) trapping in capillary networks of reservoir rocks is a pathway to long-term geological storage. At pore scale, the CO2 trapping potential depends on injection pressure, temperature, and the rock's interaction with the surrounding fluids. Modeling this interaction requires adequate representations of both capillary volume and surface. For the lack of scalable representations, h…
▽ More
Carbon dioxide (CO2) trapping in capillary networks of reservoir rocks is a pathway to long-term geological storage. At pore scale, the CO2 trapping potential depends on injection pressure, temperature, and the rock's interaction with the surrounding fluids. Modeling this interaction requires adequate representations of both capillary volume and surface. For the lack of scalable representations, however, the prediction of a rock's CO2 storage potential has been challenging. Here, we report how to represent a rock's pore space by statistically sampled capillary networks (ssCN) that preserve morphological rock characteristics. We have used the ssCN method to simulate CO2 drainage within a representative sandstone sample at reservoir pressures and temperatures, exploring intermediate- and CO2-wet conditions. This wetting regime is often neglected, despite evidence of plausibility. By raising pressure and temperature we observe increasing CO2 penetration within the capillary network. For contact angles approaching 90 degrees, the CO2 saturation exhibits a pronounced maximum reaching 80 percent of the accessible pore volume. This is about twice as high as the saturation values reported previously. For enabling validation of our results and a broader application of our methodology, we have made available the rock tomography data, the digital rock computational workflows, and the ssCN models used in this study.
△ Less
Submitted 20 December, 2023;
originally announced December 2023.
-
Detecting Oxbow Code in Erlang Codebases with the Highest Degree of Certainty
Authors:
Fernando Benavides Rodríguez,
Laura M. Castro
Abstract:
The presence of source code that is no longer needed is a handicap to project maintainability. The larger and longer-lived the project, the higher the chances of accumulating dead code in its different forms.
Manually detecting unused code is time-consuming, tedious, error-prone, and requires a great level of deep knowledge about the codebase. In this paper, we examine the kinds of dead code (sp…
▽ More
The presence of source code that is no longer needed is a handicap to project maintainability. The larger and longer-lived the project, the higher the chances of accumulating dead code in its different forms.
Manually detecting unused code is time-consuming, tedious, error-prone, and requires a great level of deep knowledge about the codebase. In this paper, we examine the kinds of dead code (specifically, oxbow code) that can appear in Erlang projects, and formulate rules to identify them with high accuracy.
We also present an open-source static analyzer that implements these rules, allowing for the automatic detection and confident removal of oxbow code in Erlang codebases, actively contributing to increasing their quality and maintainability.
△ Less
Submitted 19 July, 2021;
originally announced July 2021.
-
Fair anonymity for the Tor network
Authors:
Jesus Diaz,
David Arroyo,
Francisco B. Rodriguez
Abstract:
Current anonymizing networks have become an important tool for guaranteeing users' privacy. However, these platforms can be used to perform illegitimate actions, which sometimes makes service providers see traffic coming from these networks as a probable threat. In order to solve this problem, we propose to add support for fairness mechanisms to the Tor network. Specifically, by introducing a slig…
▽ More
Current anonymizing networks have become an important tool for guaranteeing users' privacy. However, these platforms can be used to perform illegitimate actions, which sometimes makes service providers see traffic coming from these networks as a probable threat. In order to solve this problem, we propose to add support for fairness mechanisms to the Tor network. Specifically, by introducing a slight modification to the key negotiation process with the entry and exit nodes, in the shape of group signatures. By means of these signatures, we set up an access control method to prevent misbehaving users to make use of the Tor network. Additionally, we establish a predefined method for denouncing illegitimate actions, which impedes the application of the proposed fairness mechanisms as a threat eroding users' privacy. As a direct consequence, traffic coming from Tor would be considered less suspicious by service providers.
△ Less
Submitted 15 December, 2014;
originally announced December 2014.
-
Cryptanalysis of a one round chaos-based Substitution Permutation Network
Authors:
David Arroyo,
Jesus Diaz,
F. B. Rodriguez
Abstract:
The interleaving of chaos and cryptography has been the aim of a large set of works since the beginning of the nineties. Many encryption proposals have been introduced to improve conventional cryptography. However, many proposals possess serious problems according to the basic requirements for the secure exchange of information. In this paper we highlight some of the main problems of chaotic crypt…
▽ More
The interleaving of chaos and cryptography has been the aim of a large set of works since the beginning of the nineties. Many encryption proposals have been introduced to improve conventional cryptography. However, many proposals possess serious problems according to the basic requirements for the secure exchange of information. In this paper we highlight some of the main problems of chaotic cryptography by means of the analysis of a very recent chaotic cryptosystem based on a one round Substitution Permutation Network. More specifically, we show that it is not possible to avoid the security problems of that encryption architecture just by including a chaotic system as core of the derived encryption system.
△ Less
Submitted 2 April, 2012; v1 submitted 30 March, 2012;
originally announced March 2012.
-
A formal methodology for integral security design and verification of network protocols
Authors:
Jesus Diaz,
David Arroyo,
Francisco B. Rodriguez
Abstract:
We propose a methodology for verifying security properties of network protocols at design level. It can be separated in two main parts: context and requirements analysis and informal verification; and formal representation and procedural verification. It is an iterative process where the early steps are simpler than the last ones. Therefore, the effort required for detecting flaws is proportional…
▽ More
We propose a methodology for verifying security properties of network protocols at design level. It can be separated in two main parts: context and requirements analysis and informal verification; and formal representation and procedural verification. It is an iterative process where the early steps are simpler than the last ones. Therefore, the effort required for detecting flaws is proportional to the complexity of the associated attack. Thus, we avoid wasting valuable resources for simple flaws that can be detected early in the verification process. In order to illustrate the advantages provided by our methodology, we also analyze three real protocols.
△ Less
Submitted 6 September, 2012; v1 submitted 26 January, 2012;
originally announced January 2012.
-
A PCA-Based Super-Resolution Algorithm for Short Image Sequences
Authors:
Carlos Miravet,
Francisco B. Rodríguez
Abstract:
In this paper, we present a novel, learning-based, two-step super-resolution (SR) algorithm well suited to solve the specially demanding problem of obtaining SR estimates from short image sequences. The first step, devoted to increase the sampling rate of the incoming images, is performed by fitting linear combinations of functions generated from principal components (PC) to reproduce locally the…
▽ More
In this paper, we present a novel, learning-based, two-step super-resolution (SR) algorithm well suited to solve the specially demanding problem of obtaining SR estimates from short image sequences. The first step, devoted to increase the sampling rate of the incoming images, is performed by fitting linear combinations of functions generated from principal components (PC) to reproduce locally the sparse projected image data, and using these models to estimate image values at nodes of the high-resolution grid. PCs were obtained from local image patches sampled at sub-pixel level, which were generated in turn from a database of high-resolution images by application of a physically realistic observation model. Continuity between local image models is enforced by minimizing an adequate functional in the space of model coefficients. The second step, dealing with restoration, is performed by a linear filter with coefficients learned to restore residual interpolation artifacts in addition to low-resolution blurring, providing an effective coupling between both steps of the method. Results on a demanding five-image scanned sequence of graphics and text are presented, showing the excellent performance of the proposed method compared to several state-of-the-art two-step and Bayesian Maximum a Posteriori SR algorithms.
△ Less
Submitted 18 January, 2012;
originally announced January 2012.
-
Formal security analysis of registration protocols for interactive systems: a methodology and a case of study
Authors:
Jesus Diaz,
David Arroyo,
Francisco B. Rodriguez
Abstract:
In this work we present and formally analyze CHAT-SRP (CHAos based Tickets-Secure Registration Protocol), a protocol to provide interactive and collaborative platforms with a cryptographically robust solution to classical security issues. Namely, we focus on the secrecy and authenticity properties while keeping a high usability. In this sense, users are forced to blindly trust the system administr…
▽ More
In this work we present and formally analyze CHAT-SRP (CHAos based Tickets-Secure Registration Protocol), a protocol to provide interactive and collaborative platforms with a cryptographically robust solution to classical security issues. Namely, we focus on the secrecy and authenticity properties while keeping a high usability. In this sense, users are forced to blindly trust the system administrators and developers. Moreover, as far as we know, the use of formal methodologies for the verification of security properties of communication protocols isn't yet a common practice. We propose here a methodology to fill this gap, i.e., to analyse both the security of the proposed protocol and the pertinence of the underlying premises. In this concern, we propose the definition and formal evaluation of a protocol for the distribution of digital identities. Once distributed, these identities can be used to verify integrity and source of information. We base our security analysis on tools for automatic verification of security protocols widely accepted by the scientific community, and on the principles they are based upon. In addition, it is assumed perfect cryptographic primitives in order to focus the analysis on the exchange of protocol messages. The main property of our protocol is the incorporation of tickets, created using digests of chaos based nonces (numbers used only once) and users' personal data. Combined with a multichannel authentication scheme with some previous knowledge, these tickets provide security during the whole protocol by univocally linking each registering user with a single request. [..]
△ Less
Submitted 6 September, 2012; v1 submitted 5 January, 2012;
originally announced January 2012.
-
Accurate and robust image superresolution by neural processing of local image representations
Authors:
Carlos Miravet,
Francisco B. Rodriguez
Abstract:
Image superresolution involves the processing of an image sequence to generate a still image with higher resolution. Classical approaches, such as bayesian MAP methods, require iterative minimization procedures, with high computational costs. Recently, the authors proposed a method to tackle this problem, based on the use of a hybrid MLP-PNN architecture. In this paper, we present a novel superr…
▽ More
Image superresolution involves the processing of an image sequence to generate a still image with higher resolution. Classical approaches, such as bayesian MAP methods, require iterative minimization procedures, with high computational costs. Recently, the authors proposed a method to tackle this problem, based on the use of a hybrid MLP-PNN architecture. In this paper, we present a novel superresolution method, based on an evolution of this concept, to incorporate the use of local image models. A neural processing stage receives as input the value of model coefficients on local windows. The data dimensionality is firstly reduced by application of PCA. An MLP, trained on synthetic sequences with various amounts of noise, estimates the high-resolution image data. The effect of varying the dimension of the network input space is examined, showing a complex, structured behavior. Quantitative results are presented showing the accuracy and robustness of the proposed method.
△ Less
Submitted 3 October, 2005;
originally announced October 2005.
-
Structured Information in Metric Neural Networks
Authors:
David Dominguez,
Kostadin Koroutchev,
Eduardo Serrano,
Francisco B. Rodríguez
Abstract:
The retrieval abilities of spatially uniform attractor networks can be measured by the average overlap between patterns and neural states. We found that metric networks, with local connections, however, can carry information structured in blocks without any global overlap. and blocks attractors. We propose a way to measure the block information, related to the fluctuation of the overlap. The pha…
▽ More
The retrieval abilities of spatially uniform attractor networks can be measured by the average overlap between patterns and neural states. We found that metric networks, with local connections, however, can carry information structured in blocks without any global overlap. and blocks attractors. We propose a way to measure the block information, related to the fluctuation of the overlap. The phase-diagram with the transition from local to global information, shows that the stability of blocks grows with dilution, but decreases with the storage rate and disappears for random topologies.
△ Less
Submitted 29 July, 2005;
originally announced July 2005.
-
Dynamical Neural Network: Information and Topology
Authors:
David Dominguez,
Kostadin Koroutchev,
Eduardo Serrano,
Francisco B. Rodriguez
Abstract:
A neural network works as an associative memory device if it has large storage capacity and the quality of the retrieval is good enough. The learning and attractor abilities of the network both can be measured by the mutual information (MI), between patterns and retrieval states. This paper deals with a search for an optimal topology, of a Hebb network, in the sense of the maximal MI. We use sma…
▽ More
A neural network works as an associative memory device if it has large storage capacity and the quality of the retrieval is good enough. The learning and attractor abilities of the network both can be measured by the mutual information (MI), between patterns and retrieval states. This paper deals with a search for an optimal topology, of a Hebb network, in the sense of the maximal MI. We use small-world topology. The connectivity $γ$ ranges from an extremely diluted to the fully connected network; the randomness $ω$ ranges from purely local to completely random neighbors. It is found that, while stability implies an optimal $MI(γ,ω)$ at $γ_{opt}(ω)\to 0$, for the dynamics, the optimal topology holds at certain $γ_{opt}>0$ whenever $0\leqω<0.3$.
△ Less
Submitted 20 June, 2005;
originally announced June 2005.
-
Information and Topology in Attractor Neural Network
Authors:
D. Dominguez,
K. Koroutchev,
E. Serrano,
F. B. Rodriguez
Abstract:
A wide range of networks, including small-world topology, can be modelled by the connectivity $γ$, and randomness $ω$ of the links. Both learning and attractor abilities of a neural network can be measured by the mutual information (MI), as a function of the load rate and overlap between patterns and retrieval states. We use MI to search for the optimal topology, for storage and attractor proper…
▽ More
A wide range of networks, including small-world topology, can be modelled by the connectivity $γ$, and randomness $ω$ of the links. Both learning and attractor abilities of a neural network can be measured by the mutual information (MI), as a function of the load rate and overlap between patterns and retrieval states. We use MI to search for the optimal topology, for storage and attractor properties of the network. We find that, while the largest storage implies an optimal $MI(γ,ω)$ at $γ_{opt}(ω)\to 0$, the largest basin of attraction leads to an optimal topology at moderate levels of $γ_{opt}$, whenever $0\leqω<0.3$. This $γ_{opt}$ is related to the clustering and path-length of the network. We also build a diagram for the dynamical phases with random and local initial overlap, and show that very diluted networks lose their attractor ability.
△ Less
Submitted 21 June, 2005;
originally announced June 2005.
-
A hybrid MLP-PNN architecture for fast image superresolution
Authors:
Carlos Miravet,
Francisco B. Rodriguez
Abstract:
Image superresolution methods process an input image sequence of a scene to obtain a still image with increased resolution. Classical approaches to this problem involve complex iterative minimization procedures, typically with high computational costs. In this paper is proposed a novel algorithm for super-resolution that enables a substantial decrease in computer load. First, a probabilistic neu…
▽ More
Image superresolution methods process an input image sequence of a scene to obtain a still image with increased resolution. Classical approaches to this problem involve complex iterative minimization procedures, typically with high computational costs. In this paper is proposed a novel algorithm for super-resolution that enables a substantial decrease in computer load. First, a probabilistic neural network architecture is used to perform a scattered-point interpolation of the image sequence data. The network kernel function is optimally determined for this problem by a multi-layer perceptron trained on synthetic data. Network parameters dependence on sequence noise level is quantitatively analyzed. This super-sampled image is spatially filtered to correct finite pixel size effects, to yield the final high-resolution estimate. Results on a real outdoor sequence are presented, showing the quality of the proposed method.
△ Less
Submitted 22 March, 2005;
originally announced March 2005.