Editorial: Linguistic biomarkers of neurological, cognitive, and psychiatric disorders: verification, analytical validation, clinical validation, and machine learning
- Award ID(s):
- 2037266
- PAR ID:
- 10639679
- Editor(s):
- Zhou, Xiaolin
- Publisher / Repository:
- Frontiers Media S.A.
- Date Published:
- Journal Name:
- Frontiers in Psychology
- Volume:
- 15
- ISSN:
- 1664-1078
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
The multimodal Zig-zag Soft Pneumatic Actuator (SPA) provides an effective design approach for achieving de- sired extensions and bending geometries under specific pressure conditions. The rigid body approximated model introduced in this study brings valuable insights into SPA dynamics by enabling faster simulations when compared to methods such as Finite Element Analysis (FEA). The model outlined in this paper forecasts static behavior by estimating the linear expansion of linear SPA and the bending angle of bending SPA. These two modes of motion can be combined to expand the degree of freedom. Depending on the configuration of the Strain Limiting Layer (SLL), the bending angle can be adjusted by controlling the actuator stiffness, a parameter that can be precisely characterized using the proposed actuator model. To address the hysteresis phenomena in linear expansion SPA, the Bouc-Wen hysteresis model is employed to model the actuator hysteresis responses at higher actuation rates. The validity of the proposed model is experimentally confirmed through the use of 3D-printed SPA prototypes that are designed for both extension and bending actuation.more » « less
-
Access control is often reported to be “profoundly broken” in real- world practices due to prevalent policy misconfigurations intro- duced by system administrators (sysadmins). Given the dynamics of resource and data sharing, access control policies need to be continuously updated. Unfortunately, to err is human—sysadmins often make mistakes such as over-granting privileges when chang- ing access control policies. With today’s limited tooling support for continuous validation, such mistakes can stay unnoticed for a long time until eventually being exploited by attackers, causing catastrophic security incidents. We present P-DIFF, a practical tool for monitoring access control behavior to help sysadmins early detect unintended access control policy changes and perform postmortem forensic analysis upon security attacks. P-DIFF continuously monitors access logs and infers access control policies from them. To handle the challenge of policy evolution, we devise a novel time-changing decision tree to effectively represent access control policy changes, coupled with a new learning algorithm to infer the tree from access logs. P-DIFF provides sysadmins with the inferred policies and detected changes to assist the following two tasks: (1) validating whether the access control changes are intended or not; (2) pinpointing the historical changes responsible for a given security attack. We evaluate P-DIFF with a variety of datasets collected from five real-world systems, including two from industrial companies. P- DIFF can detect 86%–100% of access control policy changes with an average precision of 89%. For forensic analysis, P-DIFF can pinpoint the root-cause change that permits the target access in 85%–98% of the evaluated cases.more » « less
An official website of the United States government

