Brain-Computer Interface (BCI) techniques have advanced to a level where it is now eliminating the need lor hand-based activation. This paper presents a novel attempt to remotely control an animal's behavior by hum...Brain-Computer Interface (BCI) techniques have advanced to a level where it is now eliminating the need lor hand-based activation. This paper presents a novel attempt to remotely control an animal's behavior by human BCI using a hybrid of Event Related Desynchronization (ERD) and Steady-State Visually Evoked Potential (SSVEP) BCI protocols. The turtle was chosen as the target animal, and we developed a head-mounted display, wireless communication, and a specially designed stimulation device for the turtle. These devices could evoke the turtle's instinctive escape behavior to guide its moving path, and turtles were remotely controlled in both indoor and outdoor environments. The system architecture and design were presented. To demon- strate the feasibility of the system, experimental tests were performed under various conditions. Our system could act as a framework for future human-animal interaction systems.展开更多
In this paper,we propose a conjecture that endogenous security without any prior knowledge is similar to perfect secrecy without any prior knowledge.To prove the conjecture,we first establish a cryptography model of i...In this paper,we propose a conjecture that endogenous security without any prior knowledge is similar to perfect secrecy without any prior knowledge.To prove the conjecture,we first establish a cryptography model of instinct function security to transform the security problem in the network domain into an encryption problem in the cryptographic domain.Then,we inherit and apply the established ideas and means of Perfect Secrecy,and propose the concept,definition and corollaries of the perfect instinct function security(PIFS)corresponding to Perfect Secrecy.Furthermore,we take the DHR system as a concrete implementation of PIFS and propose the DHR Perfect Security Theorem corresponding to Shannon’s Perfect Secrecy Theorem.Finally,we prove that the DHR satisfying the“OneTime Reconstruction”constraint is the sufficient and necessary condition to achieve perfect security.This means that the existence of PIFS is also proven.The analysis shows that any reconfigurable system can be encrypted by its construct and that the PIFS converts the oneway transparent superiority of the attacker into a double-blind problem for both the attacker and the defender,which leads to that the attacker is impossible to obtain useful construction information from the attacks and unable to find a better way than blind trial-and-error or brute-force attacks.Since the attackers are required to have the new powerful ability to crack the structure cryptogram,the threshold of cyber security is raised to at least the same level as cryptogram deciphering,thereafter the ubiquitous cyber threats are destined to be significantly reduced.展开更多
文摘Brain-Computer Interface (BCI) techniques have advanced to a level where it is now eliminating the need lor hand-based activation. This paper presents a novel attempt to remotely control an animal's behavior by human BCI using a hybrid of Event Related Desynchronization (ERD) and Steady-State Visually Evoked Potential (SSVEP) BCI protocols. The turtle was chosen as the target animal, and we developed a head-mounted display, wireless communication, and a specially designed stimulation device for the turtle. These devices could evoke the turtle's instinctive escape behavior to guide its moving path, and turtles were remotely controlled in both indoor and outdoor environments. The system architecture and design were presented. To demon- strate the feasibility of the system, experimental tests were performed under various conditions. Our system could act as a framework for future human-animal interaction systems.
基金supported by the National Natural Science Foundation of China(No.U22A2001)the National Key Research and Development Program under Grants 2022YFB2902205
文摘In this paper,we propose a conjecture that endogenous security without any prior knowledge is similar to perfect secrecy without any prior knowledge.To prove the conjecture,we first establish a cryptography model of instinct function security to transform the security problem in the network domain into an encryption problem in the cryptographic domain.Then,we inherit and apply the established ideas and means of Perfect Secrecy,and propose the concept,definition and corollaries of the perfect instinct function security(PIFS)corresponding to Perfect Secrecy.Furthermore,we take the DHR system as a concrete implementation of PIFS and propose the DHR Perfect Security Theorem corresponding to Shannon’s Perfect Secrecy Theorem.Finally,we prove that the DHR satisfying the“OneTime Reconstruction”constraint is the sufficient and necessary condition to achieve perfect security.This means that the existence of PIFS is also proven.The analysis shows that any reconfigurable system can be encrypted by its construct and that the PIFS converts the oneway transparent superiority of the attacker into a double-blind problem for both the attacker and the defender,which leads to that the attacker is impossible to obtain useful construction information from the attacks and unable to find a better way than blind trial-and-error or brute-force attacks.Since the attackers are required to have the new powerful ability to crack the structure cryptogram,the threshold of cyber security is raised to at least the same level as cryptogram deciphering,thereafter the ubiquitous cyber threats are destined to be significantly reduced.