[2k blog in Computer Science] Biological human simulator

Reading Time: < 1 minute

I am hugely interested in the very essence of life: us humans. What happens in our brains, when we live on, encounter things, make decisions? I was lucky to receive really interesting tutoring in neuroscience while studying cognitive science in Aalto University, Helsinki. Professors Vasily Klucharev and Risto Ilmoniemi kept both a course of their own, concentrating on both low-level structure and anatomy of the brain, as well as the things that grow out of and are seated in this biological framework of interconnected neurons.

As a computer scientist, my interests grew also towards the idea that perhaps a human mind could be simulated numerically?

This document is thus a memo conserning the building of human-like neural network simulator (called, simply: ‘Human’), from a biological and neurological basis. The simulator consists of individuals who interact with each other and develop during life.

First of all, I’m not a neuroscience professional. I’m just a tech student whose interest happens to extend into neuroscience. My knowledge is one semester’s worth of it, namely, one course of the brain anatomy and mechanisms. Second, in order to program a simulator in less than a millennia, you have to make simplifications. Third, what I do not know, I guess. For the program’s sake.

I haven’t read Marvin Minsky, though it would be probably worth every second spent doing that.

The model


[2k blog in Computer Science] VLAM authentication method

Reading Time: < 1 minute

Human authentication to computer systems is problematic in many ways. There are aspects conserning the user’s ability to memorize arbitrary character-number -combinations as well as extraneous equipment which should be added to the system if other than password-based authentication methods were to be used (biometrics).

The method proposed in this paper is based on the combination of two things: first, the ability of the mind to memorize almost limitless amount of visual objects (once seen), and second, the strengthening effect of associating a phrase (a familiar little story) with the password which is about to form.

Goals to seek in VLAM

  • transferrability of password. You could make your way through the world with that what is inside you, what you really know. Thus the password itself should not be prone to change. Of course it must be given a thought whether it is possible for the attacker to gain knowledge of those precise aspects that you are presenting in authenticating yourself.
  • avoiding the upcoming attack techniques against passwords: timing attacks. These measure the time between your keypresses and thus gain a bit / some bits of information about the password. In VLAM, analogous attack might be possible by deep knowledge of the brain and how much time it takes to scan a matrix and find the picture, depending probably partially on where in the matrix the correct picture is and what are the characteristics of the false pictures (‘bright’, gaining the user’s attention, etc.)