885 resultados para Observer attack


Relevância:

20.00% 20.00%

Publicador:

Resumo:

For many tasks, such as retrieving a previously viewed object, an observer must form a representation of the world at one location and use it at another. A world-based 3D reconstruction of the scene built up from visual information would fulfil this requirement, something computer vision now achieves with great speed and accuracy. However, I argue that it is neither easy nor necessary for the brain to do this. I discuss biologically plausible alternatives, including the possibility of avoiding 3D coordinate frames such as ego-centric and world-based representations. For example, the distance, slant and local shape of surfaces dictate the propensity of visual features to move in the image with respect to one another as the observer’s perspective changes (through movement or binocular viewing). Such propensities can be stored without the need for 3D reference frames. The problem of representing a stable scene in the face of continual head and eye movements is an appropriate starting place for understanding the goal of 3D vision, more so, I argue, than the case of a static binocular observer.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a continuous time target zone model of speculative attacks. Contrary to most of the literature that considers the certainty case, i.e., agents know for sure the Central Bank behavior in the future, we build uncertainty into the madel in two different ways. First, we consider the case in whicb the leveI of reserves at which the central bank lets the regime collapse is uncertain. Alternatively, we ana1ize the case in which, with some probability, the government may cbange its policy reducing the initially positive trend in domestic credito In both cases, contrary to the case of a fixed exchange rate regime, speculators face a cost of launching a tentative attack that may not succeed. Such cost induces a delay and may even prevent its occurrence. At the time of the tentative attack, the exchange rate moves either discretely up, if the attack succeeds, or down, if it fails. The remlts are consistent with the fact that, typically, an attack involves substantial profits and losses for the speculators. In particular, if agents believed that the government will control fiscal imbalances in the future, or alternatively, if they believe the trend in domestic credit to be temporary, the attack is postponed even in the presence of a signal of an imminent collapse. Finally, we aIso show that the timing of a speculative attack increases with the width of the target zone.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An important challenge in the crime literature is to isolate causal effects of police on crime. Following a terrorist attack on the main Jewish center in the city of Buenos Aires, Argentina, in July 1994, all Jewish institutions (including schools, synagogues, and clubs) were given 24-hour police protection. Thus, this hideous event induced a geographical allocation of police forces that can be presumed to be exogenous in a crime regression. Using data on the location of car thefts before and after the terrorist attack, we find a large deterrent effect of observable police presence on crime. The effect is local, with little or no appreciable impact outside the narrow area in which the police are deployed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most social sciences and medical studies assume that being observed does not affect subjects' behavior. However, interviews may cause changes in individuals' behavior or may inhibit changes which would occur if they were not being observed. If being observed changes the behavior of the studied population, the sample ceases to be representative of the population. In this paper, I investigate whether individuals periodically interviewed in a longitudinal epidemiological research conducted in Pelotas, Brazil, are affected along relevant dimensions, in particular, education and health. I find only a significant effect on ENEM score.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Among placental mammals, primates are the only ones to present trichromatic color vision. However, the distribution of trichromacy among primates is not homogeneous: Old World primates shows an uniform trichromacy (with all individuals being trichromats) and New World primates exhibit a color vision polymorphism (with dichromatic males and dichromatic or trichromatic females). Visual ecology studies have investigated which selective pressures may have been responsible for the evolution of trichromacy in primates, diverging from the dichromat standard found in other mammals. Cues associated with foraging and the socio-reproductive status were analyzed, indicating a trichromatic advantage for the rapid detection of visually conspicuous objects against a green background. However, dichromats are characterized by an efficient capture of cryptic and camouflaged stimuli. These advantages regarding phenotype may be responsible for the maintenance of the visual polymorphism in New World primates and for the high incidence of color blindness in humans (standing around 8% in Caucasian men). An important factor that has not yet been experimentally taken into account is the predation risk and its effect on the evolution of trichromacy in primates. To answer this question, we prepared and edited pictures of animals with different coats: oncillas (Leopardus spp.), puma (Puma concolor) and ferret (Galictis cuja). The specimens were taxidermized and the photographs were taken in three different vegetation scenarios (dense forest, cerrado and grassland). The images of the predators were manipulated so that they fit into two categories of stimulus size (small or large). After color calibration and photo editing, these were presented to 40 humans (20 dichromats and 20 trichromats) by a computer program, which presented a set of four photos at a time (one picture containing the taxidermized animal amid the background vegetation and three depicting only the background vegetation) and recorded the response latency and success rate of the subjects. The results show a trichromatic advantage in detecting potential predators. The predator detection was influenced by the background, the predator species, the dimension of the stimulus and the observer s visual phenotype. As humans have a high rate of dyschromatopsias, when compared to wild Catarrhini or human tribal populations, it is possible that the increased rate of dichromats is a result of reduced pressure for rapid predator detection. Since our species came to live in more cohesive groups and resistant to attack by predators, with the advent of agriculture and the formation of villages, it is possible that the lower risk of predation has reduced the selection in favor of trichromats

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper aims with the use of linear matrix inequalities approach (LMIs) for application in active vibration control problems in smart strutures. A robust controller for active damping in a panel was designed with piezoelectrical actuators in optimal locations for illustration of the main proposal. It was considered, in the simulations of the closed-loop, a model identified by eigensystem realization algorithm (ERA) and reduced by modal decomposition. We tested two differents techniques to solve the problem. The first one uses LMI approach by state-feedback based in an observer design, considering several simultaneous constraints as: a decay rate, limited input on the actuators, bounded output peak (output energy) and robustness to parametic uncertainties. The results demonstrated the vibration attenuation in the structure by controlling only the first modes and the increased damping in the bandwidth of interest. However, it is possible to occur spillover effects, because the design has not been done considering the dynamic uncertainties related with high frequencies modes. In this sense, the second technique uses the classical H. output feedback control, also solved by LMI approach, considering robustness to residual dynamic to overcome the problem found in the first test. The results are compared and discussed. The responses shown the robust performance of the system and the good reduction of the vibration level, without increase mass.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new concept of fault detection and isolation using robust observation for systems with random noises is presented. The method selects the parameters from components that may fault during the process and constructs well conditioned robust observers, considering sensors faults. To isolate component failures via robust observation, a bank of detection observers is constructed, where each observer is only sensitive to one specified component failure while robust to all other component failures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work will propose the control of an induction machine in field coordinates with imposed stator current based on theory of variable structure control and sliding mode. We describe the model of an induction machine in field coordinates with imposed stator current and we show the design of variable structure control and sliding mode to get a desirable dynamic performance of that plant. To estimate the inaccessible states we will use a state observer (estimator) based on field coordinates induction machine. We will present the results of simulations in any operation condition (start, speed reversal and load) and with parameters variation of the machine compared to a PI control scheme.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The authors report a massive attack by Pseudomyrmex ants on a human who touched a Triplaria - novice tree (Triplaris spp). The ants naturally live in these trees and their stings cause intense pain and discrete to moderate local inflammation. The problem is common in sonic Brazilian regions and can be prevented by identifying the trees.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new concept of fault detection and isolation using robust observation for systems with random noises is presented. The method selects the parameters from components that may fault during the process and constructs well conditioned robust observers, considering sensors faults. To isolate component failures via robust observation, a bank of detection observers is constructed, where each observer is only sensitive to one specified component failure while robust to all other component failures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

I report some observations of a Chestnut-bellied Euphonia (Euphonia pectoralis) nest in a lowland Atlantic Forest of southeastern Brazil during the early nestling period. During 7.5 hours of observations, the nest was attended 46.3% of the time, 45.6% by the female and 0.7% by the male. Unattended periods lasted 16-38 min. Parents visited the nest most of the time together at 36-59 min intervals. There were 1.06 feeding visits per nestling per hour. The two nestlings in the nest ended up preyed upon by army ants (Labidus praedator, Ecitoninae). The low height of the nest (0.8 m) may have facilitated its detection by the ants.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Internal and external computer network attacks or security threats occur according to standards and follow a set of subsequent steps, allowing to establish profiles or patterns. This well-known behavior is the basis of signature analysis intrusion detection systems. This work presents a new attack signature model to be applied on network-based intrusion detection systems engines. The AISF (ACME! Intrusion Signature Format) model is built upon XML technology and works on intrusion signatures handling and analysis, from storage to manipulation. Using this new model, the process of storing and analyzing information about intrusion signatures for further use by an IDS become a less difficult and standardized process.