105 resultados para Fake
Resumo:
In the era of Web 2.0, huge volumes of consumer reviews are posted to the Internet every day. Manual approaches to detecting and analyzing fake reviews (i.e., spam) are not practical due to the problem of information overload. However, the design and development of automated methods of detecting fake reviews is a challenging research problem. The main reason is that fake reviews are specifically composed to mislead readers, so they may appear the same as legitimate reviews (i.e., ham). As a result, discriminatory features that would enable individual reviews to be classified as spam or ham may not be available. Guided by the design science research methodology, the main contribution of this study is the design and instantiation of novel computational models for detecting fake reviews. In particular, a novel text mining model is developed and integrated into a semantic language model for the detection of untruthful reviews. The models are then evaluated based on a real-world dataset collected from amazon.com. The results of our experiments confirm that the proposed models outperform other well-known baseline models in detecting fake reviews. To the best of our knowledge, the work discussed in this article represents the first successful attempt to apply text mining methods and semantic language models to the detection of fake consumer reviews. A managerial implication of our research is that firms can apply our design artifacts to monitor online consumer reviews to develop effective marketing or product design strategies based on genuine consumer feedback posted to the Internet.
Resumo:
A Delay Tolerant Network (DTN) is one where nodes can be highly mobile, with long message delay times forming dynamic and fragmented networks. Traditional centralised network security is difficult to implement in such a network, therefore distributed security solutions are more desirable in DTN implementations. Establishing effective trust in distributed systems with no centralised Public Key Infrastructure (PKI) such as the Pretty Good Privacy (PGP) scheme usually requires human intervention. Our aim is to build and compare different de- centralised trust systems for implementation in autonomous DTN systems. In this paper, we utilise a key distribution model based on the Web of Trust principle, and employ a simple leverage of common friends trust system to establish initial trust in autonomous DTN’s. We compare this system with two other methods of autonomously establishing initial trust by introducing a malicious node and measuring the distribution of malicious and fake keys. Our results show that the new trust system not only mitigates the distribution of fake malicious keys by 40% at the end of the simulation, but it also improved key distribution between nodes. This paper contributes a comparison of three de-centralised trust systems that can be employed in autonomous DTN systems.
Resumo:
Aboriginal and Torres Strait Islander people who live in cities and towns are often thought of as ‘less Indigenous’ than those who live ‘in the bush’, as though they were ‘fake’ Aboriginal people — while ‘real’ Aboriginal people live ‘on communities’ and ‘real’ Torres Strait Islander people live ‘on islands’. Yet more than 70 percent of Australia’s Indigenous peoples live in urban locations (ABS 2007), and urban living is just as much part of a reality for Aboriginal and Torres Strait Islander people as living in remote discrete communities. This paper examines the contradictions and struggles that Aboriginal and Torres Strait Islander people experience when living in urban environments. It looks at the symbols of place and space on display in the Australian cities of Melbourne and Brisbane to demonstrate how prevailing social, political and economic values are displayed. Symbols of place and space are never neutral, and this paper argues that they can either marginalise and oppress urban Aboriginal and Torres Strait Islander people, or demonstrate that they are included and engaged.
Resumo:
Description of war years in France and Spain, including experiences in internment camps, life in hiding, etc.; emigration to USA.
Resumo:
This paper asks a new question: how we can use RFID technology in marketing products in supermarkets and how we can measure its performance or ROI (Return-on-Investment). We try to answer the question by proposing a simulation model whereby customers become aware of other customers' real-time shopping behavior and may hence be influenced by their purchases and the levels of purchases. The proposed model is orthogonal to sales model and can have the similar effects: increase in the overall shopping volume. Managers often struggle with the prediction of ROI on purchasing such a technology, this simulation sets to provide them the answers of questions like the percentage of increase in sales given real-time purchase information to other customers. The simulation is also flexible to incorporate any given model of customers' behavior tailored to particular supermarket, settings, events or promotions. The results, although preliminary, are promising to use RFID technology for marketing products in supermarkets and provide several dimensions to look for influencing customers via feedback, real-time marketing, target advertisement and on-demand promotions. Several other parameters have been discussed including the herd behavior, fake customers, privacy, and optimality of sales-price margin and the ROI of investing in RFID technology for marketing purposes. © 2010 Springer Science+Business Media B.V.
Resumo:
Rhodamine 6G (R6G) was incubated in silver sols with different low concentrations and its surface-enhanced resonance Raman scattering (SERRS) spectra, excited by linearly and circularly polarized light, respectively, were studied. At the single-molecule level the SERRS spectra were recorded in 10(-13) M dye colloidal solution. Spectral inhomogeneous behaviors from single-molecule were observed such as spectral polarization, spectral diffusion and intensity fluctuations of vibrational lines. Difference between SERRS spectra of R6G excited by linearly and circularly polarized light and the effect of the polarizing angle of Raman signal relative to the slit of spectrograph on the Raman spectral polarization were analyzed and measured experimentally. Circularly polarized laser and the correction of the polarizing angle of Raman signal are necessary to avoid fake results in the measuring of Raman spectral of single-molecule, which was not noticed in initial papers. (c) 2005 Elsevier B.V. All rights reserved.
Resumo:
As transformações sociais advindas da popularização de Tecnologias da Informação e Comunicação (TICs) como a Internet são flagrantes. E a regulamentação destas novas práticas deve ser condizente com as peculiaridades das relações jurídicas desenvolvidas neste âmbito. Este trabalho visa analisar o problema da responsabilidade civil por danos à pessoa humana sofridos no âmbito dos sites de redes sociais pela criação e uso de perfis falsos. Assim, primeiramente, faz-se uma análise introdutória do fenômeno da Internet e das visões sobre as possíveis formas de regulamentação jurídica das condutas praticadas por meio da Rede. Posteriormente, adstringe-se à temática dos danos morais, buscando-se conceituá-los sob a ótica civil constitucional, como danos à pessoa humana. Finalmente, chega-se ao estudo dos perfis falsos, enfrentando-se a problemática dos danos morais sofridos por seu manejo. São desdobradas em três subproblemas: se são ou não capazes civilmente os usuários, chegando-se ao estudo dos perfis de menores de idade; se existem ou não as pessoas representadas nos perfis, subdividindo-se a análise nas hipóteses de perfis criados em roubo de identidade e perfis que representem criações intelectuais e; se estão ou não vivas as pessoas descritas nos perfis, trazendo-se à baila a hipótese dos perfis de pessoas falecidas.
Resumo:
Este trabajo ha sido realizado dentro del Grupo de Investigación GIU 10–19 “LITTERARVM. Grupo de Investigación en Literatura, Retórica y Tradición Clásica” de la UPV/EHU.
Resumo:
Alimentos funcionais podem ser entendidos como aqueles que, em virtude de seus componentes fisiologicamente ativos, fornecem benefícios à saúde além da nutrição básica. Esta emergente categoria de alimentos surgiu no Japão, em meados da década de 1980. A partir de então, outros países desenvolveram o seu sistema regulatório acerca de Alimentos Funcionais. No Brasil, é possível alegar que determinados alimentos possuem propriedades funcionais e/ou de saúde. Em função disso, surge uma série de incongruências e interações importantes entre legislação de alimentos e de medicamentos. Uma análise nas publicações de registros deferidas pela ANVISA possibilita constatar que um mesmo produto poderá ser registrado nestas duas categorias. As reivindicações da saúde não devem ser evitadas, pois, podem ser um importante veículo de informação para os consumidores. Todavia, é preciso que regras claras sejam estabelecidas para que o consumidor tenha acesso ao real instrumento para o cuidado com a saúde. Agências regulatórias de qualquer país devem estar direcionadas para garantir aos consumidores segurança e qualidade dos alimentos. Serão necessárias regras mais claras para a indústria, para que ao fim do processo o consumidor não seja enganado por falsas promessas de cura. O aprofundamento do debate acerca da legislação de Alimentos funcionais traz a tona a suspeita da legitimação do processo de medicalização dos alimentos por parte das agências reguladoras, tanto no âmbito nacional quanto internacional. Este trabalho não objetivou discutir a funcionalidade dos alimentos. O foco da nossa atenção está em demonstrar os riscos sanitários relativos à ausência de definições claras acerca da regulamentação desta emergente categoria de alimentos e ainda discutir suas implicações para a Saúde Pública.
Resumo:
Using the nonlinear analog of the Fake Riccati equation developed for linear systems, we derive an inverse optimality result for several receding-horizon control schemes. This inverse optimality result unifies stability proofs and shows that receding-horizon control possesses the stability margins of optimal control laws. © 1997 Elsevier Science B.V.
Resumo:
在计算机图形学领域,阴影的绘制一直是一个热点的研究内容,它对增强场景的真实感有着非常重要的意义。完全物理正确的柔和阴影绘制通常需要耗费大量的时间,于是研究者们提出了各种阴影的近似方法。 本文首先对阴影绘制算法的研究发展历程作了概要性的介绍,特别针对近几年国内外提出的伪柔和阴影算法做了详细的介绍和分析。这些算法主要是根据点光源得到的阴影图[1]和轮廓边进行近似软影绘制的算法,不仅绘制效率高,而且画面真实感比较强。 随着GPU的不断发展,其强大的并行计算能力以及新的可编程着色器,特别是几何着色器[2]的出现,使得基于阴影图的阴影绘制算法中可以加入和场景几何相关的一些计算。本文提出了一个深度剥离[3]和GPU相结合的实时近似软影绘制算法,该算法利用了GPU强大的可编程能力,利用场景物体轮廓信息生成半影图,以此得到伪柔和阴影。实验结果表明本算法是可行的。
Resumo:
传统的密钥交换协议通常假定合法通信双方都是可信的,然而很多现实应用都要求通信双方在互不信任的环境中执行认证密钥交换协议,为此本文提出了公平认证密钥交换(FAKE)的思想:除了具有一般认证密钥交换协议的基本特点外,通过客户在协议会话中预先植入"会话证据",使得在不揭示会话证据的前提下,合法通信双方均可以否认会话的发生;一旦客户方揭示会话证据,则协议会话记录就会与通信双方的身份绑定.该思想为解决网络服务中保护个人隐私与处理网络服务纠纷的矛盾提供了一种切实可行的技术解决思路.文中系统规划了公平认证密钥交换协议的形式化安全模型,纠正了Kudla关于并发签名公平性安全模型存在的错误之处,利用并发签名具体构造了一个公平认证密钥交换协议,并在随机预言模型(ROM)中证明了该协议满足mBJM-AK安全性、条件可否认性以及公平性.
Resumo:
The necessity of installing a forward tracking detector stack is discussed for the Hadron Physics LanzhoU Spectrometer(HPLUS). A local tracker is developed to solve the multi-track finding problem. The track candidates are searched iteratively via Hough Transform. The fake tracks are removed by a least square fitting process. With this tracker we have studied the feasibility of pp -> pp + phi(-> K+K-), a typical physical channel proposed on HPLUS. The single track momentum resolution due to the uncertainty of the positioning in FTD is 1.3%. The multiple scattering effect contributes about 20% to the momentum resolution in the FTD coverage. The width and the signal-to-background ratio of the reconstructed phi are 1.51 MeV and 4.36, respectively, taking into account the direct Kaon channel pp -> pp + K+K- as background. The geometry coverage of FTD for phi events is about 85.4%. Based on the current fast simulation and estimation, the geometrical configuration of FTD meets the physical requirement of HPLUS under the current luminosity and multiplicity conditions. The tracker is applicable in the full simulation coming next and is extendable to other tracking component of HPLUS.
Resumo:
本文提出一种基于阴影图预滤波的伪柔和阴影实时绘制算法。 阴影是真实世界中的一种十分普遍的物理现象,它不但可以反映物体自身的形状,而且可以反映空间中物体与物体之间的相对位置关系,对于增加场景的真实感具有非常重要的意义。因而阴影的实时绘制一直都是计算机图形学中一个重要的研究方向。 方差阴影图算法是对传统阴影图算法的一个重要改进。传统的阴影图算法虽然有着易于实现、硬件支持好、与场景复杂度无关等优点,但是由于它是对场景的离散表示,所以会出现各种各样的走样问题。方差阴影图算法是使用概率的方法计算片元被遮挡的上限概率,它可以通过对深度图滤波的方法来有效地减少阴影图算法中的走样问题。方差阴影图算法克服了传统阴影图算法中边界走样问题,可以生成比较柔和的边界。但是,这种概率方法在深度比较复杂的场景中会出现光渗现象,即在原本应该是阴影的区域却有了亮度。本文使用最小-最大阴影图来辅助消除方差阴影图中的光渗现象。算法在对深度纹理进行滤波的同时生成一个最小-最大阴影图;在从视点实时绘制场景时,利用最小-最大阴影图来辅助判断当前片元是否完全处在阴影区域内部。通过将最小-最大阴影图和方差阴影图相结合,本文的算法可以快速生成伪柔和阴影。
Resumo:
In modem signal Processing,non-linear,non-Gaussian and non-stable signals are usually the analyzed and Processed objects,especially non-stable signals. The convention always to analyze and Process non-stable signals are: short time Fourier transform,Wigner-Ville distribution,wavelet Transform and so on. But the above three algorithms are all based on Fourier Transform,so they all have the shortcoming of Fourier Analysis and cannot get rid of the localization of it. Hilbert-Huang Transform is a new non-stable signal processing technology,proposed by N. E. Huang in 1998. It is composed of Empirical Mode Decomposition (referred to as EMD) and Hilbert Spectral Analysis (referred to as HSA). After EMD Processing,any non-stable signal will be decomposed to a series of data sequences with different scales. Each sequence is called an Intrinsic Mode Function (referred to as IMF). And then the energy distribution plots of the original non-stable signal can be found by summing all the Hilbert spectrums of each IMF. In essence,this algorithm makes the non-stable signals become stable and decomposes the fluctuations and tendencies of different scales by degrees and at last describes the frequency components with instantaneous frequency and energy instead of the total frequency and energy in Fourier Spectral Analysis. In this case,the shortcoming of using many fake harmonic waves to describe non-linear and non-stable signals in Fourier Transform can be avoided. This Paper researches in the following parts: Firstly,This paper introduce the history and development of HHT,subsequently the characters and main issues of HHT. This paper briefly introduced the basic realization principles and algorithms of Hilbert-Huang transformation and confirms its validity by simulations. Secondly, This paper discuss on some shortcoming of HHT. By using FFT interpolation, we solve the problem of IMF instability and instantaneous frequency undulate which are caused by the insufficiency of sampling rate. As to the bound effect caused by the limitation of envelop algorithm of HHT, we use the wave characteristic matching method, and have good result. Thirdly, This paper do some deeply research on the application of HHT in electromagnetism signals processing. Based on the analysis of actual data examples, we discussed its application in electromagnetism signals processing and noise suppression. Using empirical mode decomposition method and multi-scale filter characteristics can effectively analyze the noise distribution of electromagnetism signal and suppress interference processing and information interpretability. It has been founded that selecting electromagnetism signal sessions using Hilbert time-frequency energy spectrum is helpful to improve signal quality and enhance the quality of data.