125 resultados para Fake


Relevância:

10.00% 10.00%

Publicador:

Resumo:

本文提出一种基于阴影图预滤波的伪柔和阴影实时绘制算法。 阴影是真实世界中的一种十分普遍的物理现象,它不但可以反映物体自身的形状,而且可以反映空间中物体与物体之间的相对位置关系,对于增加场景的真实感具有非常重要的意义。因而阴影的实时绘制一直都是计算机图形学中一个重要的研究方向。 方差阴影图算法是对传统阴影图算法的一个重要改进。传统的阴影图算法虽然有着易于实现、硬件支持好、与场景复杂度无关等优点,但是由于它是对场景的离散表示,所以会出现各种各样的走样问题。方差阴影图算法是使用概率的方法计算片元被遮挡的上限概率,它可以通过对深度图滤波的方法来有效地减少阴影图算法中的走样问题。方差阴影图算法克服了传统阴影图算法中边界走样问题,可以生成比较柔和的边界。但是,这种概率方法在深度比较复杂的场景中会出现光渗现象,即在原本应该是阴影的区域却有了亮度。本文使用最小-最大阴影图来辅助消除方差阴影图中的光渗现象。算法在对深度纹理进行滤波的同时生成一个最小-最大阴影图;在从视点实时绘制场景时,利用最小-最大阴影图来辅助判断当前片元是否完全处在阴影区域内部。通过将最小-最大阴影图和方差阴影图相结合,本文的算法可以快速生成伪柔和阴影。

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In modem signal Processing,non-linear,non-Gaussian and non-stable signals are usually the analyzed and Processed objects,especially non-stable signals. The convention always to analyze and Process non-stable signals are: short time Fourier transform,Wigner-Ville distribution,wavelet Transform and so on. But the above three algorithms are all based on Fourier Transform,so they all have the shortcoming of Fourier Analysis and cannot get rid of the localization of it. Hilbert-Huang Transform is a new non-stable signal processing technology,proposed by N. E. Huang in 1998. It is composed of Empirical Mode Decomposition (referred to as EMD) and Hilbert Spectral Analysis (referred to as HSA). After EMD Processing,any non-stable signal will be decomposed to a series of data sequences with different scales. Each sequence is called an Intrinsic Mode Function (referred to as IMF). And then the energy distribution plots of the original non-stable signal can be found by summing all the Hilbert spectrums of each IMF. In essence,this algorithm makes the non-stable signals become stable and decomposes the fluctuations and tendencies of different scales by degrees and at last describes the frequency components with instantaneous frequency and energy instead of the total frequency and energy in Fourier Spectral Analysis. In this case,the shortcoming of using many fake harmonic waves to describe non-linear and non-stable signals in Fourier Transform can be avoided. This Paper researches in the following parts: Firstly,This paper introduce the history and development of HHT,subsequently the characters and main issues of HHT. This paper briefly introduced the basic realization principles and algorithms of Hilbert-Huang transformation and confirms its validity by simulations. Secondly, This paper discuss on some shortcoming of HHT. By using FFT interpolation, we solve the problem of IMF instability and instantaneous frequency undulate which are caused by the insufficiency of sampling rate. As to the bound effect caused by the limitation of envelop algorithm of HHT, we use the wave characteristic matching method, and have good result. Thirdly, This paper do some deeply research on the application of HHT in electromagnetism signals processing. Based on the analysis of actual data examples, we discussed its application in electromagnetism signals processing and noise suppression. Using empirical mode decomposition method and multi-scale filter characteristics can effectively analyze the noise distribution of electromagnetism signal and suppress interference processing and information interpretability. It has been founded that selecting electromagnetism signal sessions using Hilbert time-frequency energy spectrum is helpful to improve signal quality and enhance the quality of data.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Projeto de Pós-Graduação/Dissertação apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do grau de Mestre em Ciências Farmacêuticas

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cannibalism and intraguild predation (IGP) are common amongst freshwater amphipod crustacean aswsemblages, particularly between individuals of different body size, with IGP of smaller by larger species. The decline of Gammarus tigrinus Populations in mainland Europe has been accompanied by the arrival of the Ponto-Caspian invader Dikerogammarus villosus and previous studies have implicated IGP of G. tigrinus by the larger D. villosus as the principal driving force in this replacement. We examined how factors such as microhabitat and body size may mediate both cannibalism within G. tigrinus populations and IGP by D. villosus and thus contribute to field patterns of coexistence and exclusion. A field Survey of an invaded Dutch fake indicated that G. tigrinus and D. villosus differed in distribution. with D. villosus being the numerically dominant amphipod (80-96 %) on the rocky boulder Substrate of the shoreline and G. tigrinus being the dominant amphipod (100 %) in the crushed shell/sand matrix immediately adjacent to this. Laboratory microcosm experiments indicated that G. tigrinus cannibalism, particularly of smaller by larger size classes, may be common. In addition, although D. villosus predation of all G. tigrinus size classes was extreme, the smallest size classes Suffered the highest predation. Indeed, when exposed to D. villosus, predation of larger G. tigrinus was lowest when smaller G. tigrinus were also present. Increasing microhabitat complexity from a simple bare substrate littered with Dreissena polymorpha zebra mussels to a Crushed shell/sand matrix significantly reduced both cannibalism and IGP. Our Study emphasizes the need to consider both life history stages and habitat template, when considering the impacts of biotic interactions and it also emphasizes that complex, interacting factors may be mediating the range expansion of D. villosus.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Some geological fakes and frauds are carried out solely for financial gain (mining fraud), whereas others maybe have increasing aesthetic appeal (faked fossils) or academic advancement (fabricated data) as their motive. All types of geological fake or fraud can be ingenious and sophisticated, as demonstrated in this article. Fake gems, faked fossils and mining fraud are common examples where monetary profit is to blame: nonetheless these may impact both scientific theory and the reputation of geologists and Earth scientists. The substitution or fabrication of both physical and intellectual data also occurs for no direct financial gain, such as career advancement or establishment of belief (e.g. evolution vs. creationism). Knowledge of such fakes and frauds may assist in spotting undetected geological crimes: application of geoforensic techniques helps the scientific community to detect such activity, which ultimately undermines scientific integrity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Photometric and spectroscopic observations of the faint Supernovae (SNe) 2002kg and 2003gm, and their precursors, in NGC 2403 and NGC 5334, respectively, are presented. The properties of these SNe are discussed in the context of previously proposed scenarios for faint SNe: low-mass progenitors producing underenergetic SNe; SNe with ejecta constrained by a circumstellar medium; and outbursts of massive Luminous Blue Variables (LBVs). The last scenario has been referred to as 'Type V SNe', 'SN impostors' or 'fake SNe'.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This essay examines the relationship between two 'fake' editions of Shakespeare that appeared in the mid-nineteenth century: the so-called 'Perkins Folio', whose annotations were forged by the scholar J.P. Collier, and the 'Grimaldi Shakspeare', a satiric attack upon the spurious authenticity and authority of the Perkins Folio.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This integrative review presents a novel hypothesis as a basis for integrating two evolutionary viewpoints on the origins of human cognition and communication, the sexual selection of human mental capacities, and the social brain hypothesis. This new account suggests that mind-reading social skills increased reproductive success and consequently became targets for sexual selection. The hypothesis proposes that human communication has three purposes: displaying mind-reading abilities, aligning and maintaining representational parity between individuals to enable displays, and the exchange of propositional information. Intelligence, creativity, language, and humor are mental fitness indicators that signal an individual’s quality to potential mates, rivals, and allies. Five features central to the proposed display mechanism unify these indicators, the relational combination of concepts, large conceptual knowledge networks, processing speed, contextualization, and receiver knowledge. Sufficient between-mind alignment of conceptual networks allows displays based upon within-mind conceptual mappings. Creative displays communicate previously unnoticed relational connections and novel conceptual combinations demonstrating an ability to read a receiver’s mind. Displays are costly signals of mate quality with costs incurred in the developmental production of the neural apparatus required to engage in complex displays and opportunity costs incurred through time spent acquiring cultural knowledge. Displays that are fast, novel, spontaneous, contextual, topical, and relevant are hard-to-fake for lower quality individuals. Successful displays result in elevated social status and increased mating options. The review addresses literatures on costly signaling, sexual selection, mental fitness indicators, and the social brain hypothesis; drawing implications for nonverbal and verbal communication.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Stellar activity, such as starspots, can induce radial velocity (RV) variations that can mask or even mimic the RV signature of orbiting exoplanets. For this reason RV exoplanet surveys have been unsuccessful when searching for planets around young, active stars and are therefore failing to explore an important regime which can help to reveal how planets form and migrate. This paper describes a new technique to remove spot signatures from the stellar line-profiles of moderately rotating, active stars (v sin i ranging from 10 to 50 km s(-1)). By doing so it allows planetary RV signals to be uncovered. We used simulated models of a G5V type star with differing dark spots on its surface along with archive data of the known active star HD 49933 to validate our method. The results showed that starspots could be effectively cleaned from the line-profiles so that the stellar RV jitter was reduced by more than 80 per cent. Applying this procedure to the same models and HD 49933 data, but with fake planets injected, enabled the effective removal of starspots so that Jupiter mass planets on short orbital periods were successfully recovered. These results show that this approach can be useful in the search for hot-Jupiter planets that orbit around young, active stars with a v sin i of similar to 10-50 km/s.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Despite the importance of laughter in social interactions it remains little studied in affective computing. Respiratory, auditory, and facial laughter signals have been investigated but laughter-related body movements have received almost no attention. The aim of this study is twofold: first an investigation into observers' perception of laughter states (hilarious, social, awkward, fake, and non-laughter) based on body movements alone, through their categorization of avatars animated with natural and acted motion capture data. Significant differences in torso and limb movements were found between animations perceived as containing laughter and those perceived as nonlaughter. Hilarious laughter also differed from social laughter in the amount of bending of the spine, the amount of shoulder rotation and the amount of hand movement. The body movement features indicative of laughter differed between sitting and standing avatar postures. Based on the positive findings in this perceptual study, the second aim is to investigate the possibility of automatically predicting the distributions of observer's ratings for the laughter states. The findings show that the automated laughter recognition rates approach human rating levels, with the Random Forest method yielding the best performance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Despite its importance in social interactions, laughter remains little studied in affective computing. Intelligent virtual agents are often blind to users’ laughter and unable to produce convincing laughter themselves. Respiratory, auditory, and facial laughter signals have been investigated but laughter-related body movements have received less attention. The aim of this study is threefold. First, to probe human laughter perception by analyzing patterns of categorisations of natural laughter animated on a minimal avatar. Results reveal that a low dimensional space can describe perception of laughter “types”. Second, to investigate observers’ perception of laughter (hilarious, social, awkward, fake, and non-laughter) based on animated avatars generated from natural and acted motion-capture data. Significant differences in torso and limb movements are found between animations perceived as laughter and those perceived as non-laughter. Hilarious laughter also differs from social laughter. Different body movement features were indicative of laughter in sitting and standing avatar postures. Third, to investigate automatic recognition of laughter to the same level of certainty as observers’ perceptions. Results show recognition rates of the Random Forest model approach human rating levels. Classification comparisons and feature importance analyses indicate an improvement in recognition of social laughter when localized features and nonlinear models are used.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Temperament tests are widely accepted as instruments for profiling behavioral variability in dogs, and they are applied in numerous areas of investigation (e.g. suitability for adoption or for breeding). During testing, to elicit a dog's reaction toward novel stimuli and predict its behavior in everyday life, model devices such as a child-like doll, or a fake dog, are often employed. However, the reliability of these devices to accurately stimulate dogs' reactions to children or dogs, is unknown and perhaps overestimated. This may be a particular concern in the case of aggressive behavior toward humans, a significant public health issue. The aim of this study was to: (1) evaluate the correlation between dogs' reactions to these devices, and owners' reports of their dog's aggression history (using the C-BARQ ??); (2) compare reactions toward the devices of dogs with and without histories of aggression. Subjects were selected among those visiting for behavioral consultation at the Veterinary Hospital of the University of Pennsylvania, and previously categorized as aggressive toward unfamiliar children, conspecifics, or as non-aggressive dogs (control). The test consisted of different components: an unfamiliar female tester approaching the dog; the presentation of a child-like doll, an ambiguous object, and a fake plastic dog. All tests were videotaped and durations of behaviors were later analyzed on the basis of a specified ethogram. Dogs' reactions were compared to C-BARQ scores, and interesting correlations emerged for 'dog-directed aggression/fear' (R = 0.48, P = 0.004), and 'stranger-directed aggression' (R = 0.58, P <0.001) factors. Dogs differed in their reactions toward the devices: the child-like doll and the fake dog elicited more social behaviors than the ambiguous object used as a control stimulus. Issues concerning the reliability of these tools to assess canine temperament are discussed. ?? 2012 Elsevier B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper I outline possibilities for, and issues arising from, opposition towards the dominant ideologies and practices of marketing knowledge (Hirschman 1993) through an engagement with feminist epistemology (Longino 1991, Harding 1987). Feminist epistemology is a political branch of naturalised epistemology (Quine 1969) primarily concerned with critique of constructions of gender, gender norms and gendered interests within the production of knowledge (Anderson 1995) and with theorising, grounding and legitimating feminist knowledge making practices (Harding 1987). It is most often associated with the feminist critique of science, and with feminist science and technology studies (Haraway 1987, Wajman 1997). Feminist epistemology asks the question, ‘what is the nature of the feminist critical project as a way of knowing?’ (McLennan 1995:392). This paper outlines the basis of the feminist critique of knowledge generally, and as applied to marketing knowledge, offers description of the three main epistemological approaches to this question and suggestions for their application in practice. The paper progresses important work by consumer behaviour theorists (Bristor and Fischer 1993, Hirschman 1993) on the potentials of feminist ways of knowing for marketing and consumer behaviour by moving beyond the tripartite of feminist approaches outlined, and extending the discussion to take into account the development of situated knowledges theory (Haraway 1989, 1997), which has become so important in the decade since these papers were written. It joins ongoing conversations in consumer behaviour and marketing that share similar feminist concerns (Catterall et al 1997, 2000, 2005, Bettany and Woodruffe Burton 1999, 2005, and Hogg et al 1999, 2000) but in this contribution it takes a slightly tangential approach, seeing marketing knowledge in terms of its epistemic culture by using a model of masculinity in academic cultures from feminist theory (Wagner 1994) to help conceptualise it as such. The dominant masculine ideology of marketing knowledge both in execution (Penaloza 1994, Bristor and Fischer 1994, Fischer and Bristor 1993, Woodruffe 1996), and values (Hirschman 1993, Brown 2000, Desmond 1997) has been well documented over the past fifteen years. However, although the basis of this, how is it manifested and how a feminist informed marketing knowledge could be achieved, have been addressed somewhat in the literature (Bristor and Fischer 1993, Hogg, Bettany and Long 2000) an updated rendering is necessary which focuses specifically on epistemology and situates this discussion within a cultural framework. To do this I use the notions of cultural masculinity in academic disciplines developed by Wagner (1994) of ‘organisational egocentrism’, ‘fake collectivity’ and ‘de realisation’. With these, I raise important and specific issues around the notion of the masculinity of marketing knowledge, and then present an outline of feminist epistemologies to illustrate how different feminist approaches to knowledge would address these concerns.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examined the psychological impact of the online dating romance scam. Unlike other mass-marketing fraud victims, these victims experienced a ‘double hit’ of the scam: a financial loss and the loss of a relationship. For most, the loss of the relationship was more upsetting than their financial losses (many described the loss of the relationship as a ‘death’). Some described their experience as traumatic and all were affected negatively by the crime. Most victims had not found ways to cope given the lack of understanding from family and friends. Denial (e.g., not accepting the scam was real or not being able to separate the fake identity with the criminal) was identified as an ineffective means of coping, leaving the victim vulnerable to a second wave of the scam. Suggestions are made as to how to change policy with regards to law enforcement deal with this crime.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Urban Computing (UrC) provides users with the situation-proper information by considering context of users, devices, and social and physical environment in urban life. With social network services, UrC makes it possible for people with common interests to organize a virtual-society through exchange of context information among them. In these cases, people and personal devices are vulnerable to fake and misleading context information which is transferred from unauthorized and unauthenticated servers by attackers. So called smart devices which run automatically on some context events are more vulnerable if they are not prepared for attacks. In this paper, we illustrate some UrC service scenarios, and show important context information, possible threats, protection method, and secure context management for people.