939 resultados para format string attack
Resumo:
When investigating strategies for Helicoverpa armigera (Hubner) control, it is important to understand oviposition behaviour. Cotton (Gossypium hirsutum) was sown into standing wheat (Triticum astivum L.) stubble in a closed arena to investigate the effect of stubble on H. armigera moth behaviour and oviposition. Infrared cameras were used to track moths and determine whether stubble acted as a physical barrier or provided camouflage to cotton plants, thereby reducing oviposition. Searching activity was observed to peak shortly before dawn (03:00 and 04:00 h) and remained high until just after dawn (4 h window). Moths spent more time resting on cotton plants than spiralling above them, and the least time flying across the arena. While female moths spent more time searching for cotton plants growing in wheat stubble, the difference in oviposition was not significant. As similar numbers of eggs were laid on cotton plants with stubble (3.5/plant SE +/- 0.87) and without stubble (2.5/plant SE +/- 0.91), wheat stubble does not appear to provide camouflage to cotton plants. There was no significant difference in the location of eggs deposited on cotton plants with and without stubble, although more eggs were laid on the tops of cotton leaves in wheat stubble. As the spatial and temporal distribution of eggs laid on the cotton plant is a crucial component of population stability, eggs laid on the upper side of leaves on cotton plants may be more prone to fatalities caused by environmental factors such as wind and rain. Therefore, although stubble did not influence the number of eggs laid, it did affect their distribution on the plant, which may result in increased mortality of eggs on cotton plants sown into standing wheat stubble.
Resumo:
This paper presents early results from an ARC-funded research project on the content, audience and influence of Australian talkback radio. Drawing upon the analysis of data from a survey of three talkback programs — John Laws and Neil Mitchell from the commercial sector and Australia Talks Back from the ABC — the paper focuses upon two aspects: the topics canvassed and the participation of the callers. Although very preliminary, the results of this survey narrow down the kinds of questions we need to ask as we move towards more sophisticated analysis of this media format.
Resumo:
We introduce a novel transmission technique of periodic in-line all-optical format conversion between return-to-zero and non-return-to-zero-like aimed at delaying the accumulation of format-specific impairments. A particular realization of this approach using in-line normal dispersion fibre-enhanced nonlinear optical loop mirrors at 40Gbit/s data rate is presented. © 2004 Optical Society of America.
Resumo:
We introduce a novel transmission technique of periodic in-line all-optical format conversion between return-to-zero and non-return-to-zero-like aimed at delaying the accumulation of format-specific impairments. A particular realization of this approach using in-line normal dispersion fibre-enhanced nonlinear optical loop mirrors at 40Gbit/s data rate is presented.
Resumo:
This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based watermarking techniques. In this paper, the authors discuss a watermark-only attack scenario (the attacker has access to a single watermarked content only). In the literature it is an assumption that DM-QIM methods are secure to WOA. However, the authors show that the DM-QIM based embedding method is vulnerable against a guided key guessing attack by exploiting subtle statistical regularities in the feature space embeddings for time series and images. Using a distribution-free algorithm, this paper presents an analysis of the attack and numerical results for multiple examples of image and time series data.