901 resultados para algebraic attacks


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recommender systems aggregate individual user ratings into predictions of products or services that might interest visitors. The quality of this aggregation process crucially affects the user experience and hence the effectiveness of recommenders in e-commerce. We present a characterization of nearest-neighbor collaborative filtering that allows us to disaggregate global recommender performance measures into contributions made by each individual rating. In particular, we formulate three roles-scouts, promoters, and connectors-that capture how users receive recommendations, how items get recommended, and how ratings of these two types are themselves connected, respectively. These roles find direct uses in improving recommendations for users, in better targeting of items and, most importantly, in helping monitor the health of the system as a whole. For instance, they can be used to track the evolution of neighborhoods, to identify rating subspaces that do not contribute ( or contribute negatively) to system performance, to enumerate users who are in danger of leaving, and to assess the susceptibility of the system to attacks such as shilling. We argue that the three rating roles presented here provide broad primitives to manage a recommender system and its community.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The motivation behind the fusion of Intrusion Detection Systems was the realization that with the increasing traffic and increasing complexity of attacks, none of the present day stand-alone Intrusion Detection Systems can meet the high demand for a very high detection rate and an extremely low false positive rate. Multi-sensor fusion can be used to meet these requirements by a refinement of the combined response of different Intrusion Detection Systems. In this paper, we show the design technique of sensor fusion to best utilize the useful response from multiple sensors by an appropriate adjustment of the fusion threshold. The threshold is generally chosen according to the past experiences or by an expert system. In this paper, we show that the choice of the threshold bounds according to the Chebyshev inequality principle performs better. This approach also helps to solve the problem of scalability and has the advantage of failsafe capability. This paper theoretically models the fusion of Intrusion Detection Systems for the purpose of proving the improvement in performance, supplemented with the empirical evaluation. The combination of complementary sensors is shown to detect more attacks than the individual components. Since the individual sensors chosen detect sufficiently different attacks, their result can be merged for improved performance. The combination is done in different ways like (i) taking all the alarms from each system and avoiding duplications, (ii) taking alarms from each system by fixing threshold bounds, and (iii) rule-based fusion with a priori knowledge of the individual sensor performance. A number of evaluation metrics are used, and the results indicate that there is an overall enhancement in the performance of the combined detector using sensor fusion incorporating the threshold bounds and significantly better performance using simple rule-based fusion.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bees are well known for being industrious pollinators. Some species, however, have taken to invading the nests of other colonies to steal food, nest material or the nest site itself. Despite the potential mortality costs due to fighting with an aggressive opponent, the prospects of a large bounty can be worth the risk. In this review, we aim to bring together current knowledge on intercolony fighting with a view to better understand the evolution of warfare in bees and identify avenues for future research. A review of literature reveals that at least 60 species of stingless bees are involved in heterospecific conflicts, either as attacking or victim colonies. The threat of invasion has led to the evolution of architectural, behavioural and morphological adaptations, such as narrow entrance tunnels, mud balls to block the entrance, decoy nests that direct invaders away from the brood chamber, fighting swarms, and soldiers that are skilled at immobilising attackers. Little is known about how victim colonies are selected, but a phylogenetically controlled analysis suggests that the notorious robber bee Lestrimelitta preferentially attacks colonies of species with more concentrated honey. Warfare among bees poses many interesting questions, including why species differ so greatly in their response to attacks and how these alternative strategies of obtaining food or new nest sites have evolved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis consists of an introduction, four research articles and an appendix. The thesis studies relations between two different approaches to continuum limit of models of two dimensional statistical mechanics at criticality. The approach of conformal field theory (CFT) could be thought of as the algebraic classification of some basic objects in these models. It has been succesfully used by physicists since 1980's. The other approach, Schramm-Loewner evolutions (SLEs), is a recently introduced set of mathematical methods to study random curves or interfaces occurring in the continuum limit of the models. The first and second included articles argue on basis of statistical mechanics what would be a plausible relation between SLEs and conformal field theory. The first article studies multiple SLEs, several random curves simultaneously in a domain. The proposed definition is compatible with a natural commutation requirement suggested by Dubédat. The curves of multiple SLE may form different topological configurations, ``pure geometries''. We conjecture a relation between the topological configurations and CFT concepts of conformal blocks and operator product expansions. Example applications of multiple SLEs include crossing probabilities for percolation and Ising model. The second article studies SLE variants that represent models with boundary conditions implemented by primary fields. The most well known of these, SLE(kappa, rho), is shown to be simple in terms of the Coulomb gas formalism of CFT. In the third article the space of local martingales for variants of SLE is shown to carry a representation of Virasoro algebra. Finding this structure is guided by the relation of SLEs and CFTs in general, but the result is established in a straightforward fashion. This article, too, emphasizes multiple SLEs and proposes a possible way of treating pure geometries in terms of Coulomb gas. The fourth article states results of applications of the Virasoro structure to the open questions of SLE reversibility and duality. Proofs of the stated results are provided in the appendix. The objective is an indirect computation of certain polynomial expected values. Provided that these expected values exist, in generic cases they are shown to possess the desired properties, thus giving support for both reversibility and duality.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper develops a model for military conflicts where the defending forces have to determine an optimal partitioning of available resources to counter attacks from an adversary in two different fronts. The Lanchester attrition model is used to develop the dynamical equations governing the variation in force strength. Three different allocation schemes - Time-Zero-Allocation (TZA), Allocate-Assess-Reallocate (AAR), and Continuous Constant Allocation (CCA) - are considered and the optimal solutions are obtained in each case. Numerical examples are given to support the analytical results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A set of sufficient conditions to construct lambda-real symbol Maximum Likelihood (ML) decodable STBCs have recently been provided by Karmakar et al. STBCs satisfying these sufficient conditions were named as Clifford Unitary Weight (CUW) codes. In this paper, the maximal rate (as measured in complex symbols per channel use) of CUW codes for lambda = 2(a), a is an element of N is obtained using tools from representation theory. Two algebraic constructions of codes achieving this maximal rate are also provided. One of the constructions is obtained using linear representation of finite groups whereas the other construction is based on the concept of right module algebra over non-commutative rings. To the knowledge of the authors, this is the first paper in which matrices over non-commutative rings is used to construct STBCs. An algebraic explanation is provided for the 'ABBA' construction first proposed by Tirkkonen et al and the tensor product construction proposed by Karmakar et al. Furthermore, it is established that the 4 transmit antenna STBC originally proposed by Tirkkonen et al based on the ABBA construction is actually a single complex symbol ML decodable code if the design variables are permuted and signal sets of appropriate dimensions are chosen.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The study focuses on the emergence of tuberculosis as a public health problem and the development of the various methods to counteract it in Finland before the introduction of efficient methods of treatment in the 1940s and 50s. It covers a time period from year 1882 when the tuberculosis bacterium was identified to the 1930s when the early formation of tuberculosis work became established in Finland. During this time there occurred important changes in medicine, public health thinking and methods of personal health care that have been referred to as the bacteriological revolution. The study places tuberculosis prevention in this context and shows how the tuberculosis problem affected the government of health on all these three dimensions. The study is based on foucauldian analytics of government, which is supplemented with perspectives from contemporary science and technology studies. In addition, it utilises a broad array of work in medical history. The central research materials consist of medical journals, official programs and documents on tuberculosis policy, and health education texts. The general conclusions of the study are twofold. Firstly, the ensemble of tuberculosis work was formed from historically diverse and often conflicting elements. The identification of the pathogen was only the first step in the establishment of tuberculosis as a major public health problem. Important were also the attention of the science of hygiene and statistical reasoning that dominated public health thinking in the late 19th century. Furthermore, the adoption of the bacteriological tuberculosis doctrine in medicine, public health work and health education was profoundly influenced by previous understanding of the nature of the illness, of medical work, of the prevention of contagious diseases, and of personal health care. Also the two central institutions of tuberculosis work, sanatorium and dispensary, have heterogeneous origins and multifarious functions. Secondly, bacteriology represented in this study by tuberculosis remodelled medical knowledge and practices, the targets and methods of public health policy, and the doctrine of personal health care. Tuberculosis provided a strong argument for specific causes (if not cures) as well as laboratory methods in medicine. Tuberculosis prevention contributed substantially to the development whereby a comprehensive responsibility for the health of the population and public health work was added to the agenda of the state. Health advice on tuberculosis and other contagious diseases used dangerous bacteria to motivate personal health care and redefined it as protecting oneself from the attacks of external pathogens and strengthening oneself against their effects. Thus, tuberculosis work is one important root for the contemporary public concern for the health of the population and the imperative of personal health care.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper develops a model for military conflicts where the defending forces have to determine an optimal partitioning of available resources to counter attacks from an adversary in two different fronts. The Lanchester attrition model is used to develop the dynamical equations governing the variation in force strength. Three different allocation schemes - Time-Zero-Allocation (TZA), Allocate-Assess-Reallocate (AAR), and Continuous Constant Allocation (CCA) - are considered and the optimal solutions are obtained in each case. Numerical examples are given to support the analytical results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Migraine is the common cause of chronic episodic headache, affecting 12%-15% of the Caucasian population (41 million Europeans and some half a million Finns), and causes considerable loss of quality of life to its sufferers, as well as being linked to increased risk for a wide range of conditions, from depression to stroke. Migraine is the 19th most severe disease in terms of disability-adjusted life years, and 9th among women. It is characterized by attacks of headache accompanied by sensitivity to external stimuli lasting 4-72 hours, and in a third of cases by neurological aura symptoms, such as loss of vision, speech or muscle function. The underlying pathophysiology, including what triggers migraine attacks and why they occur in the first place, is largely unknown. The aim of this study was to identify genetic factors associated with the hereditary susceptibility to migraine, in order to gain a better understanding of migraine mechanisms. In this thesis, we report the results of genetic linkage and association analyses on a Finnish migraine patient collection as well as migraineurs from Australia, Denmark, Germany, Iceland and the Netherlands. Altogether we studied genetic information of nearly 7,000 migraine patients and over 50,000 population-matched controls. We also developed a new migraine analysis method called the trait component analysis, which is based on individual patient responses instead of the clinical diagnosis. Using this method, we detected a number of new genetic loci for migraine, including on chromosome 17p13 (HLOD 4.65) and 10q22-q23 (female-specific HLOD 7.68) with significant evidence of linkage, along with five other loci (2p12, 8q12, 4q28-q31, 18q12-q22, and Xp22) detected with suggestive evidence of linkage. The 10q22-q23 locus was the first genetic finding in migraine to show linkage to the same locus and markers in multiple populations, with consistent detection in six different scans. Traditionally, ion channels have been thought to play a role in migraine susceptibility, but we were able to exclude any significant role for common variants in a candidate gene study of 155 ion transport genes. This was followed up by the first genome-wide association study in migraine, conducted on 2,748 migraine patients and 10,747 matched controls followed by a replication in 3,209 patients and 40,062 controls. In this study, we found interesting results with genome-wide significance, providing targets for future genetic and functional studies. Overall, we found several promising genetic loci for migraine providing a promising base for future studies in migraine.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Financial crises have shown that dramatic movements in one financial market can have a powerful impact on other markets. The paper proposes to use cobreaking to model comovements between financial markets during crises and to test for conta-gion. It finds evidence of cobreaking between stock returns in developed markets. Finding cobreaking has implications for the diversification of international investments. For emerging mar-ket stock returns the evidence of cobreaking is mainly due to the non-financial event of the 9/11 terrorist attacks in 2001. Fi-nancial crises originating in one emerging market do not spread to other markets, i.e., no contagion.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper develops a model for military conflicts where the defending forces have to determine an optimal partitioning of available resources to counter attacks from an adversary from n different fronts. The problem of optimally partitioning the defending forces against the attacking forces is addressed. The Lanchester square law model is used to develop the dynamical equations governing the variation in force strength. Two different allocation schemes-Time-ZeroAllocation (TZA) and Continuous Constant Allocation (CCA) are considered and the optimal solutions for both are obtained analytically. These results generalize other results available in the literature. Numerical examples are given to support the analytical results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The max-coloring problem is to compute a legal coloring of the vertices of a graph G = (V, E) with a non-negative weight function w on V such that Sigma(k)(i=1) max(v epsilon Ci) w(v(i)) is minimized, where C-1, ... , C-k are the various color classes. Max-coloring general graphs is as hard as the classical vertex coloring problem, a special case where vertices have unit weight. In fact, in some cases it can even be harder: for example, no polynomial time algorithm is known for max-coloring trees. In this paper we consider the problem of max-coloring paths and its generalization, max-coloring abroad class of trees and show it can be solved in time O(vertical bar V vertical bar+time for sorting the vertex weights). When vertex weights belong to R, we show a matching lower bound of Omega(vertical bar V vertical bar log vertical bar V vertical bar) in the algebraic computation tree model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Silver code has captured a lot of attention in the recent past,because of its nice structure and fast decodability. In their recent paper, Hollanti et al. show that the Silver code forms a subset of the natural order of a particular cyclic division algebra (CDA). In this paper, the algebraic structure of this subset is characterized. It is shown that the Silver code is not an ideal in the natural order but a right ideal generated by two elements in a particular order of this CDA. The exact minimum determinant of the normalized Silver code is computed using the ideal structure of the code. The construction of Silver code is then extended to CDAs over other number fields.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ecology and evolutionary biology is the study of life on this planet. One of the many methods applied to answering the great diversity of questions regarding the lives and characteristics of individual organisms, is the utilization of mathematical models. Such models are used in a wide variety of ways. Some help us to reason, functioning as aids to, or substitutes for, our own fallible logic, thus making argumentation and thinking clearer. Models which help our reasoning can lead to conceptual clarification; by expressing ideas in algebraic terms, the relationship between different concepts become clearer. Other mathematical models are used to better understand yet more complicated models, or to develop mathematical tools for their analysis. Though helping us to reason and being used as tools in the craftmanship of science, many models do not tell us much about the real biological phenomena we are, at least initially, interested in. The main reason for this is that any mathematical model is a simplification of the real world, reducing the complexity and variety of interactions and idiosynchracies of individual organisms. What such models can tell us, however, both is and has been very valuable throughout the history of ecology and evolution. Minimally, a model simplifying the complex world can tell us that in principle, the patterns produced in a model could also be produced in the real world. We can never know how different a simplified mathematical representation is from the real world, but the similarity models do strive for, gives us confidence that their results could apply. This thesis deals with a variety of different models, used for different purposes. One model deals with how one can measure and analyse invasions; the expanding phase of invasive species. Earlier analyses claims to have shown that such invasions can be a regulated phenomena, that higher invasion speeds at a given point in time will lead to a reduction in speed. Two simple mathematical models show that analysis on this particular measure of invasion speed need not be evidence of regulation. In the context of dispersal evolution, two models acting as proof-of-principle are presented. Parent-offspring conflict emerges when there are different evolutionary optima for adaptive behavior for parents and offspring. We show that the evolution of dispersal distances can entail such a conflict, and that under parental control of dispersal (as, for example, in higher plants) wider dispersal kernels are optimal. We also show that dispersal homeostasis can be optimal; in a setting where dispersal decisions (to leave or stay in a natal patch) are made, strategies that divide their seeds or eggs into fractions that disperse or not, as opposed to randomized for each seed, can prevail. We also present a model of the evolution of bet-hedging strategies; evolutionary adaptations that occur despite their fitness, on average, being lower than a competing strategy. Such strategies can win in the long run because they have a reduced variance in fitness coupled with a reduction in mean fitness, and fitness is of a multiplicative nature across generations, and therefore sensitive to variability. This model is used for conceptual clarification; by developing a population genetical model with uncertain fitness and expressing genotypic variance in fitness as a product between individual level variance and correlations between individuals of a genotype. We arrive at expressions that intuitively reflect two of the main categorizations of bet-hedging strategies; conservative vs diversifying and within- vs between-generation bet hedging. In addition, this model shows that these divisions in fact are false dichotomies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Utilizing a circuit model [1, 2] of an induction motor, a simplified analysis of steady state performance of a voltage controlled induction motor (VCIM) drive is described in this paper. By solving a set of nonlinear algebraic equations which describe the VCIM drive under steady operation, the operating variables such as constant components of torque, rotor flux linkages, fundamental components of stator voltage and current and phase angle are obtained for any given value of slip, triggering angle and supply voltage.