70 resultados para camouflage


Relevância:

10.00% 10.00%

Publicador:

Resumo:

When investigating strategies for Helicoverpa armigera (Hubner) control, it is important to understand oviposition behaviour. Cotton (Gossypium hirsutum) was sown into standing wheat (Triticum astivum L.) stubble in a closed arena to investigate the effect of stubble on H. armigera moth behaviour and oviposition. Infrared cameras were used to track moths and determine whether stubble acted as a physical barrier or provided camouflage to cotton plants, thereby reducing oviposition. Searching activity was observed to peak shortly before dawn (03:00 and 04:00 h) and remained high until just after dawn (4 h window). Moths spent more time resting on cotton plants than spiralling above them, and the least time flying across the arena. While female moths spent more time searching for cotton plants growing in wheat stubble, the difference in oviposition was not significant. As similar numbers of eggs were laid on cotton plants with stubble (3.5/plant SE +/- 0.87) and without stubble (2.5/plant SE +/- 0.91), wheat stubble does not appear to provide camouflage to cotton plants. There was no significant difference in the location of eggs deposited on cotton plants with and without stubble, although more eggs were laid on the tops of cotton leaves in wheat stubble. As the spatial and temporal distribution of eggs laid on the cotton plant is a crucial component of population stability, eggs laid on the upper side of leaves on cotton plants may be more prone to fatalities caused by environmental factors such as wind and rain. Therefore, although stubble did not influence the number of eggs laid, it did affect their distribution on the plant, which may result in increased mortality of eggs on cotton plants sown into standing wheat stubble.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The blue and black dress that “melted the Internet” is thought to have done so because its perceived color depended on people using different prior assumptions about discounting the illuminant. However, this is not the first monochromatic object to have confused the public. For a brief period during WWI, RMS Mauretania was dressed in (dazzle) camouflage shades of blue and black/grey, yet she is sometimes depicted by artists, modelers, and historians in a much showier dress of red, blue, yellow, green, and black. I raise the possibility that this originates from a case of public deception deriving from the momentary misperception of a playful artist who neglected to discount the illuminant, propagating the most (perhaps only) successful application of dazzle camouflage known.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Research in the fields of ceramic pigments is oriented towards the enlargement of the chromatic set of colors together with a replacement for more expensive and less stable organic pigments. Novel non-toxic inorganic pigments have been required to answer environmental laws to remove elements like lead, chromium, cobalt entering in the composition of usual pigments widely used in paints and plastics. Yellow is particularly an important color in the pigment industry and consumption of yellow exceeds that of any other colored pigments. Apart from this, high infrared reflective pigments are now in great demand for usage in coatings, cement pavements, automotives and camouflage applications. They not only impart color to an object, but also reflect the invisible heat from the object to minimize heat build–up, when exposed to solar radiation. With this in view, the present work aims at developing new functional yellow pigments for these applications. A series of IR reflecting yellow pigments have been synthesized and analyzed for their crystalline structure, morphological, composition and optical characteristics, coloring and energy saving applications

Relevância:

10.00% 10.00%

Publicador:

Resumo:

When thinking what paintings are, I am continually brought back to my memory of a short sequence in Alfred Hitchcock’s Vertigo. In the scene, Kim Novak’s Madeleine is seated on a bench in an art gallery. She is apparently transfixed by a painting, Portrait of Carlotta. Alongside James Stewart, we watch her looking intently. Madeleine is pretending to be a ghost. At this stage she does not expect us to believe she is a ghost, but simply to immerse ourselves in the conceit, to delight in the shudder. Madeleine’s back is turned away from us, and as the camera draws near to show that the knot pattern in her hair mirrors the image in the portrait, I imagine Madeleine suppressing a smile. She resolutely shows us her back, though, so her feint is not betrayed. Madeleine’s stillness in this scene makes her appear as an object, a thing in the world, a rock or a pile of logs perhaps. We are not looking at that thing, however, but rather a residual image of something creaturely, a spectre. This after-image is held to the ground both by the gravity suggested by its manifestation and by the fine lie - the camouflage - of pretending to be a ghost. Encountering a painting is like meeting Madeleine. It sits in front of its own picture, gazing at it. Despite being motionless and having its back to us, there is a lurching sensation the painting brings about by pretending to be the ghost of its picture, and, at the same time, never really anticipating your credulity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Les courriels Spams (courriels indésirables ou pourriels) imposent des coûts annuels extrêmement lourds en termes de temps, d’espace de stockage et d’argent aux utilisateurs privés et aux entreprises. Afin de lutter efficacement contre le problème des spams, il ne suffit pas d’arrêter les messages de spam qui sont livrés à la boîte de réception de l’utilisateur. Il est obligatoire, soit d’essayer de trouver et de persécuter les spammeurs qui, généralement, se cachent derrière des réseaux complexes de dispositifs infectés, ou d’analyser le comportement des spammeurs afin de trouver des stratégies de défense appropriées. Cependant, une telle tâche est difficile en raison des techniques de camouflage, ce qui nécessite une analyse manuelle des spams corrélés pour trouver les spammeurs. Pour faciliter une telle analyse, qui doit être effectuée sur de grandes quantités des courriels non classés, nous proposons une méthodologie de regroupement catégorique, nommé CCTree, permettant de diviser un grand volume de spams en des campagnes, et ce, en se basant sur leur similarité structurale. Nous montrons l’efficacité et l’efficience de notre algorithme de clustering proposé par plusieurs expériences. Ensuite, une approche d’auto-apprentissage est proposée pour étiqueter les campagnes de spam en se basant sur le but des spammeur, par exemple, phishing. Les campagnes de spam marquées sont utilisées afin de former un classificateur, qui peut être appliqué dans la classification des nouveaux courriels de spam. En outre, les campagnes marquées, avec un ensemble de quatre autres critères de classement, sont ordonnées selon les priorités des enquêteurs. Finalement, une structure basée sur le semiring est proposée pour la représentation abstraite de CCTree. Le schéma abstrait de CCTree, nommé CCTree terme, est appliqué pour formaliser la parallélisation du CCTree. Grâce à un certain nombre d’analyses mathématiques et de résultats expérimentaux, nous montrons l’efficience et l’efficacité du cadre proposé.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Contemporary integrated circuits are designed and manufactured in a globalized environment leading to concerns of piracy, overproduction and counterfeiting. One class of techniques to combat these threats is circuit obfuscation which seeks to modify the gate-level (or structural) description of a circuit without affecting its functionality in order to increase the complexity and cost of reverse engineering. Most of the existing circuit obfuscation methods are based on the insertion of additional logic (called “key gates”) or camouflaging existing gates in order to make it difficult for a malicious user to get the complete layout information without extensive computations to determine key-gate values. However, when the netlist or the circuit layout, although camouflaged, is available to the attacker, he/she can use advanced logic analysis and circuit simulation tools and Boolean SAT solvers to reveal the unknown gate-level information without exhaustively trying all the input vectors, thus bringing down the complexity of reverse engineering. To counter this problem, some ‘provably secure’ logic encryption algorithms that emphasize methodical selection of camouflaged gates have been proposed previously in literature [1,2,3]. The contribution of this paper is the creation and simulation of a new layout obfuscation method that uses don't care conditions. We also present proof-of-concept of a new functional or logic obfuscation technique that not only conceals, but modifies the circuit functionality in addition to the gate-level description, and can be implemented automatically during the design process. Our layout obfuscation technique utilizes don’t care conditions (namely, Observability and Satisfiability Don’t Cares) inherent in the circuit to camouflage selected gates and modify sub-circuit functionality while meeting the overall circuit specification. Here, camouflaging or obfuscating a gate means replacing the candidate gate by a 4X1 Multiplexer which can be configured to perform all possible 2-input/ 1-output functions as proposed by Bao et al. [4]. It is important to emphasize that our approach not only obfuscates but alters sub-circuit level functionality in an attempt to make IP piracy difficult. The choice of gates to obfuscate determines the effort required to reverse engineer or brute force the design. As such, we propose a method of camouflaged gate selection based on the intersection of output logic cones. By choosing these candidate gates methodically, the complexity of reverse engineering can be made exponential, thus making it computationally very expensive to determine the true circuit functionality. We propose several heuristic algorithms to maximize the RE complexity based on don’t care based obfuscation and methodical gate selection. Thus, the goal of protecting the design IP from malicious end-users is achieved. It also makes it significantly harder for rogue elements in the supply chain to use, copy or replicate the same design with a different logic. We analyze the reverse engineering complexity by applying our obfuscation algorithm on ISCAS-85 benchmarks. Our experimental results indicate that significant reverse engineering complexity can be achieved at minimal design overhead (average area overhead for the proposed layout obfuscation methods is 5.51% and average delay overhead is about 7.732%). We discuss the strengths and limitations of our approach and suggest directions that may lead to improved logic encryption algorithms in the future. References: [1] R. Chakraborty and S. Bhunia, “HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 28, no. 10, pp. 1493–1502, 2009. [2] J. A. Roy, F. Koushanfar, and I. L. Markov, “EPIC: Ending Piracy of Integrated Circuits,” in 2008 Design, Automation and Test in Europe, 2008, pp. 1069–1074. [3] J. Rajendran, M. Sam, O. Sinanoglu, and R. Karri, “Security Analysis of Integrated Circuit Camouflaging,” ACM Conference on Computer Communications and Security, 2013. [4] Bao Liu, Wang, B., "Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks,"Design, Automation and Test in Europe Conference and Exhibition (DATE), 2014 , vol., no., pp.1,6, 24-28 March 2014.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dissertação de Mestrado apresentada ao Instituto Superior de Psicologia Aplicada para obtenção de grau de Mestre na especialidade de Psicologia Clínica.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many terrestrial ectotherms are capable of rapid colour change, yet it is unclear how these animals accommodate the multiple functions of colour, particularly camouflage, communication and thermoregulation, especially when functions require very different colours. Thermal benefits of colour change depend on an animal's absorptance of solar energy in both UV–visible (300-700 nm) and near-infrared (NIR; 700-2600 nm) wavelengths, yet colour research has focused almost exclusively on the former. Here, we show that wild-caught bearded dragon lizards (Pogona vitticeps) exhibit substantial UV–visible and NIR skin reflectance change in response to temperature for dorsal but not ventral (throat and upper chest) body regions. By contrast, lizards showed the greatest temperature-independent colour change on the beard and upper chest during social interactions and as a result of circadian colour change. Biophysical simulations of heat transfer predicted that the maximum temperature-dependent change in dorsal reflectivity could reduce the time taken to reach active body temperature by an average of 22 min per active day, saving 85 h of basking time throughout the activity season. Our results confirm that colour change may serve a thermoregulatory function, and competing thermoregulation and signalling requirements may be met by partitioning colour change to different body regions in different circumstances.