727 resultados para OFFLINE PASSWORD GUESSING


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Feather pecking is a behaviour by which birds damage or destroy the feathers of themselves (self-pecking) or other birds (allo feather pecking), in some cases even plucking out feathers and eating these. The self-pecking is rarely seen in domestic laying hens but is not uncommon in parrots. Feather pecking in laying hens has been described as being stereotypic, i.e. a repetitive invariant motor pattern without an obvious function, and indeed the amount of self-pecking in parrots was found to correlate positively with the amount of recurrent perseveration (RP), the tendency to repeat responses inappropriately, which in humans and other animals was found to correlate with stereotypic behaviour. In the present experiment we set out to investigate the correlation between allo feather pecking and RP in laying hens. We used birds (N = 92) from the 10th and 11th generation (G10 and G11) of lines selectively bred for high feather pecking (HFP) and low feather pecking (LFP), and from an unselected control line (CON) with intermediate levels of feather pecking. We hypothesised that levels of RP would be higher, and the time taken (standardised latency) to repeat a response lower, in HFP compared to LFP hens, with CON hens in between. Using a two-choice guessing task, we found that lines differed significantly in their levels of RP, with HFP unexpectedly showing lower levels of RP than CON and LFP. Latency to make a repeat did not differ between lines. Latency to make a switch differed between lines with a shorter latency in HFP compared to LFP (in G10), or CON (in G11). Latency to peck for repeats vs. latency to peck for switches did not differ between lines. Total time to complete the test was significantly shorter in HFP compared to CON and LFP. Thus, our hypotheses were not supported by the data. In contrast, selection for feather pecking seems to induce the opposite effects than would be expected from stereotyping animals: pecking was less sequenced and reaction to make a switch and to complete the test was lower in HFP. This supports the hyperactivity-model of feather pecking, suggesting that feather pecking is related to a higher general activity, possibly due to changes in the dopaminergic system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a GA-based optimization procedure for bioinspired heterogeneous modular multiconfigurable chained microrobots. When constructing heterogeneous chained modular robots that are composed of several different drive modules, one must select the type and position of the modules that form the chain. One must also develop new locomotion gaits that combine the different drive modules. These are two new features of heterogeneous modular robots that they do not share with homogeneous modular robots. This paper presents an offline control system that allows the development of new configuration schemes and locomotion gaits for these heterogeneous modular multiconfigurable chained microrobots. The offline control system is based on a simulator that is specifically designed for chained modular robots and allows them to develop and learn new locomotion patterns.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes our participation at PAN 2014 author profiling task. Our idea was to define, develop and evaluate a simple machine learning classifier able to guess the gender and the age of a given user based on his/her texts, which could become part of the solution portfolio of the company. We were interested in finding not the best possible classifier that achieves the highest accuracy, but to find the optimum balance between performance and throughput using the most simple strategy and less dependent of external systems. Results show that our software using Naive Bayes Multinomial with a term vector model representation of the text is ranked quite well among the rest of participants in terms of accuracy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While many offline retailers have developed informational websites that offer information on products and prices, the key question for such informational websites is whether they can increase revenues via web-to-store shopping. The current paper draws on the information search literature to specify and test hypotheses regarding the offline revenue impact of adding an informational website. Explicitly considering marketing efforts, a latent class model distinguishes consumer segments with different short-term revenue effects, while a Vector Autoregressive model on these segments reveals different long-term marketing response. We find that the offline revenue impact of the informational website critically depends on the product category and customer segment. The lower online search costs are especially beneficial for sensory products and for customers distant from the store. Moreover, offline revenues increase most for customers with high web visit frequency. We find that customers in some segments buy more and more expensive products, suggesting that online search and offline purchases are complements. In contrast, customers in a particular segment reduce their shopping trips, suggesting their online activities partially substitute for experiential shopping in the physical store. Hence, offline retailers should use specific online activities to target specific product categories and customer segments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Do customers increase or decrease their spending in response to the introduction of an informational website? To answer this question, this study considers the effects of the introduction and use of an informational website by a large national retailer on offline customer buying behavior. More specifically, we study a website's effects on the number of shopping trips and the amount spent per category per shopping trip. The model is calibrated through the estimation of a Poisson model (shopping trips) and a type-II tobit model (the amount spent per category per shopping trip), with effect parameters that vary across customers. For the focal retailer, an informational website creates more bad than good news; most website visitors engage in fewer shopping trips and spend less in all product categories. The authors also compare the characteristics of shoppers who exhibit negative website effects with those few shoppers who show positive effects and thus derive key implications for research and practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based watermarking techniques. In this paper, the authors discuss a watermark-only attack scenario (the attacker has access to a single watermarked content only). In the literature it is an assumption that DM-QIM methods are secure to WOA. However, the authors show that the DM-QIM based embedding method is vulnerable against a guided key guessing attack by exploiting subtle statistical regularities in the feature space embeddings for time series and images. Using a distribution-free algorithm, this paper presents an analysis of the attack and numerical results for multiple examples of image and time series data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based watermarking techniques. In this paper, the authors discuss a watermark-only attack scenario (the attacker has access to a single watermarked content only). In the literature it is an assumption that DM-QIM methods are secure to WOA. However, the authors show that the DM-QIM based embedding method is vulnerable against a guided key guessing attack by exploiting subtle statistical regularities in the feature space embeddings for time series and images. Using a distribution-free algorithm, this paper presents an analysis of the attack and numerical results for multiple examples of image and time series data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, a new method for offline handwriting recognition is presented. A robust algorithm for handwriting segmentation has been described here with the help of which individual characters can be segmented from a word selected from a paragraph of handwritten text image which is given as input to the module. Then each of the segmented characters are converted into column vectors of 625 values that are later fed into the advanced neural network setup that has been designed in the form of text files. The networks has been designed with quadruple layered neural network with 625 input and 26 output neurons each corresponding to a character from a-z, the outputs of all the four networks is fed into the genetic algorithm which has been developed using the concepts of correlation, with the help of this the overall network is optimized with the help of genetic algorithm thus providing us with recognized outputs with great efficiency of 71%.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In a world that may be described by information revolution, it is becoming more and more important to discover the diffusion of information and news in a new technological environment. We are not dependent but, more in control of receiving and forwarding information in this technology driven environment. What we can find is that in today’s interpersonal communications, even corporate communications, gossip-like information gain a more important role. Starting from the psychological notion of gossip we asked the question how gossip occurs, evolves and disperses on the internet, what the main criteria of its diffusion and how these maybe taken into service of a company. The power of gossip derives from its biological basis that is communication advantage. The “newsmonger” maybe described with good memory, being up-to-date even in non-gossip like situations. The spread of info is faster and more precise among people with similar professions or of common interest. The content of the gossip adopts to the intellectual level of its audience. We conducted multiple research methods in order to discover about the nature of gossip of corporate interest: content analyses of blogs (N=10) and forums (N=10); online in-depth interviews (N=10); and individual consumer narratives (N=100). Our research shows that companies may lead and use gossip in an online context for their own communication intentions, however, corporate presence in terms of online gossips has to fulfill requirements in order to remain acceptable: that are specific language and place, openness, being direct about expressing intention and origin. In our paper we are going to present our major results and theoretical model

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Az online marketing erősödése következtében a vállalatok a marketing költségvetésük egyre nagyobb arányát költik el erre a területre és ezzel párhuzamosan megnövekedett az igény az új eszközök hatásának mérésére is. A technikai adottságokból adódóan ugyanakkor az offline környezetben kialakított és alkalmazott mérési eljárások, illetve mutatók nem alkalmazhatóak egy az egyben az offline kampányok mérése során. A tanulmány célja, hogy az online és az offline kampányok esetében megvizsgálja és összehasonlítsa a hatékonyság és a hatásosság mérésének az elméleti megközelítésből, illetve a gyakorlati alkalmazásból eredő különbségeit. A kutatás rámutat azokra a lehetséges mérési eljárásokra, mutatórendszerre, amelyek lehetővé teszik a két csatornán elért teljesítmény integrált vizsgálatát.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Given the growing demand for the development of mobile applications, driven by use increasingly common in smartphones and tablets grew in society the need for remote data access in full in the use of mobile application without connectivity environments where there is no provision network access at all times. Given this reality, this work proposes a framework that present main functions are the provision of a persistence mechanism, replication and data synchronization, contemplating the creation, deletion, update and display persisted or requested data, even though the mobile device without connectivity with the network. From the point of view of the architecture and programming practices, it reflected in defining strategies for the main functions of the framework are met. Through a controlled study was to validate the solution proposal, being found as the gains in reducing the number of lines code and the amount of time required to perform the development of an application without there being significant increase for the operations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Given the growing demand for the development of mobile applications, driven by use increasingly common in smartphones and tablets grew in society the need for remote data access in full in the use of mobile application without connectivity environments where there is no provision network access at all times. Given this reality, this work proposes a framework that present main functions are the provision of a persistence mechanism, replication and data synchronization, contemplating the creation, deletion, update and display persisted or requested data, even though the mobile device without connectivity with the network. From the point of view of the architecture and programming practices, it reflected in defining strategies for the main functions of the framework are met. Through a controlled study was to validate the solution proposal, being found as the gains in reducing the number of lines code and the amount of time required to perform the development of an application without there being significant increase for the operations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The advent of the Auger Engineering Radio Array (AERA) necessitates the development of a powerful framework for the analysis of radio measurements of cosmic ray air showers. As AERA performs "radio-hybrid" measurements of air shower radio emission in coincidence with the surface particle detectors and fluorescence telescopes of the Pierre Auger Observatory, the radio analysis functionality had to be incorporated in the existing hybrid analysis solutions for fluorescence and surface detector data. This goal has been achieved in a natural way by extending the existing Auger Offline software framework with radio functionality. In this article, we lay out the design, highlights and features of the radio extension implemented in the Auger Offline framework. Its functionality has achieved a high degree of sophistication and offers advanced features such as vectorial reconstruction of the electric field, advanced signal processing algorithms, a transparent and efficient handling of FFTs, a very detailed simulation of detector effects, and the read-in of multiple data formats including data from various radio simulation codes. The source code of this radio functionality can be made available to interested parties on request. (C) 2011 Elsevier B.V. All rights reserved.