958 resultados para Tibetan character set


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numeric information. Thereby, the capability to watermark numerical data directly implies the capability to watermark multimedia objects and discourage information theft on social networking sites and the Internet in general. Unfortunately, there has been very limited research done in the field of numeric set watermarking due to underlying limitations in terms of number of items in the set and LSBs in each item available for watermarking. In 2009, Gupta et al. proposed a numeric set watermarking model that embeds watermark bits in the items of the set based on a hash value of the items’ most significant bits (MSBs). If an item is chosen for watermarking, a watermark bit is embedded in the least significant bits, and the replaced bit is inserted in the fractional value to provide reversibility. The authors show their scheme to be resilient against the traditional subset addition, deletion, and modification attacks as well as secondary watermarking attacks. In this paper, we present a bucket attack on this watermarking model. The attack consists of creating buckets of items with the same MSBs and determine if the items of the bucket carry watermark bits. Experimental results show that the bucket attack is very strong and destroys the entire watermark with close to 100% success rate. We examine the inherent weaknesses in the watermarking model of Gupta et al. that leave it vulnerable to the bucket attack and propose potential safeguards that can provide resilience against this attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Motivated by the need of private set operations in a distributed environment, we extend the two-party private matching problem proposed by Freedman, Nissim and Pinkas (FNP) at Eurocrypt’04 to the distributed setting. By using a secret sharing scheme, we provide a distributed solution of the FNP private matching called the distributed private matching. In our distributed private matching scheme, we use a polynomial to represent one party’s dataset as in FNP and then distribute the polynomial to multiple servers. We extend our solution to the distributed set intersection and the cardinality of the intersection, and further we show how to apply the distributed private matching in order to compute distributed subset relation. Our work extends the primitives of private matching and set intersection by Freedman et al. Our distributed construction might be of great value when the dataset is outsourced and its privacy is the main concern. In such cases, our distributed solutions keep the utility of those set operations while the dataset privacy is not compromised. Comparing with previous works, we achieve a more efficient solution in terms of computation. All protocols constructed in this paper are provably secure against a semi-honest adversary under the Decisional Diffie-Hellman assumption.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a method for designing set-point regulation controllers for a class of underactuated mechanical systems in Port-Hamiltonian System (PHS) form. A new set of potential shape variables in closed loop is proposed, which can replace the set of open loop shape variables-the configuration variables that appear in the kinetic energy. With this choice, the closed-loop potential energy contains free functions of the new variables. By expressing the regulation objective in terms of these new potential shape variables, the desired equilibrium can be assigned and there is freedom to reshape the potential energy to achieve performance whilst maintaining the PHS form in closed loop. This complements contemporary results in the literature, which preserve the open-loop shape variables. As a case study, we consider a robotic manipulator mounted on a flexible base and compensate for the motion of the base while positioning the end effector with respect to the ground reference. We compare the proposed control strategy with special cases that correspond to other energy shaping strategies previously proposed in the literature.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Flavonoids such as anthocyanins, flavonols and proanthocyanidins, play a central role in fruit colour, flavour and health attributes. In peach and nectarine (Prunus persica) these compounds vary during fruit growth and ripening. Flavonoids are produced by a well studied pathway which is transcriptionally regulated by members of the MYB and bHLH transcription factor families. We have isolated nectarine flavonoid regulating genes and examined their expression patterns, which suggests a critical role in the regulation of flavonoid biosynthesis. Results In nectarine, expression of the genes encoding enzymes of the flavonoid pathway correlated with the concentration of proanthocyanidins, which strongly increases at mid-development. In contrast, the only gene which showed a similar pattern to anthocyanin concentration was UDP-glucose-flavonoid-3-O-glucosyltransferase (UFGT), which was high at the beginning and end of fruit growth, remaining low during the other developmental stages. Expression of flavonol synthase (FLS1) correlated with flavonol levels, both temporally and in a tissue specific manner. The pattern of UFGT gene expression may be explained by the involvement of different transcription factors, which up-regulate flavonoid biosynthesis (MYB10, MYB123, and bHLH3), or repress (MYB111 and MYB16) the transcription of the biosynthetic genes. The expression of a potential proanthocyanidin-regulating transcription factor, MYBPA1, corresponded with proanthocyanidin levels. Functional assays of these transcription factors were used to test the specificity for flavonoid regulation. Conclusions MYB10 positively regulates the promoters of UFGT and dihydroflavonol 4-reductase (DFR) but not leucoanthocyanidin reductase (LAR). In contrast, MYBPA1 trans-activates the promoters of DFR and LAR, but not UFGT. This suggests exclusive roles of anthocyanin regulation by MYB10 and proanthocyanidin regulation by MYBPA1. Further, these transcription factors appeared to be responsive to both developmental and environmental stimuli.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background The genetic regulation of flower color has been widely studied, notably as a character used by Mendel and his predecessors in the study of inheritance in pea. Methodology/Principal Findings We used the genome sequence of model legumes, together with their known synteny to the pea genome to identify candidate genes for the A and A2 loci in pea. We then used a combination of genetic mapping, fast neutron mutant analysis, allelic diversity, transcript quantification and transient expression complementation studies to confirm the identity of the candidates. Conclusions/Significance We have identified the pea genes A and A2. A is the factor determining anthocyanin pigmentation in pea that was used by Gregor Mendel 150 years ago in his study of inheritance. The A gene encodes a bHLH transcription factor. The white flowered mutant allele most likely used by Mendel is a simple G to A transition in a splice donor site that leads to a mis-spliced mRNA with a premature stop codon, and we have identified a second rare mutant allele. The A2 gene encodes a WD40 protein that is part of an evolutionarily conserved regulatory complex.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There’s a diagram that does the rounds online that neatly sums up the difference between the quality of equipment used in the studio to produce music, and the quality of the listening equipment used by the consumer...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Existing multi-model approaches for image set classification extract local models by clustering each image set individually only once, with fixed clusters used for matching with other image sets. However, this may result in the two closest clusters to represent different characteristics of an object, due to different undesirable environmental conditions (such as variations in illumination and pose). To address this problem, we propose to constrain the clustering of each query image set by forcing the clusters to have resemblance to the clusters in the gallery image sets. We first define a Frobenius norm distance between subspaces over Grassmann manifolds based on reconstruction error. We then extract local linear subspaces from a gallery image set via sparse representation. For each local linear subspace, we adaptively construct the corresponding closest subspace from the samples of a probe image set by joint sparse representation. We show that by minimising the sparse representation reconstruction error, we approach the nearest point on a Grassmann manifold. Experiments on Honda, ETH-80 and Cambridge-Gesture datasets show that the proposed method consistently outperforms several other recent techniques, such as Affine Hull based Image Set Distance (AHISD), Sparse Approximated Nearest Points (SANP) and Manifold Discriminant Analysis (MDA).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In CB Richard Ellis (C) Pty Ltd v Wingate Properties Pty Ltd [2005] QDC 399 McGill DCJ examined whether the court now has a discretion to set aside an irregularly entered default judgment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In C & E Pty Ltd v Corrigan [2006] QCA 47, the Queensland Court of Appeal considered whether r103 of the Uniform Civil Procedure Rules applied to the service of an application to set aside a statutory demand under s459G of the Corporations Act 2001 (Cth). The decision provides analysis and clarification of an issue that has clearly been one of some uncertainty.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Molecular biology is a scientific discipline which has changed fundamentally in character over the past decade to rely on large scale datasets – public and locally generated - and their computational analysis and annotation. Undergraduate education of biologists must increasingly couple this domain context with a data-driven computational scientific method. Yet modern programming and scripting languages and rich computational environments such as R and MATLAB present significant barriers to those with limited exposure to computer science, and may require substantial tutorial assistance over an extended period if progress is to be made. In this paper we report our experience of undergraduate bioinformatics education using the familiar, ubiquitous spreadsheet environment of Microsoft Excel. We describe a configurable extension called QUT.Bio.Excel, a custom ribbon, supporting a rich set of data sources, external tools and interactive processing within the spreadsheet, and a range of problems to demonstrate its utility and success in addressing the needs of students over their studies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"This work forms part of a much larger collaborative album project in progress between Tim Bruniges, Julian Knowles and David Trumpmanis which explores the intersections between traditional rock instrumentation and analogue and digital media. All of the creative team are performers, composers and producers. The material for the album was thus generated by a series of in studio improvisations and performances with each collaborator assuming a range of different and alternating roles – guitars, electronics, drums, percussion, bass, keyboards production. Thematically the work explores the intersection of instrumental (post) rock, ambient music, and historical electro-acoustic tape composition traditions. Over the past 10 years, musical practice has become increasingly hybrid, with the traditional boundaries between genre becoming progressively eroded. At the same time, digital tools have replaced many of the major analogue technologies that dominated music production and performance in the 20th century. The disappearance of analogue media in mainstream musical practice has had a profound effect on the sonic characteristics of contemporary music and the gestural basis for its production. Despite the increasing power of digital technologies, a small but dedicated group of practitioners has continued to prize and use analogue technology for its unique sounds and the non-linearity of the media, aestheticising its inherent limitations and flaws. At the most radical end of this spectrum lie glitch and lo-fi musical forms, seen in part as reactions to the clinical nature of digital media and the perceived lack of character associated with its transparency. Such developments have also problematised the traditional relationships between media and genre, where specific techniques and their associated sounds have become genre markers. Tristate is an investigation into this emerging set of dialogues between analogue and digital media across composition, production and performance. It employs analogue tape loops in performance, where a tape machine ‘performer’ records and hand manipulates loops of an electric guitar performer on ‘destroyed’ tape stock (intentionally damaged tape), processing the output of this analogue system in the digital domain with contemporary sound processors. In doing so it investigates how the most extreme sonic signatures of analogue media – tape dropout and noise – can be employed alongside contemporary digital sound gestures in both compositional and performance contexts and how the extremes of the two media signatures can brought together both compositionally and performatively. In respect of genre, the work established strategies for merging compositional techniques from the early musique concrete tradition of the 1940s with late 60s popular music experimentalism and the laptop glitch electronica movement of the early 2000s. Lastly, the work explores how analogue recording studio technologies can be used as performance tools, thus illuminating and foregrounding the performative/gestural dimensions of traditional analogue studio tools in use."

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Numeric sets can be used to store and distribute important information such as currency exchange rates and stock forecasts. It is useful to watermark such data for proving ownership in case of illegal distribution by someone. This paper analyzes the numerical set watermarking model presented by Sion et. al in “On watermarking numeric sets”, identifies it’s weaknesses, and proposes a novel scheme that overcomes these problems. One of the weaknesses of Sion’s watermarking scheme is the requirement to have a normally-distributed set, which is not true for many numeric sets such as forecast figures. Experiments indicate that the scheme is also susceptible to subset addition and secondary watermarking attacks. The watermarking model we propose can be used for numeric sets with arbitrary distribution. Theoretical analysis and experimental results show that the scheme is strongly resilient against sorting, subset selection, subset addition, distortion, and secondary watermarking attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ever since Cox et. al published their paper, “A Secure, Robust Watermark for Multimedia” in 1996 [6], there has been tremendous progress in multimedia watermarking. The same pattern re-emerged with Agrawal and Kiernan publishing their work “Watermarking Relational Databases” in 2001 [1]. However, little attention has been given to primitive data collections with only a handful works of research known to the authors [11, 10]. This is primarily due to the absence of an attribute that differentiates marked items from unmarked item during insertion and detection process. This paper presents a distribution-independent, watermarking model that is secure against secondary-watermarking in addition to conventional attacks such as data addition, deletion and distortion. The low false positives and high capacity provide additional strength to the scheme. These claims are backed by experimental results provided in the paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With Ten’s new drama Party Tricks set for an October 6 premiere, coverage has focused on the social media campaign to promote the show. In advance of the screening, Ten has created in-character accounts for the lead characters, Kate Ballard (Asher Keddie) and David McLeod (Rodger Corser)...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"What is Bluebird AR? Bluebird AR was the ABC's alternate reality drama set around the leak of Bluebird, a clandestine geoengineering initiative created by eco-billionaire Harrison Wyld. Proposing a fictional scenario set against a backdrop of real world possibilities, Bluebird AR took some of the conventions of the well-established alternate reality game (ARG) genre and pulled them into the relatively new area of online drama, to create a hybrid entertainment form best described as 'participatory drama'. With Bluebird AR's interactive narrative centred on the experimental science of geoengineering, the deliberate manipulation of the Earth's atmosphere to counteract global warming, the events and characters in the Bluebird story were entirely fictional but fused with reality online. Inhabiting a mixture of third party social media spaces and websites created by the ABC, the story incorporated real online articles, scientific journals, media and debate around geoengineering. In an Australian first, ABC Innovation launched Bluebird AR on 27 April 2010, with a 6 week live phase. Audience members were invited to play collectively to help 'unlock the drama' and push forward the emerging narrative, or passively watch the story unfold in real-time across the internet. Bluebird AR subverted ARG conventions with the high quality of its production and assets, and raised the stakes for online drama with its level of audience participation." © 2014 ABC "Introduction One of the most exciting creative challenges of producing Bluebird AR was formulating the broad array of visual styles and treatments required for the project's diverse range of content. Many assets also needed to translate well not only online but across other media, including television and print. With the project's producers keen to create a visually rich narrative with high production values from the outset, inspiration for the production design for various aspects of the Bluebird story began in the earliest pitching phase in September 2008. Particular visual treatments and styles for Bluebird's characters, their web spaces and real world possessions were formulated concurrently with the creation of their profiles. Ideas around how various clues and gameplay spaces might look and feel were also explored at this early stage. Bluebird AR's small but tight creative team produced 7 website designs and brands, motion graphics for title sequences and logo animations, rotoscope animation, 3D compositing and animation, 3D wireframes and schematics, countless Photoshop composites, and a vast array of character assets for the DC (including Kyle's Bluebird Labs security pass and resignation letter, Kruger's American and Russia passports and birth certificate, Harrison's divorce papers, and more)…" © 2014 ABC