435 resultados para Theft detections


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Feature selection has been actively pursued in the last years, since to find the most discriminative set of features can enhance the recognition rates and also to make feature extraction faster. In this paper, the propose a new feature selection called Binary Cuckoo Search, which is based on the behavior of cuckoo birds. The experiments were carried out in the context of theft detection in power distribution systems in two datasets obtained from a Brazilian electrical power company, and have demonstrated the robustness of the proposed technique against with several others nature-inspired optimization techniques. © 2013 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In New Zealand, 200,000 licensed shooters (5.5% of the population) own an estimated 1 million firearms, 9 times more guns per capita than in England and Wales and 20% more than in Australia. Based on a 3 year study of firearm theft in New Zealand, this paper concludes that insecure storage of lawfully held weapons by licensed owners poses a significant public health and safety risk. Furthermore, this paper concludes that the failure of the police to enforce New Zealand gun security laws, and the government's hesitancy to develop firearm education and regulation policies, exacerbates insecure firearm storage, a key factor in firearm-related theft, injury, suicide, violence and criminal activity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present an entanglement purification scheme for the mixed entangled states of electrons with the aid of charge detections. Our scheme adopts the electronic polarizing beam splitters rather than the controlled-NOT (CNOT) operations, but the total successful probability of our scheme can reach the quantity as large as that of the the CNOT-operation-based protocol and twice as large as that of linear-optics-based protocol for the purification of photonic entangled states. Thus our scheme can achieve a high successful prabability without the usage of CNOT operations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Photon quantum statistics of light can be shown by the high-order coherence. The fourth-order coherences of various quantum states including Pock states, coherent states, thermal states and squeezed vacuum states are investigated based on a double Banbury Brown Twiss (HBT) scheme. The analytical results are obtained by taking the overall efficiency and background into account.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

SU-8 epoxy-based negative photoresist has been extensively employed as a structural material for fabrication of numerous biological microelectro-mechanical systems (Bio-MEMS) or lab-on-a-chip (LOC) devices. However, SU-8 has a high autofluorescence level that limits sensitivity of microdevices that use fluorescence as the predominant detection workhorse. Here, we show that deposition of a thin gold nanoparticles layer onto the SU-8 surface significantly reduces the autofluorescence of the coated SU-8 surface by as much as 81% compared to bare SU-8. Furthermore, DNA probes can easily be immobilized on the Au surface with high thermal stability. These improvements enabled sensitive DNA detection by simple DNA hybridization down to 1 nM (a two orders of magnitude improvement) or by solid-phase PCR with sub-picomolar sensitivity. The approach is simple and easy to perform, making it suitable for various Bio-MEMs and LOC devices that use SU-8 as a structural material.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper queries the soundness of the view that wrongful possession (eg a thief’s possession of goods he has stolen) should be protected by the standard actions for interference with goods. It uses close historical analysis of the development of the relevant concepts through the cases to argue that this is not a proposition that is compelled on the authorities, nor one demanded as a matter of principle. It then abstracts to consider the implications of this argument at a theoretical level, exposing great need for development in the common law’s basic principles of possessory protection. It argues innovatively that the objects of the law might be better served by the creation of a more limited form of possessory protection, achieved through the possessor’s acquisition of a personal right, and correlatively that the values that underpin and justify our basic rules of possessory protection entail a more nuanced response to matters of property acquisition.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present new detections of cyanodiacetylene (HC5N) toward hot molecular cores, observed with the Tidbinbilla 34 m radio telescope (DSS–34). In a sample of 79 hot molecular cores, HC5N was detected towards 35. These results are counter to the expectation that long chain cyanopolyynes, such as HC5N, are not typically found in hot molecular cores, unlike their shorter chain counterpart HC3N. However it is consistent with recent models which suggest HC5N may exist for a limited period during the evolution of hot molecular cores.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter discusses the potential uses of both found poetry and imitiation poetry as teaching material for undergraduate creative poetry students.