8,734 research outputs found

    Main specifications of CFD codes for WUIVIEW activities

    Get PDF
    CFD simulations will be the core activity of the WUVIEW performance based fire safety analysis. The purpose of this document is to provide WUIVIEW partners with a general overview of the CFD codes to be used in the Action. The general simulation framework is described, particularly highlighting data inputs and scenario description requirements, to be developed in subsequent WUIVIEW WPs. This TN provides the technical foundations and main specifications of the databases to be designed within the WUIVIEW working program (ongoing action by UPC).Postprint (updated version

    Image counter-forensics based on feature injection

    Get PDF
    Starting from the concept that many image forensic tools are based on the detection of some features revealing a particular aspect of the history of an image, in this work we model the counter-forensic attack as the injection of a specific fake feature pointing to the same history of an authentic reference image. We propose a general attack strategy that does not rely on a specific detector structure. Given a source image x and a target image y, the adversary processes x in the pixel domain producing an attacked image (x) over tilde, perceptually similar to x, whose feature f((x) over tilde) is as close as possible to f (y) computed on y. Our proposed counter-forensic attack consists in the constrained minimization of the feature distance Phi(z) = vertical bar f (z) f (y) vertical bar through iterative methods based on gradient descent. To solve the intrinsic limit due to the numerical estimation of the gradient on large images, we propose the application of a feature decomposition process, that allows the problem to be reduced into many subproblems on the blocks the image is partitioned into. The proposed strategy has been tested by attacking three different features and its performance has been compared to state-of-the-art counter-forensic methods

    Close Reading with Computers: Genre Signals, Parts of Speech, and David Mitchell’s Cloud Atlas

    Get PDF
    David Mitchell’s Cloud Atlas (2004) contains six different generic registers. This article is the first to explore computationally the linguistic mechanisms that create these genre effects. Authorship attribution techniques incorrectly cluster the chapters of Cloud Atlas as distinct ‘authors’ using anything above the nineteen most-common words. This has implications for understandings of literary style and authorship. The seafaring parts of Mitchell’s novel, however, do not correlate with the writings of Herman Melville using Burrows’s delta method. Part-of-speech trigram visualization and analysis reveals the unique present-tense linguistic phrasings (NNP NNP VBZ and NNP VBZ DT) that lend pace to the Luisa Rey section of the novel
    • 

    corecore