8,734 research outputs found
Main specifications of CFD codes for WUIVIEW activities
CFD simulations will be the core activity of the WUVIEW performance based fire safety analysis. The purpose of this document is to provide WUIVIEW partners with a general overview of the CFD codes to be used in the Action.
The general simulation framework is described, particularly highlighting data inputs and scenario description requirements, to be developed in subsequent WUIVIEW WPs. This TN provides the technical foundations and main specifications of the databases to be designed within the WUIVIEW working program (ongoing action by UPC).Postprint (updated version
Recommended from our members
Identifying idiolect in forensic authorship attribution: an n-gram textbite approach
Forensic authorship attribution is concerned with identifying authors of disputed or anonymous documents, which are potentially evidential in legal cases, through the analysis of linguistic clues left behind by writers. The forensic linguist âapproaches this problem of questioned authorship from the theoretical position that every native speaker has their own distinct and individual version of the language [. . . ], their own idiolectâ (Coulthard, 2004: 31). However, given the diXculty in empirically substantiating a theory of idiolect, there is growing concern in the Veld that it remains too abstract to be of practical use (Kredens, 2002; Grant, 2010; Turell, 2010). Stylistic, corpus, and computational approaches to text, however, are able to identify repeated collocational patterns, or n-grams, two to six word chunks of language, similar to the popular notion of soundbites: small segments of no more than a few seconds of speech that journalists are able to recognise as having news value and which characterise the important moments of talk. The soundbite oUers an intriguing parallel for authorship attribution studies, with the following question arising: looking at any set of texts by any author, is it possible to identify ân-gram textbitesâ, small textual segments that characterise that authorâs writing, providing DNA-like chunks of identifying material
Image counter-forensics based on feature injection
Starting from the concept that many image forensic tools are based on the detection of some features revealing a particular aspect of the history of an image, in this work we model the counter-forensic attack as the injection of a specific fake feature pointing to the same history of an authentic reference image. We propose a general attack strategy that does not rely on a specific detector structure. Given a source image x and a target image y, the adversary processes x in the pixel domain producing an attacked image (x) over tilde, perceptually similar to x, whose feature f((x) over tilde) is as close as possible to f (y) computed on y. Our proposed counter-forensic attack consists in the constrained minimization of the feature distance Phi(z) = vertical bar f (z) f (y) vertical bar through iterative methods based on gradient descent. To solve the intrinsic limit due to the numerical estimation of the gradient on large images, we propose the application of a feature decomposition process, that allows the problem to be reduced into many subproblems on the blocks the image is partitioned into. The proposed strategy has been tested by attacking three different features and its performance has been compared to state-of-the-art counter-forensic methods
Close Reading with Computers: Genre Signals, Parts of Speech, and David Mitchellâs Cloud Atlas
David Mitchellâs Cloud Atlas (2004) contains six different generic registers. This article is the first to explore computationally the linguistic mechanisms that create these genre effects. Authorship attribution techniques incorrectly cluster the chapters of Cloud Atlas as distinct âauthorsâ using anything above the nineteen most-common words. This has implications for understandings of literary style and authorship. The seafaring parts of Mitchellâs novel, however, do not correlate with the writings of Herman Melville using Burrowsâs delta method. Part-of-speech trigram visualization and analysis reveals the unique present-tense linguistic phrasings (NNP NNP VBZ and NNP VBZ DT) that lend pace to the Luisa Rey section of the novel
- âŠ