17,307 research outputs found
Better Safe Than Sorry: An Adversarial Approach to Improve Social Bot Detection
The arm race between spambots and spambot-detectors is made of several cycles
(or generations): a new wave of spambots is created (and new spam is spread),
new spambot filters are derived and old spambots mutate (or evolve) to new
species. Recently, with the diffusion of the adversarial learning approach, a
new practice is emerging: to manipulate on purpose target samples in order to
make stronger detection models. Here, we manipulate generations of Twitter
social bots, to obtain - and study - their possible future evolutions, with the
aim of eventually deriving more effective detection techniques. In detail, we
propose and experiment with a novel genetic algorithm for the synthesis of
online accounts. The algorithm allows to create synthetic evolved versions of
current state-of-the-art social bots. Results demonstrate that synthetic bots
really escape current detection techniques. However, they give all the needed
elements to improve such techniques, making possible a proactive approach for
the design of social bot detection systems.Comment: This is the pre-final version of a paper accepted @ 11th ACM
Conference on Web Science, June 30-July 3, 2019, Boston, U
Predicting the energy output of wind farms based on weather data: important variables and their correlation
Pre-print available at: http://arxiv.org/abs/1109.1922Wind energy plays an increasing role in the supply of energy world wide. The energy output of a wind farm is highly dependent on the weather conditions present at its site. If the output can be predicted more accurately, energy suppliers can coordinate the collaborative production of different energy sources more efficiently to avoid costly overproduction. In this paper, we take a computer science perspective on energy prediction based on weather data and analyze the important parameters as well as their correlation on the energy output. To deal with the interaction of the different parameters, we use symbolic regression based on the genetic programming tool DataModeler. Our studies are carried out on publicly available weather and energy data for a wind farm in Australia. We report on the correlation of the different variables for the energy output. The model obtained for energy prediction gives a very reliable prediction of the energy output for newly supplied weather data. © 2012 Elsevier Ltd.Ekaterina Vladislavleva, Tobias Friedrich, Frank Neumann, Markus Wagne
IllinoisGRMHD: An Open-Source, User-Friendly GRMHD Code for Dynamical Spacetimes
In the extreme violence of merger and mass accretion, compact objects like
black holes and neutron stars are thought to launch some of the most luminous
outbursts of electromagnetic and gravitational wave energy in the Universe.
Modeling these systems realistically is a central problem in theoretical
astrophysics, but has proven extremely challenging, requiring the development
of numerical relativity codes that solve Einstein's equations for the
spacetime, coupled to the equations of general relativistic (ideal)
magnetohydrodynamics (GRMHD) for the magnetized fluids. Over the past decade,
the Illinois Numerical Relativity (ILNR) Group's dynamical spacetime GRMHD code
has proven itself as a robust and reliable tool for theoretical modeling of
such GRMHD phenomena. However, the code was written "by experts and for
experts" of the code, with a steep learning curve that would severely hinder
community adoption if it were open-sourced. Here we present IllinoisGRMHD,
which is an open-source, highly-extensible rewrite of the original
closed-source GRMHD code of the ILNR Group. Reducing the learning curve was the
primary focus of this rewrite, with the goal of facilitating community
involvement in the code's use and development, as well as the minimization of
human effort in generating new science. IllinoisGRMHD also saves computer time,
generating roundoff-precision identical output to the original code on
adaptive-mesh grids, but nearly twice as fast at scales of hundreds to
thousands of cores.Comment: 37 pages, 6 figures, single column. Matches published versio
The role of urban living labs in a smart city
In a rapidly changing socio-technical environment cities are increasingly seen as main drivers for change. Against this backdrop, this paper studies the emerging Urban Living Lab and Smart City concepts from a project based perspective, by assessing a series of five Smart City initiatives within one local city ecosystem. A conceptual and analytical framework is used to analyse the architecture, nature and outcomes of the Smart City Ghent and the role of Urban Living Labs. The results of our analysis highlight the potential for social value creation and urban transition. However, current Smart City initiatives face the challenge of evolving from demonstrators towards real sustainable value. Furthermore, Smart Cities often have a technological deterministic, project-based approach, which forecloses a sustainable, permanent and growing future for the project outcomes. ‘City-governed’ Urban Living Labs have an interesting potential to overcome some of the identified challenges
Comprehensive Security Framework for Global Threats Analysis
Cyber criminality activities are changing and becoming more and more professional. With the growth of financial flows through the Internet and the Information System (IS), new kinds of thread arise involving complex scenarios spread within multiple IS components. The IS information modeling and Behavioral Analysis are becoming new solutions to normalize the IS information and counter these new threads. This paper presents a framework which details the principal and necessary steps for monitoring an IS. We present the architecture of the framework, i.e. an ontology of activities carried out within an IS to model security information and User Behavioral analysis. The results of the performed experiments on real data show that the modeling is effective to reduce the amount of events by 91%. The User Behavioral Analysis on uniform modeled data is also effective, detecting more than 80% of legitimate actions of attack scenarios
A semantic-based platform for the digital analysis of architectural heritage
This essay focuses on the fields of architectural documentation and digital representation. We present a research paper concerning the development of an information system at the scale of architecture, taking into account the relationships that can be established between the representation of buildings (shape, dimension, state of conservation, hypothetical restitution) and heterogeneous information about various fields (such as the technical, the documentary or still the historical one). The proposed approach aims to organize multiple representations (and associated information) around a semantic description model with the goal of defining a system for the multi-field analysis of buildings
- …