81,062 research outputs found
Reflex of Avoidance in Spatial Restrictions for Signatures and Handwritten Entries
Regarding the myriad disputed documents encountered within the science of forensic document examination, questioned handwriting is the most prevalent. This includes the simulation or alteration of and or additions to handwriting and signatures. The current study examined the changes that may occur in writing when given a limited amount of space. Several participants completed a survey wherein writing samples were taken under varying space allowances. These space restrictions were made under differing conditions such as boxed signatures, additions to prewritten material, and alterations to letters and numbers. The results of the study found characteristics of reflex of avoidance in the participants\u27 handwriting. These characteristics included changes in height, width, and letter spacing in accordance to the amount of space provided. The examples of reflex of avoidance defined throughout this study may serve to assist forensic document examiners in the detection of alterations within questioned documents
Remote Macroscopic Entanglement on a Photonic Crystal Architecture
The outstanding progress in nanostructure fabrication and cooling
technologies allows what was unthinkable a few decades ago: bringing
single-mode mechanical vibrations to the quantum regime. The coupling between
photon and phonon excitations is a natural source of nonclassical states of
light and mechanical vibrations, and its study within the field of cavity
optomechanics is developing lightning-fast. Photonic crystal cavities are
highly integrable architectures that have demonstrated the strongest
optomechanical coupling to date, and should therefore play a central role for
such hybrid quantum state engineering. In this context, we propose a realistic
heralding protocol for the on-chip preparation of remotely entangled mechanical
states, relying on the state-of-the-art optomechanical parameters of a
silicon-based nanobeam structure. Pulsed sideband excitation of a Stokes
process, combined with single photon detection, allows writing a delocalised
mechanical Bell state in the system, signatures of which can then be read out
in the optical field. A measure of entanglement in this protocol is provided by
the visibility of a characteristic quantum interference pattern in the emitted
light.Comment: 8 pages, 5 Figure
CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection
Intrusion Detection Systems are an accepted and very
useful option to monitor, and detect malicious activities.
However, Intrusion Detection Systems have inherent limitations which lead to false positives and false negatives; we propose that combining signature and anomaly based IDSs should be examined. This paper contrasts signature and anomaly-based IDSs, and critiques some proposals about hybrid IDSs with signature and heuristic capabilities, before considering some of their contributions in order to include them as main features of a new hybrid IDS named CONDOR (COmbined Network intrusion Detection ORientate), which is designed to offer superior pattern analysis and anomaly detection by reducing false positive rates and administrator intervention
Scalable Techniques for Similarity Search
Document similarity is similar to the nearest neighbour problem and has applications in various domains. In order to determine the similarity / dissimilarity of the documents first they need to be converted into sets containing shingles. Each document is converted into k-shingles, k being the length of each shingle. The similarity is calculated using Jaccard distance between sets and output into a characteristic matrix, the complexity to parse this matrix is significantly high especially when the sets are large. In this project we explore various approaches such as Min hashing, LSH & Bloom Filter to decrease the matrix size and to improve the time complexity. Min hashing creates a signature matrix which significantly smaller compared to a characteristic matrix. In this project we will look into Min-Hashing implementation, pros and cons. Also we will explore Locality Sensitive Hashing, Bloom Filters and their advantages
- …