81,062 research outputs found

    Reflex of Avoidance in Spatial Restrictions for Signatures and Handwritten Entries

    Get PDF
    Regarding the myriad disputed documents encountered within the science of forensic document examination, questioned handwriting is the most prevalent. This includes the simulation or alteration of and or additions to handwriting and signatures. The current study examined the changes that may occur in writing when given a limited amount of space. Several participants completed a survey wherein writing samples were taken under varying space allowances. These space restrictions were made under differing conditions such as boxed signatures, additions to prewritten material, and alterations to letters and numbers. The results of the study found characteristics of reflex of avoidance in the participants\u27 handwriting. These characteristics included changes in height, width, and letter spacing in accordance to the amount of space provided. The examples of reflex of avoidance defined throughout this study may serve to assist forensic document examiners in the detection of alterations within questioned documents

    Remote Macroscopic Entanglement on a Photonic Crystal Architecture

    Get PDF
    The outstanding progress in nanostructure fabrication and cooling technologies allows what was unthinkable a few decades ago: bringing single-mode mechanical vibrations to the quantum regime. The coupling between photon and phonon excitations is a natural source of nonclassical states of light and mechanical vibrations, and its study within the field of cavity optomechanics is developing lightning-fast. Photonic crystal cavities are highly integrable architectures that have demonstrated the strongest optomechanical coupling to date, and should therefore play a central role for such hybrid quantum state engineering. In this context, we propose a realistic heralding protocol for the on-chip preparation of remotely entangled mechanical states, relying on the state-of-the-art optomechanical parameters of a silicon-based nanobeam structure. Pulsed sideband excitation of a Stokes process, combined with single photon detection, allows writing a delocalised mechanical Bell state in the system, signatures of which can then be read out in the optical field. A measure of entanglement in this protocol is provided by the visibility of a characteristic quantum interference pattern in the emitted light.Comment: 8 pages, 5 Figure

    CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection

    Get PDF
    Intrusion Detection Systems are an accepted and very useful option to monitor, and detect malicious activities. However, Intrusion Detection Systems have inherent limitations which lead to false positives and false negatives; we propose that combining signature and anomaly based IDSs should be examined. This paper contrasts signature and anomaly-based IDSs, and critiques some proposals about hybrid IDSs with signature and heuristic capabilities, before considering some of their contributions in order to include them as main features of a new hybrid IDS named CONDOR (COmbined Network intrusion Detection ORientate), which is designed to offer superior pattern analysis and anomaly detection by reducing false positive rates and administrator intervention

    Scalable Techniques for Similarity Search

    Get PDF
    Document similarity is similar to the nearest neighbour problem and has applications in various domains. In order to determine the similarity / dissimilarity of the documents first they need to be converted into sets containing shingles. Each document is converted into k-shingles, k being the length of each shingle. The similarity is calculated using Jaccard distance between sets and output into a characteristic matrix, the complexity to parse this matrix is significantly high especially when the sets are large. In this project we explore various approaches such as Min hashing, LSH & Bloom Filter to decrease the matrix size and to improve the time complexity. Min hashing creates a signature matrix which significantly smaller compared to a characteristic matrix. In this project we will look into Min-Hashing implementation, pros and cons. Also we will explore Locality Sensitive Hashing, Bloom Filters and their advantages
    • …
    corecore