37,882 research outputs found

    The impact of victim-perpetrator relationship, reputation, and initial point of resistance on officers’ responsibility and authenticity ratings towards hypothetical rape cases

    Get PDF
    Purpose: Previous studies suggest that judgments of responsibility and authenticity made towards hypothetical rape cases differ when specific case factors are varied. However, few studies have examined whether police officers exhibit similar variations in judgment. Methods: Sixteen vignettes depicting a hypothetical rape scenario were created. Vignettes varied on victim-perpetrator relationship, victim reputation, and initial point of resistance. Police officers from a large police force in the United Kingdom (n = 808) provided judgments of victim and perpetrator responsibility, as well as rape authenticity. Results: Officers rated perpetrators as less responsible and gave lower rape authenticity ratings when a partner was the perpetrator, and in ‘late’ resistance scenarios. Officers rated victims as more responsible in ‘bad’ reputation conditions and in ‘late’ resistance conditions. Additional effects of officer sex and receipt of specialist training were also found (i.e., male officers rated the victim as more responsible than female officers), as were several interactions between factors. Conclusions: Results suggest that police officers in the UK may judge victims of rape differentially based on extra-legal case factors. The potential impact on the investigation of rape cases is discussed, and a recommendation for thorough and prompt review of specialist and non-specialist training is made

    Proof of Stanley's conjecture about irreducible character values of the symmetric group

    Full text link
    R. Stanley has found a nice combinatorial formula for characters of irreducible representations of the symmetric group of rectangular shape. Then, he has given a conjectural generalisation for any shape. Here, we will prove this formula using shifted Schur functions and Jucys-Murphy elements.Comment: 9 page

    PassGAN: A Deep Learning Approach for Password Guessing

    Full text link
    State-of-the-art password guessing tools, such as HashCat and John the Ripper, enable users to check billions of passwords per second against password hashes. In addition to performing straightforward dictionary attacks, these tools can expand password dictionaries using password generation rules, such as concatenation of words (e.g., "password123456") and leet speak (e.g., "password" becomes "p4s5w0rd"). Although these rules work well in practice, expanding them to model further passwords is a laborious task that requires specialized expertise. To address this issue, in this paper we introduce PassGAN, a novel approach that replaces human-generated password rules with theory-grounded machine learning algorithms. Instead of relying on manual password analysis, PassGAN uses a Generative Adversarial Network (GAN) to autonomously learn the distribution of real passwords from actual password leaks, and to generate high-quality password guesses. Our experiments show that this approach is very promising. When we evaluated PassGAN on two large password datasets, we were able to surpass rule-based and state-of-the-art machine learning password guessing tools. However, in contrast with the other tools, PassGAN achieved this result without any a-priori knowledge on passwords or common password structures. Additionally, when we combined the output of PassGAN with the output of HashCat, we were able to match 51%-73% more passwords than with HashCat alone. This is remarkable, because it shows that PassGAN can autonomously extract a considerable number of password properties that current state-of-the art rules do not encode.Comment: This is an extended version of the paper which appeared in NeurIPS 2018 Workshop on Security in Machine Learning (SecML'18), see https://github.com/secml2018/secml2018.github.io/raw/master/PASSGAN_SECML2018.pd

    Five-dimensional Monopole Equation with Hedge-Hog Ansatz and Abel's Differential Equation

    Full text link
    We review the generalized monopole in the five-dimensional Euclidean space. A numerical solution with the Hedge-Hog ansatz is studied. The Bogomol'nyi equation becomes a second order autonomous non-linear differential equation. The equation can be translated into the Abel's differential equation of the second kind and is an algebraic differential equation.Comment: 4 pages, 4 figures, typos correcte

    The Molonglo Galactic Plane Survey (MGPS-2): Compact Source Catalogue

    Full text link
    We present the first data release from the second epoch Molonglo Galactic Plane Survey (MGPS-2). MGPS-2 was carried out with the Molonglo Observatory Synthesis Telescope at a frequency of 843 MHz and with a restoring beam of 45 arcsec x 45 arcsec cosec(dec), making it the highest resolution large scale radio survey of the southern Galactic plane. It covers the range |b| < 10 deg and 245 deg < l < 365 deg and is the Galactic counterpart to the Sydney University Molonglo Sky Survey (SUMSS) which covers the whole southern sky with dec 10 deg). In this paper we present the MGPS-2 compact source catalogue. The catalogue has 48,850 sources above a limiting peak brightness of 10 mJy/beam. Positions in the catalogue are accurate to 1 arcsec - 2 arcsec. A full catalogue including extended sources is in preparation. We have carried out an analysis of the compact source density across the Galactic plane and find that the source density is not statistically higher than the density expected from the extragalactic source density alone. We also present version 2.0 of the SUMSS image data and catalogue which are now available online. The data consists of 629 4.3 deg x 4.3 deg mosaic images covering the 8100 deg^2 of sky with dec 10 deg. The catalogue contains 210,412 radio sources to a limiting peak brightness of 6 mJy/beam at dec -50 deg. We describe the updates and improvements made to the SUMSS cataloguing process.Comment: 12 pages, 9 figures, to be published in MNRAS Note that Figures 8 and 9 are much lower resolution than in the published versio

    Statistical region based active contour using a fractional entropy descriptor: Application to nuclei cell segmentation in confocal microscopy images

    Get PDF
    We propose an unsupervised statistical region based active contour approach integrating an original fractional entropy measure for image segmentation with a particular application to single channel actin tagged fluorescence confocal microscopy image segmentation. Following description of statistical based active contour segmentation and the mathematical definition of the proposed fractional entropy descriptor, we demonstrate comparative segmentation results between the proposed approach and standard Shannon’s entropy on synthetic and natural images. We also show that the proposed unsupervised statistical based approach, integrating the fractional entropy measure, leads to very satisfactory segmentation of the cell nuclei from which shape characterization can be calculated
    • …
    corecore