2,406 research outputs found
Evaluating Human Driving Behavior and Traffic Operation Conditions during Wildfire Evacuation Using Connected Vehicles Data
With climate change and the resulting rise in temperatures, wildfire risk is increasing all over the world, particularly in the western United States, and the communities in wildland-urban interface (WUI) areas are at the greatest risk of fire. Understanding the driving behavior of individuals during evacuating fire-affected WUI areas is important because the evacuees may encounter difficult driving conditions and traffic congestions due to proximity to flammable vegetation and limited exit routes. Existing studies lack empirical data on evacuee driving behavior and traffic operation conditions during a wildfire evacuation. This study used two distinct connected vehicles (CV) datasets that contain lane-level precision historical vehicle trajectory and driving events datasets to investigate the traffic delays and driving behavior of individuals during historical wildfire evacuation events. The results of the study showed that the CV-datasets are a valuable source to accurately evaluate human driving behavior and calculate traffic delays in wildfire-caused evacuations
Centralized vs Decentralized Multi-Agent Guesswork
We study a notion of guesswork, where multiple agents intend to launch a
coordinated brute-force attack to find a single binary secret string, and each
agent has access to side information generated through either a BEC or a BSC.
The average number of trials required to find the secret string grows
exponentially with the length of the string, and the rate of the growth is
called the guesswork exponent. We compute the guesswork exponent for several
multi-agent attacks. We show that a multi-agent attack reduces the guesswork
exponent compared to a single agent, even when the agents do not exchange
information to coordinate their attack, and try to individually guess the
secret string using a predetermined scheme in a decentralized fashion. Further,
we show that the guesswork exponent of two agents who do coordinate their
attack is strictly smaller than that of any finite number of agents
individually performing decentralized guesswork.Comment: Accepted at IEEE International Symposium on Information Theory (ISIT)
201
Rough Maximal Oscillatory Singular Integral Operators
2000 Mathematics Subject Classification: Primary 42B20; Secondary 42B15, 42B25In this paper, we establish the L^p boundedness of certain maximal oscillatory singular integral operators with rough kernels belonging to certain block spaces. Our L^p boundedness result improves previously known results
Constructing 3D faces from natural language interface
This thesis presents a system by which 3D images of human faces can be constructed
using a natural language interface. The driving force behind the project was the need to
create a system whereby a machine could produce artistic images from verbal or
composed descriptions. This research is the first to look at constructing and modifying
facial image artwork using a natural language interface.
Specialised modules have been developed to control geometry of 3D polygonal head
models in a commercial modeller from natural language descriptions. These modules
were produced from research on human physiognomy, 3D modelling techniques and
tools, facial modelling and natural language processing. [Continues.
REPRESENTASI MITOS DALAM FILM HOROR PADA WAKTU MAGHRIB : ANALISIS NARATIF DAN VISUAL
This study aims to analyze the representation of myths in horror films at Maghrib time. Myths related to Maghrib Time are often an interesting element in horror films, because they contain elements of mystery, belief, and fear that are related to cultural and religious contexts. In this study, researchers conducted narrative and visual analysis to understand how this myth is represented in horror films at Maghrib Time. This study focuses on narrative elements and the use of visual techniques to create a frightening atmosphere. Research data was collected by collecting samples of horror films that are relevant to the theme of Maghrib Time. The results of the analysis show that the representation of myths in horror films at Maghrib Time involves the use of symbols, timing, lighting, and music that create a dark, gripping, and fear-inducing atmosphere in the audience. The implication of this research is to provide a deeper understanding of how myths and culture related to Maghrib Time can be utilized in the context of horror films, as well as providing insight to filmmakers in creating effective effects in presenting fear to the audience.Penelitian ini bertujuan untuk menganalisis representasi mitos dalam film horor pada Waktu Maghrib. Mitos yang terkait dengan Waktu Maghrib sering kali menjadi elemen yang menarik dalam film horor, karena mereka mengandung unsur misteri, kepercayaan, dan ketakutan yang berhubungan dengan konteks budaya dan agama. Dalam penelitian ini, peneliti melakukan analisis naratif dan visual untuk memahami bagaimana mitos tersebut direpresentasikan dalam film horor pada Waktu Maghrib. Penelitian ini berfokus pada elemen-elemen naratif dan penggunaan teknik visual yang digunakan untuk menciptakan atmosfer yang menakutkan. Data penelitian dikumpulkan melalui pengumpulan sampel film horor yang relevan dengan tema Waktu Maghrib. Hasil analisis menunjukkan bahwa representasi mitos dalam film horor pada Waktu Maghrib melibatkan penggunaan simbol, pengaturan waktu, pencahayaan, dan musik yang menciptakan suasana yang gelap, mencekam, dan membangkitkan rasa takut pada penonton. Implikasi penelitian ini memberikan pemahaman yang lebih dalam tentang bagaimana mitos dan budaya terkait Waktu Maghrib dapat dimanfaatkan dalam konteks film horor, serta memberikan wawasan kepada pembuat film dalam menciptakan efek yang efektif dalam menghadirkan ketakutan kepada penonton
PENGGUNAAN MEDIA SOSIAL DALAM KAMPANYE POLITIK DAN DAMPAKNYA TERHADAP PARTISIPASI POLOTIK DAN PERSEPSI PUBLIK
In this increasingly advanced digital era, social media has become a powerful platform for sharing information, influencing opinion, and mobilizing the masses. Therefore, it is important to understand how the use of social media in political campaigns affects political participation and public perception. This study aims to investigate the effect of social media on political behavior, with a focus on the use of social media in political campaigns and its impact on political participation and public perception. This research will use a case study approach to analyze several political campaigns that involve social media as the main communication tool. Data will be collected through online surveys, interviews and analysis of social media content. Respondents who were sampled in this study were individuals involved in political campaigns using social media, as well as the general public who actively consume political content on social media. Based on this research, it can be concluded that the use of social media in political campaigns has a significant influence on political behavior, political participation and public perception
Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization
In September 2017, McAffee Labs quarterly report estimated that brute force
attacks represent 20\% of total network attacks, making them the most prevalent
type of attack ex-aequo with browser based vulnerabilities. These attacks have
sometimes catastrophic consequences, and understanding their fundamental limits
may play an important role in the risk assessment of password-secured systems,
and in the design of better security protocols. While some solutions exist to
prevent online brute-force attacks that arise from one single IP address,
attacks performed by botnets are more challenging. In this paper, we analyze
these distributed attacks by using a simplified model. Our aim is to understand
the impact of distribution and asynchronization on the overall computational
effort necessary to breach a system. Our result is based on Guesswork, a
measure of the number of queries (guesses) required of an adversary before a
correct sequence, such as a password, is found in an optimal attack. Guesswork
is a direct surrogate for time and computational effort of guessing a sequence
from a set of sequences with associated likelihoods. We model the lack of
synchronization by a worst-case optimization in which the queries made by
multiple adversarial agents are received in the worst possible order for the
adversary, resulting in a min-max formulation. We show that, even without
synchronization, and for sequences of growing length, the asymptotic optimal
performance is achievable by using randomized guesses drawn from an appropriate
distribution. Therefore, randomization is key for distributed asynchronous
attacks. In other words, asynchronous guessers can asymptotically perform
brute-force attacks as efficiently as synchronized guessers.Comment: Accepted to IEEE Transactions on Information Forensics and Securit
- …