9,007 research outputs found
Aircraft/lidar turbulence comparison
Very good agreement between remotely sensed winds using a ground-based Doppler lidar and in situ measurements with an instrumented aircraft is possible. Results show that turbulence intensities computed from time histories measured with the aircraft and time histories of the radial wind measured with lidar can be analyzed statistically to provide turbulence intensities and turbulence spectra which agree well with one another. The results further show that the second moment data, as presently compared with the NASA/MSFC algorithms, do not provide meaningful comparisons with turbulence intensities measured with the aircraft. This disagreement, however, must be investigated further in terms of the accuracy of the second moment data determined by both the lidar hardware and the algorithm for computing the second moment
Tunneling-induced restoration of classical degeneracy in quantum kagome ice
Quantum effect is expected to dictate the behavior of physical systems at low temperature. For quantum magnets with geometrical frustration, quantum fluctuation usually lifts the macroscopic classical degeneracy, and exotic quantum states emerge. However, how different types of quantum processes entangle wave functions in a constrained Hilbert space is not well understood. Here, we study the topological entanglement entropy and the thermal entropy of a quantum ice model on a geometrically frustrated kagome lattice. We find that the system does not show a Z(2) topological order down to extremely low temperature, yet continues to behave like a classical kagome ice with finite residual entropy. Our theoretical analysis indicates an intricate competition of off-diagonal and diagonal quantum processes leading to the quasidegeneracy of states and effectively, the classical degeneracy is restored
R2-D2: ColoR-inspired Convolutional NeuRal Network (CNN)-based AndroiD Malware Detections
The influence of Deep Learning on image identification and natural language
processing has attracted enormous attention globally. The convolution neural
network that can learn without prior extraction of features fits well in
response to the rapid iteration of Android malware. The traditional solution
for detecting Android malware requires continuous learning through
pre-extracted features to maintain high performance of identifying the malware.
In order to reduce the manpower of feature engineering prior to the condition
of not to extract pre-selected features, we have developed a coloR-inspired
convolutional neuRal networks (CNN)-based AndroiD malware Detection (R2-D2)
system. The system can convert the bytecode of classes.dex from Android archive
file to rgb color code and store it as a color image with fixed size. The color
image is input to the convolutional neural network for automatic feature
extraction and training. The data was collected from Jan. 2017 to Aug 2017.
During the period of time, we have collected approximately 2 million of benign
and malicious Android apps for our experiments with the help from our research
partner Leopard Mobile Inc. Our experiment results demonstrate that the
proposed system has accurate security analysis on contracts. Furthermore, we
keep our research results and experiment materials on http://R2D2.TWMAN.ORG.Comment: Verison 2018/11/15, IEEE BigData 2018, Seattle, WA, USA, Dec 10-13,
2018. (Accepted
Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection
The advance of smartphones and cellular networks boosts the need of mobile
advertising and targeted marketing. However, it also triggers the unseen
security threats. We found that the phone scams with fake calling numbers of
very short lifetime are increasingly popular and have been used to trick the
users. The harm is worldwide. On the other hand, deceptive advertising
(deceptive ads), the fake ads that tricks users to install unnecessary apps via
either alluring or daunting texts and pictures, is an emerging threat that
seriously harms the reputation of the advertiser. To counter against these two
new threats, the conventional blacklist (or whitelist) approach and the machine
learning approach with predefined features have been proven useless.
Nevertheless, due to the success of deep learning in developing the highly
intelligent program, our system can efficiently and effectively detect phone
scams and deceptive ads by taking advantage of our unified framework on deep
neural network (DNN) and convolutional neural network (CNN). The proposed
system has been deployed for operational use and the experimental results
proved the effectiveness of our proposed system. Furthermore, we keep our
research results and release experiment material on
http://DeceptiveAds.TWMAN.ORG and http://PhoneScams.TWMAN.ORG if there is any
update.Comment: 6 pages, TAAI 2017 versio
- …