66 research outputs found

    The Doyen of Dixie: A Survey of the Banjo Stylings of Uncle Dave Macon

    Get PDF
    David Harrison Macon (1870-1952) is often memorialized for his showmanship rather than his banjo playing. To compartmentalize such a significant American musician yields a wide gap within scholarship about Macon, country music history and the banjo. Macon’s banjo playing, documented through over two-hundred and fifty recordings made between the 1920s and 1950s, represents an array of cultures, eras, ethnicities, and styles all preserved in the repertoire of one of the most prolific country musicians of the 20th century. This study reveals Macon’s playing by considering such factors as influences that preceded his professional tenure, identifying elements within his playing from specific stylistic origins, and by technically notating selections from Macon’s canon that represent those influences. To understand the instrumental playing of one of early country music’s most important figures broadens understanding of banjo influences from the nineteenth century which laid the foundation for the instrument’s renaissance in the twentieth century

    Search Rank Fraud De-Anonymization in Online Systems

    Full text link
    We introduce the fraud de-anonymization problem, that goes beyond fraud detection, to unmask the human masterminds responsible for posting search rank fraud in online systems. We collect and study search rank fraud data from Upwork, and survey the capabilities and behaviors of 58 search rank fraudsters recruited from 6 crowdsourcing sites. We propose Dolos, a fraud de-anonymization system that leverages traits and behaviors extracted from these studies, to attribute detected fraud to crowdsourcing site fraudsters, thus to real identities and bank accounts. We introduce MCDense, a min-cut dense component detection algorithm to uncover groups of user accounts controlled by different fraudsters, and leverage stylometry and deep learning to attribute them to crowdsourcing site profiles. Dolos correctly identified the owners of 95% of fraudster-controlled communities, and uncovered fraudsters who promoted as many as 97.5% of fraud apps we collected from Google Play. When evaluated on 13,087 apps (820,760 reviews), which we monitored over more than 6 months, Dolos identified 1,056 apps with suspicious reviewer groups. We report orthogonal evidence of their fraud, including fraud duplicates and fraud re-posts.Comment: The 29Th ACM Conference on Hypertext and Social Media, July 201

    UA12/2/1 Grad Guide

    Get PDF
    Magazine edition of the College Heights Herald featuring the Class of 2022. Crawford, Ashlyn. Dear 2022 Graduates Jones, Tea. Survival Guide for Post Graduate Job Prep Wilson, Gabby. Time for Your Close-up! Wilson, Gabby. Your Grad Book List Honeck, Adelle. Taking Risks: Advice to Graduates Potter College of Arts & Letters College of Health & Human Services College of Education & Behavioral Sciences Ogden College of Science & Engineering Gordon Ford College of Business Brush, Bailey. Grad Playlis

    Hubungan Kualitas Tidur dan Kejadian Stroke Iskemik di Bangsal dan Poliklinik Saraf RSUD Dokter Abdul Aziz Singkawang

    Get PDF
    Latar belakang. Stroke merupakan penyebab utama dari kecacatan dan kematian di seluruh dunia. Gangguan kualitas tidur dalam beberapa tahun terakhir ini dipandang sebagai faktor potensial penyebab terjadinya stroke. Ketidakcukupan kualitasdan kuantitas tidur dapat merusak memori dan kemampuan kognitif. Jika hal ini berlanjut hingga bertahun-tahun maka akan berdampak pada risiko terjadinya stroke iskemik. Tujuan. Penelitian ini bertujuan untuk mengetahui hubungan kualitas tidur dan kejadian stroke iskemik di RSUD Dokter Abdul Aziz Singkawang. Metode. Penelitian analitik dengan desain penelitian kasus-kontrol menggunakan kuesioner PSQI (Piitsburgh Sleep Quality Index). Penelitian dilakukan di bangsal penyakit dalam dan poliklinik saraf RSUD dr. Abdul Aziz Singkawang. Kasus-kasus yang memenuhi kriteria diteliti secara retrospektif dengan menggunakan data yang diperoleh dari wawancara menggunakan kuesioner PSQI dan rekam medik. Hasil penelitian diuji dengan uji statistik chi square dengan program SPSS 22.0. Hasil. Analisis statistik diperoleh nilai significancy yang didapatkan dengan uji chi-square adalah 0,037 (p<0,05) dan OR sebesar 0,323. Hasil analisis statistik menunjukkan terdapatnya hubungan bermakna antara kualitas tidur dan kejadian stroke iskemik. Kesimpulan. Terdapat hubungan yang bermakna antara kualitas tidur dan kejadian stroke iskemik. Kualitas tidur yang baik merupakan faktor protektif pada kejadian stroke iskemik.

    Étude d'une Boîte à Outils Multi-Dispositifs

    Get PDF
    International audienceLes boîtes à outils graphiques actuelles ne gèrent qu'un clavier, une souris et un nombre limité de techniques d'interaction. La prolifération de nouveaux dispositifs, en particulier pour les jeux, la CAO, le dessin et l'accès aux handicapés n'est donc pas prise en compte. Cet article présente une étude des difficultés à gérer les modes d'interaction étendus au niveau des boîtes à outils, ainsi qu'une architecture de widget découplant la gestion des événements de la présentation. Cette architecture est réminiscente du modèle MVC de Smalltalk : elle redonne son existence à la composante contrôle qui avait disparue des boîtes à outils. Cependant, notre version définit une interface générique de communication avec la partie vue du widget. Plusieurs contrôleurs peuvent fonctionner en parallèle dans le même widget, autorisant l'interaction pa- rallèle tout en évitant les conflits à un niveau de granularité correspondant aux zones visuelles gérées par le widget. Nous montrons une implémentation partielle de l'architecture dans Java Swing et décrivons quelques contrôleurs spécifiques que nous avons implémentés : un pointeur contrôlé par le clavier et un autre par la voix. Ces pointeurs coexistent et fonctionnent parallèlement sans que l'interface utilisateur ne soit modifiée

    Grizzly Football Game Day Program, September 8, 1984

    Get PDF
    Program created for a Grizzly football game.https://scholarworks.umt.edu/grizzlyfootball_programs_asc/1062/thumbnail.jp

    Playing Hide-and-Seek with Spammers: Detecting Evasive Adversaries in the Online Social Network Domain

    Get PDF
    Online Social Networks (OSNs) have seen an enormous boost in popularity in recent years. Along with this popularity has come tribulations such as privacy concerns, spam, phishing and malware. Many recent works have focused on automatically detecting these unwanted behaviors in OSNs so that they may be removed. These works have developed state-of-the-art detection schemes that use machine learning techniques to automatically classify OSN accounts as spam or non-spam. In this work, these detection schemes are recreated and tested on new data. Through this analysis, it is clear that spammers are beginning to evade even these detectors. The evasion tactics used by spammers are identified and analyzed. Then a new detection scheme is built upon the previous ones that is robust against these evasion tactics. Next, the difficulty of evasion of the existing detectors and the new detector are formalized and compared. This work builds a foundation for future researchers to build on so that those who would like to protect innocent internet users from spam and malicious content can overcome the advances of those that would prey on these users for a meager dollar
    • …
    corecore