2,162 research outputs found

    Evaluating Human Driving Behavior and Traffic Operation Conditions during Wildfire Evacuation Using Connected Vehicles Data

    Get PDF
    With climate change and the resulting rise in temperatures, wildfire risk is increasing all over the world, particularly in the western United States, and the communities in wildland-urban interface (WUI) areas are at the greatest risk of fire. Understanding the driving behavior of individuals during evacuating fire-affected WUI areas is important because the evacuees may encounter difficult driving conditions and traffic congestions due to proximity to flammable vegetation and limited exit routes. Existing studies lack empirical data on evacuee driving behavior and traffic operation conditions during a wildfire evacuation. This study used two distinct connected vehicles (CV) datasets that contain lane-level precision historical vehicle trajectory and driving events datasets to investigate the traffic delays and driving behavior of individuals during historical wildfire evacuation events. The results of the study showed that the CV-datasets are a valuable source to accurately evaluate human driving behavior and calculate traffic delays in wildfire-caused evacuations

    Centralized vs Decentralized Multi-Agent Guesswork

    Full text link
    We study a notion of guesswork, where multiple agents intend to launch a coordinated brute-force attack to find a single binary secret string, and each agent has access to side information generated through either a BEC or a BSC. The average number of trials required to find the secret string grows exponentially with the length of the string, and the rate of the growth is called the guesswork exponent. We compute the guesswork exponent for several multi-agent attacks. We show that a multi-agent attack reduces the guesswork exponent compared to a single agent, even when the agents do not exchange information to coordinate their attack, and try to individually guess the secret string using a predetermined scheme in a decentralized fashion. Further, we show that the guesswork exponent of two agents who do coordinate their attack is strictly smaller than that of any finite number of agents individually performing decentralized guesswork.Comment: Accepted at IEEE International Symposium on Information Theory (ISIT) 201

    Rough Maximal Oscillatory Singular Integral Operators

    Get PDF
    2000 Mathematics Subject Classification: Primary 42B20; Secondary 42B15, 42B25In this paper, we establish the L^p boundedness of certain maximal oscillatory singular integral operators with rough kernels belonging to certain block spaces. Our L^p boundedness result improves previously known results

    Constructing 3D faces from natural language interface

    Get PDF
    This thesis presents a system by which 3D images of human faces can be constructed using a natural language interface. The driving force behind the project was the need to create a system whereby a machine could produce artistic images from verbal or composed descriptions. This research is the first to look at constructing and modifying facial image artwork using a natural language interface. Specialised modules have been developed to control geometry of 3D polygonal head models in a commercial modeller from natural language descriptions. These modules were produced from research on human physiognomy, 3D modelling techniques and tools, facial modelling and natural language processing. [Continues.

    REPRESENTASI MITOS DALAM FILM HOROR PADA WAKTU MAGHRIB : ANALISIS NARATIF DAN VISUAL

    Get PDF
    This study aims to analyze the representation of myths in horror films at Maghrib time. Myths related to Maghrib Time are often an interesting element in horror films, because they contain elements of mystery, belief, and fear that are related to cultural and religious contexts. In this study, researchers conducted narrative and visual analysis to understand how this myth is represented in horror films at Maghrib Time. This study focuses on narrative elements and the use of visual techniques to create a frightening atmosphere. Research data was collected by collecting samples of horror films that are relevant to the theme of Maghrib Time. The results of the analysis show that the representation of myths in horror films at Maghrib Time involves the use of symbols, timing, lighting, and music that create a dark, gripping, and fear-inducing atmosphere in the audience. The implication of this research is to provide a deeper understanding of how myths and culture related to Maghrib Time can be utilized in the context of horror films, as well as providing insight to filmmakers in creating effective effects in presenting fear to the audience.Penelitian ini bertujuan untuk menganalisis representasi mitos dalam film horor pada Waktu Maghrib. Mitos yang terkait dengan Waktu Maghrib sering kali menjadi elemen yang menarik dalam film horor, karena mereka mengandung unsur misteri, kepercayaan, dan ketakutan yang berhubungan dengan konteks budaya dan agama. Dalam penelitian ini, peneliti melakukan analisis naratif dan visual untuk memahami bagaimana mitos tersebut direpresentasikan dalam film horor pada Waktu Maghrib. Penelitian ini berfokus pada elemen-elemen naratif dan penggunaan teknik visual yang digunakan untuk menciptakan atmosfer yang menakutkan. Data penelitian dikumpulkan melalui pengumpulan sampel film horor yang relevan dengan tema Waktu Maghrib. Hasil analisis menunjukkan bahwa representasi mitos dalam film horor pada Waktu Maghrib melibatkan penggunaan simbol, pengaturan waktu, pencahayaan, dan musik yang menciptakan suasana yang gelap, mencekam, dan membangkitkan rasa takut pada penonton. Implikasi penelitian ini memberikan pemahaman yang lebih dalam tentang bagaimana mitos dan budaya terkait Waktu Maghrib dapat dimanfaatkan dalam konteks film horor, serta memberikan wawasan kepada pembuat film dalam menciptakan efek yang efektif dalam menghadirkan ketakutan kepada penonton

    PENGGUNAAN MEDIA SOSIAL DALAM KAMPANYE POLITIK DAN DAMPAKNYA TERHADAP PARTISIPASI POLOTIK DAN PERSEPSI PUBLIK

    Get PDF
    In this increasingly advanced digital era, social media has become a powerful platform for sharing information, influencing opinion, and mobilizing the masses. Therefore, it is important to understand how the use of social media in political campaigns affects political participation and public perception. This study aims to investigate the effect of social media on political behavior, with a focus on the use of social media in political campaigns and its impact on political participation and public perception. This research will use a case study approach to analyze several political campaigns that involve social media as the main communication tool. Data will be collected through online surveys, interviews and analysis of social media content. Respondents who were sampled in this study were individuals involved in political campaigns using social media, as well as the general public who actively consume political content on social media. Based on this research, it can be concluded that the use of social media in political campaigns has a significant influence on political behavior, political participation and public perception

    Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization

    Full text link
    In September 2017, McAffee Labs quarterly report estimated that brute force attacks represent 20\% of total network attacks, making them the most prevalent type of attack ex-aequo with browser based vulnerabilities. These attacks have sometimes catastrophic consequences, and understanding their fundamental limits may play an important role in the risk assessment of password-secured systems, and in the design of better security protocols. While some solutions exist to prevent online brute-force attacks that arise from one single IP address, attacks performed by botnets are more challenging. In this paper, we analyze these distributed attacks by using a simplified model. Our aim is to understand the impact of distribution and asynchronization on the overall computational effort necessary to breach a system. Our result is based on Guesswork, a measure of the number of queries (guesses) required of an adversary before a correct sequence, such as a password, is found in an optimal attack. Guesswork is a direct surrogate for time and computational effort of guessing a sequence from a set of sequences with associated likelihoods. We model the lack of synchronization by a worst-case optimization in which the queries made by multiple adversarial agents are received in the worst possible order for the adversary, resulting in a min-max formulation. We show that, even without synchronization, and for sequences of growing length, the asymptotic optimal performance is achievable by using randomized guesses drawn from an appropriate distribution. Therefore, randomization is key for distributed asynchronous attacks. In other words, asynchronous guessers can asymptotically perform brute-force attacks as efficiently as synchronized guessers.Comment: Accepted to IEEE Transactions on Information Forensics and Securit
    • …
    corecore