To see the other types of publications on this topic, follow the link: Exploit testing.

Journal articles on the topic 'Exploit testing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Exploit testing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Deng, Fenglei, Jian Wang, Bin Zhang, Chao Feng, Zhiyuan Jiang, and Yunfei Su. "A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities." Scientific Programming 2020 (September 27, 2020): 1–21. http://dx.doi.org/10.1155/2020/8883746.

Full text
Abstract:
In recent years, increased attention is being given to software quality assurance and protection. With considerable verification and protection schemes proposed and deployed, today’s software unfortunately still fails to be protected from cyberattacks, especially in the presence of insecure organization of heap metadata. In this paper, we aim to explore whether heap metadata could be corrupted and exploited by cyberattackers, in an attempt to assess the exploitability of vulnerabilities and ensure software quality. To this end, we propose RELAY, a software testing framework to simulate human exploitation behavior for metadata corruption at the machine level. RELAY employs the heap layout serialization method to construct exploit patterns from human expertise and decomposes complex exploit-solving problems into a series of intermediate state-solving subproblems. With the heap layout procedural method, RELAY makes use of the fewer resources consumed to solve a layout problem according to the exploit pattern, activates the intermediate state, and generates the final exploit. Additionally, RELAY can be easily extended and can continuously assimilate human knowledge to enhance its ability for exploitability evaluation. Using 20 CTF&RHG programs, we then demonstrate that RELAY has the ability to evaluate the exploitability of metadata corruption vulnerabilities and works more efficiently compared with other state-of-the-art automated tools.
APA, Harvard, Vancouver, ISO, and other styles
2

Narayana Rao, T. Venkat, and Vemula Shravan. "Metasploit Unleashed Tool for Penetration Testing." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 4 (April 26, 2019): 16–20. http://dx.doi.org/10.17762/ijritcc.v7i4.5285.

Full text
Abstract:
In the recent era as the technology is growing rapidly, the use of internet has grown at an exponential rate. The growth has started increasing in between the years 1995-2000.The success of internet has brought great change to the world as we know; however, the problems are common as an obstacle to every productive growth. As the thousands of sites are launching daily and lakhs of people using it ,with limited sources of internet available to monitor the security and credibility of these sites. The security issues are growing rapidly and the existence of vulnerabilities are inevitable. As a result exploits became rampant causing the usage of information security fields. Eventually, the need for vulnerability scanning for a particular network or a particular site has increased and the result was pre-emptive existence of penetration testers whose sole purpose is to execute an exploit using a payload for scanning a vulnerability far before others got the opportunity. Metasploit is a computer security tool that works like a penetration tester. The Metasploit Framework was developed with the intentions of making lives of security experts easier.
APA, Harvard, Vancouver, ISO, and other styles
3

Mason, G. J. "CONTRAFREELOADING IN STARLINGS: TESTING THE INFORMATION HYPOTHESIS." Behaviour 136, no. 10-11 (1999): 1267–82. http://dx.doi.org/10.1163/156853999500712.

Full text
Abstract:
AbstractContrafreeloading (CFL) behaviour, in which animals forage persistently in patches that require effort to exploit when patches containing ad lib. food are easily available, seems to contradict the predictions of optimal foraging theory. However, it has been proposed that contrafreeloaders are in fact exploiting a hidden resource, namely information about patches that may be useful in future foraging attempts. We performed two experiments on starlings Sturnus vulgaris to test this hypothesis by determining the circumstances in which CFL occurs and assessing whether any useful information is acquired by animals performing the behaviour. In accordance with previous results we found that CFL is reduced when foragers are previously deprived of food and also when there are means of gathering information aside from sampling (namely when patches that require effort to exploit can be visually inspected). We also found that useful information is acquired by birds that perform CFL, in that when subsequently tested in extinction with the best patch removed they reliably chose the patch that had been the second best. These results are consistent with the information gain hypothesis. However, birds with low levels of CFL did not perform discernably worse in this test of patch knowledge and experimental reductions in CFL achieved through deprivation treatments did not produce apparent reductions in useful information possessed.
APA, Harvard, Vancouver, ISO, and other styles
4

Barone, Guglielmo, Francesco D'Acunto, and Gaia Narciso. "Telecracy: Testing for Channels of Persuasion." American Economic Journal: Economic Policy 7, no. 2 (May 1, 2015): 30–60. http://dx.doi.org/10.1257/pol.20130318.

Full text
Abstract:
We consider the long-lived slant towards Berlusconi in political information on Italian television (TV ). We exploit a shock to the slanted exposure of viewers: idiosyncratic deadlines to switch to digital TV from 2008 to 2012, which increased the number of freeview channels tenfold. The switch caused a drop in the vote share of Berlusconi's coalition by between 5.5 and 7.5 percentage points. The effect was stronger in towns with older and less educated voters. At least 20 percent of digital users changed their voting behavior after the introduction of digital TV. Our evidence is consistent with the existence of persuasion-biased viewers. (JEL D72, D83, L82, L88)
APA, Harvard, Vancouver, ISO, and other styles
5

Bin Khalid, Hasnan, and Budi Saesar Luhur. "Kinematic-Dynamic Modeling and Test Control of Tracked Drive Vehicle for Indoor Mapping." Applied Mechanics and Materials 148-149 (December 2011): 1510–13. http://dx.doi.org/10.4028/www.scientific.net/amm.148-149.1510.

Full text
Abstract:
This paper presents one approach in designing and testing an unmanned ground vehicle (UGV) for indoor mapping. The approach makes use of computer real-time simulation and animation direct with the testing in real environment. Novel control architecture was proposed, by exploit the communication between two laptop installed Matlab/Simulink and telemetry data collected from it. The parameter values between real performance and model can be easily evaluated and also from its ladar scanning result, then researcher can explore more variation of modeling aspect, parameter and sensor-actuator configuration to enhance performance of their indoor unmanned vehicle
APA, Harvard, Vancouver, ISO, and other styles
6

Bergström, Gunnar, Jonas Christoffersson, Kristin Schwanke, Robert Zweigerdt, and Carl-Fredrik Mandenius. "Stem cell derived in vivo-like human cardiac bodies in a microfluidic device for toxicity testing by beating frequency imaging." Lab on a Chip 15, no. 15 (2015): 3242–49. http://dx.doi.org/10.1039/c5lc00449g.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pedersen, Rasmus Søndergaard, and Anders Rahbek. "TESTING GARCH-X TYPE MODELS." Econometric Theory 35, no. 05 (October 18, 2018): 1012–47. http://dx.doi.org/10.1017/s026646661800035x.

Full text
Abstract:
We present novel theory for testing for reduction of GARCH-X type models with an exogenous (X) covariate to standard GARCH type models. To deal with the problems of potential nuisance parameters on the boundary of the parameter space as well as lack of identification under the null, we exploit a noticeable property of specific zero-entries in the inverse information of the GARCH-X type models. Specifically, we consider sequential testing based on two likelihood ratio tests and as demonstrated the structure of the inverse information implies that the proposed test neither depends on whether the nuisance parameters lie on the boundary of the parameter space, nor on lack of identification. Asymptotic theory is derived essentially under stationarity and ergodicity, coupled with a regularity assumption on the exogenous covariate X. Our general results on GARCH-X type models are applied to Gaussian based GARCH-X models, GARCH-X models with Student’s t-distributed innovations as well as integer-valued GARCH-X (PAR-X) models.
APA, Harvard, Vancouver, ISO, and other styles
8

LakshmiSupraja, K. "Sneaking into Mobile." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 5107–17. http://dx.doi.org/10.22214/ijraset.2021.36042.

Full text
Abstract:
As the numbers of android mobiles are increasing day by day and are used to store sensitive information. So, maintaining security is becoming a difficult thing. Here comes the role of penetration testing. The process of performing a penetration test is to verify that mobile devices are vulnerable to security risk or not. We will exploit the mobile devices by preparing and performing the penetration test using Metasploit. It is a framework for developing and executing exploit code against a remote target machine. The main goal is to provide an understanding of mobile device penetration testing using Metasploit Framework and how to utilize it as a security professional.
APA, Harvard, Vancouver, ISO, and other styles
9

SLOAN, JOHN C., and TAGHI M. KHOSHGOFTAAR. "TESTING AND FORMAL VERIFICATION OF SERVICE ORIENTED ARCHITECTURES." International Journal of Reliability, Quality and Safety Engineering 16, no. 02 (April 2009): 137–62. http://dx.doi.org/10.1142/s0218539309003332.

Full text
Abstract:
We examine two open engineering problems in the area of testing and formal verification of internet-enabled service oriented architectures (SOA). The first involves deciding when to formally and exhaustively verify versus when to informally and non-exhaustively test. The second concerns scalability limitations associated with formal verification, to which we propose a semi-formal technique that uses software agents. Finally, we assess how these findings can improve current software quality assurance practices. Addressing the first problem, we present and explain two classes of tradeoffs. External tradeoffs between assurance, performance, and flexibility are determined by the business needs of each application, whether it be in engineering, commerce, or entertainment. Internal tradeoffs between assurance, scale, and level of detail involve the technical challenges of feasibly verifying or testing an SOA. To help decide whether to exhaustively verify or non-exhaustively test, we present and explain these two classes of tradeoffs. Identifying a middle ground between testing and verification, we propose using software agents to simulate services in a composition. Technologically, this approach has the advantage of assuring the quality of compositions that are too large to exhaustively verify. Operationally, it supports testing these compositions in the laboratory without access to source code or use of network resources of third-party services. We identify and exploit the structural similarities between agents and services, examining how doing so can assure the quality of service compositions.
APA, Harvard, Vancouver, ISO, and other styles
10

Seong, Jin-Taek. "Group Testing-Based Robust Algorithm for Diagnosis of COVID-19." Diagnostics 10, no. 6 (June 11, 2020): 396. http://dx.doi.org/10.3390/diagnostics10060396.

Full text
Abstract:
At the time of writing, the COVID-19 infection is spreading rapidly. Currently, there is no vaccine or treatment, and researchers around the world are attempting to fight the infection. In this paper, we consider a diagnosis method for COVID-19, which is characterized by a very rapid rate of infection and is widespread. A possible method for avoiding severe infections is to stop the spread of the infection in advance by the prompt and accurate diagnosis of COVID-19. To this end, we exploit a group testing (GT) scheme, which is used to find a small set of confirmed cases out of a large population. For the accurate detection of false positives and negatives, we propose a robust algorithm (RA) based on the maximum a posteriori probability (MAP). The key idea of the proposed RA is to exploit iterative detection to propagate beliefs to neighbor nodes by exchanging marginal probabilities between input and output nodes. As a result, we show that our proposed RA provides the benefit of being robust against noise in the GT schemes. In addition, we demonstrate the performance of our proposal with a number of tests and successfully find a set of infected samples in both noiseless and noisy GT schemes with different COVID-19 incidence rates.
APA, Harvard, Vancouver, ISO, and other styles
11

Maitra, Arpita, Bibhas Adhikari, and Satyabrata Adhikari. "Proposal for dimensionality testing in QPQ." Quantum Information and Computation 18, no. 13&14 (November 2018): 1125–42. http://dx.doi.org/10.26421/qic18.13-14-4.

Full text
Abstract:
Recently, dimensionality testing of a quantum state has received extensive attention (Ac{\'i}n et al. Phys. Rev. Letts. 2006, Scarani et al. Phys. Rev. Letts. 2006). Security proofs of existing quantum information processing protocols rely on the assumption about the dimension of quantum states in which logical bits are encoded. However, removing such assumption may cause security loophole. In the present paper, we show that this is indeed the case. We choose two players' quantum private query protocol by Yang et al. (Quant. Inf. Process. 2014) as an example and show how one player can gain an unfair advantage by changing the dimension of subsystem of a shared quantum system. To resist such attack we propose dimensionality testing in a different way. Our proposal is based on CHSH like game. As we exploit CHSH like game, it can be used to test if the states are product states for which the protocol becomes completely vulnerable.
APA, Harvard, Vancouver, ISO, and other styles
12

Singh, Mandeep, Sunny Kumar, Tushant Garg, and Niranjan Pandey. "Penetration Testing on Metasploitable 2." International Journal of Engineering and Computer Science 9, no. 05 (May 10, 2020): 25014–22. http://dx.doi.org/10.18535/ijecs/v9i05.4476.

Full text
Abstract:
Abstract— In this paper, we will discuss how to perform a penetration test on Metasploitable 2 using Metasploit. Metasploitable 2 is a vulnerable system that we decide to use, as using some other system to do the same it would be considered as hacking and could have awful results. The primary purpose of this research is to tell about the various tools used when someone trying to find possible vulnerabilities in a system. By using the Metasploit system to test a system, we can find possible vulnerabilities that need to be fixed to protect and make the system better. Different areas like firewalls, network protocols, and other basic security is-sues will be explored in this research.While there are many other different ways to do penetration testing, but we decide to use Metasploit be-cause of its broad uses and simplicity. We will have the option of either using the command line within Metasploit or by using the community version of the product, which is mostly automated. Both alternatives will be explored in this paper. If anyone going through all of the steps given in this paper should be able to try and exploit any vulnerable system.
APA, Harvard, Vancouver, ISO, and other styles
13

Bernhofen, Daniel M., and John C. Brown. "Testing the General Validity of the Heckscher-Ohlin Theorem." American Economic Journal: Microeconomics 8, no. 4 (November 1, 2016): 54–90. http://dx.doi.org/10.1257/mic.20130126.

Full text
Abstract:
We exploit Japan's mid-nineteenth century transition from autarky to open trade to test Alan Deardorff's (1982) seminal and parsimonious autarky price formulation of the Heckscher-Ohlin theorem. Factor price data from Japan's late autarky period impose a refutable restriction on Japan's factor content of trade. Our data are constructed from many historical sources, including a major Japanese survey of agricultural techniques and a rich set of nineteenth century comparative cost studies. Evaluating Japan's factor content of trade during 1865–1876 under alternative theoretical assumptions about technology, we provide robust evidence in favor of the Heckscher-Ohlin hypothesis. (JEL F14, N55, N75, Q10)
APA, Harvard, Vancouver, ISO, and other styles
14

Karaki, Youmna Shawki, Halina Kaubasa, and Nick Ivanov. "Normality Testing for Vectors on Perceptron Layers." European Journal of Engineering Research and Science 5, no. 9 (September 11, 2020): 1085–88. http://dx.doi.org/10.24018/ejers.2020.5.9.2090.

Full text
Abstract:
Designing optimal topology of network graph is one of the most prevalent issues in neural network applications. Number of hidden layers, number of nodes in layers, activation functions, and other parameters of neural networks must suit the given data set and the prevailing problem. Massive learning datasets prompt a researcher to exploit probability methods in an attempt to find optimal structure of a neural network. Classic Bayesian estimation of network hyperparameters assumes distribution of specific random parameters to be Gaussian. Multivariate Normality Analysis methods are widespread in contemporary applied mathematics. In this article, the normality of probability distribution of vectors on perceptron layers was examined by the Multivariate Normality Test. Ten datasets from University of California, Irvine were selected for the computing experiment. The result of our hypothesis on Gaussian distribution is negative, ensuring that none of the set of vectors passed the criteria of normality.
APA, Harvard, Vancouver, ISO, and other styles
15

Andria, Andria, and Ridho Pamungkas. "Penetration Testing Database Menggunakan Metode SQL Injection Via SQLMap di Termux." Indonesian Journal of Applied Informatics 5, no. 1 (April 18, 2021): 1. http://dx.doi.org/10.20961/ijai.v5i1.40845.

Full text
Abstract:
<p class="infAbstract"><em>Abstrak : </em></p><p class="infAbstract">Penetration testing (Pentesting) merupakan sebuah metode evaluasi terhadap keamanan pada suatu sistem dan jaringan komputer dengan melakukan suatu pengujian, salah satu metode pengujian yang dapat digunakan adalah SQL Injection. SQL Injection merupakan suatu teknik hacking dengan fokus pengujian pada database sebagai media penyimpanan data pada sistem. Tool yang digunakan pada penelitian ini ialah SQLMap yang merupakan tool open source yang dapat menganalisa, mendeteksi dan melakukan exploit (sebuah kode yang dapat menyerang keamanan sistem komputer secara spesifik) pada bug SQL Injection. Pengujian dilakukan menggunakan perangkat Smartphone bersistem operasi Android dengan program aplikasi Termux sebagai emulator terminal berbasis linux. Tujuan dari penelitian ini untuk pengujian keamanan database web server dan membantu pengelola atau admin situs web untuk dapat memeriksa adanya celah kerentanan database yang dapat dieskploitasi oleh peretas.</p><p class="infAbstract">____________________________</p><p class="infAbstract">Abstract :</p><p><em>Penetration testing</em><em> (Pentest</em><em>ing</em><em>) is a method of evaluating the security of a computer system and network by conducting a test, one of the testing methods that can be used is SQL Injection . SQL Injection is a hacking technique that focuses on testing the database as a data storage medium on the system. The tool used in this study is SQLMap which is an open source tool that can analyze, detect and exploit (a code that can specifically attack computer system security) on the SQL Injection bug. Testing was carried out using a Smartphone device with the Android operating system with the Termux application program as a linux-based terminal emulator. The purpose of this research is to test the security of the web server database and help the website manager or admin to be able to check for any database vulnerabilities that can be exploited by hackers.</em></p><p class="infAbstract"><em><br /></em></p>
APA, Harvard, Vancouver, ISO, and other styles
16

Lohano, Heman D., Fateh M. Mari, and Rajab A. Memon. "Testing Onion Market Integration in Pakistan." Pakistan Development Review 44, no. 4II (December 1, 2005): 717–28. http://dx.doi.org/10.30541/v44i4iipp.717-728.

Full text
Abstract:
Spatial market integration of agricultural products has been widely used to indicate overall market performance [Faminow and Benson (1990)]. In spatially integrated markets, competition among arbitragers will ensure that a unique equilibrium is achieved where local prices in regional markets differ by no more than transportation and transaction costs. Information of spatial market integration, thus, provides indication of competitiveness, the effectiveness of arbitrage, and the efficiency of pricing [Sexton, et al. (1991)]. If price changes in one market are fully reflected in alternative market, these markets are said to be spatially integrated [Goodwin and Schroeder (1991)]. Prices in spatially integrated markets are determined simultaneously in various locations, and information of any change in price in one market is transmitted to other markets [Gonzalez-Rivera and Helfand (2001)]. Markets that are not integrated may convey inaccurate price signal that might distort producers marketing decisions and contribute to inefficient product movement [Goodwin and Schroeder (1991)], and traders may exploit the market and benefit at the cost of producers and consumers. In more integrated markets, farmers specialise in production activities in which they are comparatively proficient, consumers pay lower prices for purchased goods, and society is better able to reap increasing returns from technological innovations and economies of scale [Vollrath (2003)].
APA, Harvard, Vancouver, ISO, and other styles
17

Chen, Jia-Wei, Rongfang Wang, Fan Ding, Bo Liu, Licheng Jiao, and Jie Zhang. "A Convolutional Neural Network with Parallel Multi-Scale Spatial Pooling to Detect Temporal Changes in SAR Images." Remote Sensing 12, no. 10 (May 19, 2020): 1619. http://dx.doi.org/10.3390/rs12101619.

Full text
Abstract:
In synthetic aperture radar (SAR) image change detection, it is quite challenging to exploit the changing information from the noisy difference image subject to the speckle. In this paper, we propose a multi-scale spatial pooling (MSSP) network to exploit the changed information from the noisy difference image. Being different from the traditional convolutional network with only mono-scale pooling kernels, in the proposed method, multi-scale pooling kernels are equipped in a convolutional network to exploit the spatial context information on changed regions from the difference image. Furthermore, to verify the generalization of the proposed method, we apply our proposed method to the cross-dataset bitemporal SAR image change detection, where the MSSP network (MSSP-Net) is trained on a dataset and then applied to an unknown testing dataset. We compare the proposed method with other state-of-arts and the comparisons are performed on four challenging datasets of bitemporal SAR images. Experimental results demonstrate that our proposed method obtain comparable results with S-PCA-Net on YR-A and YR-B dataset and outperforms other state-of-art methods, especially on the Sendai-A and Sendai-B datasets with more complex scenes. More important, MSSP-Net is more efficient than S-PCA-Net and convolutional neural networks (CNN) with less executing time in both training and testing phases.
APA, Harvard, Vancouver, ISO, and other styles
18

GUO, PENGFEI, and ALWELL JULIUS OYET. "ON WAVELET METHODS FOR TESTING EQUALITY OF MEAN RESPONSE CURVES." International Journal of Wavelets, Multiresolution and Information Processing 07, no. 03 (May 2009): 357–73. http://dx.doi.org/10.1142/s0219691309002969.

Full text
Abstract:
In this article, we exploit the adaptive properties of wavelets to develop some procedures for testing the equality of nonlinear and nonparametric mean response curves which are assumed by an experimenter to be the underlying functions generating several groups of data with possibly hetereoscedastic errors. The essential feature of the techniques is the transformation of the problem from the domain of the input variable to the wavelet domain through an orthogonal discrete wavelet transformation or a multiresolution expansion. We shall see that this greatly simplifies the testing problem into either a wavelet thresholding problem or a linear wavelet regression problem. The size and power performances of the tests are reported and compared to some existing methods. The tests are also applied to data on dose response curves for vascular relaxation in the absence or presence of a nitric oxide inhibitor.
APA, Harvard, Vancouver, ISO, and other styles
19

Chan, Derek C. K., and Lori L. Burrows. "Thiocillin and micrococcin exploit the ferrioxamine receptor of Pseudomonas aeruginosa for uptake." Journal of Antimicrobial Chemotherapy 76, no. 8 (April 28, 2021): 2029–39. http://dx.doi.org/10.1093/jac/dkab124.

Full text
Abstract:
Abstract Background Thiopeptides are a class of antibiotics that are active against Gram-positive bacteria and inhibit translation. They were considered inactive against Gram-negative bacteria due to their inability to cross the outer membrane. However, we discovered previously that a member of this class, thiostrepton (TS), has activity against Pseudomonas aeruginosa and Acinetobacter baumannii under iron-limiting conditions. TS hijacks the pyoverdine siderophore receptors of P. aeruginosa to cross the outer membrane and synergizes with iron chelators. Objectives To test other thiopeptides for antimicrobial activity against P. aeruginosa and determine their mechanism of uptake, action and spectrum of activity. Methods Eight thiopeptides were screened in chequerboard assays against a mutant of P. aeruginosa PA14 lacking both pyoverdine receptors. Thiopeptides that retain activity against a pyoverdine receptor-null mutant may use alternative siderophore receptors for entry. Susceptibility testing against siderophore receptor mutants was used to determine thiopeptide mechanism of uptake. Results The thiopeptides thiocillin (TC) and micrococcin (MC) use the ferrioxamine siderophore receptor (FoxA) for uptake and inhibit the growth of P. aeruginosa at low micromolar concentrations. The activity of TC required the TonB-ExbBD system used to energize siderophore uptake. TC acted through its canonical mechanism of action of translation inhibition. Conclusions Multiple thiopeptides have antimicrobial activity against P. aeruginosa, countering the historical assumption that they cannot cross the outer membrane. These results demonstrate the potential for thiopeptides to act as antipseudomonal antibiotics.
APA, Harvard, Vancouver, ISO, and other styles
20

Lucchesi, David, Luciano Anselmo, Massimo Bassan, Marco Lucente, Carmelo Magnafico, Carmen Pardini, Roberto Peron, Giuseppe Pucacco, and Massimo Visco. "Testing General Relativity vs. Alternative Theories of Gravitation with the SaToR-G Experiment." Physical Sciences Forum 2, no. 1 (February 22, 2021): 52. http://dx.doi.org/10.3390/ecu2021-09274.

Full text
Abstract:
A new experiment in the field of gravitation, SaToR-G, is presented. The experiment aims to compare the predictions of different theories of gravitation in the limit of weak field and slow motion. The ultimate goal of the experiment is to look for possible "new physics" beyond the current standard model of gravitation based on the predictions of general relativity. A key role in the above perspective is the theoretical and experimental framework within which to confine our work. To this end, we make our best efforts to exploit the framework suggested by Dicke over 50 years ago.
APA, Harvard, Vancouver, ISO, and other styles
21

Veronesi, Umberto, Thilo Rehren, Beverly Straube, and Marcos Martinón-Torres. "Testing the New World: early modern chemistry and mineral prospection at colonial Jamestown, 1607–1610." Archaeological and Anthropological Sciences 11, no. 12 (November 19, 2019): 6851–64. http://dx.doi.org/10.1007/s12520-019-00945-x.

Full text
Abstract:
AbstractThe paper presents new research on an assemblage of metallurgical crucibles used in the assay of minerals at colonial Jamestown. The aim of the study is to explore the range of chemical operations carried out at the site of the first permanent British settlement in America, for which little is known in the documents. The results show that the colonists used high-quality Hessian crucibles to perform tests on different types of complex polymetallic sulphides. This was done to (1) prospect for potential silver and copper ores and (2) to find suitable sources of zinc and tin to be alloyed into brass and bronze through cementation with imported copper offcuts. This study makes a relevant contribution to the growing field of the archaeology of early chemistry and mineral prospection as well as the archaeology of early European colonies in the New World. In particular, material culture can shed fresh light on how European settlers reacted to the many challenges of a new and unfamiliar natural environment and how they tried to make sense and exploit it for financial profit.
APA, Harvard, Vancouver, ISO, and other styles
22

Datta, Avimanyu. "IT-Based Knowledge Capability and Commercialization of Innovations." International Journal of Knowledge Management 8, no. 3 (July 2012): 83–97. http://dx.doi.org/10.4018/jkm.2012070105.

Full text
Abstract:
The author provides a framework comprising of propositions for further research explicating the relations between IT-based knowledge capabilities (IT-KC) and Commercialization of Innovations (CI). They posit that a firm’s absorptive capacity and ambidexterity (ability to explore and exploit) affect CI. Further, absorptive capacity too can be an antecedent to ambidexterity. IT based knowledge capability (which is an instantiation of IT capability) is found to positively moderate the relationship between ambidexterity and commercialization of innovations, and also is an antecedent to potential and realized absorptive capacity. The author ties the seemingly isolated bits of literature together into an integrative theoretical model for testing.
APA, Harvard, Vancouver, ISO, and other styles
23

Hilbig, Benjamin E., Pascal J. Kieslich, Felix Henninger, Isabel Thielmann, and Ingo Zettler. "Lead Us (Not) into Temptation: Testing the Motivational Mechanisms Linking Honesty–Humility to Cooperation." European Journal of Personality 32, no. 2 (March 2018): 116–27. http://dx.doi.org/10.1002/per.2149.

Full text
Abstract:
Over the past decades, there has been considerable interest in individual differences in cooperative behaviour and how these can be explained. Whereas the Honesty–Humility dimension from the HEXACO model of personality has been identified as a consistent predictor of cooperation, the underlying motivational mechanisms of this association have remained unclear—especially given the confound between the temptation to exploit others and the fear of being exploited as motivational drivers of defection in social dilemmas. In a reanalysis and a new experiment, we tease apart these mechanisms by manipulating the rank order of pay–offs in a symmetric two–person game paradigm, essentially implementing the classic prisoner's dilemma, stag hunt, and chicken games. Results revealed that Honesty–Humility predicted cooperation specifically in the games in which temptation was a potential motivator of defection, whereas it did not account for cooperation in those games in which only fear implied defection. Our findings thereby shed light on the underlying motivational mechanisms of the Honesty–Humility–cooperation link and, more generally, demonstrate how economic games can be used to disentangle such mechanisms. Copyright © 2018 European Association of Personality Psychology
APA, Harvard, Vancouver, ISO, and other styles
24

Saidala, Ravi Kumar, and Nagaraju Devarakonda. "A Novel Chaotic Northern Bald Ibis Optimization Algorithm for Solving Different Cluster Problems [ICCICC18 #155]." International Journal of Software Science and Computational Intelligence 11, no. 2 (April 2019): 1–25. http://dx.doi.org/10.4018/ijssci.2019040101.

Full text
Abstract:
This article proposes a new optimal data clustering method for finding optimal clusters of data by incorporating chaotic maps into the standard NOA. NOA, a newly developed optimization technique, has been shown to be efficient in generating optimal results with lowest solution cost. The incorporation of chaotic maps into metaheuristics enables algorithms to diversify the solution space into two phases: explore and exploit more. To make the NOA more efficient and avoid premature convergence, chaotic maps are incorporated in this work, termed as CNOAs. Ten different chaotic maps are incorporated individually into standard NOA for testing the optimization performance. The CNOA is first benchmarked on 23 standard functions. Secondly, testing was done on the numerical complexity of the new clustering method which utilizes CNOA, by solving 10 UCI data cluster problems and 4 web document cluster problems. The comparisons have been made with the help of obtaining statistical and graphical results. The superiority of the proposed optimal clustering algorithm is evident from the simulations and comparisons.
APA, Harvard, Vancouver, ISO, and other styles
25

Tesárek, Pavel, Lukáš Novák, Jaroslav Topič, Zdeněk Prošek, Václav Nežerka, and Martin Lidmila. "Compression Testing of Gypsum-Based Composite Reinforced by Recycled Wires from Automobile Tires." Applied Mechanics and Materials 732 (February 2015): 393–96. http://dx.doi.org/10.4028/www.scientific.net/amm.732.393.

Full text
Abstract:
The use of recycled materials is nowadays greatly promoted and these are exploited in many industries, including construction and civil engineering. It is advantageous and efficient to exploit mainly those materials that cannot find their use in any other application. The steel wires from old automobile tires are a perfect example – they can be used as a dispersed reinforcement to stabilize subsoil in railway construction. In order to test the structural performance of the recycled wires as well as the composite behavior, gypsum was chosen a model matrix material. Such approach resulted in a relatively cheap gypsum-based composite material effectively combining gypsum as the material able to resist relatively high levels of compression and recycled wire reinforcement from old automobile tires, which is able to transfer tensile stress. The material can be removed from a formwork after less than 20 minutes of curing and immediately loaded. The study presents the results of a compression test carried out on three different materials – the reference sample was composed of a pure gypsum matrix, while the other two were reinforced by the dispersed wire reinforcement, which has been poorly and perfectly compacted. The results indicate the huge potential of the recycled material for the improvement of soils and brittle materials.
APA, Harvard, Vancouver, ISO, and other styles
26

Siva Prasad, K., Dr K. Raja Sekhar, and Dr P. Rajarajeswari. "An Integrated Approach Towards Vulnerability Assessment & Penetration Testing for a Web Application." International Journal of Engineering & Technology 7, no. 2.32 (May 31, 2018): 431. http://dx.doi.org/10.14419/ijet.v7i2.32.15733.

Full text
Abstract:
Current digitized world has surpassed the days of mere existence of internet. Furnishing the services through web has become the most often element to be implemented by almost every sector. These ever-changing technologies has also brought about, devastating evading techniques compromising the fragility of the web application. Assessing the existing vulnerabilities of a web application and testing all possible penetrations would be tedious if the tools used are bearing a cost factor. This paper suggests an integrated approach of assessing the vulnerabilities in any web application using free and open source tools where the reports are generated with respect to vulnerabilities and their categories and level of severity. The tools are integrated and correlated for producing the accurate results in better manner similar to the results produced by the commercial ones. The analysis has been done by considering the reports released by OWASP, OSSTMM, ISSAF, CVE, Exploit Database and Microsoft Vulnerability Research. The report produced after vulnerability assessment has been taken for testing different penetrations for a single application. The identified vulnerabilities are therefore exploited for testing the penetrations of a web application. The report will be generated finally stating all possible exploitable vulnerabilities that are encountered in a web application. The final report generated would help the developers to fix the vulnerable issues.
APA, Harvard, Vancouver, ISO, and other styles
27

Peng, Xiang Hua, Ying She Luo, Jing Ye Zhou, Min Yu, and Tao Luo. "Research on Creep Constitutive Model of TC11 Titanium Alloy Based on RBFNN." Materials Science Forum 575-578 (April 2008): 1050–55. http://dx.doi.org/10.4028/www.scientific.net/msf.575-578.1050.

Full text
Abstract:
The paper is aimed to exploit a creep constitutive mode of TC11 titanium alloy based on RBF neural network. Creep testing data of TC11 titanium alloy obtained under the same temperature and different stress are considered as knowledge base and the characteristics of rheological forming of materials and radial basis function neural network (RBFNN) are also combined when exploiting the model. A part of data extracted from knowledge base is divided into two groups: one is learning sample and the other testing sample, which are being performed training, learning and simulating. Then predicting value is compared with the creep testing value and the theoretical value deduced by primary model, which validates that the RBFNN model has higher precision and generalizing ability.
APA, Harvard, Vancouver, ISO, and other styles
28

Sahren, Sahren, Ruri Ashari Dalimuthe, and Muhammad Amin. "Penetration Testing Untuk Deteksi Vulnerability Sistem Informasi Kampus." Prosiding Seminar Nasional Riset Information Science (SENARIS) 1 (September 30, 2019): 994. http://dx.doi.org/10.30645/senaris.v1i0.109.

Full text
Abstract:
Security is an effort that can be done to protect the information contained in it which refers to confidentiality. Information systems that are centrally prone to various types of attacks such as DoS, SQL Injections, Cross Site Scripting (XSS), Clickjacking, CSRF / Cross-site request forgery and so on. This will be a polemic for the information service owner and manager. The method to be carried out in this study is to do penetration testing to audit the security of the campus information system webserver. This activity aims to identify and exploit vulnerabilities in the web server. In this study, several tools will be used as a tool, including WHOIS, NMAP and Acunetix Web Vulnerability Scanner. Tests carried out are to look for vulnerabilities on the web server while the level of vulnerability that will be detected in this test sawill be inter alia higt risk, Medium risk and low risk. The aim is to find out the weaknesses in the web server so that in the future it can avoid DoS attacks, CSRF / Cross-site request forgery, Cross Site Scripting (XSS) and clickjacking. The results of this test are expected to be an input for the management of campus information systems for the future can be made improvements to existing weaknesses.
APA, Harvard, Vancouver, ISO, and other styles
29

Lucchesi, David, Luciano Anselmo, Massimo Bassan, Marco Lucente, Carmelo Magnafico, Carmen Pardini, Roberto Peron, Giuseppe Pucacco, and Massimo Visco. "Testing Gravitational Theories in the Field of the Earth with the SaToR-G Experiment." Universe 7, no. 6 (June 8, 2021): 192. http://dx.doi.org/10.3390/universe7060192.

Full text
Abstract:
A new satellite-based experiment in the field of gravitation, SaToR-G, is presented. It aims to compare the predictions of different theories of gravitation in the limit of weak-field and slow-motion. The ultimate goal of SaToR-G is searching for possible “new physics” beyond General Relativity, which represent the state-of-the-art of our current knowledge of gravitational physics. A key role in the above perspective is the theoretical and experimental framework that confines our work. To this end, we will exploit as much as possible the classical framework suggested by R.H. Dicke over fifty years ago.
APA, Harvard, Vancouver, ISO, and other styles
30

Awdeh, Ali. "Monetary Policy and Economic Growth in Lebanon." Journal of Central Banking Theory and Practice 8, no. 2 (May 1, 2019): 147–71. http://dx.doi.org/10.2478/jcbtp-2019-0018.

Full text
Abstract:
Abstract The central bank of Lebanon adopted exchange rate targeting in 1994 and it has exploited several instruments (particularly interest rate) since then to stimulate foreign financial inflows. This study aims at testing the impact of this strategy on economic performance and welfare in both the short- and long-run. In this regard, we exploit monthly data covering the period January 2002-June 2017 and implement cointegration analysis and VEC model. The empirical results suggest that monetary tools exploited by the central bank of Lebanon depress economic growth in the long-run. Moreover, despite their importance for external balance, financial inflows may hinder economic activity in both short- and long-run. On the other hand, monetary policy transmission channels through bank credit and capital play a constructive role for GDP growth.
APA, Harvard, Vancouver, ISO, and other styles
31

Ginting, Jusia Amanda, and I. Gusti Gusti Ngurah Suryantara. "PENGUJIAN KERENTANAN SISTEM DENGAN MENGGUNAKAN METODE PENETRATION TESTING DI UNIVERSITAS XYZ." Infotech: Journal of Technology Information 7, no. 1 (June 30, 2021): 41–46. http://dx.doi.org/10.37365/jti.v7i1.105.

Full text
Abstract:
Awareness of information security will be a priority in the event of data loss or damage. This certainly harms the performance of a company or organization due to unpreparedness to resolve or minimize risks that can occur. The impact that occurs on the security system used is that the system cannot provide a sense of security because the system used and has security holes that can be used to exploit systems and networks at XYZ University. This study aims to examine the internal and external security controls of the system by identifying threats that can pose serious problems to assets at XYZ University by using the penetration testing method, the results can be used as a benchmark in measuring the weaknesses of the network and system from external attacks. The goal is to implement preventive controls against risks that can occur to improve system security at XYZ University.
APA, Harvard, Vancouver, ISO, and other styles
32

Fang, Zheng, and Juwon Seo. "A Projection Framework for Testing Shape Restrictions That Form Convex Cones." Econometrica 89, no. 5 (2021): 2439–58. http://dx.doi.org/10.3982/ecta17764.

Full text
Abstract:
This paper develops a uniformly valid and asymptotically nonconservative test based on projection for a class of shape restrictions. The key insight we exploit is that these restrictions form convex cones, a simple and yet elegant structure that has been barely harnessed in the literature. Based on a monotonicity property afforded by such a geometric structure, we construct a bootstrap procedure that, unlike many studies in nonstandard settings, dispenses with estimation of local parameter spaces, and the critical values are obtained in a way as simple as computing the test statistic. Moreover, by appealing to strong approximations, our framework accommodates nonparametric regression models as well as distributional/density‐related and structural settings. Since the test entails a tuning parameter (due to the nonstandard nature of the problem), we propose a data‐driven choice and prove its validity. Monte Carlo simulations confirm that our test works well.
APA, Harvard, Vancouver, ISO, and other styles
33

Ramsingh, Chelsea, and Paolina Centonze. "Program Analysis For Database Injections." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 16, no. 6 (September 16, 2017): 6977–86. http://dx.doi.org/10.24297/ijct.v16i6.6332.

Full text
Abstract:
Today businesses all around the world use databases in many different ways to store sensitive data. It is important that the data stored stay safe and does not get into the wrong hands. To perform data management in a database, the language SQL (Structured Query Language) can be used. It is extremely crucial to prevent these databases from being attacked to ensure the security of the users’ sensitive and private data. This journal will focus on the most common way hackers exploit data from databases through SQL injection, and it presents dynamic and static code testing to find and prevent these SQL cyber attacks by comparing two testing tools. It will also present a comparative analysis and static/dynamic code testing of two SQL injection detection tools. Burp Suite and Vega will be used to identify possible flaws in test cases dealing with users’ sensitive and private information. Currently, there are no comparisons of these two open-source tools to quantify the number of flaws these two tools are able to detect. Also, there are no detailed papers found fully testing the open-source Burp Suite and Vega for SQL Injection. These two open-source tools are commonly used but have not been tested enough. A static analyzer detecting SQL Injection will be used to test and compare the results of the dynamic analyzer. In addition, this paper will suggest techniques and methods to ensure the security of sensitive data from SQL injection. The prevention of SQL injection is imperative and it is crucial to secure the sensitive data from potential hackers who want to exploit it.
APA, Harvard, Vancouver, ISO, and other styles
34

Ghanem, Mohamed C., and Thomas M. Chen. "Reinforcement Learning for Efficient Network Penetration Testing." Information 11, no. 1 (December 20, 2019): 6. http://dx.doi.org/10.3390/info11010006.

Full text
Abstract:
Penetration testing (also known as pentesting or PT) is a common practice for actively assessing the defenses of a computer network by planning and executing all possible attacks to discover and exploit existing vulnerabilities. Current penetration testing methods are increasingly becoming non-standard, composite and resource-consuming despite the use of evolving tools. In this paper, we propose and evaluate an AI-based pentesting system which makes use of machine learning techniques, namely reinforcement learning (RL) to learn and reproduce average and complex pentesting activities. The proposed system is named Intelligent Automated Penetration Testing System (IAPTS) consisting of a module that integrates with industrial PT frameworks to enable them to capture information, learn from experience, and reproduce tests in future similar testing cases. IAPTS aims to save human resources while producing much-enhanced results in terms of time consumption, reliability and frequency of testing. IAPTS takes the approach of modeling PT environments and tasks as a partially observed Markov decision process (POMDP) problem which is solved by POMDP-solver. Although the scope of this paper is limited to network infrastructures PT planning and not the entire practice, the obtained results support the hypothesis that RL can enhance PT beyond the capabilities of any human PT expert in terms of time consumed, covered attacking vectors, accuracy and reliability of the outputs. In addition, this work tackles the complex problem of expertise capturing and re-use by allowing the IAPTS learning module to store and re-use PT policies in the same way that a human PT expert would learn but in a more efficient way.
APA, Harvard, Vancouver, ISO, and other styles
35

Watanabe, Yuuki Y., Motohiro Ito, and Akinori Takahashi. "Testing optimal foraging theory in a penguin–krill system." Proceedings of the Royal Society B: Biological Sciences 281, no. 1779 (March 22, 2014): 20132376. http://dx.doi.org/10.1098/rspb.2013.2376.

Full text
Abstract:
Food is heterogeneously distributed in nature, and understanding how animals search for and exploit food patches is a fundamental challenge in ecology. The classic marginal value theorem (MVT) formulates optimal patch residence time in response to patch quality. The MVT was generally proved in controlled animal experiments; however, owing to the technical difficulties in recording foraging behaviour in the wild, it has been inadequately examined in natural predator–prey systems, especially those in the three-dimensional marine environment. Using animal-borne accelerometers and video cameras, we collected a rare dataset in which the behaviour of a marine predator (penguin) was recorded simultaneously with the capture timings of mobile, patchily distributed prey (krill). We provide qualitative support for the MVT by showing that (i) krill capture rate diminished with time in each dive, as assumed in the MVT, and (ii) dive duration (or patch residence time, controlled for dive depth) increased with short-term, dive-scale krill capture rate, but decreased with long-term, bout-scale krill capture rate, as predicted from the MVT. Our results demonstrate that a single environmental factor (i.e. patch quality) can have opposite effects on animal behaviour depending on the time scale, emphasizing the importance of multi-scale approaches in understanding complex foraging strategies.
APA, Harvard, Vancouver, ISO, and other styles
36

Viviani, Emma, Luca Di Persio, and Matthias Ehrhardt. "Energy Markets Forecasting. From Inferential Statistics to Machine Learning: The German Case." Energies 14, no. 2 (January 11, 2021): 364. http://dx.doi.org/10.3390/en14020364.

Full text
Abstract:
In this work, we investigate a probabilistic method for electricity price forecasting, which overcomes traditional ones. We start considering statistical methods for point forecast, comparing their performance in terms of efficiency, accuracy, and reliability, and we then exploit Neural Networks approaches to derive a hybrid model for probabilistic type forecasting. We show that our solution reaches the highest standard both in terms of efficiency and precision by testing its output on German electricity prices data.
APA, Harvard, Vancouver, ISO, and other styles
37

Viviani, Emma, Luca Di Persio, and Matthias Ehrhardt. "Energy Markets Forecasting. From Inferential Statistics to Machine Learning: The German Case." Energies 14, no. 2 (January 11, 2021): 364. http://dx.doi.org/10.3390/en14020364.

Full text
Abstract:
In this work, we investigate a probabilistic method for electricity price forecasting, which overcomes traditional ones. We start considering statistical methods for point forecast, comparing their performance in terms of efficiency, accuracy, and reliability, and we then exploit Neural Networks approaches to derive a hybrid model for probabilistic type forecasting. We show that our solution reaches the highest standard both in terms of efficiency and precision by testing its output on German electricity prices data.
APA, Harvard, Vancouver, ISO, and other styles
38

Sim, Jun-Gi. "Improved image processing of road pavement defect by infrared thermography." Selected Scientific Papers - Journal of Civil Engineering 13, s1 (March 1, 2018): 61–72. http://dx.doi.org/10.1515/sspjce-2018-0006.

Full text
Abstract:
Abstract This paper intends to achieve improved image processing for the clear identification of defects in damaged road pavement structure using infrared thermography non-destructive testing (NDT). To that goal, 4 types of pavement specimen including internal defects were fabricated to exploit the results obtained by heating the specimens by natural light. The results showed that defects located down to a depth of 3 cm could be detected by infrared thermography NDT using the improved image processing method.
APA, Harvard, Vancouver, ISO, and other styles
39

Hidayat, Arif, and Ismail Puji Saputra. "ANALISA DAN PROBLEM SOLVING KEAMANAN ROUTER MIKROTIK RB750RA DAN RB750GR3 DENGAN METODE PENETRATION TESTING (STUDI KASUS: WARNET AULIA.NET, TANJUNG HARAPAN LAMPUNG TIMUR)." Jurnal RESISTOR (Rekayasa Sistem Komputer) 1, no. 2 (October 28, 2018): 118–24. http://dx.doi.org/10.31598/jurnalresistor.v1i2.323.

Full text
Abstract:
Information and communication technology is something that is difficult to separate from human life in the present era. One example of information and communication technology is a network of proxy routers. This study uses the penetration testing method, which aims to analyze the security system of the proxy router that has been applied to Warnet Aulia.net. In analyzing network security, the Mikrotik Router is done by the method of penetration testing where the form of attacks on the network is simulated. In this study Python and Winboxpoc.py were successfully run on the Windows 10 operating system. The results of this study indicate that the network security owned by the Aulia.net cafe network still has many gaps to exploit. As for the results of some attacks, it shows serious things in terms of exploitation, such as the output of getting a proxy router password and username. Therefore, this study also provides a solution on how to prevent the mikrotik router from being exploited. Problem solving is explained using several alternative solutions, so that practitioners or network technicians are expected to be able to utilize knowledge related to the results of this study in order to secure the router.
APA, Harvard, Vancouver, ISO, and other styles
40

Nafiah, Faris, Ali Sophian, Md Raisuddin Khan, and Ilham Mukriz Zainal Abidin. "Modelling of scanning pulsed eddy current testing of normal and slanted surface cracks." Indonesian Journal of Electrical Engineering and Computer Science 16, no. 3 (December 1, 2019): 1297. http://dx.doi.org/10.11591/ijeecs.v16.i3.pp1297-1302.

Full text
Abstract:
<p><span style="font-family: Arial; font-size: small;">Thanks to its wide bandwidth, pulsed eddy current (PEC) has attracted researchers of various backgrounds in the attempt to exploit its benefits in Non-destructive Testing (NDT). The ability of modelling PEC problems would be a precious tool in this attempt as it would help improve the understanding of the interaction between the transient magnetic field and the specimen, among others. In this work, a Finite Element Modelling (FEM) has been developed and experimental test data have been gathered for its validation. The investigated cases were simulated surface cracks of different sizes and angles. The study involved looking at time-domain PEC signals at different spatial distances from the cracks’ faces, which would particularly be useful for modelling scanning PEC probes. The obtained results show a good agreement between the FEM and experiment, demonstrating that the modelling technique can be used with confidence for solving similar problems.</span></p>
APA, Harvard, Vancouver, ISO, and other styles
41

Wu, Jiang, and J. W. Zuo. "Interactive System for T-Learning: Introduction of iTV Edutainment Mode." Advanced Materials Research 215 (March 2011): 43–46. http://dx.doi.org/10.4028/www.scientific.net/amr.215.43.

Full text
Abstract:
This paper introduces a new education mode system named as T-learning, which converges with two technologies: iTV and E-learning. After the initial discussion about the potential of T-learning, a basic system mode will be proposed. Then we modify it according to the SCORM standard, and also descript a system evaluation for functionality testing. The main objective of this paper is to establish an interactive system for the home learning and exploit a potential business possibility for T-learning service.
APA, Harvard, Vancouver, ISO, and other styles
42

Costa-Jussà, Marta R. "Domain adaptation strategies in statistical machine translation: a brief overview." Knowledge Engineering Review 30, no. 5 (October 30, 2015): 514–20. http://dx.doi.org/10.1017/s0269888915000119.

Full text
Abstract:
AbstractStatistical machine translation (SMT) is gaining interest given that it can easily be adapted to any pair of languages. One of the main challenges in SMT is domain adaptation because the performance in translation drops when testing conditions deviate from training conditions. Many research works are arising to face this challenge. Research is focused on trying to exploit all kinds of material, if available. This paper provides an overview of research, which copes with the domain adaptation challenge in SMT.
APA, Harvard, Vancouver, ISO, and other styles
43

Bouziane, Ayoub, Jamal Kharroubi, and Arsalane Zarghili. "Towards an Optimal Speaker Modeling in Speaker Verification Systems using Personalized Background Models." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 6 (December 1, 2017): 3655. http://dx.doi.org/10.11591/ijece.v7i6.pp3655-3663.

Full text
Abstract:
<p>This paper presents a novel speaker modeling approachfor speaker recognition systems. The basic idea of this approach consists of deriving the target speaker model from a personalized background model, composed only of the UBM Gaussian components which are really present in the speech of the target speaker. The motivation behind the derivation of speakers’ models from personalized background models is to exploit the observeddifference insome acoustic-classes between speakers, in order to improve the performance of speaker recognition systems.</p>The proposed approach was evaluatedfor speaker verification task using various amounts of training and testing speech data. The experimental results showed that the proposed approach is efficientin termsof both verification performance and computational cost during the testing phase of the system, compared to the traditional UBM based speaker recognition systems.
APA, Harvard, Vancouver, ISO, and other styles
44

Crippa, Chiara, and Federico Agliardi. "Practical Estimation of Landslide Kinematics Using PSI Data." Geosciences 11, no. 5 (May 14, 2021): 214. http://dx.doi.org/10.3390/geosciences11050214.

Full text
Abstract:
Kinematics is a key component of a landslide hazard because landslides moving at similar rates can affect structures or collapse differently depending on their mechanisms. While a complete definition of landslide kinematics requires integrating surface and subsurface site investigation data, its practical estimate is usually based on 2D profiles of surface slope displacements. These can be now measured accurately using Persistent Scatterer InSAR (PSI), which exploits open access satellite imagery. Although 2D profiles of kinematic quantities are easy to retrieve, the efficacy of possible descriptors and extraction strategies has not been systematically compared, especially for complex landslides. Large, slow rock slope deformations, characterized by low displacement rates (<50 mm/year) and spatial and temporal heterogeneities, are an excellent testing ground to explore the best approaches to exploit PSI data from Sentinel-1 for kinematic characterization. For three case studies, we extract profiles of different kinematic quantities using different strategies and evaluate them against field data and simplified numerical modelling. We suggest that C-band PSI data allow for an effective appraisal of complex landslide kinematics, provided that the interpretation is (a) based on decomposed velocity vector descriptors, (b) extracted along critical profiles using interpolation techniques respectful of landslide heterogeneity, and (c) constrained by suitable model-based templates and field data.
APA, Harvard, Vancouver, ISO, and other styles
45

Rice, John, Tung-Shan Liao, Nigel Martin, and Peter Galvin. "The role of strategic alliances in complementing firm capabilities." Journal of Management & Organization 18, no. 6 (November 2012): 858–69. http://dx.doi.org/10.1017/s1833367200000493.

Full text
Abstract:
AbstractStrategic alliance research emerged to explain alliance formation based upon transaction cost minimisation and opportunism reduction. Later research, and early research from Japan, emphasised the role of alliances in facilitating the transfer of knowledge between organisations. Most recently, alliance research has focussed on the development of shared, potentially idiosyncratic, resource stocks. This paper builds on this recent research, testing the proposition that alliances are important vehicles allowing firms to access or acquire external resources, hence shoring up capability gaps and building new capabilities as required during firm, product and industry life cycles. Using a sample from Australian manufacturing small-and-medium-sized enterprises, the paper reveals that alliances employed by firms can be viewed as initiatives to either fill a gap in the firm's resource stock or to exploit a perceived opportunity in its operational and strategic environment.
APA, Harvard, Vancouver, ISO, and other styles
46

Rice, John, Tung-Shan Liao, Nigel Martin, and Peter Galvin. "The role of strategic alliances in complementing firm capabilities." Journal of Management & Organization 18, no. 6 (November 2012): 858–69. http://dx.doi.org/10.5172/jmo.2012.18.6.858.

Full text
Abstract:
AbstractStrategic alliance research emerged to explain alliance formation based upon transaction cost minimisation and opportunism reduction. Later research, and early research from Japan, emphasised the role of alliances in facilitating the transfer of knowledge between organisations. Most recently, alliance research has focussed on the development of shared, potentially idiosyncratic, resource stocks. This paper builds on this recent research, testing the proposition that alliances are important vehicles allowing firms to access or acquire external resources, hence shoring up capability gaps and building new capabilities as required during firm, product and industry life cycles. Using a sample from Australian manufacturing small-and-medium-sized enterprises, the paper reveals that alliances employed by firms can be viewed as initiatives to either fill a gap in the firm's resource stock or to exploit a perceived opportunity in its operational and strategic environment.
APA, Harvard, Vancouver, ISO, and other styles
47

Michael, Steven C. "Time To Discovery." Ruffin Series of the Society for Business Ethics 3 (2002): 157–61. http://dx.doi.org/10.5840/ruffinx200237.

Full text
Abstract:
Venkataraman’s essay in this volume argues that the “fourth” force of control of the modern corporation, the entrepreneurial discovery process, can limit the ability of firms to exploit stakeholders. In this essay I explicitly examine the role of time in the entrepreneurial discovery process. First, the role of time in the individual stakeholder’s decisions is examined. Second, at an organizational level, I examine some historical evidence in order to empirically consider how swiftly the discovery process may work. Implications for both theory and empirical testing are discussed.
APA, Harvard, Vancouver, ISO, and other styles
48

Boschetto, Alberto, Luana Bottini, Valerio Cardini, Marco Eugeni, Paolo Gaudenzi, and Francesco Veniali. "Aircraft part substitution via additive manufacturing: design, simulation, fabrication and testing." Rapid Prototyping Journal 27, no. 5 (June 2, 2021): 995–1009. http://dx.doi.org/10.1108/rpj-06-2020-0140.

Full text
Abstract:
Purpose This paper aims to provide a case study focused on the substitution through selective laser melting of a part typically fabricated by traditional manufacturing. Design/methodology/approach To exploit the additive manufacturing (AM) advantages, the retrieving of the reconfiguration part data was provided, the process strategies by means of the interchange file handling and pre and post-processing were investigated and a re-design of the part was developed. Finally, the fabricated part was tested and analyzed. Findings Results claimed that a reconfiguration of the manufacturing framework plays an important role at each step of the process otherwise many AM benefits can be lost. In the paper, a set of recommendations, suggestions and hints regarding the implementation of AM for part substitutions is provided. Research limitations/implications Many aspects of the AM adoption, such as the production cost, energy consumption, sustainability and production volume, depend upon the geometry, batch size and other impactful factors, and thus they need to be studied in a case-by-case manner. Practical implications The proposed approaches have the concrete aim to address industrial resources toward the maximization of AM benefits in part substituting. Originality/value In this paper, the substitution of a part is fully undertaken from the early data collection to the manufactured part testing providing integrated approaches for each process step.
APA, Harvard, Vancouver, ISO, and other styles
49

Sun, Xudong, Lei Huang, and Changping Liu. "Multispectral face spoofing detection using VIS–NIR imaging correlation." International Journal of Wavelets, Multiresolution and Information Processing 16, no. 02 (March 2018): 1840003. http://dx.doi.org/10.1142/s0219691318400039.

Full text
Abstract:
With the wide applications of face recognition techniques, spoofing detection is playing an important role in the security systems and has drawn much attention. This research presents a multispectral face anti-spoofing method working with both visible (VIS) and near-infrared (NIR) spectra imaging, which exploits VIS–NIR image consistency for spoofing detection. First, we use part-based methods to extract illumination robust local descriptors, and then the consistency is calculated to perform spoofing detection. In order to further exploit multispectral correlation in local patches and to be free from manually chosen regions, we learn a confidence factor map for all the patches, which is used in final classifier. Experimental results of self-collected datasets, public Msspoof and PolyU-HSFD datasets show that the proposed approach gains promising results for both intra-dataset and cross-dataset testing scenarios, and that our method can deal with different illumination and both photo and screen spoofing.
APA, Harvard, Vancouver, ISO, and other styles
50

Pfrang, Steffen, Anne Borcherding, David Meier, and Jürgen Beyerer. "Automated security testing for web applications on industrial automation and control systems." at - Automatisierungstechnik 67, no. 5 (May 27, 2019): 383–401. http://dx.doi.org/10.1515/auto-2019-0021.

Full text
Abstract:
Abstract Industrial automation and control systems (IACS) play a key role in modern production facilities. On the one hand, they provide real-time functionality to the connected field devices. On the other hand, they get more and more connected to local networks and the internet in order to facilitate use cases promoted by “Industrie 4.0”. A lot of IACS are equipped with web servers that provide web applications for configuration and management purposes. If an attacker gains access to such a web application operated on an IACS, he can exploit vulnerabilities and possibly interrupt the critical automation process. Cyber security research for web applications is well-known in the office IT. There exist a lot of best practices and tools for testing web applications for different kinds of vulnerabilities. Security testing targets at discovering those vulnerabilities before they can get exploited. In order to enable IACS manufacturers and integrators to perform security tests for their devices, ISuTest was developed, a modular security testing framework for IACS. This paper provides a classification of known types of web application vulnerabilities. Therefore, it makes use of the worst direct impact of a vulnerability. Based on this analysis, a subset of open-source vulnerability scanners to detect such vulnerabilities is selected to be integrated into ISuTest. Subsequently, the integration is evaluated. This evaluation is twofold: At first, willful vulnerable web applications are used. In a second step, seven real IACS, like a programmable logic controller, industrial switches and cloud gateways, are used. Both evaluation steps start with the manual examination of the web applications for vulnerabilities. They conclude with an automated test of the web applications using the vulnerability scanners automated by ISuTest. The results show that the vulnerability scanners detected 53 % of the existing vulnerabilities. In a former study using commercial vulnerability scanners, 54 % of the security flaws could be found. While performing the analysis, 45 new vulnerabilities were detected. Some of them did not only break the web server but crashed the whole IACS, stopping the critical automation process. This shows that security testing is crucial in the industrial domain and needs to cover all services provided by the devices.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography