Latest YouTube Video

Saturday, March 5, 2016

Anonymous User

Anonymous User is a Treehouse member. Join Anonymous User on Treehouse today to learn web design, web development, and iOS development.

from Google Alert - anonymous http://ift.tt/1UJeNfx
via IFTTT

I have a new follower on Twitter


Fractal US
Fractalerts was founded by a group of traders with a passion for math, markets and money. Prepare...don't react. Indices, Commodities and Forex

http://t.co/KHp2AU2oHi
Following: 4855 - Followers: 13262

March 05, 2016 at 04:28PM via Twitter http://twitter.com/FA_USIndices

Reinstall anonymous authentication method

Reinstall anonymous authentication method. Completely new to how to install Moodle for my site. Display mode. Display replies flat, with oldest first ...

from Google Alert - anonymous http://ift.tt/1YfIOTW
via IFTTT

Sculptor Galaxy NGC 134


NGC 134 is probably not the best known spiral galaxy in the constellation Sculptor. Still, the tantalizing island universe is a clearly a telescopic treasure in southern skies. It shares a bright core, clumpy dust lanes, and loosely wrapped spiral arms with spiky foreground stars of the Milky Way and the more diminutive galaxy NGC 131 in this sharp cosmic vista. From a distance of about 60 million light-years, NGC 134 is seen tilted nearly edge-on. It spans some 150,000 light-years, making it even larger than our own Milky Way galaxy. NGC 134's warped disk and faint extensions give the appearance of past gravitational interactions with neighboring galaxies. Like the much closer and brighter Sculptor galaxy NGC 253, tendrils of dust appear to rise from a galactic disk sprinkled with blue star clusters and pinkish star forming regions. via NASA http://ift.tt/1LEhe0I

JPSS Multi Mission Concept of Operations

NOAA has partnered with NASA to implement the Joint Polar Satellite System (JPSS). The JPSS Program constitutes the next series of U.S. civilian polar orbiting environmental remote sensing satellites and sensors that have been flown historically on polar satellites. These satellites will implement NOAA's requirements for collection of global multi-spectral radiometry and other specialized meteorological and oceanographic data, via remote sensing of land, sea, and the atmosphere. These data will support NOAA's mission for continuous observations of the Earth's environment necessary to understand and predict changes in weather, climate, oceans and coasts, which support the Nation's economy, and protect lives and property. The JPSS-1 through JPSS-4 satellite series provides operational continuity of satellite-based observations and products from NOAA's POES and S-NPP satellites. The JPSS Program includes: • A Flight Segment including the Suomi National Polar-orbiting Partnership (S-NPP), JPSS-1, and JPSS-2/3/4 satellites and launch vehicles; • A Ground Segment consisting of ground station assets, networks, command, control, communications, product generation and distribution, and facilities; and • All science-related activity, including algorithm development and maintenance, and instrument and data product calibration and validation. The JPSS Multi-Mission System supplements other largely independent programs/systems whose data products and services are interconnected via the JPSS Ground Segment to increase across-the-board capabilities. In this synergistic way, JPSS satisfies NOAA requirements by utilizing both domestic and international partner assets, including, but not limited to, EUMETSAT's Metop and EPS-SG satellites, and JAXA's GCOM satellites. To learn more about JPSS, visit http://ift.tt/1TxExfM

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/1YdDiRQ
via IFTTT

Friday, March 4, 2016

Heart Warmers knit anonymous gifts for newborn babies

SPRINGFIELD, Ore. - At PeaceHealth Sacred Heart in Springfield, newborn babies receive something special - anonymous gifts of love in the form of ...

from Google Alert - anonymous http://ift.tt/1Ydf2iJ
via IFTTT

Re: [FD] Netgear GS105Ev2 - Multiple Vulnerabilities

[FD] McAfee VirusScan Enterprise security restrictions bypass

[FD] Executable installers are vulnerable^WEVIL (case 29): putty-0.66-installer.exe allowa arbitrary (remote) code execution WITH escalation of privilege

Ravens: OL Kelechi Osemele the one free agent Baltimore must sign - Jamison Hensley; already extended \"aggressive\" offer (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

How to Steal Secret Encryption Keys from Android and iOS SmartPhones

Unlike desktops, your mobile devices carry all sorts of information from your personal emails to your sensitive financial details. And due to this, the hackers have shifted their interest to the mobile platform. Every week new exploits are discovered for iOS and Android platform, most of the times separately, but the recently discovered exploit targets both Android as well as iOS devices.


from The Hacker News http://ift.tt/1LEW0jl
via IFTTT

I have a new follower on Twitter


Eternal Fat Kid
You gonna finish those fries? TV writer


Following: 7594 - Followers: 10761

March 04, 2016 at 11:45AM via Twitter http://twitter.com/EternalFatKid

NFL: Ravens LB Terrell Suggs arrested for a suspended license Friday in Arizona after one-car collision with no injuries (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

ISS Daily Summary Report – 03/3/16

MAGVECTOR: Peake configured switches on portable power supply 1 and inserted the Universal Serial Bus (USB) in preparation for the European Space Agency’s (ESA’s) MAGVECTOR experiment run.  MAGVECTOR qualitatively investigates the interaction between a moving magnetic field and an electrical conductor. The expected changes in the magnetic field structure on the ram and wake side of the electrical conductor are of interest for technical applications as well as for astrophysical research. Education Payloads Operations (EPO) – AstroPi:  Peake played Reaction Games on the ESA AstroPi which is a complete suite of games that provide reaction times of the user.  AstroPi is composed of RaspberryPi B+, Sense HAT (Hardware Attached on Top) and a camera module contained within a protective aluminum case.  Raspberry Pi is a credit-card sized computer that enables students to explore computing and learn how to program. Two AstroPi are on board: AstroPi Vis, with visible light camera, and AstroPi IR, with an infrared camera.  Both AstroPi will run programs written by the winners of a student competition and collect data from sensors (i.e., inertial movement, barometric pressure, relative humidity and temperature). The data will be shared with various schools.   Robonaut: Kopra setup the XF305 camcorders, which will be used capture video downlinks of the Robonaut investigation in the Lab and Node 2 modules. Kopra configured the Oscilloscopes to Robonaut which will monitor voltage signatures during debugging activities. Robonaut is a humanoid robot designed with the versatility and dexterity to manipulate hardware, work in high risk environments, and respond safely to unexpected obstacles. It is comprised of a torso with two arms and a head, and two legs with end effectors that enable the robot to translate inside the ISS by interfacing with handrails and seat track. Robonaut is currently operated inside the ISS, however, in the future, it will perform tasks both inside and outside the ISS. The Robonaut Teleoperations System enables Robonaut to mimic the motions of a crewmember wearing specialized gloves, a vest and a visor providing a three-dimensional view through Robonaut’s eyes.   Urine Processing Assembly (UPA) Separator Plumbing Assembly (SPA) Remove & Replace (R&R): On February 21st, the UPA failed due to the Distillation Assembly (DA) centrifuge speed exceeding its low limit. Three attempts to restart the UPA were not successful and review of the data indicated that the SPA was not functioning properly. Today Peake purged the DA-PCPA purge hose of moisture and R&Rd the malfunctioning SPA. Shortly after transitioning the UPA to standby, the PCPA turned on and the UPA immediately faulted due to a high pressure alert, indicating a lack of flow through the SPA. The crew subsequently cycled the Quick Disconnects (QDs) connected to the newly installed SPA in an attempt to recover flow through the SPA which was unsuccessful. The crew was advised to perform another SPA R&R which was completed but did not recover the UPA. Teams are meeting to discuss the forward plan.   Today’s Planned Activities   All activities were completed unless otherwise noted. ·         ISS HAM RADIO Power Down ·         Charger Unstow and Setup ·         VCA1 Camera Adjustment ·         MAGVEC – Gather and setup hardware ·         MAGVEC – Data Export from USB Drive ·         SPHERES – Battery Charging ·         Consolidation of US Food Rations ·         HAM Radio Power Up ·         VIZIR. Start charging СКПИ Infrared Receiver (ИКП) battery / r/g 1593 ·         IDENTIFICATION. Copy ИМУ-Ц micro-accelerometer data to laptop / r/g 1589 ·         ARED exercise video setup ·         Urine Processor Assembly (UPA) Hose Purge ·         Flushing Elektron-VM Gas-Liquid Separator (ГЖС) SKO / r/g 1590 ·         Filling (separation) of EDV (KOV) for Elektron or EDV-SV  r/g 1590 ·         СОЖ Maintenance ·         SSC – Crew Log Out ·         UPA SPA R&R ·         Date and Time Synch on 6 RS photo cameras to the station time / r/g 1594 ·         Preventive Maintenance of FS1 Laptop / r/g 1023 ·         Semi-annual BRI Cleaning. Express-check of nominal network configuration r/g 1596 ·         Urine Processor Assembly (UPA) Purge Hose Part 2 ·         ROBONAUT – Installation of camcorder for EPO video ·         SPHERES – Battery Replacement ·         VIZIR. Battery Charge / r/g 1593 ·         R2 – Equipment Setup ·         EPO – Reaction Game (Crew’s choice) ·         SPHERES OBT ·         Testing Inter-modular connectivity r/g 1597 ·         Test procedure and plan ·         SPHERES – Battery Replacement ·         BRI log download from RSS1 / Auxiliary Computer System ·         OTKLIK. Hardware Monitoring / r/g 1588 ·         Checkout of video equipment to capture ARED exercise ·         ROBONAUT 2 (R2) – Hardware Deactivation and Stowage ·         ARED Exercise Video Equipment Stowage ·         SPHERES – Battery Replacement ·         Crew handover conference ·         PAO Hardware Setup ·         VIZIR. Battery Charge / r/g 1593 ·         IMS Delta File Prep ·         Crew Prep for PAO ·         PAO Event ·         Station Support Computer (SSC) System Log-in ·         Flight Director / ISS Crew Tagup ·         SPHERES – Battery Replacement   Completed Task List Items ·         None   Ground Activities All activities were completed unless otherwise noted. ·         UPA recovery support   Three-Day Look Ahead: Friday, 03/04:  BASS H/W Stow, SPHERES, Food Consolidation Saturday, 03/05: Crew Off Duty, Weekly Cleaning Sunday, 03/06: Crew Off Duty   QUICK ISS Status – Environmental Control Group:                               Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Override Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Init Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up    

from ISS On-Orbit Status Report http://ift.tt/21bnGhE
via IFTTT

Subgraph OS — Secure Linux Operating System for Non-Technical Users

Information security and privacy are consistently hot topics after Edward Snowden revelations of NSA's global surveillance that brought the world's attention towards data protection and encryption as never before. Moreover, just days after Windows 10's successful launch last summer, we saw various default settings in the Microsoft's newest OS that compromise users' privacy, making a large


from The Hacker News http://ift.tt/1TXUCJU
via IFTTT

Is there a way to switch off jsdoc enforceExistence for anonymous arrow functions?

JsDoc validation rules for jscs. Contribute to jscs-jsdoc development by creating an account on GitHub.

from Google Alert - anonymous http://ift.tt/1UDZ8On
via IFTTT

Funds Donors showing as anonymous

Hi David I just bought the Widget pack and gave it a test and say for top donors widget I only saw one donor and it was Anonymous. I had a look at the ...

from Google Alert - anonymous http://ift.tt/1RMrKlO
via IFTTT

Moons and Jupiter


Some of the Solar System's largest moons rose together on February 23. On that night, a twilight pairing of a waning gibbous Moon and Jupiter was captured in this sharp telescopic field of view. The composite of short and long exposures reveals the familiar face of our fair planet's own large natural satellite, along with a line up of the ruling gas giant's four Galilean moons. Left to right, the tiny pinpricks of light are Callisto, Io, Ganymede, [Jupiter], and Europa. Closer and brighter, our own natural satellite appears to loom large. But Callisto, Io, and Ganymede are actually larger than Earth's Moon, while water world Europa is only slightly smaller. In fact, of the Solar System's six largest planetary satellites, only Saturn's moon Titan is missing from the scene. via NASA http://ift.tt/1Y57jDq

[FD] Hacking Magento eCommerce For Fun And 17.000 USD

Hello list, Tonight I'd like to share with you my latest blog post. Seeing my personal experience with the Magento bug bounty program (and even experiences from other security researchers), it looks like they truly believe in a "security through obscurity" methodology. I'm quite disappointed by the fact they tried to downplay the severity of my vulnerabilities, silently patching them after several months, without letting me know their progresses. However, what really disappoints me is that my vulnerabilities seem to be quite critical, specially considering they're the only two classes of security bugs they're willing to pay up to 10,000$ under their bug bounty program. I had to ping them several times in order to get my bounties, so I believe they tried to "obscure" and unevaluated my findings not only because of their "security through obscurity" methodology, but probably because they were also hoping I'd never noticed their advisories with my name and the vulnerabilities I reported, and never claimed my bounties for such findings? Link: http://ift.tt/1QWRI9p Best regards, EgiX

Source: Gmail -> IFTTT-> Blogger

Thursday, March 3, 2016

[FD] Hacking Magento eCommerce For Fun And 17.000 USD

Hello list, Tonight I'd like to share with you my latest blog post. Seeing my personal experience with the Magento bug bounty program (and even experiences from other security researchers), it looks like they truly believe in a "security through obscurity" methodology. I'm quite disappointed by the fact they tried to downplay the severity of my vulnerabilities, silently patching them after several months, without letting me know their progresses. However, what really disappoints me is that my vulnerabilities seem to be quite critical, specially considering they’re the only two classes of security bugs they’re willing to pay up to 10,000$ under their bug bounty program. I had to ping them several times in order to get my bounties, so I believe they tried to "obscure" and unevaluated my findings not only because of their "security through obscurity" methodology, but probably because they were also hoping I'd never noticed their advisories with my name and the vulnerabilities I reported, and never claimed my bounties for such findings? Link: http://ift.tt/1QWRI9p Best regards, /EgiX

Source: Gmail -> IFTTT-> Blogger

Learning Tabletop Object Manipulation by Imitation. (arXiv:1603.00964v1 [cs.RO])

We aim to enable robot to learn tabletop object manipulation by imitation. Given external observations of demonstrations on object manipulations, we believe that two underlying problems to address in learning by imitation is 1) segment a given demonstration into skills that can be individually learned and reused, and 2) formulate the correct RL (Reinforcement Learning) problem that only considers the relevant aspects of each skill so that the policy for each skill can be effectively learned. Previous works made certain progress in this direction, but none has taken private information into account. The public information is the information that is available in the external observations of demonstration, and the private information is the information that are only available to the agent that executes the actions, such as tactile sensations. Our contribution is that we provide a method for the robot to automatically segment the demonstration into multiple skills, and formulate the correct RL problem for each skill, and automatically decide whether the private information is an important aspect of each skill based on interaction with the world. Our motivating example is for a real robot to play the shape sorter game by imitating other's behavior, and we will show the results in a simulated 2D environment that captures the important properties of the shape sorter game. The evaluation is based on whether the demonstration is reasonably segmented, and whether the correct RL problems are formulated. In the end, we will show that robot can imitate the demonstrated behavior based on learned policies.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1oTnW8P
via IFTTT

Automatic learning of gait signatures for people identification. (arXiv:1603.01006v1 [cs.CV])

This work targets people identification in video based on the way they walk (i.e. gait). While classical methods typically derive gait signatures from sequences of binary silhouettes, in this work we explore the use of convolutional neural networks (CNN) for learning high-level descriptors from low-level motion features (i.e. optical flow components). We carry out a thorough experimental evaluation of the proposed CNN architecture on the challenging TUM-GAID dataset. The experimental results indicate that using spatio-temporal cuboids of optical flow as input data for CNN allows to obtain state-of-the-art results on the gait task with an image resolution eight times lower than the previously reported results (i.e. 80x60 pixels).

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1QWDHZm
via IFTTT

Modeling the Sequence of Brain Volumes by Local Mesh Models for Brain Decoding. (arXiv:1603.01067v1 [cs.LG])

We represent the sequence of fMRI (Functional Magnetic Resonance Imaging) brain volumes recorded during a cognitive stimulus by a graph which consists of a set of local meshes. The corresponding cognitive process, encoded in the brain, is then represented by these meshes each of which is estimated assuming a linear relationship among the voxel time series in a predefined locality. First, we define the concept of locality in two neighborhood systems, namely, the spatial and functional neighborhoods. Then, we construct spatially and functionally local meshes around each voxel, called seed voxel, by connecting it either to its spatial or functional p-nearest neighbors. The mesh formed around a voxel is a directed sub-graph with a star topology, where the direction of the edges is taken towards the seed voxel at the center of the mesh. We represent the time series recorded at each seed voxel in terms of linear combination of the time series of its p-nearest neighbors in the mesh. The relationships between a seed voxel and its neighbors are represented by the edge weights of each mesh, and are estimated by solving a linear regression equation. The estimated mesh edge weights lead to a better representation of information in the brain for encoding and decoding of the cognitive tasks. We test our model on a visual object recognition and emotional memory retrieval experiments using Support Vector Machines that are trained using the mesh edge weights as features. In the experimental analysis, we observe that the edge weights of the spatial and functional meshes perform better than the state-of-the-art brain decoding models.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1oTnW8G
via IFTTT

Deep Reinforcement Learning from Self-Play in Imperfect-Information Games. (arXiv:1603.01121v1 [cs.LG])

Many real-world applications can be described as large-scale games of imperfect information. To deal with these challenging domains, prior work has focused on computing Nash equilibria in a handcrafted abstraction of the domain. In this paper we introduce the first scalable end-to-end approach to learning approximate Nash equilibria without any prior knowledge. Our method combines fictitious self-play with deep reinforcement learning. When applied to Leduc poker, Neural Fictitious Self-Play (NFSP) approached a Nash equilibrium, whereas common reinforcement learning methods diverged. In Limit Texas Holdem, a poker game of real-world scale, NFSP learnt a competitive strategy that approached the performance of human experts and state-of-the-art methods.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1QWDK7A
via IFTTT

Network Unfolding Map by Edge Dynamics Modeling. (arXiv:1603.01182v1 [cs.AI])

The emergence of collective dynamics in neural networks is a mechanism of the animal and human brain for information processing. In this paper, we develop a computational technique of distributed processing elements, which are called particles. We observe the collective dynamics of particles in a complex network for transductive inference on semi-supervised learning problems. Three actions govern the particles' dynamics: walking, absorption, and generation. Labeled vertices generate new particles that compete against rival particles for edge domination. Active particles randomly walk in the network until they are absorbed by either a rival vertex or an edge currently dominated by rival particles. The result from the model simulation consists of sets of edges sorted by the label dominance. Each set tends to form a connected subnetwork to represent a data class. Although the intrinsic dynamics of the model is a stochastic one, we prove there exists a deterministic version with largely reduced computational complexity; specifically, with subquadratic growth. Furthermore, the edge domination process corresponds to an unfolding map. Intuitively, edges "stretch" and "shrink" according to edge dynamics. Consequently, such effect summarizes the relevant relationships between vertices and uncovered data classes. The proposed model captures important details of connectivity patterns over the edge dynamics evolution, which contrasts with previous approaches focused on vertex dynamics. Computer simulations reveal that our model can identify nonlinear features in both real and artificial data, including boundaries between distinct classes and the overlapping structure of data.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1oTnVS6
via IFTTT

GeoGebra Tools with Proof Capabilities. (arXiv:1603.01228v1 [cs.AI])

We report about significant enhancements of the complex algebraic geometry theorem proving subsystem in GeoGebra for automated proofs in Euclidean geometry, concerning the extension of numerous GeoGebra tools with proof capabilities. As a result, a number of elementary theorems can be proven by using GeoGebra's intuitive user interface on various computer architectures including native Java and web based systems with JavaScript. We also provide a test suite for benchmarking our results with 200 test cases.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1QWDHZf
via IFTTT

Decision Forests, Convolutional Networks and the Models in-Between. (arXiv:1603.01250v1 [cs.CV])

This paper investigates the connections between two state of the art classifiers: decision forests (DFs, including decision jungles) and convolutional neural networks (CNNs). Decision forests are computationally efficient thanks to their conditional computation property (computation is confined to only a small region of the tree, the nodes along a single branch). CNNs achieve state of the art accuracy, thanks to their representation learning capabilities. We present a systematic analysis of how to fuse conditional computation with representation learning and achieve a continuum of hybrid models with different ratios of accuracy vs. efficiency. We call this new family of hybrid models conditional networks. Conditional networks can be thought of as: i) decision trees augmented with data transformation operators, or ii) CNNs, with block-diagonal sparse weight matrices, and explicit data routing functions. Experimental validation is performed on the common task of image classification on both the CIFAR and Imagenet datasets. Compared to state of the art CNNs, our hybrid models yield the same accuracy with a fraction of the compute cost and much smaller number of parameters.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1oTnVBJ
via IFTTT

[FD] [CFP] EuskalHack (San Sebastian / Donostia) 2016

Hi, I am submitting this CFP on behalf of EuskalHack. Tables are shown in Markdown format. Thanks, Ryan **Introduction** EuskalHack Security Congress is the first Ethical Hacking association in Euskadi, with the aim of promoting the community and culture in digital security to anyone who may be interested. This exclusive conference is shaping up to be the most relevant in the Basque Country, with an estimated 125 attendees for the first edition. The participants include specialised companies, state security organisations, professionals, hobbyists and students in the area of security and Information Technology. **Estimated date and location** The estimated date for the conference is the 18th of June 2016 in the city of Donostia - San Sebastian. **Participate as a speaker** We want to open the doors to all those who wish to be part of this first edition of the EuskalHack Security Congress in one of the various categories of talks and workshops we offer, whether professionals, students or hobbyists. We are interested in original content, giving preference to innovative research and materials, for example: - Communication hacking: GSM, SDR, 3G, Fiber Optics, Satellite Links - Robots, Drones, Mobile Devices, Virtual Reality, Raspberry Pi - Critical infrastructure and industrial security - Practical attacks and virtual environments - Cryptography, steganography, anti-forensics methods - Open Source software development - Programming, Debugging and Exploitation - Malware in general, APTs, Bypassing - Corporate security and intelligence - Cloud (in)security - Data Mining - Hacktivism **Language and Internationalisation** At EuskalHack we value linguistic diversity and internationalisation, this is why we envisage talks mainly being presented in Spanish, Basque and English. Therefore, please let us know what language you plan to use for your slides and orally. Note: We positively value bilingual options which can be understood by the maximum number of attendees as possible. **Talks and Workshops** We will have several spaces over the course of the event, which will include talks and workshops concurrently, taking three different types of approaches: | **NUMBER** | **1** | **2** | **3** | |

Source: Gmail -> IFTTT-> Blogger

[FD] Vulnerabilities in Mobile Safari

Hello list! There are multiple Denial of Service vulnerabilities in Mobile Safari. After conversation with Apple about all vulnerabilities in their browser during December - February, I present the second advisory. In the middle of December I checked all exploits for different browsers, which I published and non-published since 2006, in Mobile Safari for iOS 6.0.1 and 8.4.1. This is the second part of vulnerabilities.

Source: Gmail -> IFTTT-> Blogger

[FD] CVE Request: Fiyo CMS 2.0.6.1 - Multiple XSS Vulnerabilities

*1. Introduction* Affected Product: Fiyo CMS 2.0.6.1 Fixed in: 2.0.6.2 Vendor Website: http://www.fiyo.org/ Vulnerability Type: XSS Remote Exploitable: Yes *2. Overview* There are multiple XSS vulnerabilities in Fiyo CMS 2.0.6.1. The vulnerabilities exist due to insufficient filtration of user-supplied data. A remote attacker can execute arbitrary HTML and script code in browser in context of the vulnerable application. *3. Affected Modules* Affected fields in the modules are listed below: i. Module: Dashboard->Users ->User List Section: User Group Field: Group Name ii. Module: Dashboard->Users->New User Section: Login Data Field: Nama Lengkap *4. Payload* *5. Credit* Himanshu Mehta mehta.himanshu21@gmail.com

Source: Gmail -> IFTTT-> Blogger

[FD] [REVIVE-SA-2016-001] Revive Adserver - Multiple vulnerabilities

[FD] Schneider Electric Building Operation Automation Server Multiple Vulnerabilities

[FD] WAGO IO PLC 758-870, 750-849, 750-849 vulnerabilities

[FD] Shakacon 2016 CFP - July 11-14 / Hawaii



Source: Gmail -> IFTTT-> Blogger

[FD] Panda SM Manager iOS Application - MITM SSL Certificate Vulnerability

Panda SM Manager iOS Application - MITM SSL Certificate Vulnerability

Source: Gmail -> IFTTT-> Blogger

[FD] Browser Security Tool: HTTPS Only 2.1 (Major Release, Open Source, Python)

When we browse the web, top threats are: 1. Remote code execution - everything is lost 2. Man in the middle - sniffing, and tampering 3. Phishing - simple, old, and still quite useful 4. Cross site scripting - data of the vulnerable domain is lost 5. CSRF - unauthorized action So, what if the browser can only access HTTPS of whitelist domains? With HTTPS, "man in the middle" is fixed. And with the whitelist, other attacks become very difficult, some even become impossible(such as phishing). Phishing is a huge headache in this era, because URLs can be hidden in legitimate redirection(such as t.co). That's why we made this simple tool(really simple - less than 200 lines of Python and JavaScript): Project Home Page - http://ift.tt/1VTYTNR Source Code - http://ift.tt/1SQVsJQ Kind Regards,

Source: Gmail -> IFTTT-> Blogger

Tu me comande (Anonymous)

Composer, Anonymous. Key, C Dorian mode. First Publication, 1487 ca. in Bologna Ms Q.16 (No.32). Language, French. Piece Style, Renaissance.

from Google Alert - anonymous http://ift.tt/1UCRF29
via IFTTT

[FD] Vipps by DNB for Android - cryptographic vulnerabilities

============================ Summary: ========= Application: Vipps by DNB Operating system: Android Versions affected: 1.1.33, 1.2.18, 1.2.20, 1.2.44 and 1.2.45 Non-vulnerable version: 1.3.0 Bugs: Cryptographic issues Vendor notification: 16.02.2016 Vendor fix: 29.02.2016 Author: Gunnar Alendal, alendal (at) nym.hush.com General description: ==================== The mobile app Vipps for Android has two cryptographic issues regarding generation of AES key material used to protect data in transit. Vipps generates AES keys used for various encryption needs. This is done in a non-standard way, reducing the strength of the key material expected in AES encryption. Vulnerability 1 - poor choice of PRNG: ============================= Description:

Source: Gmail -> IFTTT-> Blogger

Anonymous tosses sonic bomb in Ain el Helweh camp

Anonymous tosses sonic bomb in Ain el Helweh camp. Thu 03 Mar 2016 at 09:43. NNA - An unknown individual tossed at dawn on Thursday a sonic ...

from Google Alert - anonymous http://ift.tt/1WXIUyp
via IFTTT

Ravens: Team declines option on DE Chris Canty's contract, making him free agent; spent 3 seasons in Baltimore (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Ravens Video: Skip Bayless calls Joe Flacco \"just pretty good\"; \"outrageous\" contract makes him most overpaid QB in NFL (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

I have a new follower on Twitter


Trending Facts
Factoids surrounding the trends of Twitter
United States

Following: 2891 - Followers: 335

March 03, 2016 at 12:36PM via Twitter http://twitter.com/TrendingFactoid

Ravens: LB Daryl Smith released, freeing up $2.625M in cap space - Adam Schefter; 12-year veteran has career 30.5 sacks (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

University Takes Steps to Address Anonymous Racial Comments

Southern Adventist University is appalled and deeply saddened by the hurtful, insensitive comments regarding race that were expressed on social ...

from Google Alert - anonymous http://ift.tt/1VSDN2f
via IFTTT

Suspected hit-and-run driver arrested following anonymous tip

Investigators say an anonymous tip led them to Jose Manjaras, 26, as the driver who hit a motorcyclist in the 1100 block of Northwest Military Highway ...

from Google Alert - anonymous http://ift.tt/1QVnbcb
via IFTTT

Hack the Pentagon — US Government Challenges Hackers to Break its Security

The United States Department of Defense (DoD) has the plan to boost their internal and network security by announcing what it calls "the first cyber Bug Bounty Program in the history of the federal government," officially inviting hackers to take up the challenge. Dubbed "Hack the Pentagon," the bug bounty program invites the hackers and security researchers only from the United States to


from The Hacker News http://ift.tt/21Jtxg8
via IFTTT

Anonymous

This woman has been married for more than seven years. She does not have children due to health problems that she had in adolescence.

from Google Alert - anonymous http://ift.tt/1UB92QX
via IFTTT

Can Scientists 'Upload Knowledge' Directly into your Brain to Teach New Skills?

Imagine the world where you do not have to make any efforts to learn new skills or knowledge. Just like new programs are uploaded to a Robot to teach them new skills, What if new skills are uploaded to your brain to make you learn, say, playing Guitar, a whole language like French or German or anything else you wish? Do you want a technique, if exists, to make this possible? Of


from The Hacker News http://ift.tt/1UATkVW
via IFTTT

Unusual Clouds over Hong Kong


What's that in the sky? Earlier this month, in the sky high above Hong Kong, China, not just one unusual type of cloud appeared -- but two. In the foreground was a long lenticular cloud, a cloud that forms near mountains from uprising air and might appear to some as an alien spaceship. Higher in the sky, and further in the background, was a colorful iridescent cloud. Iridescent clouds are composed of water droplets of similar size that diffract different colors of sunlight by different amounts. Furthest in the background is the Sun, blocked from direct view by the opaque lenticular, but providing the light for the colors of the iridescent. Either type of cloud is unusual to see in Hong Kong, and unfortunately, after only a few minutes, both were gone. via NASA http://ift.tt/1LUWz3j

Cyclone Winston Slams Fiji (February 20, 2016)

The NASA GPM satellite passed directly over Tropical Cyclone Winston just after it made landfall on the north coast of Viti Levu Island, which is the largest and most populated island in the nation of Fiji. At the time, Winston was one of the most intense tropical cyclones observed in the South Pacific Ocean, and took an unusual track on the way to Fiji, completing a large counter-clockwise loop during the preceding week. NASA's GPM satellite is designed to measure rainfall using both passive microwave (GMI) and radar (DPR) instruments. GMI measuremensts are sensitive to the column-integrated rain and ice water, and cover a wide swath, whereas the DPR can observe 3D structures of radar signals reflected by rain and snow in a narrower swath. In this animation, the GMI rainfall estimates are shown at the earth's surface below the 3D storm structure revealed by DPR.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/21Fagjm
via IFTTT

Wednesday, March 2, 2016

Mask, Anonymous, Network

Download free images about Mask, Anonymous, Network from Pixabay's library of over 570000 public domain photos, illustrations and vectors ...

from Google Alert - anonymous http://ift.tt/1TRIDyR
via IFTTT

Probabilistic Relational Model Benchmark Generation. (arXiv:1603.00709v1 [cs.LG])

The validation of any database mining methodology goes through an evaluation process where benchmarks availability is essential. In this paper, we aim to randomly generate relational database benchmarks that allow to check probabilistic dependencies among the attributes. We are particularly interested in Probabilistic Relational Models (PRMs), which extend Bayesian Networks (BNs) to a relational data mining context and enable effective and robust reasoning over relational data. Even though a panoply of works have focused, separately , on the generation of random Bayesian networks and relational databases, no work has been identified for PRMs on that track. This paper provides an algorithmic approach for generating random PRMs from scratch to fill this gap. The proposed method allows to generate PRMs as well as synthetic relational data from a randomly generated relational schema and a random set of probabilistic dependencies. This can be of interest not only for machine learning researchers to evaluate their proposals in a common framework, but also for databases designers to evaluate the effectiveness of the components of a database management system.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1RqexN5
via IFTTT

Continuous Deep Q-Learning with Model-based Acceleration. (arXiv:1603.00748v1 [cs.LG])

Model-free reinforcement learning has been successfully applied to a range of challenging problems, and has recently been extended to handle large neural network policies and value functions. However, the sample complexity of model-free algorithms, particularly when using high-dimensional function approximators, tends to limit their applicability to physical systems. In this paper, we explore algorithms and representations to reduce the sample complexity of deep reinforcement learning for continuous control tasks. We propose two complementary techniques for improving the efficiency of such algorithms. First, we derive a continuous variant of the Q-learning algorithm, which we call normalized adantage functions (NAF), as an alternative to the more commonly used policy gradient and actor-critic methods. NAF representation allows us to apply Q-learning with experience replay to continuous tasks, and substantially improves performance on a set of simulated robotic control tasks. To further improve the efficiency of our approach, we explore the use of learned models for accelerating model-free reinforcement learning. We show that iteratively refitted local linear models are especially effective for this, and demonstrate substantially faster learning on domains where such models are applicable.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/24Cv0aD
via IFTTT

Filter based Taxonomy Modification for Improving Hierarchical Classification. (arXiv:1603.00772v1 [cs.AI])

Large scale classification of data organized as a hierarchy of classes has received significant attention in the literature. Top-Down (TD) Hierarchical Classification (HC), which exploits the hierarchical structure during the learning process is an effective method for dealing with problems at scale due to its computational benefits. However, its accuracy suffers due to error propagation i.e., prediction errors made at higher levels in the hierarchy cannot be corrected at lower levels. One of the main reasons behind errors at the higher levels is the presence of inconsistent nodes and links that are introduced due to the arbitrary process of creating these hierarchies by domain experts. In this paper, we propose two efficient data driven filter based approaches for hierarchical structure modification: (i) Flattening (local and global) approach that identifies and removes inconsistent nodes present within the hierarchy and (ii) Rewiring approach modifies parent-child relationships to improve the classification performance of learned models. Our extensive empirical evaluation of the proposed approaches on several image and text datasets shows improved performance over competing approaches.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1Rqezo1
via IFTTT

Automatic Differentiation Variational Inference. (arXiv:1603.00788v1 [stat.ML])

Probabilistic modeling is iterative. A scientist posits a simple model, fits it to her data, refines it according to her analysis, and repeats. However, fitting complex models to large data is a bottleneck in this process. Deriving algorithms for new models can be both mathematically and computationally challenging, which makes it difficult to efficiently cycle through the steps. To this end, we develop automatic differentiation variational inference (ADVI). Using our method, the scientist only provides a probabilistic model and a dataset, nothing else. ADVI automatically derives an efficient variational inference algorithm, freeing the scientist to refine and explore many models. ADVI supports a broad class of models-no conjugacy assumptions are required. We study ADVI across ten different models and apply it to a dataset with millions of observations. ADVI is integrated into Stan, a probabilistic programming system; it is available for immediate use.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/24CuXLZ
via IFTTT

Hybrid Collaborative Filtering with Neural Networks Romaric Gaudel. (arXiv:1603.00806v1 [cs.IR])

Collaborative Filtering aims at exploiting the feedback of users to provide personalised recommendations. Such algorithms look for latent variables in a large sparse matrix of ratings. They can be enhanced by adding side information to tackle the well-known cold start problem. While Neu-ral Networks have tremendous success in image and speech recognition, they have received less attention in Collaborative Filtering. This is all the more surprising that Neural Networks are able to discover latent variables in large and heterogeneous datasets. In this paper, we introduce a Collaborative Filtering Neural network architecture aka CFN which computes a non-linear Matrix Factorization from sparse rating inputs and side information. We show experimentally on the MovieLens and Douban dataset that CFN outper-forms the state of the art and benefits from side information. We provide an implementation of the algorithm as a reusable plugin for Torch, a popular Neural Network framework.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1Rqez7D
via IFTTT

Finding Preference Profiles of Condorcet Dimension $k$ via SAT. (arXiv:1402.4303v2 [cs.MA] UPDATED)

Condorcet winning sets are a set-valued generalization of the well-known concept of a Condorcet winner. As supersets of Condorcet winning sets are always Condorcet winning sets themselves, an interesting property of preference profiles is the size of the smallest Condorcet winning set they admit. This smallest size is called the Condorcet dimension of a preference profile. Since little is known about profiles that have a certain Condorcet dimension, we show in this paper how the problem of finding a preference profile that has a given Condorcet dimension can be encoded as a satisfiability problem and solved by a SAT solver. Initial results include a minimal example of a preference profile of Condorcet dimension 3, improving previously known examples both in terms of the number of agents as well as alternatives. Due to the high complexity of such problems it remains open whether a preference profile of Condorcet dimension 4 exists.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1m7I3cW
via IFTTT

Belief and Truth in Hypothesised Behaviours. (arXiv:1507.07688v3 [cs.AI] UPDATED)

There is a long history in game theory on the topic of Bayesian or "rational" learning, in which each player maintains beliefs over a set of alternative behaviours, or types, for the other players. This idea has gained increasing interest in the artificial intelligence (AI) community, where it is used as a method to control a single agent in a system composed of multiple agents with unknown behaviours. The idea is to hypothesise a set of types, each specifying a possible behaviour for the other agents, and to plan our own actions with respect to those types which we believe are most likely, given the observed actions of the agents. The game theory literature studies this idea primarily in the context of equilibrium attainment. In contrast, many AI applications have a focus on task completion and payoff maximisation. With this perspective in mind, we identify and address a spectrum of questions pertaining to belief and truth in hypothesised types. We formulate three basic ways to incorporate evidence into posterior beliefs and show when the resulting beliefs are correct, and when they may fail to be correct. Moreover, we demonstrate that prior beliefs can have a significant impact on our ability to maximise payoffs in the long-term, and that they can be computed automatically with consistent performance effects. Furthermore, we analyse the conditions under which we are able complete our task optimally, despite inaccuracies in the hypothesised types. Finally, we show how the correctness of hypothesised types can be ascertained during the interaction via an automated statistical analysis.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1JQl9k3
via IFTTT

Viagra Anonymous

Viagra anonymous . FDA approved pharmacy. Buy Generic Without Prescription. Top-quality drugs at discount prices.

from Google Alert - anonymous http://ift.tt/24Cgkbs
via IFTTT

Ravens Video: Joe Flacco's extension \"only solution\" to cap issues - Field Yates; says QB has better timing than anyone (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Anonymous

Anonymous. Anonymous is hosting For Universites World Food Day 2016 2016-03-02 13:39:51 -0500. For Universites World Food Day 2016.

from Google Alert - anonymous http://ift.tt/1OQOooK
via IFTTT

France could Fine Apple $1 Million for each iPhone it Refuses to Unlock

The United States is not the only one where Apple is battling with the federal authorities over iPhone encryption. Apple could face $1 Million in Fine each time the company refused to unlock an iPhone in France. Despite its victory in a New York court yesterday, Apple may not be so successful elsewhere in fighting against federal authorities over iPhone encryption battle. Yann Galut, a


from The Hacker News http://ift.tt/1RoSwht
via IFTTT

Ravens: QB Joe Flacco's 3-year contract extension is worth $66.4M with $44M fully guaranteed, source tells Adam Caplan (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Turing Award — Inventors of Modern Cryptography Win $1 Million Cash Prize

And the Winners of this year's Turing Award are: Whitfield Diffie and Martin E. Hellman. The former chief security officer at Sun Microsystems Whitfield Diffie and the professor at Stanford University Martin E. Hellman won the 2015 ACM Turing Award, which is frequently described as the "Nobel Prize of Computing". Turing Award named after Alan M. Turing, the British mathematician and computer


from The Hacker News http://ift.tt/1oPEcaL
via IFTTT

Kanye West, Who wants to destroy ‘The Pirate Bay’, Caught using Torrent Site

The 38-year-old rapper Kanye West is at the centre of controversy once again. West is himself a Pirate Lover just like everyone else, and he proved it today by sharing a photo of his laptop screen on Twitter. The rapper tweeted an ill-judged picture on Tuesday night to show what he was listening to on YouTube (Sufjan Stevens’ 'Death With Dignity' song), but his fans discovered something he


from The Hacker News http://ift.tt/1OPVIAN
via IFTTT

Issues

Hi, "By default Gitlab relies on anonymous binding or a special querying user to ask the LDAP server about the existence of a user before ...

from Google Alert - anonymous http://ift.tt/1Y1IFUc
via IFTTT

Ravens: Notre Dame OT Ronnie Stanley goes No. 6 in Todd McShay's Mock Draft 3.0; RB Ezekiel Elliot is also an option (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

NFL: QB Joe Flacco agrees with Ravens to 3-year contract extension through 2021 - Caplan; tore ACL, MCL in 2015 Week 11 (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Pour vous servir belle dame (Anonymous)

Misc. Comments. Many of the pieces in the Bologna Q.16 manuscript have text incipits, and if the song was well-known, singers would know what ...

from Google Alert - anonymous http://ift.tt/1oYoivy
via IFTTT

Um anjo à Virgem Santa (Anonymous)

Um anjo à Virgem Santa (Anonymous). Add File. Add Sheet MusicAdd Your Own ArrangementAdd Your Own CompositionAdd Your Own EditionAdd ...

from Google Alert - anonymous http://ift.tt/1VQgBSi
via IFTTT

ISS Daily Summary Report – 03/1/16

44 Soyuz (44S) Undock and Landing:  The 44S Crew (Kelly, Volkov, and Kornienko) undocked from the ISS Mini-Research Module (MRM)-2 docking port at 7:02pm CST. The Soyuz deorbit burn occurred at 9:32pm CST resulting in a nominal landing in the Kazakhstan southern zone at 10:26pm CST. The ISS will be in 3-crew operations until 46S docking on March 19th.   Payload On-Orbit Still Shots for Utilization and Maintenance (POSSUM) Photographs:  Peake obtained still digital photos of all payload racks to document any configuration changes and to support crew training.   Habitability Walkthrough Video:  Kopra recorded a video of his walk-through of an area or activity and provide insights related to human factors and habitability.  The Habitability investigation results will be used to assess the relationship between crew members and their environment to better prepare for future long-duration spaceflights. Observations recorded during 6 month and 1 year missions assist spacecraft designers to determine how much habitable volume is required, and whether a mission’s duration impacts how much space crew members need.   Twins Study:  In support of the Twins Study, Peake obtained an ambient blood sample from Kelly for stowage on 44S.  This investigation integrates ten different studies led by multiple investigators.  The studies take advantage of a unique opportunity to look at the effects of space travel on identical twins, with one of the twins experiencing space travel for a year while the other remains earth-bound.  The study also looks at changes in the human body that are important in the fields of genetics, psychology, physiology, microbiology, and immunology.   Canadian Space Agency (CSA) Video:  Peake recorded a video and explained the CSA T-Bone experiment. The video is for the general public to view on the web and social media to promote science on board the ISS.   Story Time:  Kelly photographed Peake as he read from the children’s book The Incredible Intergalactic Journey Home.  Story Time is an advocacy Science, Technology, Engineering, Arts, and Math (STEAM) and literacy project.  It consists of reading seven books and performing related science demonstrations at a later date.  Story Time provides an opportunity to deliver ISS research content to communities that have not previously been engaged in the space program.   Today’s Planned Activities All activities were completed unless otherwise noted. HRF – Samples Collection and Stowage Prep TWIN – Saliva Samples Collection HRF – Samples Insertion into MELFI TWIN – Saliva Samples Collection TWIN – Centrifuge Setup and Blood Samples Collection TWIN – Assistance during Blood Samples Collection Checkout of Station Support [ВКС] Laptops Antivirus Scanning Results HRF – Blood Samples Collection HRF – Assistance during Blood Samples Collection Return Cargo Transfer into Soyuz 718 HRF – Blood Samples Preparation, Packing, and Handover to RS for Transfer into Soyuz 718 Closure of SM Window Shutters #6, 8, 9, 12, 13, and 14 MRM1-FGB Interface Screw Clamps Tightening Work Prep CMS – ARED Quarterly Maintenance TWIN – Samples Stowage and Hardware Restow after the Experiment HRF – Samples Stowage and Hardware Restow after the Experiment ARED – Fly Wheel Cylinder Removal Columbus HAM Radio Session KORREKTSIYA. Blood Samples Stow into ECCO Mini-container and Transfer to Soyuz 718 ECCO – Blood Samples Retrieval from MELFI and Handover to RS for Transfer into Soyuz 718 POSSUM Payload Photography HRF – Post-Experiment Blood Samples Stowage and Hardware Restow Transfer and Packing of Return Cargo into Soyuz 718. Photography of Return Cargo GoPro HERO3 Cameras Setup inside the Descent Module of Soyuz 718 Crew Departure Preparations for Return to Earth CIR – Rack Alignment Guide Installation WRS – Water Samples Analysis Dose Tracker Data Entry – Subject Soyuz 718 Transfer Completion Report Soyuz 718 [СА БО] Hatch Cover Surface Photography HABIT – HDD Cleaning OCA Downlink of Soyuz 718 [СА БО] Hatch Cover Surface Inspection Photographs after the Return Cargo Transfer is Complete Soyuz 718 Undock Comm Config Soyuz 718 RSA2-S/G2 Comm Check USOS Window Shutter Closure SALMARK – Health Assessment Questionnaire Soyuz 718 Activation SM and Columbus Ham Radio Deactivation SALMARK – Health Assessment Questionnaire On MCC Go Removal of QD Screw Clamps on MRM2 side and Post-Removal Clamps Inspection. Video Recording of the Interface Soyuz-MRM2 Transfer Hatches Closure. ‘MRM2 Transfer Hatch Closure’ TV Report Soyuz-MRM2 Transfer Hatches Closure TOCA – Data Recording On MCC Go Leak Check After Soyuz 718-MRM2 Hatch Closure Dose Tracker Data Entry – Subject Downlink of ‘ЗВБ uninstallation’ from MRM2 in mpeg2 via Ku-band HABIT – Experiment Ops Story Time Historical Photo [КСПЭ] Deactivation and Closure of Apps on Central Post SSC HABIT – Video Recording during the Experiment Ops SPRINT – Post-Experiment Closeout Ops Soyuz 718 ODF operations, undock and landing On MCC Go Post-deactivation ELEKTRON purge On MCC Go Switch DC-Soyuz PEV (КВД) in MRM2 to CLOSED WRS Maintenance IMS Delta File Prep CEVIS Isolator Inspection ISTOCHNIK-M. Preparation for Taking Measurements ISTOCHNIK-M. Turning on Telemetry Recording from Soyuz 718 Return to Nominal Comm Config   Completed Task List Items UPA Hardware Gather   Ground Activities All activities were completed unless otherwise noted. 44S Undock Operations   Three-Day Look Ahead: Wednesday, 03/02:  Crew Off Duty Thursday, 03/03:  Robonaut CPCI Fault Troubleshooting Friday, 03/04:  BASS H/W Stow, Food Consolidation   QUICK ISS Status – Environmental Control Group:                               Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) On [СКВ] 2 – SM Air Conditioner System (“SKV2”) Off Carbon Dioxide Removal Assembly (CDRA) Lab Override Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Standby Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up    

from ISS On-Orbit Status Report http://ift.tt/1Qr2RK6
via IFTTT

Survive France Network (Anonymous) Suggestion Box

I'm looking for any suggestions as to how to improve any aspect of the Survive France Network. I've made this suggestion box anonymous so feel free ...

from Google Alert - anonymous http://ift.tt/1RGkpEw
via IFTTT

anonymous,uncategorized,misc,general,other

While bernie sanders t shirt (http://ift.tt/1RGkrwf … %2Fa%3E%29) is running for the Autonomous nomination, he's still not a ...

from Google Alert - anonymous http://ift.tt/1oYhwWt
via IFTTT

FBI Admits — It was a 'Mistake' to Reset Terrorist's iCloud Password

Yes, FBI Director James Comey admitted that the investigators made a "mistake" with the San Bernardino investigation during a congressional hearing held by the House Judiciary Committee. Apple is facing a court order to help the FBI unlock an iPhone belonged to San Bernardino Shooter by developing a backdoored version of iOS that can disable the security feature on the locked iPhone.


from The Hacker News http://ift.tt/1LwIwpZ
via IFTTT

I have a new follower on Twitter


MelnikovFlorenc1958
Get Handmade word press website Design only in $249. call +1-800-219-0366 visit: https://t.co/3o7Ek7tTLZ
San Jose, CA
https://t.co/3o7Ek7tTLZ
Following: 373 - Followers: 6

March 02, 2016 at 05:59AM via Twitter http://twitter.com/florenc1958

I have a new follower on Twitter


Go Pro Football
Pro Club #footballtrials MARCH 2016!!!ENGLISH & EUROPEAN FOOTBALL LEAGUE SCOUTS! Go Pro today & book YOUR pro club trial @ https://t.co/2sXwxTrzJX #GoPro
United Kingdom
https://t.co/2sXwxTrzJX
Following: 4807 - Followers: 5490

March 02, 2016 at 05:23AM via Twitter http://twitter.com/GoProFootball

Voglio siscà (Anonymous)

Composer, Anonymous. Key, F major. Movements/Sections, 1 movement. First Publication, 1890 ca. Librettist, Aniello Califano (1870-1919).

from Google Alert - anonymous http://ift.tt/1TRe8I7
via IFTTT

FBI Director — "What If Apple Engineers are Kidnapped and Forced to Write (Exploit) Code?"

What If Apple Engineers are Kidnapped and Forced to Write (Exploit) Code? Exactly this was what FBI Director James Comey asked in the congressional hearing on Tuesday. The House Judiciary Committee hearing on "The Encryption Tightrope: Balancing Americans' Security and Privacy" over the ongoing battle between Apple and the FBI ended up being full of drama. The key to the dispute is


from The Hacker News http://ift.tt/1QqHYPb
via IFTTT

Creator alme siderum

Creator alme siderum (Anonymous). Add File. Add Sheet MusicAdd Your Own ArrangementAdd Your Own CompositionAdd Your Own EditionAdd ...

from Google Alert - anonymous http://ift.tt/1LUbKtC
via IFTTT

Qui es Ane

Composer, Anonymous. Key, A Aeolian mode. First Publication, 1487 ca. in Bologna Ms Q.16 (No.26). Language, French. Piece Style, Renaissance.

from Google Alert - anonymous http://ift.tt/1TQPKXb
via IFTTT

NGC 3310: A Starburst Spiral Galaxy


The party is still going on in spiral galaxy NGC 3310. Roughly 100 million years ago, NGC 3310 likely collided with a smaller galaxy causing the large spiral galaxy to light up with a tremendous burst of star formation. The changing gravity during the collision created density waves that compressed existing clouds of gas and triggered the star-forming party. The featured image from the Gemini North Telescope shows the galaxy in great detail, color-coded so that pink highlights gas while white and blue highlight stars. Some of the star clusters in the galaxy are quite young, indicating that starburst galaxies may remain in star-burst mode for quite some time. NGC 3310 spans about 50,000 light years, lies about 50 million light years away, and is visible with a small telescope towards the constellation of Ursa Major. via NASA http://ift.tt/1TOrkyF

Tuesday, March 1, 2016

Quantifying the vanishing gradient and long distance dependency problem in recursive neural networks and recursive LSTMs. (arXiv:1603.00423v1 [cs.AI])

Recursive neural networks (RNN) and their recently proposed extension recursive long short term memory networks (RLSTM) are models that compute representations for sentences, by recursively combining word embeddings according to an externally provided parse tree. Both models thus, unlike recurrent networks, explicitly make use of the hierarchical structure of a sentence. In this paper, we demonstrate that RNNs nevertheless suffer from the vanishing gradient and long distance dependency problem, and that RLSTMs greatly improve over RNN's on these problems. We present an artificial learning task that allows us to quantify the severity of these problems for both models. We further show that a ratio of gradients (at the root node and a focal leaf node) is highly indicative of the success of backpropagation at optimizing the relevant weights low in the tree. This paper thus provides an explanation for existing, superior results of RLSTMs on tasks such as sentiment analysis, and suggests that the benefits of including hierarchical structure and of including LSTM-style gating are complementary.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1QK3xJO
via IFTTT

Guided Cost Learning: Deep Inverse Optimal Control via Policy Optimization. (arXiv:1603.00448v1 [cs.LG])

Reinforcement learning can acquire complex behaviors from high-level specifications. However, defining a cost function that can be optimized effectively and encodes the correct task is challenging in practice. We explore how inverse optimal control (IOC) can be used to learn behaviors from demonstrations, with applications to torque control of high-dimensional robotic systems. Our method addresses two key challenges in inverse optimal control: first, the need for informative features and effective regularization to impose structure on the cost, and second, the difficulty of learning the cost function under unknown dynamics for high-dimensional continuous systems. To address the former challenge, we present an algorithm capable of learning arbitrary nonlinear cost functions, such as neural networks, without meticulous feature engineering. To address the latter challenge, we formulate an efficient sample-based approximation for MaxEnt IOC. We evaluate our method on a series of simulated tasks and real-world robotic manipulation problems, demonstrating substantial improvement over prior methods both in terms of task complexity and sample efficiency.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1UxsLB5
via IFTTT

Reasoning about Entailment with Neural Attention. (arXiv:1509.06664v4 [cs.CL] UPDATED)

While most approaches to automatically recognizing entailment relations have used classifiers employing hand engineered features derived from complex natural language processing pipelines, in practice their performance has been only slightly better than bag-of-word pair classifiers using only lexical similarity. The only attempt so far to build an end-to-end differentiable neural network for entailment failed to outperform such a simple similarity classifier. In this paper, we propose a neural model that reads two sentences to determine entailment using long short-term memory units. We extend this model with a word-by-word neural attention mechanism that encourages reasoning over entailments of pairs of words and phrases. Furthermore, we present a qualitative analysis of attention weights produced by this model, demonstrating such reasoning capabilities. On a large entailment dataset this model outperforms the previous best neural model and a classifier with engineered features by a substantial margin. It is the first generic end-to-end differentiable system that achieves state-of-the-art accuracy on a textual entailment dataset.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1NRZGOz
via IFTTT

Facebook's Vice President Arrested in Brazil for Refusing to Share WhatsApp Data

Apple is not the only technology giant battling against authorities over a court order; Facebook is also facing the same. Brazil’s federal police arrested Facebook Latin America Vice President for failing to comply with court orders to help investigators in a drug trafficking case that involves WhatsApp, a popular messaging app owned by Facebook that has over 100 Million users in Brazil.


from The Hacker News http://ift.tt/1QqqWE4
via IFTTT

DROWN Attack — More than 11 Million OpenSSL HTTPS Websites at Risk

A new deadly security vulnerability has been discovered in OpenSSL that affects more than 11 Million modern websites and e-mail services protected by an ancient, long deprecated transport layer security protocol, Secure Sockets Layer (SSLv2). Dubbed DROWN, the highly critical security hole in OpenSSL was disclosed today as a low-cost attack that could decrypt your sensitive, secure HTTPS


from The Hacker News http://ift.tt/1OMroXK
via IFTTT

When an anonymous user submits a form with an un-uploaded file that

Originally reported in #2675170-19: Drupal 7.43 makes file upload component fail for anonymous user but appears to affect Drupal core. To reproduce ...

from Google Alert - anonymous http://ift.tt/1oMyKFu
via IFTTT

Rorate, coeli, desuper

Composer, Anonymous. Key, F major. Language, Portuguese/Latin. Piece Style, Early 20th century. Instrumentation, mixed chorus (SSAA), organ ...

from Google Alert - anonymous http://ift.tt/1UwwUoM
via IFTTT

New York Judge Rules FBI Can't Force Apple to Unlock iPhone

Apple - 1; The FBI - 0 Apple Won a major court victory against the Federal Bureau of Investigation (FBI) in an ongoing legal battle similar to San Bernardino. In a New York case, a federal magistrate judge has ruled in favor of Apple, rejecting the U.S. government’s request to force Apple to help the FBI extract data from a locked iPhone. This ruling from United States Magistrate


from The Hacker News http://ift.tt/1QISeS0
via IFTTT

Ravens: WR Steve Smith (torn Achilles) confident he will be ready for start of season; \"No setbacks. No real pain\" (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

ISS Daily Summary Report – 02/29/16

Change of Command Ceremony: Today, the ISS Crew participated in a Change of Command Ceremony. During this ceremony Expedition 46 Commander Scott Kelly handed over command of the ISS to Expedition 47 Commander Tim Kopra.   Kelly, Volkov, and Kornienko will be returning to earth tomorrow evening onboard Soyuz 44.   Integrated Resistance and Aerobic Training Study (Sprint) Volume of Oxygen Utilized (VO2) Max:  For his Flight Day 75 Sprint VO2 Max session, Kopra attached Electrocardiogram (ECG) electrodes to himself, set up and donned Heart Rate Monitor hardware, performed Portable Pulmonary Function System calibrations, and then completed the VO2 protocol.  The Sprint VO2 investigation evaluates the use of high intensity, low volume exercise to minimize loss of muscle, bone, and cardiovascular function in ISS crewmembers while reducing total exercise time during long-duration space missions.   Multi-Purpose Small Payload Rack 2 (MSPR2) Microgravity Measurement Apparatus (MMA) Installation:  To prepare for upcoming operations for the JAXA Electrostatic Levitation Furnace (ELF), Peake installed the MMA Remote Sensor Units and MMA Triaxial Acceleration Assembly in the MSPR2 rack.   Habitability:  Today Peake recorded a video of his walk-through of an area or activity and provided insights related to human factors and habitability.  The Habitability investigation results will be used to assess the relationship between crew members and their environment in order to better prepare for future long-duration spaceflights to destinations, such as near earth asteroids and Mars. Observations recorded during 6 month and 1 year missions can help spacecraft designers determine how much habitable volume is required, and whether a mission’s duration impacts how much space crew members need.   Twins Study:  In support of the Twins Study, Kelly continued his series of week-long return minus 14 day saliva and blood collections.  This investigation is an integrated compilation of ten different studies led by multiple investigators.  The studies take advantage of a unique opportunity to look at the effects of space travel on identical twins, with one of them experiencing space travel for a year while the other remains earth-bound for that same year.  The study looks at changes in the human body that are important in the fields of genetics, psychology, physiology, microbiology, and immunology.   Fine Motor Skills:  Kelly, Kopra, Peake and Kornienko each completed a session of the Fine Motor Skills experiment today.  They performed a series of interactive tasks on a touchscreen tablet. This investigation is the first fine motor skills study to measure long-term microgravity exposure, different phases of microgravity adaptation, and sensorimotor recovery after returning to Earth gravity.   Ras Labs-CASIS-ISS Project for Synthetic Muscle: Resistance to Radiation (Synthetic Muscle):  Kopra obtained a set of historical photos of the synthetic muscle samples.  The purpose of this investigation is to measure the effects of radiation on proprietary synthetic muscle materials in space and earth environments. Robots made of these materials could provide assistance to humans in space, enhance survivability of robots during deep space travel, and provide support in extreme radiation environments on Earth.   Russian Treadmill (БД-2) Repair – БД-2 experienced a failure in the vibration isolation system, late in the crew day Friday.  Upon evalution, it was determined that the left rear torsion bracket had failed.  Over the weekend, the crew replaced the bracket.  The right front and right rear brackets had been replaced in October 2015.  БД-2 is go for nominal usage.   Japanese Experiment Module (JEM) Stowage Frame Installation Part 2:  Peake continued the assembly and installation of the JEM Stowage Frame.  Once fully installed, the frame will increase JEM stowage capability by 12 Cargo Transfer Bag Equivalents (CTBE).   Emergency Roles and Responsibilities Review:  Kopra and Peake reviewed and discussed priorities in the event of an emergency and how to achieve safety of the crew as well as safe configuration of the ISS.  Topics which were covered included crew actions during emergency retreat to the Soyuz, ISS Commander responsibilities, and communication and coordination among crew members and with ground teams.   Crew Quarters (CQ) Cleaning:  Over the weekend, Kornienko cleaned his Overhead CQ and Kelly cleaned his Port CQ today. The activity included cleaning of the intake and exhaust ducts, fans and airflow sensors.   Today’s Planned Activities All activities were completed unless otherwise noted. TWIN – sample drying SLEEP – questionnaire fill-out Fine Motor Skills – pre-test reminder PARODONT-2. Sampling using Microbe Control and Gingival Liquid sets / r/g 1559 HRF – sampling HRF – sample insertion into MELFI Fine Motor Skills – examination Signing of ROS crew handover statement / r/g 1561 SPRINT – hardware activation and warm-up init FINEMOTR – science ops setup Progress 429 RODNIK tank connection flushing / r/g 1563 MO – science ops bag prep Soyuz 718 Samsung tablet PC charging – init / ВиА item 5.4 step 6,7 pages 5-34, 5-35 (94, 95) MSPR2- – hardware installation into the rack to perform the science ops Soyuz 718 RGS comm check and comm pass / Выведение и спуск item п.1.4.2 (exc.step 1) pages 26, 27 Fine Motor Skills – examination Medical equipment stowage Fine Motor Skills – science ops run SPRINT – camcorder installation and setup EPO – Micro SD Card data copy for downlink Soyuz 719 Samsung tablet PC charging – init / ВиА item 5.4 step 6,7 pages 5-34, 5-35 (94, 95) MRM2 [АСП-О] hatch and Soyuz 718 hatch cover sealing mechanism maintenance / РК ИРС item 4.5 page 4-7 (82) Port crew cabin cleanup EPO – hardware power-off following automatic monitoring Sanitary and epidemiological status check / МО vol. 2 item 16 page 16-1 (166)+ r/g 1549 СОЖ maintenance / СОЖ item 4.4 step 1 page 4-27 (99) JAXA – cargo stowage frame installation On MCC Go Remove [ТА251М1Б] ([ЛКТ1Б1]) and [ПЗУ] from Soyuz 718 living compartment. Stow (СМ1РО_3_314_1, bag 353-8 (00037141R). Update the IMS / Орбитальный полёт item 13.6 page 100 Soyuz 719 Samsung tablet PC charging – term / ВиА item 5.4 step 6,7 pages 5-34, 5-35 (94, 95) [ВКС] laptop antivirus signature base update / r/g 8247 steps 1, 2 Soyuz 718 […]

from ISS On-Orbit Status Report http://ift.tt/1TO7EcZ
via IFTTT

I have a new follower on Twitter


Tara Reed
Founder @Kollecto. I like to build software without writing any code. Former Googler, Foursquarer & Microsoftie.
Detroit
https://t.co/oUf60ea0Uu
Following: 657 - Followers: 5345

March 01, 2016 at 04:10AM via Twitter http://twitter.com/TaraReed_

I have a new follower on Twitter


Issac Avila
Research Associate @internetresearc #internetresearch #marketresearch #research #academicresearch #onlineresearch #researchmethods
United States
https://t.co/kWRfUZ6xBV
Following: 712 - Followers: 76

March 01, 2016 at 02:47AM via Twitter http://twitter.com/researchassocit

Julius Caesar and Leap Days


Today, February 29th, is a leap day - a relatively rare occurrence. In 46 BC, Julius Caesar, featured here in a self-decreed minted coin, created a calendar system that added one leap day every four years. Acting on advice by Alexandrian astronomer Sosigenes, Caesar did this to make up for the fact that the Earth's year is slightly more than 365 days. In modern terms, the time it takes for the Earth to circle the Sun is slightly more than the time it takes for the Earth to rotate 365 times (with respect to the Sun -- actually we now know this takes about 365.24219 rotations). So, if calendar years contained 365 days they would drift from the actual year by about 1 day every 4 years. Eventually July (named posthumously for Julius Caesar himself) would occur during the northern hemisphere winter! By adopting a leap year with an extra day every four years, the calendar year would drift much less. This Julian Calendar system was used until the year 1582 when Pope Gregory XIII provided further fine-tuning when he added that leap days should not occur in years ending in "00", unless divisible by 400. This Gregorian Calendar system is the one in common use today. via NASA http://ift.tt/1QGtTw8

Monday, February 29, 2016

Towards Neural Knowledge DNA. (arXiv:1602.08571v1 [cs.AI])

In this paper, we propose the Neural Knowledge DNA, a framework that tailors the ideas underlying the success of neural networks to the scope of knowledge representation. Knowledge representation is a fundamental field that dedicate to representing information about the world in a form that computer systems can utilize to solve complex tasks. The proposed Neural Knowledge DNA is designed to support discovering, storing, reusing, improving, and sharing knowledge among machines and organisation. It is constructed in a similar fashion of how DNA formed: built up by four essential elements. As the DNA produces phenotypes, the Neural Knowledge DNA carries information and knowledge via its four essential elements, namely, Networks, Experiences, States, and Actions.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1XWzl3G
via IFTTT

Scalable Bayesian Rule Lists. (arXiv:1602.08610v1 [cs.AI])

We present an algorithm for building rule lists that is two orders of magnitude faster than previous work. Rule list algorithms are competitors for decision tree algorithms. They are associative classifiers, in that they are built from pre-mined association rules. They have a logical structure that is a sequence of IF-THEN rules, identical to a decision list or one-sided decision tree. Instead of using greedy splitting and pruning like decision tree algorithms, we fully optimize over rule lists, striking a practical balance between accuracy, interpretability, and computational speed. The algorithm presented here uses a mixture of theoretical bounds (tight enough to have practical implications as a screening or bounding procedure), computational reuse, and highly tuned language libraries to achieve computational efficiency. Currently, for many practical problems, this method achieves better accuracy and sparsity than decision trees; further, in many cases, the computational time is practical and often less than that of decision trees.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1oUm0xs
via IFTTT

Lie Access Neural Turing Machine. (arXiv:1602.08671v1 [cs.NE])

Recently, Neural Turing Machine and Memory Networks have shown that adding an external memory can greatly ameliorate a traditional recurrent neural network's tendency to forget after a long period of time. Here we present a new design of an external memory, wherein memories are stored in an Euclidean key space $\mathbb R^n$. An LSTM controller performs read and write via specialized structures called read and write heads, following the design of Neural Turing Machine. It can move a head by either providing a new address in the key space (aka random access) or moving from its previous position via a Lie group action (aka Lie access). In this way, the "L" and "R" instructions of a traditional Turing Machine is generalized to arbitrary elements of a fixed Lie group action. For this reason, we name this new model the Lie Access Neural Turing Machine, or LANTM.

We tested two different configurations of LANTM against an LSTM baseline in several basic experiments. As LANTM is differentiable end-to-end, training was done with RMSProp. We found the right configuration of LANTM to be capable of learning different permutation and arithmetic tasks and extrapolating to at least twice the input size, all with the number of parameters 2 orders of magnitude below that for the LSTM baseline. In particular, we trained LANTM on addition of $k$-digit numbers for $2 \le k \le 16$, but it was able to generalize almost perfectly to $17 \le k \le 32$.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1XWzjsL
via IFTTT

Investigating practical, linear temporal difference learning. (arXiv:1602.08771v1 [cs.LG])

Off-policy reinforcement learning has many applications including: learning from demonstration, learning multiple goal seeking policies in parallel, and representing predictive knowledge. Recently there has been an proliferation of new policy-evaluation algorithms that fill a longstanding algorithmic void in reinforcement learning: combining robustness to off-policy sampling, function approximation, linear complexity, and temporal difference (TD) updates. This paper contains two main contributions. First, we derive two new hybrid TD policy-evaluation algorithms, which fill a gap in this collection of algorithms. Second, we perform an empirical comparison to elicit which of these new linear TD methods should be preferred in different situations, and make concrete suggestions about practical use.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1TMGfIj
via IFTTT

Range-based argumentation semantics as 2-valued models. (arXiv:1602.08903v1 [cs.LO])

Characterizations of semi-stable and stage extensions in terms of 2-valued logical models are presented. To this end, the so-called GL-supported and GL-stage models are defined. These two classes of logical models are logic programming counterparts of the notion of range which is an established concept in argumentation semantics.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1oUlYWl
via IFTTT

Personalized and situation-aware multimodal route recommendations: the FAVOUR algorithm. (arXiv:1602.09076v1 [cs.AI])

Route choice in multimodal networks shows a considerable variation between different individuals as well as the current situational context. Personalization of recommendation algorithms are already common in many areas, e.g., online retail. However, most online routing applications still provide shortest distance or shortest travel-time routes only, neglecting individual preferences as well as the current situation. Both aspects are of particular importance in a multimodal setting as attractivity of some transportation modes such as biking crucially depends on personal characteristics and exogenous factors like the weather. This paper introduces the FAVourite rOUte Recommendation (FAVOUR) approach to provide personalized, situation-aware route proposals based on three steps: first, at the initialization stage, the user provides limited information (home location, work place, mobility options, sociodemographics) used to select one out of a small number of initial profiles. Second, based on this information, a stated preference survey is designed in order to sharpen the profile. In this step a mass preference prior is used to encode the prior knowledge on preferences from the class identified in step one. And third, subsequently the profile is continuously updated during usage of the routing services. The last two steps use Bayesian learning techniques in order to incorporate information from all contributing individuals. The FAVOUR approach is presented in detail and tested on a small number of survey participants. The experimental results on this real-world dataset show that FAVOUR generates better-quality recommendations w.r.t. alternative learning algorithms from the literature. In particular the definition of the mass preference prior for initialization of step two is shown to provide better predictions than a number of alternatives from the literature.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1XWzjsE
via IFTTT

Easy Monotonic Policy Iteration. (arXiv:1602.09118v1 [cs.LG])

A key problem in reinforcement learning for control with general function approximators (such as deep neural networks and other nonlinear functions) is that, for many algorithms employed in practice, updates to the policy or $Q$-function may fail to improve performance---or worse, actually cause the policy performance to degrade. Prior work has addressed this for policy iteration by deriving tight policy improvement bounds; by optimizing the lower bound on policy improvement, a better policy is guaranteed. However, existing approaches suffer from bounds that are hard to optimize in practice because they include sup norm terms which cannot be efficiently estimated or differentiated. In this work, we derive a better policy improvement bound where the sup norm of the policy divergence has been replaced with an average divergence; this leads to an algorithm, Easy Monotonic Policy Iteration, that generates sequences of policies with guaranteed non-decreasing returns and is easy to implement in a sample-based framework.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1OK3bl0
via IFTTT

Illustrating a neural model of logic computations: The case of Sherlock Holmes' old maxim. (arXiv:1210.7495v3 [q-bio.NC] UPDATED)

Natural languages can express some logical propositions that humans are able to understand. We illustrate this fact with a famous text that Conan Doyle attributed to Holmes: 'It is an old maxim of mine that when you have excluded the impossible, whatever remains, however improbable, must be the truth'. This is a subtle logical statement usually felt as an evident truth. The problem we are trying to solve is the cognitive reason for such a feeling. We postulate here that we accept Holmes' maxim as true because our adult brains are equipped with neural modules that naturally perform modal logical computations.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/TkYGAI
via IFTTT

Discovering Beaten Paths in Collaborative Ontology-Engineering Projects using Markov Chains. (arXiv:1407.2002v2 [cs.SI] UPDATED)

Biomedical taxonomies, thesauri and ontologies in the form of the International Classification of Diseases (ICD) as a taxonomy or the National Cancer Institute Thesaurus as an OWL-based ontology, play a critical role in acquiring, representing and processing information about human health. With increasing adoption and relevance, biomedical ontologies have also significantly increased in size. For example, the 11th revision of the ICD, which is currently under active development by the WHO contains nearly 50,000 classes representing a vast variety of different diseases and causes of death. This evolution in terms of size was accompanied by an evolution in the way ontologies are engineered. Because no single individual has the expertise to develop such large-scale ontologies, ontology-engineering projects have evolved from small-scale efforts involving just a few domain experts to large-scale projects that require effective collaboration between dozens or even hundreds of experts, practitioners and other stakeholders. Understanding how these stakeholders collaborate will enable us to improve editing environments that support such collaborations. We uncover how large ontology-engineering projects, such as the ICD in its 11th revision, unfold by analyzing usage logs of five different biomedical ontology-engineering projects of varying sizes and scopes using Markov chains. We discover intriguing interaction patterns (e.g., which properties users subsequently change) that suggest that large collaborative ontology-engineering projects are governed by a few general principles that determine and drive development. From our analysis, we identify commonalities and differences between different projects that have implications for project managers, ontology editors, developers and contributors working on collaborative ontology-engineering projects and tools in the biomedical domain.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/VHixTV
via IFTTT

Better Computer Go Player with Neural Network and Long-term Prediction. (arXiv:1511.06410v3 [cs.LG] UPDATED)

Competing with top human players in the ancient game of Go has been a long-term goal of artificial intelligence. Go's high branching factor makes traditional search techniques ineffective, even on leading-edge hardware, and Go's evaluation function could change drastically with one stone change. Recent works [Maddison et al. (2015); Clark & Storkey (2015)] show that search is not strictly necessary for machine Go players. A pure pattern-matching approach, based on a Deep Convolutional Neural Network (DCNN) that predicts the next move, can perform as well as Monte Carlo Tree Search (MCTS)-based open source Go engines such as Pachi [Baudis & Gailly (2012)] if its search budget is limited. We extend this idea in our bot named darkforest, which relies on a DCNN designed for long-term predictions. Darkforest substantially improves the win rate for pattern-matching approaches against MCTS-based approaches, even with looser search budgets. Against human players, the newest versions, darkfores2, achieve a stable 3d level on KGS Go Server as a ranked bot, a substantial improvement upon the estimated 4k-5k ranks for DCNN reported in Clark & Storkey (2015) based on games against other machine players. Adding MCTS to darkfores2 creates a much stronger player named darkfmcts3: with 5000 rollouts, it beats Pachi with 10k rollouts in all 250 games; with 75k rollouts it achieves a stable 5d level in KGS server, on par with state-of-the-art Go AIs (e.g., Zen, DolBaram, CrazyStone) except for AlphaGo [Silver et al. (2016)]; with 110k rollouts, it won the 3rd place in January KGS Go Tournament.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1QCLVEE
via IFTTT

Analysis of Algorithms and Partial Algorithms. (arXiv:1601.03411v2 [cs.AI] UPDATED)

We present an alternative methodology for the analysis of algorithms, based on the concept of expected discounted reward. This methodology naturally handles algorithms that do not always terminate, so it can (theoretically) be used with partial algorithms for undecidable problems, such as those found in artificial general intelligence (AGI) and automated theorem proving. We mention new approaches to self-improving AGI and logical uncertainty enabled by this methodology.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1lbZZHF
via IFTTT

Ocean City, MD's surf is at least 5.02ft high

Maryland-Delaware, March 04, 2016 at 08:00PM

Ocean City, MD Summary
At 2:00 AM, surf min of 0.3ft. At 8:00 AM, surf min of 2.41ft. At 2:00 PM, surf min of 4.1ft. At 8:00 PM, surf min of 5.02ft.

Surf maximum: 6.02ft (1.84m)
Surf minimum: 5.02ft (1.53m)
Tide height: 0.7ft (0.21m)
Wind direction: N
Wind speed: 9.49 KTS


from Surfline http://ift.tt/1kVmigH
via IFTTT

Ocean City, MD's surf is at least 5.44ft high

Maryland-Delaware, March 05, 2016 at 02:00AM

Ocean City, MD Summary
At 2:00 AM, surf min of 5.44ft. At 8:00 AM, surf min of 5.02ft. At 2:00 PM, surf min of 4.42ft. At 8:00 PM, surf min of 3.71ft.

Surf maximum: 6.45ft (1.96m)
Surf minimum: 5.44ft (1.66m)
Tide height: 2.72ft (0.83m)
Wind direction: N
Wind speed: 4.51 KTS


from Surfline http://ift.tt/1kVmigH
via IFTTT

Je m'en vois (Anonymous)

Composer, Anonymous. Key, C Ionian mode. First Publication, 1480s in Bologna Ms Q.16 (No.26). Language, French. Piece Style, Renaissance.

from Google Alert - anonymous http://ift.tt/1TNcjgH'en_vois_(Anonymous)&ct=ga&cd=CAIyGjgxMzAxNTQ0ZWE3M2NhMmQ6Y29tOmVuOlVT&usg=AFQjCNEgaFf96D42lZwRoIwa8eRCr4N-cQ
via IFTTT

Better anonymous user support

Right now the anonymous user support in 3.x is broken. Here is a patch which fixes that as well as merges some other changes that I wasn't able to ...

from Google Alert - anonymous http://ift.tt/1QgWdbq
via IFTTT

I have a new follower on Twitter


Flybrix
Play with #robotics & #engineering using Flybrix. It's a programable toy LEGO #drone kit. Comes with a cool app for flight controls and airframe ideas #makerED

https://t.co/tyOpVGU90u
Following: 1804 - Followers: 3469

February 29, 2016 at 11:25AM via Twitter http://twitter.com/Flybrix

[FD] Fing v3.3.0 iOS - Persistent Mail Encoding Vulnerability

Document Title: =============== Fing v3.3.0 iOS - Persistent Mail Encoding Vulnerability References (Source): ==================== http://ift.tt/1oSZkgT Release Date: ============= 2016-02-29 Vulnerability Laboratory ID (VL-ID): ==================================== 1772 Common Vulnerability Scoring System: ==================================== 3.5 Product & Service Introduction: =============================== Find out which devices are connected to your Wi-Fi network, in just a few seconds. Fast and accurate, Fing is a professional App for network analysis. A simple and intuitive interface helps you evaluate security levels, detect intruders and resolve network issues. Discovers all devices connected to a Wi-Fi network. Unlimited devices and unlimited networks, for free! (Copy of the Homepage: http://ift.tt/18sOC71 ) Abstract Advisory Information: ============================== The Vulnerability Laboratory Core Research Team discovered an application-side mail encoding web vulnerability in the official Fing mobile iOS application. Vulnerability Disclosure Timeline: ================================== 2016-02-29: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Overlook Soft Product: Fing - iOS (Web-Application) 3.3.0 Exploitation Technique: ======================= Local Severity Level: =============== Medium Technical Details & Description: ================================ An application-side input validation web vulnerability has been discovered in the official Fing mobile iOS web-application. The security web vulnerability allows to inject malicious script codes to the application-side of the vulnerable iOS mobile app. The vulnerability is located in the encode mechanism of the `Address` input field. Local attackers with restricted or privileged web-application user accounts are able to inject the address input to the mail body message context on sharing. The attacker injects a new Hostname Address to scan and shares the input context mail mail to the addressbook. The injection point is the Address input field and the execution point is the mail message body context. The security risk of the application-side vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 3.5. Exploitation of the persistent web vulnerability requires a low privileged ios device account with restricted access and low user interaction. Successful exploitation of the vulnerabilities results in persistent phishing mails, session hijacking, persistent external redirect to malicious sources and application-side manipulation of affected or connected module context. Vulnerable Module(s) [+] Edit Scan (Add Hostname) Vulnerable Input(s): [+] Address Vulnerable Parameter(s) [+] hostname Affected Module(s) [+] Mail Message Body (Share Function) Proof of Concept (PoC): ======================= The application-side validation web vulnerability can be exploited by remote attackers with low privileged iOS device user account and without user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. Manual steps to reproduce the vulnerability ... 1. Install the Fing Scanner iOS app 2. Start the app 3. Click the second button in the bottom menu to edit a scan 4. Inject a script code payload to the "Address / Hostname" input field 5. Now click above the share button and choose send by email Note: The payload of the scan is not getting saved to the mail body message context 6. The execution occurs directly in the mail body of the email context 7. Successful reproduce of the vulnerability! PoC: Find (Send by Mail to Share)
Betreff: Fing discovery report for "><img>%20<iframe>%20<iframe src="x"> (No address)
Von: Benjamin Mejri Kunz <vulnerabilitylab@icloud.com>
Datum: 28.02.2016 18:38
An: bkm@evolution-sec.com

Host Name: ">%20




Von meinem iPad gesendet
Solution - Fix & Patch: ======================= The vulnerability can be patched by a secure parse and encode of the vulnerable `Address/Hostname` input field. Restrict the input field and disallow usage of special chars. Encode the mail message body context that is getting transfered of the address input to the email body context. Security Risk: ============== The security risk of the persistent mail encoding web vulnerability in the fing scanner iOS app is estimated as medium. (CVSS 3.5) Credits & Authors: ================== Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri (bkm@evolution-sec.com) [http://ift.tt/1jnqRwA] Disclaimer & Information: ========================= The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data. Domains: http://ift.tt/1jnqRwA - www.vuln-lab.com - http://ift.tt/1kouTut Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com Section: magazine.vulnerability-db.com - http://ift.tt/1zNuo47 - http://ift.tt/1wo6y8x Social: http://twitter.com/#!/vuln_lab - http://ift.tt/1kouSqa - http://youtube.com/user/vulnerability0lab Feeds: http://ift.tt/1iS1DH0 - http://ift.tt/1kouSqh - http://ift.tt/1kouTKS Programs: http://ift.tt/1iS1GCs - http://ift.tt/1iS1FyF - http://ift.tt/1oSBx0A Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or edit our material contact (admin@ or research@vulnerability-lab.com) to get a ask permission. Copyright © 2016 | Vulnerability Laboratory - [Evolution Security GmbH]™

Source: Gmail -> IFTTT-> Blogger