Latest YouTube Video

Saturday, September 10, 2016

Ocean City, MD's surf is at least 5.16ft high

Maryland-Delaware, September 16, 2016 at 04:00PM

Ocean City, MD Summary
At 4:00 AM, surf min of 3.94ft. At 10:00 AM, surf min of 4.13ft. At 4:00 PM, surf min of 5.16ft. At 10:00 PM, surf min of 4.88ft.

Surf maximum: 5.56ft (1.7m)
Surf minimum: 5.16ft (1.57m)
Tide height: 1.15ft (0.35m)
Wind direction: SE
Wind speed: 7.72 KTS


from Surfline http://ift.tt/1kVmigH
via IFTTT

biblatex-anonymous

Ma?eul Rouquette submitted an update to the biblatex-anonymous package. Version number: 2.3.0 2016-09-08 License type: lppl1.3 Summary ...

from Google Alert - anonymous http://ift.tt/2cf6dDj
via IFTTT

SKR Anonymous

The latest broadcasts from SKR Anonymous (@SKR_Anonymous) on Periscope. Hi! I'm Paul and I love to play games and entertain people!

from Google Alert - anonymous http://ift.tt/2cNxnWP
via IFTTT

Acid Anonymous 8

a Solo release by Acid Anonymous member Rinse. For Corruption is a bloody ass shaker, excaping the acid flow, With the grunting bassline and the ...

from Google Alert - anonymous http://ift.tt/2cf1jqW
via IFTTT

[FD] Persistent Cross-Site Scripting in Woocommerce WordPress plugin

--------------------------------------------------------------------

Source: Gmail -> IFTTT-> Blogger

[FD] Authorization bypass in InfiniteWP Admin Panel

--------------------------------------------------------------------

Source: Gmail -> IFTTT-> Blogger

[FD] Command injection in InfiniteWP Admin Panel

--------------------------------------------------------------------

Source: Gmail -> IFTTT-> Blogger

[FD] Reflected Cross-Site Scripting vulnerability in MailPoet Newsletters plugin

--------------------------------------------------------------------

Source: Gmail -> IFTTT-> Blogger

manchester utd vs manchester city Live Streaming

manchester utd v.s manchester city li.ve. s.t-.r.e.a.m. Image for the news result. Manchester United vs Manchester City preview: What time does it start, ...

from Google Alert - anonymous http://ift.tt/2c80xA5
via IFTTT

Friday, September 9, 2016

PIL filed in Court to Ban ‘Pokémon Go’ in India for Hurting Religious Sentiments

Pokémon GO has yet not been officially launched in India, but the location-based augmented reality game has already fueled a privacy debate and request for Ban. Isn’t it impressive? A Gujarat resident, Alay Anil Dave has recently filed a Public Interest Litigation (PIL) in the Gujarat High Court against Niantic, developers of Pokémon Go, over allegations that the game is hurting religious


from The Hacker News http://ift.tt/2ch7TLU
via IFTTT

I have a new follower on Twitter


Leonard Kim
Personal Branding Expert | Speaker → https://t.co/cnOinGn1BG ❤️✒️⛳️⌚️✈️⛱⛵️⛰⛺️⛴⛷⚾️ https://t.co/LumHkC2mFx Available for interviews: Hello@LeonardKim.com
Los Angeles
https://t.co/JIXNz6TkE4
Following: 52344 - Followers: 109162

September 09, 2016 at 02:24PM via Twitter http://twitter.com/MrLeonardKim

My Driverless Car's Cool But It Sure Pulls Over For Anonymous Sex A Lot

Having a driverless car is everything I thought it would be: I don't have to get stressed out every time I change lanes, I'll never get another speeding ...

from Google Alert - anonymous http://ift.tt/2ccS4q2
via IFTTT

Anonymous Infamous

The latest broadcasts from Anonymous Infamous (@Blazinfusion) on Periscope.

from Google Alert - anonymous http://ift.tt/2cjmg5Y
via IFTTT

ISS Daily Summary Report – 09/08/2016

Biomolecule Sequencer (BMS) Sample Analysis: Yesterday, the crew initiated the third BMS sample off of the task list.  Following retrieval of the Flow Cell and Media Syringe Tube from the from Minus Eighty Degree Celsius Laboratory Freezer for ISS (MELFI) and thawing of the sample, the crew injected the sample into the Flow Cell and initiated the deoxyribonucleic acid (DNA) sequencing via the Surface Pro 3 tablet.  The goals of the BMS experiment are to provide a proof-of-concept for the functionality and evaluate crew operability of a DNA sequencer in a space/microgravity environment.  The capability for sequencing of DNA in space could provide for a better ability to identify microbes in real-time, instead of requiring sample return and ground based analysis. Node 1 Starboard Aft Intra-Module Ventilation (IMV) Fan Inlet Cleaning: Yesterday, the crew completed the IMV Fan Inlet cleaning.  The purpose of this cleaning is to remove any foreign object or debris (FOD) from Intermodule Ventilation (IMV) Fan inlet flow straighter and Silencers located at the Node 1 Starboard Aft location. Portable Emergency Provisions (PEPS) Inspection:  Today, the crew conducted a regular inspection of the Portable Fire Extinguishers (PFEs), Extension Hose Tee Kits (EHTKs), Portable Breathing Apparatus (PBAs), and Pre-Breathe Masks.  Pre-Breathe Masks are not emergency equipment, but have similar maintenance requirements and are included in this inspection. EXpedite PRocessing of Experiments to Space Station (EXPRESS) Rack 7 (ER7) Solid State Power Control Module (SSPCM) Remove and Replace (R&R):   The crew replaced the SSPCM in ER7 to recover the rack.  After powering the rack, ground teams report that the SSPCM powered up successfully.  The SSPCM failed on July 8, 2016.  Following the recovery of ER7 capability, tomorrow the crew will relocate the two Space Automated Bioproduct Laboratories (SABLs) currently in ER8 to ER7 to make room for the SpaceX-9 delivered Phase Change Heat Exchanger (PCHx).  The primary objective of the PCHx Project is to create a unique test platform utilizing the EXPRESS Rack on the ISS to advance the technology readiness level of phase change heat exchangers for infusion into future exploration vehicles. Phase change material heat exchangers are a useful technology that helps certain space missions in regulating the thermal conditions on their particular spacecraft. They serve as a supplemental heat rejection device during time-varying heat loads and/or transient environments. It does so by storing waste energy by melting a phase change material during peak loads. It can then reject this energy through a radiator when conditions allow, causing the phase change material to freeze. Advanced Resistive Exercise Device (ARED) Rope Replace:  As part of routine maintenance, the crew replaced both ARED cable arm ropes.  After the installation, the crew was unable to engage detents while the ARED Main Arm is on the Upper Stops. Currently the crew is no go for ARED exercise.  Ground teams are discussing a forward plan. Intermodule Ventilation (IMV) Flow Measurements:  As part of system health monitoring, the crew utilized a Velocicalc tool in order to obtain measurements of selected ventilation inlets and outlets within the USOS.  Today’s measurements were taken in the Joint Airlock, Node1, Node 2, Node 3, Cupola, and the Lab.  Today’s Planned Activities All activities were completed unless otherwise noted. ER7 Removal of Glacier 4 from EXPRESS Rack 7 PILOT-T.  Preparation for the experiment EMCS Opening Gas Valve PILOT-T. Experiment Ops Fine Motor Skills (FINEMOTR) Experiment Ops WRS Recycle Tank Fill from EDV ER7 Rack Rotation EMU Conductivity Test ER7 SSPCM Replacement PILOT-T. Closeout Ops Preventive Maintenance of FS1 Laptop Semi-annual BRI Cleaning NAPOR-mini RSA. Cleaning Onboard Memory Storage БЗУ-М vents WRS Recycle Tank Fill from EDV Testing comm between modules ARED Rope Replacement ER7 Rack Rotation Inspection of Portable Breathing Apparatus (PBA) and Portable Fire Extinguisher (PFE) BRI log download from RSS1 MPEG2 Multicast Video Streaming Test after BRI Cleaning СОЖ Maintenance ER7 Glacier 4 Setup in EXPRESS Rack 7 Configuration Setup for MMB Measurement IMV Flow Measurement Photo/TV Camcorder Setup Verification IMV Flow Measurement Start EMU Metox Regeneration Stow Syringes used in Н2О Conductivity Test Completed Task List Items JEM Stowage Consolidation for OA-5 Dust Mask Transfer Ground Activities All activities were completed unless otherwise noted. EPS Max Loading Test Three-Day Look Ahead: Friday, 09/09: OBT 47S emergency drill, SABL relocate Saturday, 09/10: Housekeeping, Crew Off Duty Sunday, 9/11: Crew Off Duty QUICK ISS Status – Environmental Control Group:                               Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Standby Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up  

from ISS On-Orbit Status Report http://ift.tt/2ccqHMJ
via IFTTT

Oh, It's On Sale! USB Kill to Destroy any Computer within Seconds

Remember Killer USB stick? A proof-of-concept USB prototype that was designed by a Russian researcher, Dark Purple, last year, to effectively destroy sensitive components of a computer when plugged in. <!-- adsense --> Now, someone has actually created the Killer USB stick that destroys almost anything – such as Laptops, PCs, or televisions – it is plugged into. A Hong Kong-based technology


from The Hacker News http://ift.tt/2cySuHO
via IFTTT

Google Chrome to Label Sensitive HTTP Pages as "Not Secure"

Although over three months remaining, Google has planned a New Year gift for the Internet users, who're concerned about their privacy and security. Starting in January of 2017, the world's most popular web browser Chrome will begin labeling HTTP sites that transmit passwords or ask for credit card details as "Not Secure" — the first step in Google's plan to discourage the use of sites that


from The Hacker News http://ift.tt/2cpQDI6
via IFTTT

Premier Li lays wreath at Laos' anonymous martyr's monument

Premier Li lays wreath at Laos' anonymous martyr's monument. Source: Xinhua2016-09-09 08:34:15. Editor: Huang Panyue. 01; 02. Abstract. Chinese ...

from Google Alert - anonymous http://ift.tt/2bYjXpK
via IFTTT

Your Story, anonymous

This is a request for an anonymous submission of a paragraph (@200 words) that would begin your autobiography were you to write one.

from Google Alert - anonymous http://ift.tt/2cn1cge
via IFTTT

Mars in the Clouds


Wandering through this stunning field of view, Mars really is in front of these colorful cosmic clouds. The mosaic contructed from telescopic images is about 5 degrees (10 full moons) across. It captures the planet's position on August 26, over 7 light-minutes from Earth and very near the line-of-sight to bright star Antares and the Rho Ophiuchi cloud complex. In the exposure yellow-hued Mars, above and left, is almost matched by Antares, also known as Alpha Scorpii, below center. Globular star cluster M4 shines just right of Antares, but M4 lies some 7,000 light-years away compared to Antares' 500 light-year distance. Slightly closer than Antares, Rho Ophiuchi's bluish starlight is reflected by the dusty molecular clouds near the top of the frame. via NASA http://ift.tt/2cn8BuV

Thursday, September 8, 2016

I have a new follower on Twitter


TOP Step Consulting
TOP Step Consulting improves business efficiency and productivity for Professional Services business operations.
Your Office
http://t.co/v0bQkV4EHL
Following: 2538 - Followers: 3037

September 08, 2016 at 11:45PM via Twitter http://twitter.com/TOPStepTweets

2 results

Results: 1-2 of 2 | Refined by: Original Format: Manuscripts/Mixed Material Remove Look Inside: Anonymous to Thomas Jefferson, February 26, 1802 ...

from Google Alert - anonymous http://ift.tt/2cK3mXO
via IFTTT

Ask Anonymous

Ask Anonymous. from Staring ContestPlus 1 hour ago. more. Follow. 0. 0 5 0. Download Share. Valuable advice from your favorite unknown ...

from Google Alert - anonymous http://ift.tt/2cGyzqU
via IFTTT

Random Shuffling and Resets for the Non-stationary Stochastic Bandit Problem. (arXiv:1609.02139v1 [cs.AI])

We consider a non-stationary formulation of the stochastic multi-armed bandit where the rewards are no longer assumed to be identically distributed. For the best-arm identification task, we introduce a version of Successive Elimination based on random shuffling of the $K$ arms. We prove that under a novel and mild assumption on the mean gap $\Delta$, this simple but powerful modification achieves the same guarantees in term of sample complexity and cumulative regret than its original version, but in a much wider class of problems, as it is not anymore constrained to stationary distributions. We also show that the original {\sc Successive Elimination} fails to have controlled regret in this more general scenario, thus showing the benefit of shuffling. We then remove our mild assumption and adapt the algorithm to the best-arm identification task with switching arms. We adapt the definition of the sample complexity for that case and prove that, against an optimal policy with $N-1$ switches of the optimal arm, this new algorithm achieves an expected sample complexity of $O(\Delta^{-2}\sqrt{NK\delta^{-1} \log(K \delta^{-1})})$, where $\delta$ is the probability of failure of the algorithm, and an expected cumulative regret of $O(\Delta^{-1}{\sqrt{NTK \log (TK)}})$ after $T$ time steps.



from cs.AI updates on arXiv.org http://ift.tt/2cxDGZW
via IFTTT

Fitted Learning: Models with Awareness of their Limits. (arXiv:1609.02226v1 [cs.AI])

Though deep learning has pushed the boundaries of classification forward, in recent years hints of the limits of standard classification have begun to emerge. Problems such as fooling, adding new classes over time, and the need to retrain learning models only for small changes to the original problem all point to a potential shortcoming in the classic classification regime, where a comprehensive a priori knowledge of the possible classes or concepts is critical. Without such knowledge, classifiers misjudge the limits of their knowledge and overgeneralization therefore becomes a serious obstacle to consistent performance. In response to these challenges, this paper extends the classic regime by reframing classification instead with the assumption that concepts present in the training set are only a sample of the hypothetical final set of concepts. To bring learning models into this new paradigm, a novel elaboration of standard architectures called the competitive overcomplete output layer (COOL) neural network is introduced. Experiments demonstrate the effectiveness of COOL by applying it to fooling, separable concept learning, one-class neural networks, and standard classification benchmarks. The results suggest that, unlike conventional classifiers, the amount of generalization in COOL networks can be tuned to match the problem.



from cs.AI updates on arXiv.org http://ift.tt/2cxD070
via IFTTT

Backpropagation of Hebbian plasticity for lifelong learning. (arXiv:1609.02228v1 [cs.NE])

Hebbian plasticity allows biological agents to learn from their lifetime experience, extending the fixed information provided by evolutionary search. Conversely, backpropagation methods can build high-performance fixed-weights networks, but are not currently equipped to design networks with Hebbian connections. Here we use backpropagation to train fully-differentiable plastic networks, such that backpropagation determines not only the baseline weights, but also the plasticity of each connection. To perform this backpropagation of Hebbian plasticity (BOHP), we derive error gradients for neural networks with Hebbian plastic connections. The equations for these gradients turn out to follow a simple, recursive form. We apply this method to train small networks for simple learning tasks inspired from classical conditioning. We show that, through Hebbian plasticity, the networks perform fast learning of unpredictable environmental features during their lifetime, successfully solving a task that fixed-weight feedforward networks cannot possibly solve. We conclude that backpropagation of Hebbian plasticity offers a powerful model for lifelong learning.



from cs.AI updates on arXiv.org http://ift.tt/2cxDnyC
via IFTTT

Latent Dependency Forest Models. (arXiv:1609.02236v1 [cs.AI])

Probabilistic modeling is one of the foundations of modern machine learning and artificial intelligence. In this paper, we propose a novel type of probabilistic models named latent dependency forest models (LDFMs). A LDFM models the dependencies between random variables with a forest structure that can change dynamically based on the variable values. It is therefore capable of modeling context-specific independence. We parameterize a LDFM using a first-order non-projective dependency grammar. Learning LDFMs from data can be formulated purely as a parameter learning problem, and hence the difficult problem of model structure learning is circumvented. Our experimental results show that LDFMs are competitive with existing probabilistic models.



from cs.AI updates on arXiv.org http://ift.tt/2cxDR7C
via IFTTT

Ashwin: Plug-and-Play System for Machine-Human Image Annotation. (arXiv:1609.02271v1 [cs.AI])

In this paper, we present an end-to-end machine-human image annotation system where each component can be attached in a plug-and-play fashion. These components include Feature Extraction, Machine Annotation, Task Sampling and Crowd Consensus.



from cs.AI updates on arXiv.org http://ift.tt/2coRUPE
via IFTTT

Ms. Pac-Man Versus Ghost Team CIG 2016 Competition. (arXiv:1609.02316v1 [cs.AI])

This paper introduces the revival of the popular Ms. Pac-Man Versus Ghost Team competition. We present an updated game engine with Partial Observability constraints, a new Multi-Agent Systems approach to developing Ghost agents and several sample controllers to ease the development of entries. A restricted communication protocol is provided for the Ghosts, providing a more challenging environment than before. The competition will debut at the IEEE Computational Intelligence and Games Conference 2016. Some preliminary results showing the effects of Partial Observability and the benefits of simple communication are also presented.



from cs.AI updates on arXiv.org http://ift.tt/2c9Dwsj
via IFTTT

Latest Datasets and Technologies Presented in the Workshop on Grasping and Manipulation Datasets. (arXiv:1609.02531v1 [cs.RO])

This paper reports the activities and outcomes in the Workshop on Grasping and Manipulation Datasets that was organized under the International Conference on Robotics and Automation (ICRA) 2016. The half day workshop was packed with nine invited talks, 12 interactive presentations, and one panel discussion with ten panelists. This paper summarizes all the talks and presentations and recaps what has been discussed in the panels session. This summary servers as a review of recent developments in data collection in grasping and manipulation. Many of the presentations describe ongoing efforts or explorations that could be achieved and fully available in a year or two. The panel discussion not only commented on the current approaches, but also indicates new directions and focuses. The workshop clearly displayed the importance of quality datasets in robotics and robotic grasping and manipulation field. Hopefully the workshop could motivate larger efforts to create big datasets that are comparable with big datasets in other communities such as computer vision.



from cs.AI updates on arXiv.org http://ift.tt/2cmITb7
via IFTTT

Combining Monte-Carlo and Hyper-heuristic methods for the Multi-mode Resource-constrained Multi-project Scheduling Problem. (arXiv:1511.04387v2 [cs.DS] UPDATED)

Multi-mode resource and precedence-constrained project scheduling is a well-known challenging real-world optimisation problem. An important variant of the problem requires scheduling of activities for multiple projects considering availability of local and global resources while respecting a range of constraints. A critical aspect of the benchmarks addressed in this paper is that the primary objective is to minimise the sum of the project completion times, with the usual makespan minimisation as a secondary objective. We observe that this leads to an expected different overall structure of good solutions and discuss the effects this has on the algorithm design. This paper presents a carefully designed hybrid of Monte-Carlo tree search, novel neighbourhood moves, memetic algorithms, and hyper-heuristic methods. The implementation is also engineered to increase the speed with which iterations are performed, and to exploit the computing power of multicore machines. Empirical evaluation shows that the resulting information-sharing multi-component algorithm significantly outperforms other solvers on a set of "hidden" instances, i.e. instances not available at the algorithm design phase.



from cs.AI updates on arXiv.org http://ift.tt/1NyCIHb
via IFTTT

True Online Temporal-Difference Learning. (arXiv:1512.04087v2 [cs.AI] UPDATED)

The temporal-difference methods TD($\lambda$) and Sarsa($\lambda$) form a core part of modern reinforcement learning. Their appeal comes from their good performance, low computational cost, and their simple interpretation, given by their forward view. Recently, new versions of these methods were introduced, called true online TD($\lambda$) and true online Sarsa($\lambda$), respectively (van Seijen & Sutton, 2014). These new versions maintain an exact equivalence with the forward view at all times, whereas the traditional versions only approximate it for small step-sizes. We hypothesize that these true online methods not only have better theoretical properties, but also dominate the regular methods empirically. In this article, we put this hypothesis to the test by performing an extensive empirical comparison. Specifically, we compare the performance of true online TD($\lambda$)/Sarsa($\lambda$) with regular TD($\lambda$)/Sarsa($\lambda$) on random MRPs, a real-world myoelectric prosthetic arm, and a domain from the Arcade Learning Environment. We use linear function approximation with tabular, binary, and non-binary features. Our results suggest that the true online methods indeed dominate the regular methods. Across all domains/representations the learning speed of the true online methods are often better, but never worse than that of the regular methods. An additional advantage is that no choice between traces has to be made for the true online methods. Besides the empirical results, we provide an in-depth analysis of the theory behind true online temporal-difference learning. In addition, we show that new true online temporal-difference methods can be derived by making changes to the online forward view and then rewriting the update equations.



from cs.AI updates on arXiv.org http://ift.tt/1YbxOuA
via IFTTT

A Notation for Markov Decision Processes. (arXiv:1512.09075v2 [cs.AI] UPDATED)

This paper specifies a notation for Markov decision processes.



from cs.AI updates on arXiv.org http://ift.tt/1R9uxGn
via IFTTT

Deep Reinforcement Learning with a Combinatorial Action Space for Predicting Popular Reddit Threads. (arXiv:1606.03667v3 [cs.CL] UPDATED)

We introduce an online popularity prediction and tracking task as a benchmark task for reinforcement learning with a combinatorial, natural language action space. A specified number of discussion threads predicted to be popular are recommended, chosen from a fixed window of recent comments to track. Novel deep reinforcement learning architectures are studied for effective modeling of the value function associated with actions comprised of interdependent sub-actions. The proposed model, which represents dependence between sub-actions through a bi-directional LSTM, gives the best performance across different experimental configurations and domains, and it also generalizes well with varying numbers of recommendation requests.



from cs.AI updates on arXiv.org http://ift.tt/1UgLwrc
via IFTTT

Title Generation for User Generated Videos. (arXiv:1608.07068v2 [cs.CV] UPDATED)

A great video title describes the most salient event compactly and captures the viewer's attention. In contrast, video captioning tends to generate sentences that describe the video as a whole. Although generating a video title automatically is a very useful task, it is much less addressed than video captioning. We address video title generation for the first time by proposing two methods that extend state-of-the-art video captioners to this new task. First, we make video captioners highlight sensitive by priming them with a highlight detector. Our framework allows for jointly training a model for title generation and video highlight localization. Second, we induce high sentence diversity in video captioners, so that the generated titles are also diverse and catchy. This means that a large number of sentences might be required to learn the sentence structure of titles. Hence, we propose a novel sentence augmentation method to train a captioner with additional sentence-only examples that come without corresponding videos. We collected a large-scale Video Titles in the Wild (VTW) dataset of 18100 automatically crawled user-generated videos and titles. On VTW, our methods consistently improve title prediction accuracy, and achieve the best performance in both automatic and human evaluation. Finally, our sentence augmentation method also outperforms the baselines on the M-VAD dataset.



from cs.AI updates on arXiv.org http://ift.tt/2ccvuCG
via IFTTT

Error message when adding a reminder as anonymous user

When I'm testing adding a reminder as an anonymous user with this module, it displays (and logs) the following error message: Notice: Undefined ...

from Google Alert - anonymous http://ift.tt/2bWkvHP
via IFTTT

[FD] AST-2016-007: RTP Resource Exhaustion

[FD] AST-2016-006: Crash on ACK from unknown endpoint

Asterisk Project Security Advisory - AST-2016-006 Product Asterisk Summary Crash on ACK from unknown endpoint Nature of Advisory Remote Crash Susceptibility Remote unauthenticated sessions Severity Critical Exploits Known No Reported On August 3, 2016 Reported By Nappsoft Posted On Last Updated On August 31, 2016 Advisory Contact mark DOT michelson AT digium DOT com CVE Name Description Asterisk can be crashed remotely by sending an ACK to it from an endpoint username that Asterisk does not recognize. Most SIP request types result in an "artificial" endpoint being looked up, but ACKs bypass this lookup. The resulting NULL pointer results in a crash when attempting to determine if ACLs should be applied. This issue was introduced in the Asterisk 13.10 release and only affects that release. This issue only affects users using the PJSIP stack with Asterisk. Those users that use chan_sip are unaffected. Resolution ACKs now result in an artificial endpoint being looked up just like other SIP request types. Affected Versions Product Release Series Asterisk Open Source 11.x Unaffected Asterisk Open Source 13.x 13.10.0 Certified Asterisk 11.6 Unaffected Certified Asterisk 13.8 Unaffected Corrected In Product Release Asterisk Open Source 13.11.1 Patches SVN URL Revision Links Asterisk Project Security Advisories are posted at http://ift.tt/12wGWyz This document may be superseded by later versions; if so, the latest version will be posted at http://ift.tt/2cJq2rk and http://ift.tt/2caHQqm Revision History Date Editor Revisions Made August 16, 2016 Mark Michelson Initial draft of Advisory Asterisk Project Security Advisory - AST-2016-006 Copyright (c) 2016 Digium, Inc. All Rights Reserved. Permission is hereby granted to distribute and publish this advisory in its original, unaltered form.

Source: Gmail -> IFTTT-> Blogger

FBI Arrests Two Hackers Who Hacked US Spy Chief, FBI and CIA Director

US authorities have arrested two North Carolina men on charges that they were part of the notorious hacking group "Crackas With Attitude." Crackas with Attitude is the group of hackers who allegedly was behind a series of audacious and embarrassing hacks that targeted personal email accounts of senior officials at the CIA, FBI, the White House, Homeland Security Department, and other US


from The Hacker News http://ift.tt/2cm8uRn
via IFTTT

[FD] CVE request - Samsumg Mobile Phone SVE-2016-6248: SystemUI Security issue

Hi, Description of the potential vulnerability: SVE-2016-6248: SystemUI Security issue Severity: Medium Affected versions: L(5.0/5.1), M(6.0) devices with Exynos7420 chipset Reported on: June 7, 2016 Disclosure status: Privately disclosed. The vulnerability exists due to a null pointer dereference on fimg2d driver. The patch verifies if the object is null before dereferencing it. Fix: http://ift.tt/2cnyLfk SVE-2016-6248: SystemUI Security issue I report this to samsung, samsung reply to us if I want to get CVE request it by ourself. Best regards, Zhaozhanpeng(0xr0ot) of Cheetah Mobile.

Source: Gmail -> IFTTT-> Blogger

[FD] CVE-2016-4264 Adobe ColdFusion <= 11 XXE Vulnerability

Vulnerability: Adobe ColdFusion <= 11 XXE Injection CVE: CVE-2016-4264 Vendor ID: APSB16-30 Discovered by: Dawid Golunski (http://legalhackers.com) Adobe ColdFusion in versions 11 and below is vulnerable to XXE Injection when processing untrusted office documents. Depending on a web application's functionality and the attacker's ability to supply a malicious document to be processed by a vulnerable ColdFusion application, this vulnerability may potentially be exploited by both low-privileged and unauthenticated remote attackers. The full advisory and a ColdFusion PoC exploit can be found at: http://ift.tt/2bMhtrA Adobe has been notified about this vulnerability and has issued the following critical hotfix (APSB16-30) prior to the disclosure of this advisory: http://ift.tt/2coLBxn

Source: Gmail -> IFTTT-> Blogger

[FD] cve request: Airmail URLScheme render and file:// xss vulnerability

Airmail is a popular email client on iOS and OS X. I found a vulnerability in airmail of the latest version which could cause a file:// xss and arbitrary file read. Author: redrain, yu.hong@chaitin.com Date: 2016-08-15 Version: 3.0.2 and earlier Platform: OS X and iOS Site: http://airmailapp.com/ Vendor: http://airmailapp.com/ Vendor Notified: 2016-08-15 Vulnerability: There is a file:// xss in airmail version 3.0.2 and earlier. The app can deal the URLscheme render with link detection, any user can edit the email content in reply with the evil code with the TL;DR. Airmail implements its user interface using an embedded version of WebKit, furthermore Airmail on OS X will render any URI as a clickable HTML

Source: Gmail -> IFTTT-> Blogger

[FD] Defense in depth -- the Microsoft way (part 43): restricting the DLL load order fails

[FD] Heap 'two-write-where-and-what' format string (FMS) technique

[FD] ELNet Energy & Electrical Power Meter - Mulitple Vulnerabilities

*ELNet **Energy & Electrical Power Meter - Mulitple Vulnerabilities* http://ift.tt/2cJ2zqj http://ift.tt/2cakDVc Powermeter with color graphic display for all electrical measurements and harmonics, with TCP/IP and RS485 communication (ModBus and Bacnet), panel mounted 96X96 mm. *Product Description* General Simple operated menus. - Multilingual support. - Up to One year of energy data logging. - Displays up to 64th Harmonic in Waveform or Graphic. - 1600 samples per cycle. - Accuracy 0.2 %. - Accuracy 0.1% with special calibration, that can be ordered. - Build in T.O.U. Energy meter. - RS485 Communication Port (MODBUS, Bacnet MS/TP). - State of the art Graphic LCD - Modern 320 x 240 LCD display. - Displays of Waveform and Bar graph. - Simple installation- Panel mounted. Dimension: 96×96 mm. - Flash memory stores 6 months of energy. - TCP/IP communication port + WEB server - BacNet TCP/IP *Standard approvals:* IEC 62053-22, IEC 62053-23, IEC 62052-11 Large consumers of electricity e.g. factories, hotels, hospitals, municipalities, need to know the history of their consumption and the quality and the values of the power supply. Details such as Voltage, Current, Power Factor, Hertz, Neutral Current, Energy consumption can be displayed by the ELNet LT Energy & Powermeter. An additional feature of the Powermeter is the ability to measure Harmonics. Part of the Electricity Supply Authority’s bill reflects poor or good Harmonics in the consumer’s system, therefore it is in his interest to monitor Harmonics and try to improve it. The ELNet LT Energy & Powermeter is a compact, multi functional, three-phase Powermeter simple to install and is especially designed to integrate into Building Management Systems. It requires no special mounting and is ideally suited for mounting on the front face of any standard electrical panel. The Configuration and Setup is menu driven, with password protection. +++++ *Vulnerabilities* 1. *Unauthenticated Web Management access* ELNet power meters can be managed via Java applet over a web browser. Meter console and all its functions are accessible. By default, no authentication is required to access the web console. *2. Weak Credential Management* In order to perform certain specific functions in ELNet power meters, passwords are required. These passwords are, really just a formality. For example: Default password code to access Technical Menu for device configuration is – 1 (One) *Default password – 6474* - To reset I,V,F Peak Values - To display /reset power peak value +++++ It appears that password/code functionality is implemented for the sake of getting the compliance check-list ticked. Not only the default passwords are poor/weak, the system does not have a mechanism to enforce a mandatory password change. 3. *Password Recovery Functionality* But what if, just what if, someone does want security and changes the default passwords, and forgets/lose them?? According to vendor: *It is not recommended to forget your new passwords.* The manual also doesn't seem to document Password Recovery either. +++++

Source: Gmail -> IFTTT-> Blogger

[FD] Multiple vulnerabilities - Powerlogic/Schneider Electric IONXXXX series Smart Meters

*Powerlogic/Schneider Electric IONXXXX series Smart Meters - Multiple security issues* *Impacted devices:* *ION7300 and potentially all IONXXXX models (based off of Powerlogic) *For example, Power Measurement Ltd. Meter ION 7330V283 ETH ETH7330V274 http://ift.tt/2cJ3wyS *About* Power & Energy Monitoring System Compact energy and power quality meters for feeders or critical loads The PowerLogic ION7300 series meters help you: • reduce energy and operations costs • improve power quality, reliability and uptime • optimize equipment use for optimal management of your electrical installation and greater productivity Used in enterprise energy management applications such as feeder monitoring and sub-metering, ION7300 Series meters offer unmatched value, functionality, and ease of use. ION7300 Series meters interface to PowerLogic StrxureWare software or other automation systems to give all users fast information sharing and analysis. ION7300 Series meters are an ideal replacement for analogue meters, with a multitude of power and energy measurements, analogue and digital I/O, communication ports, and industry-standard protocols. The ION7330 meter has on-board data storage, emails of logged data, and an optional modem. The ION7350 meter is further augmented by more sophisticated power quality analysis, alarms and a call-back-on-alarm feature. *Applications* - Power monitoring and control operations. - Power quality analysis. - Cost allocation and billing. - Demand and power factor control. - Load studies and circuit optimisation. - Equipment monitoring and control. - Preventive maintenance. *Rebranded or used as is, by different organizations * *Canada* Telus Mobility Futureway Communications Radiant Communications Acadia University Loyalist College Seneca College TBayTel *Mexico* Universidad Nacional Autonoma de Mexico *USA* Frontier Communications Cox Communications Avon Old Farms School University of Pennsylvania Princeton University City of Glenwood Springs, Electric Department University of California, Santa Cruz City of Thomasville Utilities Comcast Cable Verizon Wireless City Of Hartford AT&T Internet Services CNS-Internet Comcast Business Communications AT&T U-verse *Vulnerabilities * *HTTP Web Management portal * Provides stats for Monitor Energy, Revenue, Peak Demand, Voltage Disturbances. *No access control* – by default no Authentication is configured, to access device’s web management portal. An unauthorized user can access the device management portal and make config changes. This can further be exploited easily at a mass scale, with scripting, and submitting device configuration changes via a specific POST request. I suspect it may also be possible to cause denial of service to these devices, as well as additional devices - which directly or indirectly accept / send data to/from these meters - by submitting varying amounts of invalid / junk data. *Vulnerable to Cross-Site Request Forgery * There is no CSRF Token generated per page and / or per (sensitive) function. Successful exploitation of this vulnerability can allow silent execution of unauthorized actions on the device such as configuration parameter changes, and saving modified configuration. Successful exploitation of these vulnerabilities allow silent execution of unauthorized actions on the device specifically modifying parameter configurations – voltage modes, polarity, voltage units, current units, interval values -, and submitting configuration changes to meter. *Front Panel security (Physical) * *Weak Credential Management* – Default meter password is factory-set to 00000 – mandatory default password change is not enforced. Front panel meter security lets you configure the meter through the front panel using a meter password. Front panel meter security is enabled by default on all ION7300 series meters; all configuration functions in the front panel are password‐protected. The password is factory‐set to 0 (zero). *Telnet * *Weak Credentials Management * - *Default accounts* - different models come with corresponding login creds - documented in the powerlogic admin guide - http://ift.tt/2cakzEW - Application does not enforce a mandatory default password change For example, for ION7300, default creds are: User - 7300 Password – 0 (<— zero) +++++

Source: Gmail -> IFTTT-> Blogger

[FD] Unrar 0.0.1 Memory Corruption

[FD] Persistent Cross-Site Scripting vulnerability in WordPress due to unsafe processing of file names

--------------------------------------------------------------------

Source: Gmail -> IFTTT-> Blogger

I have a new follower on Twitter


Hacker Ventures
Team of hustlers and hackers. Increasing our productivity with https://t.co/DLEkgUUVw2 and innovating daily.

https://t.co/DLEkgUUVw2
Following: 10952 - Followers: 15935

September 08, 2016 at 12:36PM via Twitter http://twitter.com/HackerVentures

Anonymous Survey but Possible Prize

Hey there,. I'm looking into creating an anonymous survey, so I'm planning on leaving off identifying information fields such as name or e-mail address ...

from Google Alert - anonymous http://ift.tt/2c1chBI
via IFTTT

Anonymous

Find & apply online for the latest Jobs from Anonymous with reed.co.uk, the UK's #1 job site.

from Google Alert - anonymous http://ift.tt/2cczmyC
via IFTTT

anonymous event creation does not work

I allow anonymous event creation here: Tilføj kursus/uddannelse. 1) anonymous event creation does not work for logged-out-users. 2 ) I cannot find ...

from Google Alert - anonymous http://ift.tt/2cw7giM
via IFTTT

Map not visible for anonymous users when using AdvAgg js compression

I just recently noticed this on a website I made in March. It used to work and I didn't do any updates if not just moving the domain. I can see the map ...

from Google Alert - anonymous http://ift.tt/2cvXBIO
via IFTTT

I have a new follower on Twitter


Erik Fisher
Social Media Manager @SMExaminer | Productivity Podcaster @ https://t.co/cKnTdmuVKn | Follow me for News & How-to's on Social Media, Productivity & Podcasting
Indiana & The Interwebs
https://t.co/cKnTdmuVKn
Following: 23401 - Followers: 40284

September 08, 2016 at 06:50AM via Twitter http://twitter.com/ErikJFisher

Anonymous Has a New Message for the World

Home Onair Jake Dill Anonymous Has A New Message For The World. On Air Now Listen ... Jake Dill. Anonymous Has a New Message for the World ...

from Google Alert - anonymous http://ift.tt/2cE5a0M
via IFTTT

[FD] PHPHolidays CMS v3.00.50 - Cross Site Scripting Web Vulnerability

Document Title: =============== PHPHolidays CMS v3.00.50 - Cross Site Scripting Web Vulnerability References (Source): ==================== http://ift.tt/2c9g1yq Release Date: ============= 2016-09-08 Vulnerability Laboratory ID (VL-ID): ==================================== 1948 Common Vulnerability Scoring System: ==================================== 3.1 Product & Service Introduction: =============================== The PhpHolidays is a travel web portal script designed for Travel Agencies & Tour Operators for booking packages online. The Car Hire and Vacation Rental modules are also integrated with this software. This script is a CMS Driven integrated web application platform, which is considered as one-stop solution developed especially for Travel agent & Tour business owners. (Copy of the Homepage: http://ift.tt/1hf6QtL ) Abstract Advisory Information: ============================== An independent vulnerability laboratory researcher discovered a client-side cross site scripting vulnerability in the PHPHolidays 3.00.50 content management system. Vulnerability Disclosure Timeline: ================================== 2016-09-08: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Eicra Product: PHPHolidays - Content Management System (Web-Application) 3.00.50 Exploitation Technique: ======================= Remote Severity Level: =============== Medium Technical Details & Description: ================================ A client-side cross site scripting web vulnerability has been discovered in the official PHPHolidays v3.00.50 content management system. The web vulnerability allows remote attacker to inject own malicious script codes on the client-side of the vulnerable module or service. A client-side cross site scripting web vulnerability is located in the search engine. The web vulnerability could allow an attacker to execute javascript in the web-browser of the user or administrator to compromise session credentials. The attacker can connect to a third account to trigger the issue without knowing the password. The security risk of the client-side web vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 3.1. Exploitation of the client-side cross site vulnerability requires no privileged web-application user account and low or medium user interaction. Successful exploitation of the vulnerability results in non-persistent phishing, session hijacking, non-persistent external redirect to malicious sources and client-side manipulation of affected or connected web module context. Request Method(s): [+] POST Vulnerable Module(s): [+] Add (Input) Vulnerable Parameter(s): [+] location_for_search Proof of Concept (PoC): ======================= The vulnerability can be exploited by remote attackers without privileged user account and with low user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue.

Source: Gmail -> IFTTT-> Blogger

[FD] Picosmos Shows v1.6.0 - Stack Buffer Overflow Vulnerability

Document Title: =============== Picosmos Shows v1.6.0 - Stack Buffer Overflow Vulnerability References (Source): ==================== http://ift.tt/2c0kV3r Release Date: ============= 2016-09-05 Vulnerability Laboratory ID (VL-ID): ==================================== 1936 Common Vulnerability Scoring System: ==================================== 6.1 Product & Service Introduction: =============================== Picosmos Shows - View image files on your computer, set them as wallpaper or process them, individually or in groups, using this useful program. Editing images can be quite a tedious activity, especially if there are many files and all you have to do is subtle image optimizations. Although there are some methods to quickly do this without much effort, using editors batch file, as Picosmos Entertainment, is one of the most effective ways. (Copy of the Homepage: http://ift.tt/1IwHbHf) Abstract Advisory Information: ============================== An independent vulnerability laboratory researcher discovered a stack buffer overflow vulnerability in the official Picosmos Shows v1.6.0 software. Vulnerability Disclosure Timeline: ================================== 2016-09-05: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Picosmos Tools Product: Picosmos Shows - Software 1.6.0 Exploitation Technique: ======================= Local Severity Level: =============== High Technical Details & Description: ================================ A local stack buffer overflow vulnerability has been discovered in the official Picosmos Shows v1.6.0 software. The overflow vulnerability allows remote attackers to take-over the process by overwrite of the active registers. The stack buffer overflow vulnerability is located in the `directory entry` module of the software. Local attackers are able to include unicode as malicious payload to crash software via stack overflow. Thus allows the local attacker to overwrite for example the eip register to take control of the vulnerable software process. The security risk of the issue is estimated as high with a cvss (common vulnerability scoring system) count of 6.1. Exploitation of the vulnerability requires a low privilege or restricted system user account without user interaction. Successful exploitation of the vulnerability results in computer system manipulation and compromise of the computer system. Vulnerable Input(s): [+] Directories - (Entry) Proof of Concept (PoC): ======================= A local stack overflow vulnerability can be exploited by local attackers without user interaction and with privileged system user account. For security demonstration or to reproduce the sofwtare vulnerability follow the provided information and steps below to continue. Manual steps to reproduce the vulnerability ... 1. Launch the PicosmosShows.exe software process Note: Additional you can attach a debugger like windbg to the software process 2. Run the code in perl and a file format (.txt) will create 3. Copy the AAAAAAAAA+... string from Picosmos.txt to clipboard 4. Paste it to the input Directories AAAAAAAAA+... string and click Enter to process 5. Software crash permanently by a stack overflow 6. Successfully reproduce of the local stack buffer overflow vulnerability! PoC: Exploit Code (Perl) #!/usr/bin/perl my $Buff = "x41" x 5000; open(MYFILE,'>>Picosmos.txt'); print MYFILE $Buff; close(MYFILE); print " POC Created by ZwXn";

Source: Gmail -> IFTTT-> Blogger

Tip-offs Anonymous and Trends

Deloitte Tip-Offs Anonymous provides an anonymous reporting channel for unethical behaviour in the workplace. Globally, it is recognised that the ...

from Google Alert - anonymous http://ift.tt/2bVWYvn
via IFTTT

Warning: Mokes Cross-Platform Malware Can Hack Windows, Linux and OS X Systems

Unlike specially crafted malware specifically developed to take advantage of Windows operating system platform, cyber attackers have started creating cross-platform malware for wider exploitation. Due to the rise in popularity of Mac OS X and other Windows desktop alternatives, hackers have begun designing cross-platform malware modularly for wide distribution. Cross-platform malware is


from The Hacker News http://ift.tt/2c8Y7Me
via IFTTT

Eclipse to Sunset


September's eclipse of the Sun is documented in the 68 frames of this timelapse composite. Starting at 1pm local time a frame every 4 minutes follow's the progress of the New Moon across the solar disk. Taken near the centerline of the narrow eclipse path, the series of exposures ends with a golden sunset. Balanced rock cairns in the foreground line a beach on the southern side of Reunion Island in the Indian Ocean, near the village of Etang-Salé. Of course, the close balance in apparent size creates drama in eclipses of the Sun by the Moon as seen from planet Earth. In an annular eclipse, the Moon's silhouette is just small enough to show the solar disk as a narrow ring-of-fire at maximum eclipse phase. via NASA http://ift.tt/2cjUQNE

Wednesday, September 7, 2016

I have a new follower on Twitter


RushMillerFoundation
We put Blind/Visually Impaired (BVI) Kids butts on tandem bikes Dig hearing about BVI Tech - Cool BVI Orgs/Individuals - Crowdfunding - Social Entrepreneurism
Pueblo, Colorado USA
http://t.co/CIONv07BXN
Following: 15255 - Followers: 17102

September 07, 2016 at 10:34PM via Twitter http://twitter.com/RushMillerFound

Automation of Pedestrian Tracking in a Crowded Situation. (arXiv:1609.01710v1 [cs.CV])

Studies on microscopic pedestrian requires large amounts of trajectory data from real-world pedestrian crowds. Such data collection, if done manually, needs tremendous effort and is very time consuming. Though many studies have asserted the possibility of automating this task using video cameras, we found that only a few have demonstrated good performance in very crowded situations or from a top-angled view scene. This paper deals with tracking pedestrian crowd under heavy occlusions from an angular scene. Our automated tracking system consists of two modules that perform sequentially. The first module detects moving objects as blobs. The second module is a tracking system. We employ probability distribution from the detection of each pedestrian and use Bayesian update to track the next position. The result of such tracking is a database of pedestrian trajectories over time and space. With certain prior information, we showed that the system can track a large number of people under occlusion and clutter scene.



from cs.AI updates on arXiv.org http://ift.tt/2cHdFvK
via IFTTT

A modular architecture for transparent computation in Recurrent Neural Networks. (arXiv:1609.01926v1 [cs.NE])

Computation is classically studied in terms of automata, formal languages and algorithms; yet, the relation between neural dynamics and symbolic representations and operations is still unclear in traditional eliminative connectionism. Therefore, we suggest a unique perspective on this central issue, to which we would like to refer as to transparent connectionism, by proposing accounts of how symbolic computation can be implemented in neural substrates. In this study we first introduce a new model of dynamics on a symbolic space, the versatile shift, showing that it supports the real-time simulation of a range of automata. We then show that the Goedelization of versatile shifts defines nonlinear dynamical automata, dynamical systems evolving on a vectorial space. Finally, we present a mapping between nonlinear dynamical automata and recurrent artificial neural networks. The mapping defines an architecture characterized by its granular modularity, where data, symbolic operations and their control are not only distinguishable in activation space, but also spatially localizable in the network itself, while maintaining a distributed encoding of symbolic representations. The resulting networks simulate automata in real-time and are programmed directly, in absence of network training. To discuss the unique characteristics of the architecture and their consequences, we present two examples: i) the design of a Central Pattern Generator from a finite-state locomotive controller, and ii) the creation of a network simulating a system of interactive automata that supports the parsing of garden-path sentences as investigated in psycholinguistics experiments.



from cs.AI updates on arXiv.org http://ift.tt/2c691Ut
via IFTTT

Unifying task specification in reinforcement learning. (arXiv:1609.01995v1 [cs.AI])

Reinforcement learning tasks are typically specified as Markov decision processes. This formalism has been highly successful, though specifications often couple the dynamics of the environment and the learning objective. This lack of modularity can complicate generalization of the task specification, as well as obfuscate connections between different task settings, such as episodic and continuing. In this work, we introduce the RL task formalism, that provides a unification through simple constructs including a generalization to transition-based discounting. Through a series of examples, we demonstrate the generality and utility of this formalism. Finally, we extend standard learning constructs, including Bellman operators, and extend some seminal theoretical results, including approximation errors bounds. Overall, we provide a well-understood and sound formalism on which to build theoretical results and simplify algorithm use and development.



from cs.AI updates on arXiv.org http://ift.tt/2c8rGgQ
via IFTTT

Non-Evolutionary Superintelligences Do Nothing, Eventually. (arXiv:1609.02009v1 [cs.AI])

There is overwhelming evidence that human intelligence is a product of Darwinian evolution. Investigating the consequences of self-modification, and more precisely, the consequences of utility function self-modification, leads to the stronger claim that not only human, but any form of intelligence is ultimately only possible within evolutionary processes. Human-designed artificial intelligences can only remain stable until they discover how to manipulate their own utility function. By definition, a human designer cannot prevent a superhuman intelligence from modifying itself, even if protection mechanisms against this action are put in place. Without evolutionary pressure, sufficiently advanced artificial intelligences become inert by simplifying their own utility function. Within evolutionary processes, the implicit utility function is always reducible to persistence, and the control of superhuman intelligences embedded in evolutionary processes is not possible. Mechanisms against utility function self-modification are ultimately futile. Instead, scientific effort toward the mitigation of existential risks from the development of superintelligences should be in two directions: understanding consciousness, and the complex dynamics of evolutionary systems.



from cs.AI updates on arXiv.org http://ift.tt/2cHdroz
via IFTTT

Equilibrium Graphs. (arXiv:1609.02010v1 [cs.AI])

In this paper we present an extension of Peirce's existential graphs to provide a diagrammatic representation of expressions in Quantified Equilibrium Logic (QEL). Using this formalisation, logical connectives are replaced by encircled regions (circles and squares) and quantified variables are represented as "identity" lines. Although the expressive power is equivalent to that of QEL, the new representation can be useful for illustrative or educational purposes.



from cs.AI updates on arXiv.org http://ift.tt/2c8qb2f
via IFTTT

Deep Markov Random Field for Image Modeling. (arXiv:1609.02036v1 [cs.CV])

Markov Random Fields (MRFs), a formulation widely used in generative image modeling, have long been plagued by the lack of expressive power. This issue is primarily due to the fact that conventional MRFs formulations tend to use simplistic factors to capture local patterns. In this paper, we move beyond such limitations, and propose a novel MRF model that uses fully-connected neurons to express the complex interactions among pixels. Through theoretical analysis, we reveal an inherent connection between this model and recurrent neural networks, and thereon derive an approximated feed-forward network that couples multiple RNNs along opposite directions. This formulation combines the expressive power of deep neural networks and the cyclic dependency structure of MRF in a unified model, bringing the modeling capability to a new level. The feed-forward approximation also allows it to be efficiently learned from data. Experimental results on a variety of low-level vision tasks show notable improvement over state-of-the-arts.



from cs.AI updates on arXiv.org http://ift.tt/2cHbvMM
via IFTTT

Feasibility of Post-Editing Speech Transcriptions with a Mismatched Crowd. (arXiv:1609.02043v1 [cs.AI])

Manual correction of speech transcription can involve a selection from plausible transcriptions. Recent work has shown the feasibility of employing a mismatched crowd for speech transcription. However, it is yet to be established whether a mismatched worker has sufficiently fine-granular speech perception to choose among the phonetically proximate options that are likely to be generated from the trellis of an ASRU. Hence, we consider five languages, Arabic, German, Hindi, Russian and Spanish. For each we generate synthetic, phonetically proximate, options which emulate post-editing scenarios of varying difficulty. We consistently observe non-trivial crowd ability to choose among fine-granular options.



from cs.AI updates on arXiv.org http://ift.tt/2c69Hcj
via IFTTT

UberNet: Training a `Universal' Convolutional Neural Network for Low-, Mid-, and High-Level Vision using Diverse Datasets and Limited Memory. (arXiv:1609.02132v1 [cs.CV])

In this work we introduce a convolutional neural network (CNN) that jointly handles low-, mid-, and high-level vision tasks in a unified architecture that is trained end-to-end. Such a universal network can act like a `swiss knife' for vision tasks; we call this architecture an UberNet to indicate its overarching nature.

We address two main technical challenges that emerge when broadening up the range of tasks handled by a single CNN: (i) training a deep architecture while relying on diverse training sets and (ii) training many (potentially unlimited) tasks with a limited memory budget. Properly addressing these two problems allows us to train accurate predictors for a host of tasks, without compromising accuracy.

Through these advances we train in an end-to-end manner a CNN that simultaneously addresses (a) boundary detection (b) normal estimation (c) saliency estimation (d) semantic segmentation (e) human part segmentation (f) semantic boundary detection, (g) region proposal generation and object detection. We obtain competitive performance while jointly addressing all of these tasks in 0.7 seconds per frame on a single GPU. A demonstration of this system can be found at this http URL



from cs.AI updates on arXiv.org http://ift.tt/2c8pZjv
via IFTTT

Truth Serums for Massively Crowdsourced Evaluation Tasks. (arXiv:1507.07045v2 [cs.GT] UPDATED)

A major challenge in crowdsourcing evaluation tasks like labeling objects, grading assignments in online courses, etc., is that of eliciting truthful responses from agents in the absence of verifiability. In this paper, we propose new reward mechanisms for such settings that, unlike many previously studied mechanisms, impose minimal assumptions on the structure and knowledge of the underlying generating model, can account for heterogeneity in the agents' abilities, require no extraneous elicitation from them, and furthermore allow their beliefs to be (almost) arbitrary. These mechanisms have the simple and intuitive structure of an output agreement mechanism: an agent gets a reward if her evaluation matches that of her peer, but unlike the classic output agreement mechanism, this reward is not the same across evaluations, but is inversely proportional to an appropriately defined popularity index of each evaluation. The popularity indices are computed by leveraging the existence of a large number of similar tasks, which is a typical characteristic of these settings. Experiments performed on MTurk workers demonstrate higher efficacy (with a $p$-value of $0.02$) of these mechanisms in inducing truthful behavior compared to the state of the art.



from cs.AI updates on arXiv.org http://ift.tt/1fBCcOR
via IFTTT

Feature Based Task Recommendation in Crowdsourcing with Implicit Observations. (arXiv:1602.03291v2 [cs.AI] UPDATED)

Existing research in crowdsourcing has investigated how to recommend tasks to workers based on which task the workers have already completed, referred to as {\em implicit feedback}. We, on the other hand, investigate the task recommendation problem, where we leverage both implicit feedback and explicit features of the task. We assume that we are given a set of workers, a set of tasks, interactions (such as the number of times a worker has completed a particular task), and the presence of explicit features of each task (such as, task location). We intend to recommend tasks to the workers by exploiting the implicit interactions, and the presence or absence of explicit features in the tasks. We formalize the problem as an optimization problem, propose two alternative problem formulations and respective solutions that exploit implicit feedback, explicit features, as well as similarity between the tasks. We compare the efficacy of our proposed solutions against multiple state-of-the-art techniques using two large scale real world datasets.



from cs.AI updates on arXiv.org http://ift.tt/1KcDjDf
via IFTTT

A Repeated Signal Difference for Recognising Patterns. (arXiv:1604.05170v3 [cs.NE] UPDATED)

This paper describes a new mechanism that might help with defining pattern sequences, by the fact that it can produce an upper bound on the ensemble value that can persistently oscillate with the actual values produced from each pattern. With every firing event, a node also receives an on/off feedback switch. If the node fires, then it sends a feedback result depending on the input signal strength. If the input signal is positive or larger, it can store an 'on' switch feedback for the next iteration. If the signal is negative or smaller, it can store an 'off' switch feedback for the next iteration. If the node does not fire, then it does not affect the current feedback situation and receives the switch command produced by the last active pattern event for the same neuron. The upper bound therefore also represents the largest or most enclosing pattern set and the lower value is for the actual set of firing patterns. If the pattern sequence repeats, it will oscillate between the two values, allowing them to be recognised and measured more easily, over time. Tests show that changing the sequence ordering produces different value sets, which can also be measured.



from cs.AI updates on arXiv.org http://ift.tt/23UuRhj
via IFTTT

Anonymous scout dishes on Dallas Cowboys' most overrated, underrated players

That opinion comes via an anonymous scout, who dished on the most underrated and overrated players in the NFC for MMQB.com. Here's some of ...

from Google Alert - anonymous http://ift.tt/2cq3qIV
via IFTTT

Orioles Podcast: Manager Buck Showalter tells Baseball Tonight "we enjoy making people scratch their heads" with success (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Anonymous Voter Registration: Domestic Violence Victims

I have arranged to meet representatives from Women's Aid to discuss concerns they may have over the process of anonymous registration and have ...

from Google Alert - anonymous http://ift.tt/2c5DYrE
via IFTTT

Orioles: 1B Chris Davis out of Wednesday's starting lineup vs. Rays due to sore left hand; hitting .229, 35 HR in 2016 (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Ravens: Elvis Dumervil (foot) says he won't be able to play in season opener vs. Bills after a minor setback in recovery (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Anonymous user a688ef

Name, Anonymous user a688ef. User since, September 7, 2016. Number of add-ons developed, 1 theme. Average rating of developer's add-ons, Not ...

from Google Alert - anonymous http://ift.tt/2bYeZrD
via IFTTT

ISS Daily Summary Report – 09/06/2016

46 Soyuz (46S) Undock and Landing: Jeff Williams, Alexey Ovchinin and Oleg Skripochka are scheduled to undock from the ISS today at 4:51PM CDT and land in Kazakhstan at 8:14PM CDT. The ISS will be in 3-crew operations until the arrival of 48S on September 9, 2016. Human Research Program (HRP) Collections: Flight Engineer (FE)-6 assisted FE-5 with HRP operations in performing blood sample collections and configuring the Refrigerated Centrifuge for the first set of sample load operations. FE-5 performed urine sample collections and processed the blood samples by setting up Refrigerated Centrifuge for two sample spins. The urine and blood samples were stowed in the Minus Eighty-degree Freezer for ISS (MELFI). These sample collections will be used to support the HRP: Biochem Profile, Repository, and Cardio Ox investigations.  Cardio Ox Ultrasound and Blood Pressure Operations: With remote guidance from the Cardio Ox ground teams, FE-5 assisted FE-6 in conducting an ultrasound scan after attaching the ECG Electrodes and marking the arteries followed by blood pressure measurements using the Cardiolab Holter Arterial Blood Pressure Unit. The goal of the Cardio Ox investigation is to determine whether biological markers of oxidative and inflammatory stress are elevated during and after space flight and whether this results in an increased, long-term risk of atherosclerosis risk in astronauts. Twelve crewmembers provide blood and urine samples to assess biomarkers before launch, 15 and 60 days after launch, 15 days before returning to Earth, and within days after landing. Ultrasound scans of the carotid and brachial arteries are obtained at the same time points, as well as through 5 years after landing, as an indicator of cardiovascular health.  Marrow: FE-5 collected breath and ambient air samples in support of the Canadian Space Agency’s Marrow experiment.  Marrow investigation looks at the effect of microgravity on the bone marrow. It is believed that microgravity, like long-duration bed rest on Earth, has a negative effect on the bone marrow and the blood cells that are produced in the marrow. The extent of this effect, and its recovery, are of interest to space research and healthcare providers on Earth. Waste Hygiene Compartment (WHC) Piping Replacement: The crew replaced the WHC piping between the pump separator and the dose pump.  This is routine preventative maintenance performed every 6 months.  All activities were completed unless otherwise noted. MARROW Air Samples HRF Samples Collection HRF Insertion of Samples into MELFI HRF Centrifuge Setup and Collection of Blood Samples HRF Refrigerated Centrifuge Configuration Virus Definition File Update on Auxiliary Computer System (ВКС) Laptops BIOPLENKA. Removal from Thermostat  and Transfer to Soyuz 720 Water Transfer from Soyuz 720 Kolos-БД to EDV HRF Refrigerated Centrifuge Configuration 2 USND2 Activation of Ultrasound Equipment PRODUTSENT. Removal of Bioekologiya Case from Universal Bioengineering Thermostatic Container  and Transfer to Soyuz CASKAD. Removal of Bioreactor from ТБУ-В No.04 and Setup in Anabioz incubator Soyuz 720 Stowage Ops for Return GoPro HERO3 camcorders adjustment and installation in Soyuz 720 prior to descent Photography of Items for Return ISS HAM Radio Sets deactivation in Columbus and SM Fine Motor Skills (FINEMOTR) Experiment Ops HRF Blood samples removal in preparation for cold stowage insertion CASKAD. Deactivation of Anabioz Thermostat CASKAD. Hardware Transfer to Soyuz 720 CARDOX Scanning Measurements of Harmful Contaminants in SM Using CMS Counter Measure System (CMS) Harmful Contaminant Measurements in SM СОЖ Maintenance SM Ventilation Subsystem Preventive Maintenance. Group А CARDOX Measurements HRF Equipment stowage after sample collection CARDOX Post-ops hardware stowage WRS Water Sample Analysis Water Recovery System (WRS) WSTA Fill CARDOX Ultrasound Scan Operations CARDOX Photography Soyuz 720 Stowage Complete Report CARDOX Blood Pressure Operations Photography of the external surface of Soyuz 720 [СА] БО hatch cover CARDOX Blood Pressure Operations Closeout HRF Refrigerated Centrifuge Closeout Ops Downlink photos of the external surface of Soyuz [СА] -БО Hatch Cover after completion of return cargo transfers DOSETRK Saving data on iPad Comm Config for Soyuz 720 Undocking and Descent Comm check with Soyuz 720 via RSA2-S/G2 Soyuz 720 Activation Closing Window Shutters 6, 8, 9, 12, 13, 14 SSPCM EXPRESS 7 Replacement Conference Setup and Activation of КСПЭ Equipment to conduct Hatch Closure TV coverage from MRM2 USOS Window Shutter Close Water Resource Management, Condensate Tank Offload ECLSS (RGN). WSTA Fill TOCA Data Recording TOCA Waste Water Bag (WWB) Changeout Soyuz -MRM2 Hatch Closure Hatch Closure TV Coverage Soyuz 720-MRM2 Hatch Closure TV coverage Soyuz 720 – MRM2 Hatch Leak Check ER7 Equipment Gathering Downlink Video Data Hatch Closure Coverage from MRM2 Crew Onboard Support System (КСПЭ) Hardware Deactivation and Closing Applications on CP SSC Soyuz 720 ODF Ops; Undocking and Descent Ops Waste Hygiene Compartment (WHC) Tank R&R Switching MRM2-СУ PEV to CLOSED position ARED Cylinder Flywheel Evacuation ISTOCHNIK-M. Activation of Soyuz 720 TLM Recording Mode Soyuz 720 Comm reconfig for nominal ops after landing ISS HAM Radio Sets Activation in Columbus and SM METEOR Rack Doors Open Completed Task List Items Lab/N2 LHA R&R – LAB1OS1, LAB1OP5, NOD2OP5 CPA Cap Restor JEM Stowage Consolidation for OA-5 (In Work) Ground Activities All activities are on schedule unless otherwise noted. 46S undock/landing Three-Day Look Ahead: Wednesday, 09/07: Crew off duty Thursday, 09/08: Express Rack 7 SSPCM R&R, EVA water conductivity test, ARED cable R&R, BEAM IMV flow measurement Friday, 09/09: OBT 47S emergency drill, SABL relocate QUICK ISS Status – Environmental Control Group:                               Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) Off Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Standby Urine Processing Assembly (UPA) Process Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up  

from ISS On-Orbit Status Report http://ift.tt/2ccQEif
via IFTTT

Here’s How to Hack Windows/Mac OS X Login Password (When Locked)

A Security researcher has discovered a unique attack method that can be used to steal credentials from a locked computer (but, logged-in) and works on both Windows as well as Mac OS X systems. In his blog post published today, security expert Rob Fuller demonstrated and explained how to exploit a USB SoC-based device to turn it into a credential-sniffer that works even on a locked computer or


from The Hacker News http://ift.tt/2chb4rT
via IFTTT

Warning! Just an Image Can Hack Your Android Phone — Patch Now

Own an Android smartphone? Beware, as just an innocuous-looking image on social media or messaging app could compromise your smartphone. Along with the dangerous Quadrooter vulnerabilities that affected 900 Million devices and other previously disclosed issues, Google has patched a previously-unknown critical bug that could let attackers deliver their hack hidden inside an innocent looking


from The Hacker News http://ift.tt/2bSsdCK
via IFTTT

Uncaught reflect-metadata shim is required when using class decorators

52(anonymous function) @ decorators.js:9__webpack_require__ ... 52(anonymous function) @ index.js:17__webpack_require__ @ bootstrap ...

from Google Alert - anonymous http://ift.tt/2cnM4wf
via IFTTT

The Whirlpool Galaxy and Beyond


Follow the handle of the Big Dipper away from the dipper's bowl, until you get to the handle's last bright star. Then, just slide your telescope a little south and west and you might find this stunning pair of interacting galaxies, the 51st entry in Charles Messier's famous catalog. Perhaps the original spiral nebula, the large galaxy with well defined spiral structure is also cataloged as NGC 5194. Its spiral arms and dust lanes clearly sweep in front of its companion galaxy (left), NGC 5195. The pair are about 31 million light-years distant and officially lie within the angular boundaries of the small constellation Canes Venatici. Though M51 looks faint and fuzzy to the human eye, the above long-exposure, deep-field image taken earlier this year shows much of the faint complexity that actually surrounds the smaller galaxy. Thousands of the faint dots in background of the featured image are actually galaxies far across the universe. via NASA http://ift.tt/2ckvJbO

Tuesday, September 6, 2016

Orioles Video: Manny Machado's 34th HR of the season is a towering grand slam in the 4th inning of 11-2 win at Rays (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Check out our slate of Daily Kos-endorsed candidates

No, my real name is not “Sockpuppet” but for today, at least, that is what I am going by. You would probably recognize my handle and I don't want to ...

from Google Alert - anonymous http://ift.tt/2cEQoe9
via IFTTT

Deviant Learning Algorithm: Learning Sparse Mismatch Representations through Time and Space. (arXiv:1609.01459v1 [cs.AI])

Predictive coding (PDC) has recently attracted attention in the neuroscience and computing community as a candidate unifying paradigm for neuronal studies and artificial neural network implementations particularly targeted at unsupervised learning systems. The Mismatch Negativity (MMN) has also recently been studied in relation to PC and found to be a useful ingredient in neural predictive coding systems. Backed by the behavior of living organisms, such networks are particularly useful in forming spatio-temporal transitions and invariant representations of the input world. However, most neural systems still do not account for large number of synapses even though this has been shown by a few machine learning researchers as an effective and very important component of any neural system if such a system is to behave properly. Our major point here is that PDC systems with the MMN effect in addition to a large number of synapses can greatly improve any neural learning system's performance and ability to make decisions in the machine world. In this paper, we propose a novel bio-mimetic computational intelligence algorithm -- the Deviant Learning Algorithm, inspired by these key ideas and functional properties of recent brain-cognitive discoveries and theories. We also show by numerical experiments guided by theoretical insights, how our invented bio-mimetic algorithm can achieve competitive predictions with even with very small problem specific data.



from cs.AI updates on arXiv.org http://ift.tt/2cqVki6
via IFTTT

Q-Learning with Basic Emotions. (arXiv:1609.01468v1 [cs.AI])

Q-learning is a simple and powerful tool in solving dynamic problems where environments are unknown. It uses a balance of exploration and exploitation to find an optimal solution to the problem. In this paper, we propose using four basic emotions: joy, sadness, fear, and anger to influence a Qlearning agent. Simulations show that the proposed affective agent requires lesser number of steps to find the optimal path. We found when affective agent finds the optimal path, the ratio between exploration to exploitation gradually decreases, indicating lower total step count in the long run



from cs.AI updates on arXiv.org http://ift.tt/2czjsje
via IFTTT

OpenTripPlanner, OpenStreetMap, General Transit Feed Specification: Tools for Disaster Relief and Recovery. (arXiv:1609.01472v1 [cs.CY])

Open Trip Planner was identified as the most promising open source multi-modal trip planning software. Open Street Map, which provides mapping data to Open Trip Planner, is one of the most well-known open source international repository of geographic data. General Transit Feed Specification, which provides transportation data to Open Trip Planner, has been the standard for describing transit systems and platform for numerous applications. Together, when used to implement an instance of Open Trip Planner, these software has been helping in traffic decongestion all over the world by assisting commuters to shift from using private transportation modes to public ones. Their potential however goes beyond providing multi-modal public transportation routes. This paper aims to first discuss the researchers' experience in implementing a public transportation route planner for the purpose of traffic decongestion.The researchers would examine the prospective of using the system for disaster preparedness and recovery and concrete ways on how to realize them.



from cs.AI updates on arXiv.org http://ift.tt/2cilJla
via IFTTT

Multi Exit Configuration of Mesoscopic Pedestrian Simulation. (arXiv:1609.01475v1 [cs.MA])

A mesoscopic approach to modeling pedestrian simulation with multiple exits is proposed in this paper. A floor field based on Qlearning Algorithm is used. Attractiveness of exits to pedestrian typically is based on shortest path. However, several factors may influence pedestrian choice of exits. Scenarios with multiple exits are presented and effect of Q-learning rewards system on navigation is investigated



from cs.AI updates on arXiv.org http://ift.tt/2cqVZQs
via IFTTT

Axiomatizing Category Theory in Free Logic. (arXiv:1609.01493v1 [cs.LO])

Starting from a generalization of the standard axioms for a monoid we present a stepwise development of various, mutually equivalent foundational axiom systems for category theory. Our axiom sets have been formalized in the Isabelle/HOL interactive proof assistant, and this formalization utilizes a semantically correct embedding of free logic in classical higher-order logic. The modeling and formal analysis of our axiom sets has been significantly supported by series of experiments with automated reasoning tools integrated with Isabelle/HOL. We also address the relation of our axiom systems to alternative proposals from the literature, including an axiom set proposed by Freyd and Scedrov for which we reveal a technical flaw: either all operations, e.g. morphism composition, are total or their axiom system is inconsistent. The repair for this problem is quite straightforward, however.



from cs.AI updates on arXiv.org http://ift.tt/2cilbLW
via IFTTT

Lie Access Neural Turing Machine. (arXiv:1602.08671v3 [cs.NE] UPDATED)

Following the recent trend in explicit neural memory structures, we present a new design of an external memory, wherein memories are stored in an Euclidean key space $\mathbb R^n$. An LSTM controller performs read and write via specialized read and write heads. It can move a head by either providing a new address in the key space (aka random access) or moving from its previous position via a Lie group action (aka Lie access). In this way, the "L" and "R" instructions of a traditional Turing Machine are generalized to arbitrary elements of a fixed Lie group action. For this reason, we name this new model the Lie Access Neural Turing Machine, or LANTM.

We tested two different configurations of LANTM against an LSTM baseline in several basic experiments. We found the right configuration of LANTM to outperform the baseline in all of our experiments. In particular, we trained LANTM on addition of $k$-digit numbers for $2 \le k \le 16$, but it was able to generalize almost perfectly to $17 \le k \le 32$, all with the number of parameters 2 orders of magnitude below the LSTM baseline.



from cs.AI updates on arXiv.org http://ift.tt/1XWzjsL
via IFTTT

2016 Preview: Ravens have better than a 65% chance to win 5 games on schedule and a 39.1% chance to make the playoffs (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

ISS Daily Summary Report – 09/05/2016

Bigelow Expandable Activity Module (BEAM) Ingress and Sampling: Flight Engineer (FE)-6 Rubins ingressed the BEAM and collected the deployed Radiation Area Monitor (RAM) dosimeters and performed Microbial Air Sampler (MAS) and Surface Sample Kit (SSK) sampling. She also performed a thorough inspection of the walls and found no moisture.  The crew also replaced all of the BEAM sensor extended life battery packs.  The MAS and SSK samples as well as the RAM dosimeters will be packed for return on 46S and analyzed in Houston.  Cardio Ox and Biochem Profile Collections:  Rubins and FE-5 Onishi performed their Flight Day 60 (FD60) urine and blood collections and inserted them into Minus Eighty Degree Celsius Laboratory Freezer for ISS (MELFI).  The Biochemical Profile experiment tests blood and urine samples obtained from astronauts before, during, and after spaceflight. Specific proteins and chemicals in the samples are used as biomarkers, or indicators of health. Post-flight analysis yields a database of samples and test results, which scientists can use to study the effects of spaceflight on the body.  The goal of Cardio Ox is to determine whether biological markers of oxidative and inflammatory stress are elevated during and after space flight and whether this results in an increased, long-term risk of atherosclerosis risk in astronauts. Marrow: Rubins collected breath and ambient air samples in support of the Canadian Space Agency’s Marrow experiment.  Marrow investigation looks at the effect of microgravity on the bone marrow. It is believed that microgravity, like long-duration bed rest on Earth, has a negative effect on the bone marrow and the blood cells that are produced in the marrow. The extent of this effect, and its recovery, are of interest to space research and healthcare providers on Earth.  ISS Change of Command (COC): The entire crew discussed with Mission Control Center (MCC)-Houston and MCC-Moscow flight control teams their roles and responsibilities for the timeframe between the COC event and departure of 46S. Anatoly Ivanishin then assumed command of the ISS from Jeff Williams. Following the COC, the 47S crew became prime for emergency response.  Post Extravehicular Activity (EVA) Tasks: The crew deconfigured the Airlock following last week’s EVA operations and prepared Extravehicular Mobility Units (EMUs) and equipment for long term stowage. They also performed EMU cooling loop maintenance on the EMUs used during the EVA (3003 and 3008). Crew Quarters (CQ) Port Cleaning: In preparation for his departure from the ISS tomorrow Williams cleaned his CQ, including the intake and exhaust ducts, fans and airflow sensors. All activities were completed unless otherwise noted. MARROW Air Samples HRF Sample Collection HRF MELFI Sample Insertion HRF Activation of Centrifuge and blood collection operator assistance HRF Blood Collection Operator HRF Refrigerated Centrifuge Configuration DOSETRK Data Entry HRF Refrigerated Centrifuge Configuration 2 MRF Flow HRF MELFI Sample Insertion Auxiliary Laptop Computer System Anti-Virus Data Update Crew Departure Prep Removal and handover of dosimeters to RS for stowage in Soyuz 720 Measuring Partial CO Pressure in RS using US portable CSA-CP device (Central Post SM panel 208) HRF Blood sample removal in preparation for cold stowage insertion HRF MELFI Sample Insertion MATRYOSHKA-R. Transfer of PADLE detectors and handover for Return / r/g 3286 MATRYOSHKA-R. Photos of Transfer / r/g 3290 Fine Motor Skills (FINEMOTR) Experiment Ops LBNP Exercise (CLOSEOUT) r/g 3296 HRF Refrigerated Centrifuge Closeout Ops HRF Sample Collection On MCC GO Dismantling ЛКТ (ТА251МБ) and ROM from Soyuz720 БО HRF MELFI Sample Insertion US items prepack for return on 46S HABIT Questionnaires Regenerative Environmental Control and Life Support System (ECLSS) Recycle Tank Fill Part 3 CASKAD. Connecting Anabioz Incubator to РБС and Power Up / r/g 3293 WRM Condensate Collection Configuration Soyuz 731 Samsung Tablet Recharge, initiate HABIT Preparing for the experiment Stowage of BEAM Video Equipment Folding ARED Platform CASKAD. Starting Anabioz No. 2 Battery Charge / r/g 3293 Folding ARED Platform MRF Purge BEAM Ingress Crew Discretionary Event FENIKS. Removal and Transfer of Bioekologiya cases to Soyuz 720, disposal of empty Bioekologiya kits / r/g 3292 Air Lock Deconfig after EVA Moving Stowage back to the A/L after the EVA BEAM air sampling using АК-1М sampler r/g 3295 Environmental Health System (EHS), Radiation Area Monitors (RAM) Retrieve FAGEN. Removal and transfer of [MCK] Kits No.06 and No.07 from panel 328 to Soyuz 720 / r/g 3291 BIOPOLIMER. Hardware Removal from Exposure Location and Transfer to Soyuz / r/g 3294 Start EMU cooling loop scrub STRUKTURA  Photography during deactivation / r/g 3289 STRUKTURA  Deactivation of crystallization process / r/g 3288 Microbiology Surface Sampling in BEAM using SSK kit BAKTERIOFAG. Photograph and Dismantle BIOECOLOGIYA Container, transfer to Soyuz 720 / r/g 3287 STRUKTURA  Transfer and stowage of Luch-2 Kit to Soyuz 720 / r/g 3288 IFM Port Crew Quarters (CQ) Cleaning Soyuz 720 Samsung Tablet Recharge, initiate Sanitary -Hygiene Status Monitoring r/g 3298 Soyuz 720 Payload Container Stowage Ops for return / r/g 3099 Soyuz 731 Samsung Tablet Recharge, terminate СОЖ Maintenance r/g 3300 EMU Cooling Loop Post Scrub Water Sample Microbial Air Sampler (MAS) Kit Sample Collection in BEAM EMU  Cooling Loop Maintenance, EMU Reconfig Microbial Sample Collection / r/g 3297 Filling (separation) of ЕДВ (КОВ) for Elektron or ЕДВ-СВ Transfer of MAS/SSK samples (from BEAM) to RS for stowage in Soyuz 720 HRF Sample Collection Replace BEAM Distributed Impact Detection System (DIDS) HRF MELFI Sample Insertion BEAM Cleanup and Egress Exercise Data Downlink via OCA ARED Footplate Unfold to Nominal Position IFM In Flight Maintenance (IFM) Port Crew Quarter (CQ) Cleaning Health Maintenance System (HMS) Profile of Mood States (POMS) Questionnaire HRF Sample Collection Water Transfer to Container via MRF, End Countermeasures System (CMS),  Sprint Exercise, Optional HRF MELFI Sample Insertion EMU Cooling Loop Deconfig Soyuz 720 P/L Container Transfer Operations Report  r/g 3099 MARROW Air Samples Soyuz 720 Samsung tablet recharge, terminate Signing ISS RS Handover Protocol / r/g 3285 Comm Check and Ops from Soyuz 720 via RGS Completed Task List Items MELFI1 retrieve 1 and 2 of 4 BMS sample complete 3 of 4 Manufacturing Device Print Removal, Clean, and […]

from ISS On-Orbit Status Report http://ift.tt/2c11lCF
via IFTTT

Incorrect autofix of anonymous function body in Drupal.WhiteSpace.ScopeClosingBrace

Mile23 reported in #1999722-28: [policy] Define coding standards for anonymous functions (closures) that there is a piece of code currently in ...

from Google Alert - anonymous http://ift.tt/2bQGGUO
via IFTTT

ISS Daily Summary Report – 09/02/2016

Trailing Thermal Control Radiator (TTCR) Extravehicular Activity (EVA) Post-EVA Activities:  Today, the USOS crew had a half-duty day.  They completed their post-EVA medical checkups, and performed an Extravehicular Mobility Unit (EMU) Water Recharge procedure on EMUs 3003 and 3008. The EMUs and associated equipment were then be prepared for storage.  They then participated in an EVA debrief to discuss any comments regarding preparation and execution of the EVA.  Skin-B Operations: The Skin-B investigation was conducted as FE-6 performed Corneometer, Tewameter and Visioscan measurements on his forearm. The Corneometer measures the hydration level of the stratus coreum (outer layer of the skin), the Tewameter measures the skin barrier function, and the Visioscan measures the skin surface topography. Skin B is a European Space Agency (ESA) investigation that aims to improve the understanding of skin aging, which is greatly accelerated in space. The data will also be used to verify the results from previous testing for the SkinCare investigation on the ISS.   Space Headaches: The crew completed the ESA Space Headaches questionnaire which provides information that may help in the development of methods to alleviate associated symptoms and improvement in the well-being and performance of crew members in space. Headaches during space flight can negatively affect mental and physical capacities of crew members which can influence performance during a space mission.  Habitability Walk-through: The crew recorded a walk-through video documenting observations of life onboard ISS, providing insight related to human factors and habitability. The Habitability investigation collects observations about the relationship between crew members and their environment on the ISS. Observations can help spacecraft designers understand how much habitable volume is required, and whether a mission’s duration impacts how much space crew members need.  Today’s Planned Activities All activities were completed unless otherwise noted. Closing Window Shutters 6, 8, 9, 12, 13, 14 Regeneration of БМП Ф2 Micropurification Cartridge Soyuz 720 СУДН Test Prior to Undocking CALCIUM. Experiment Session 8 Post EVA Crew Health Status Examination ISS crew and ГОГУ (RSA Flight Control Management Team) weekly conference Environmental Control & Life Support System (ECLSS) Recycle Tank Drain Soyuz 720 Samsung tablet recharging USOS EVA Photo Cameras Reconfiguration Skin B Nominal Ops (SKNB) Setup and hardware gathering CALCIUM. Bioekololgiya Cases: Photography, Processing, and Photo Downlink, Pre-pack for Return ISS HAM – Activation of ISS HAM Radio and Video IMS Tagup (S-band) HABIT Habitability Walk-Through Video Crew Departure Prep BIODEGRADATSIYA. Sample collection from structure surfaces and photography WRS Recycle Tank Fill from EDV Water flow through Microbial Removal Filter Soyuz 720 [АСУ] Activation Pille Dosimeter Readings after US EVA Prepack USOS hardware for stowage in Soyuz EMU Water Refill Soyuz 720 Descent OBT Crew’s Emergency Roles and Responsibilities Review Food Frequency Questionnaire Microbial Removal Filter (MRF) Purge Expedition 49/50 Crew Handover Conference Post-EVA PBA Relocation Crew Departure Prep METEOR Rack Doors Open Crew EVA Debrief СОЖ Maintenance Onboard Training (OBT) Robotics Onboard Trainer (ROBoT) Debrief Space Headaches (SHD) Weekly Questionnaire IMS Delta File Prep Space Headaches (SHD) Weekly Questionnaire IMS Conference Initiating potable water flow through the Microbial Removal Filter into the Water Processor Assembly Daily Planning Conference Flight Director / ISS Crew Tagup Regeneration of БМП Ф2 Absorption Cartridge Completed Task List Items None Ground Activities All activities were completed unless otherwise noted. 46S Thruster Test (first time Soyuz thruster test performed on US CMG Control) Three-Day Look Ahead: Saturday, 09/03: Crew Off Duty, Housekeeping, Overhead CQ Cleaning Sunday, 09/04: Crew Off Duty Monday, 09/05: EMU Loop Scrub, Port Crew Quarters Cleaning, BEAM Ingress and Sampling QUICK ISS Status – Environmental Control Group:                               Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Standby Urine Processing Assembly (UPA) Standby Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up

from ISS On-Orbit Status Report http://ift.tt/2c9xUjJ
via IFTTT

[FD] SEC Consult SA-20160906-0 :: Private key for browser-trusted certificate embedded in multiple Aruba Networks / Alcatel-Lucent products

This advisory is accompanied by a blog post regarding a recap on our published "House of Keys" research study on the re-use of cryptographic secrets from 11/2015. For further information also see http://ift.tt/2cw33yw SEC Consult Vulnerability Lab Security Advisory < 20160906-0 > ======================================================================= title: Private Key For Browser-Trusted Certificate Embedded In Firmware product: multiple Aruba Networks / Alcatel-Lucent products vulnerable version: see Vulnerable / tested versions fixed version: - CVE number: impact: High homepage: http://ift.tt/Xqtkz4 http://ift.tt/1vX2FHK found: 2015-05-15 by: Stefan Viehböck (Office Vienna) SEC Consult Vulnerability Lab An integrated part of SEC Consult Bangkok - Berlin - Linz - Montreal - Moscow Singapore - Vienna (HQ) - Vilnius - Zurich http://ift.tt/1mGHMNR ======================================================================= Vendor description:

Source: Gmail -> IFTTT-> Blogger

Russia's Largest Portal HACKED; Nearly 100 Million Plaintext Passwords Leaked

Another data breach from 2012, and this time, it's Russia's biggest internet portal and email provider Rambler.ru. Rambler.ru, also known as Russia's Yahoo, suffered a massive data breach in 2012 in which an unknown hacker or a group of hackers managed to steal nearly 100 Million user accounts, including their unencrypted plaintext passwords. <!-- adsense --> The copy of the hacked database


from The Hacker News http://ift.tt/2bPvIdj
via IFTTT

Spiral Meteor through the Heart Nebula


What is this meteor doing? Dynamically, the unusually short and asymmetric train may indicate that the sand-sized grain at the center of the glow is momentarily spinning as it ablates, causing its path to be slightly spiral. Geographically, the meteor appears to be going through the Heart Nebula, although really it is in Earth's atmosphere and so is about one quadrillion times closer. Taken last month on the night of the peak, this meteor is likely from the Perseid meteor shower. The Perseids radiant, in the constellation of Perseus, is off the frame to the upper right, toward the direction that the meteor streak is pointing. The Heart Nebula was imaged in 18 one-minute exposures, of which the unusual meteor streak appeared on just one. The meteor train is multicolored as its glow emanates from different elements in the heated gas. via NASA http://ift.tt/2bZmWdc

Monday, September 5, 2016

I have a new follower on Twitter


Exonar
Organise your Organisation's Information
Silicon Canal, Newbury
https://t.co/WuvRwoE62d
Following: 1014 - Followers: 531

September 05, 2016 at 11:54PM via Twitter http://twitter.com/exonar

A MIP Backend for the IDP System. (arXiv:1609.00759v1 [cs.AI])

The IDP knowledge base system currently uses MiniSAT(ID) as its backend Constraint Programming (CP) solver. A few similar systems have used a Mixed Integer Programming (MIP) solver as backend. However, so far little is known about when the MIP solver is preferable. This paper explores this question. It describes the use of CPLEX as a backend for IDP and reports on experiments comparing both backends.



from cs.AI updates on arXiv.org http://ift.tt/2bZwKp3
via IFTTT

An Online Universal Classifier for Binary, Multi-class and Multi-label Classification. (arXiv:1609.00843v1 [cs.LG])

Classification involves the learning of the mapping function that associates input samples to corresponding target label. There are two major categories of classification problems: Single-label classification and Multi-label classification. Traditional binary and multi-class classifications are sub-categories of single-label classification. Several classifiers are developed for binary, multi-class and multi-label classification problems, but there are no classifiers available in the literature capable of performing all three types of classification. In this paper, a novel online universal classifier capable of performing all the three types of classification is proposed. Being a high speed online classifier, the proposed technique can be applied to streaming data applications. The performance of the developed classifier is evaluated using datasets from binary, multi-class and multi-label problems. The results obtained are compared with state-of-the-art techniques from each of the classification types.



from cs.AI updates on arXiv.org http://ift.tt/2casp5R
via IFTTT

High Dimensional Human Guided Machine Learning. (arXiv:1609.00904v1 [cs.AI])

Have you ever looked at a machine learning classification model and thought, I could have made that? Well, that is what we test in this project, comparing XGBoost trained on human engineered features to training directly on data. The human engineered features do not outperform XGBoost trained di- rectly on the data, but they are comparable. This project con- tributes a novel method for utilizing human created classifi- cation models on high dimensional datasets.



from cs.AI updates on arXiv.org http://ift.tt/2bZwnuO
via IFTTT

Spectral learning of dynamic systems from nonequilibrium data. (arXiv:1609.00932v1 [cs.LG])

Observable operator models (OOMs) and related models are one of the most important and powerful tools for modeling and analyzing stochastic systems. They can exactly describe dynamics of finite-rank systems, and be efficiently learned from data by moment based algorithms. Almost all OOM learning algorithms are developed based on the assumption of equilibrium data which is very difficult to guarantee in real life, especially for complex processes with large time scales. In this paper, we derive a nonequilibrium learning algorithm for OOMs, which dismisses this assumption and can effectively extract the equilibrium dynamics of a system from nonequilibrium observation data. In addition, we propose binless OOMs for the application of nonequilibrium learning to continuous-valued systems. In comparison with the other OOMs with continuous observations, binless OOMs can achieve consistent estimation from nonequilibrium data with only linear computational complexity.



from cs.AI updates on arXiv.org http://ift.tt/2carJgV
via IFTTT

Multi-Label Classification Method Based on Extreme Learning Machines. (arXiv:1608.08435v1 [cs.LG] CROSS LISTED)

In this paper, an Extreme Learning Machine (ELM) based technique for Multi-label classification problems is proposed and discussed. In multi-label classification, each of the input data samples belongs to one or more than one class labels. The traditional binary and multi-class classification problems are the subset of the multi-label problem with the number of labels corresponding to each sample limited to one. The proposed ELM based multi-label classification technique is evaluated with six different benchmark multi-label datasets from different domains such as multimedia, text and biology. A detailed comparison of the results is made by comparing the proposed method with the results from nine state of the arts techniques for five different evaluation metrics. The nine methods are chosen from different categories of multi-label methods. The comparative results shows that the proposed Extreme Learning Machine based multi-label classification technique is a better alternative than the existing state of the art methods for multi-label problems.



from cs.AI updates on arXiv.org http://ift.tt/2bUdcDe
via IFTTT