Automated detection and classification of marine mammals vocalizations is critical for conservation and management efforts but is hindered by limited annotated datasets and the acoustic complexity of real-world marine environments. Data augmentation has proven to be an effective strategy to address this limitation by increasing dataset diversity and improving model generalization without requiring additional field data. However, most augmentation techniques used to date rely on effective but relatively simple transformations, leaving open the question of whether deep generative models can provide additional benefits. In this study, we evaluate the potential of deep generative for data augmentation in marine mammal call detection including: Variational Autoencoders, Generative Adversarial Networks, and Denoising Diffusion Probabilistic Models. Using Southern Resident Killer Whale (Orcinus orca) vocalizations from two long-term hydrophone deployments in the Salish Sea, we compare these approaches against traditional augmentation methods such as time-shifting and vocalization masking. While all generative approaches improved classification performance relative to the baseline, diffusi
The case of the Zodiac Killer is one of the most widely known unsolved serial killer cases in history. The unidentified killer murdered five known victims and terrorized the state of California. He also communicated extensively with the press and law enforcement. Besides his murders, Zodiac was known for his use of ciphers. The first Zodiac cipher was solved within a week of its publication, while the second cipher was solved by the authors after 51 years, when it was discovered to be a transposition and homophonic substitution cipher with unusual qualities. In this paper, we detail the historical significance of this cipher and the numerous efforts which culminated in its solution.
We study the distribution of 2,837 inter-murder intervals (cooling off periods) for 1,012 American serial killers. The distribution is smooth, following a power law in the region of 10-10,000 days. The power law cuts off where inter-murder intervals become comparable with the length of human life. Otherwise there is no other characteristic scale in the distribution. In particular, we do not see any characteristic spree-killer interval or serial-killer interval, but only a monotonous smooth distribution lacking any features. This suggests that there is only a quantitative difference between serial killers and spree-killers, representing different samples generated by the same underlying phenomenon. The over decade long inter-murder intervals are not anomalies, but rare events described by the same power-law distribution and therefore should not necessarily be looked upon with suspicion, as has been done in a recent case involving a serial killer dubbed as the "Grim Sleeper." This large-scale study supports the conclusions of a previous study, involving three prolific serial killers, and the associated neural net model, which can explain the observed power law distribution.
Code commit messages can contain useful information on why a developer has made a change. However, the presence and structure of rationale in real-world code commit messages is not well studied. Here, we detail the creation of a labelled dataset to analyze the code commit messages of the Linux Kernel Out-Of-Memory Killer component. We study aspects of rationale information, such as presence, temporal evolution, and structure. We find that 98.9% of commits in our dataset contain sentences with rationale information, and that experienced developers report rationale in about 60% of the sentences in their commits. We report on the challenges we faced and provide examples for our labelling.
It has been a widely growing interest in using silicon carbide (SiC)in high-power electronic devices. Yet, SiC wafers may contain killer defects that could reduce fabrication yield and make the device fall into unexpected failures. To prevent these failures from happening, it is very important to develop inspection tools that can detect, characterize and locate these defects in a non-invasive way. Current inspection techniques such as Dark Field or Bright field microscopy are effectively able to visualize most such defects; however, there are some scenarios where the inspection becomes problematic or almost impossible, such as when the defects are too small or have low contrast or if the defects lie deep into the substrate. Thus, an alternative method is needed to face these challenges. In this paper, we demonstrate the application of coherent Fourier scatterometry (CFS) as a complementary tool in addition to the conventional techniques to overcome different and problematic scenarios of killer defects inspection on SiC samples. Scanning electron microscopy (SEM)has been used to assess the same defects to validate the findings of CFS. Great consistency has been demonstrated in the c
Backdoor poisoning attacks pose a well-known risk to neural networks. However, most studies have focused on lenient threat models. We introduce Silent Killer, a novel attack that operates in clean-label, black-box settings, uses a stealthy poison and trigger and outperforms existing methods. We investigate the use of universal adversarial perturbations as triggers in clean-label attacks, following the success of such approaches under poison-label settings. We analyze the success of a naive adaptation and find that gradient alignment for crafting the poison is required to ensure high success rates. We conduct thorough experiments on MNIST, CIFAR10, and a reduced version of ImageNet and achieve state-of-the-art results.
The accelerating advancements in Artificial Intelligence (AI) and Machine Learning (ML), highlighted by the development of cutting-edge Generative Pre-trained Transformer (GPT) models by organizations such as OpenAI, Meta, and Anthropic, present new challenges and opportunities in warfare and security. Much of the current focus is on AI's integration within weapons systems and its role in rapid decision-making in kinetic conflict. However, an equally important but often overlooked aspect is the potential of AI-based psychological manipulation at internet scales within the information domain. These capabilities could pose significant threats to individuals, organizations, and societies globally. This paper explores the concept of AI weapons, their deployment, detection, and potential countermeasures.
Many serial killers commit tens of murders. At the same time inter-murder intervals can be decades long. This suggests that some serial killers can die of an accident or a disease, having been never caught. We use the distribution of the killers by the number of murders, the distribution of the length of inter-murder intervals and USA life tables to estimate the number of the uncaught killers. The result is that in 20th century there were about seven of such killers. The most prolific of them likely committed over sixty murders.
Killer technology is a radical innovation, based on new products and/or processes, that with high technical and/or economic performance destroys the usage value of established techniques previously sold and used. Killer technology is a new concept in economics of innovation that may be useful for bringing a new perspective to explain and generalize the behavior and characteristics of innovations that generate a destructive creation for sustaining technical change. To explore the behavior of killer technologies, a simple model is proposed to analyze and predict how killer technologies destroy and substitute established technologies. Empirical evidence of this theoretical framework is based on historical data on the evolution of some example technologies. Theoretical framework and empirical evidence hint at general properties of the behavior of killer technologies to explain corporate, industrial, economic and social change and to support best practices for technology management of firms and innovation policy of nations. Overall, then, the proposed theoretical framework can lay a foundation for the development of more sophisticated concepts to explain the behavior of vital technologi
A substantial period of life after reproduction ends, known as postreproductive lifespan (PRLS), is at odds with classical life history theory. Prolonged PRLS has been confirmed in only two non-human mammals, both odontocete cetaceans. We investigate the evidence for PRLS in a third species, the false killer whale, Pseudorca crassidens, using a quantitative measure of PRLS and morphological evidence from reproductive tissue. We examined specimens from false killer whales from combined strandings (South Africa, 1981) and harvest (Japan 1979-80) and found morphological evidence of changes in the activity of the ovaries in relation to age. Ovulation had ceased in 50% of whales over 45 years, and all whales over 55 years old had ovaries classified as postreproductive. We also calculated a measure of PRLS, known as postreproductive representation (PrR) as an indication of the effect of inter-population demographic variability. PrR for the combined sample was 0.14, whereas the mean of the simulated distribution for PrR under the null hypothesis of no PRLS was 0.02. The 99th percentile of the simulated distribution was 0.08 and no simulated value exceeded 0.13. These results suggest that
A killer of a group Gis an element that normally generates G. We show that the group of a cable knot contains infinitely many killers such that no two lie in the same automorphic orbit.
Justice systems are sometimes called upon to evaluate cases in which health-care professionals are suspected of killing their patients illegally. These cases are difficult to evaluate because they involve at least two levels of uncertainty. Commonly in a murder case it is clear that a homicide has occurred, and investigators must resolve uncertainty about who is responsible. In the cases we examine here there is also uncertainty about whether homicide has occurred. Investigators need to consider whether the deaths that prompted the investigation could plausibly have occurred for reasons other than homicide, in addition to considering whether, if homicide was indeed the cause, the person under suspicion is responsible. In this report, prepared under the auspices of the Royal Statistical Society, we provide advice and guidance on the investigation and evaluation of such cases. Our work was prompted by concerns about the statistical challenges such cases pose for the legal system.
We discuss a cellular automata model to study the competition between an emergent better fitted species against an existing majority species. The model implement local fights among small group of individual and a synchronous random walk on a 2D lattice. The faith of the system, i.e. the spreading or disappearance of the species is determined by their initial density and fight frequency. The initial density of the emergent species has to be higher than a critical threshold for total spreading but this value depends in a non-trivial way of the fight frequency. Below the threshold any better adapted species disappears showing that a qualitative advantage is not enough for a minority to win. No strategy is involved but spatial organization turns out to be crucial. For instance at minority densities of zero measure some very rare local geometries which occur by chance are found to be killer geometries. Once set they lead with high probability to the total destruction of the preexisting majority species. The occurrence rate of these killer geometries is function of the system size. This model may apply to a large spectrum of competing groups like smoker-non smoker, opinion forming, diffu
Molecular vibrations play a critical role in the charge transport properties of weakly van der Waals bonded organic semiconductors. To understand which specific phonon modes contribute most strongly to the electron-phonon coupling and ensuing thermal energetic disorder in some of the most widely studied high mobility molecular semiconductors, state-of-the-art quantum mechanical simulations of the vibrational modes and the ensuing electron phonon coupling constants are combined with experimental measurements of the low-frequency vibrations using inelastic neutron scattering and terahertz time-domain spectroscopy. In this way, the long-axis sliding motion is identified as a killer phonon mode, which in some molecules contributes more than 80% to the total thermal disorder. Based on this insight, a way to rationalize mobility trends between different materials and derive important molecular design guidelines for new high mobility molecular semiconductors is suggested.
In this letter, we decode the newly observed charmoniumlike states, $Y(4320)$ and $Y(4390)$, by introducing interference effect between $ψ(4160)$ and $ψ(4415)$, which plays a role of resonance killer for $Y(4320)$ and $Y(4390)$. It means that two newly reported charmoniumlike states are not genuine resonances, according to which we can naturally explain why two well-established charmonia $ψ(4160)$ and $ψ(4415)$ are missing in the cross sections of $e^+e^- \to π^+ π^- J/ψ$ and $π^+ π^- h_c$ simultaneously. To well describe the detailed data of these cross sections around $\sqrt{s}=4.2$ GeV, our study further illustrates that a charmoniumlike structure $Y(4220)$ must be introduced. As a charmonium, $Y(4220)$ should dominantly decay into its open-charm channel $e^+e^- \to D^0 π^+ D^{\ast-}$, which provides an extra support to $ψ(4S)$ assignment to $Y(4220)$. In fact, this interference effect introduced to explain $Y(4320)$ and $Y(4390)$ gives a typical example of non-resonant explanations to the observed $XYZ$ states, which should be paid more attention especially before identifying the observed $XYZ$ states as genuine resonances.
Defects play important roles in semiconductors for optoelectronic applications. Common intuition is that defects with shallow levels act as carrier providers and defects with deep levels are carrier killers. Here, taking the Cu defects in CdTe as an example, we show that shallow defects can play both roles. Using first-principles calculation methods combined with thermodynamic simulations, we study the dialectic effects of Cu-related defects on hole density and lifetime in bulk CdTe over a wide range of Cu incorporation conditions. Because CuCd can form a relatively shallow acceptor in CdTe, we find that increased Cu incorporation into CdTe indeed can help achieve high hole density; however, too much Cu can cause significant non-radiative recombination. We discuss two strategies to balance the contradictory effects of Cu defects based on the calculated impact of Cd chemical potential, copper defect concentrations, and incorporation temperature on lifetime and hole density. The results indicates that to optimize the Cu doping in CdTe, it is important to control the total amount of Cu incorporated into CdTe and optimize the match between the Cu incorporation temperature and the Cd ch
Terahertz technology is mature enough for large-volume sensing applications. However, Dook van Mechelen says there are a few hurdles preventing its industrial debut. THz spectroscopy has a number of advantages that point to abundant industrial applications, in areas such quality control, security and biomedical imaging. Yet despite those advantages, the search for a THz "killer application"--a novel, innovative use with a business case strong enough to bring the technology into the industrial mainstream--has remained fruitless, and even the hope of finding such an application has begun to falter. Why has a killer app for THz radiation been so elusive? And how can the road to industrial application of this versatile technology be cleared?
Centralized trust is ubiquitous in today's interconnected world, from computational resources to data storage and its underlying infrastructure. The monopolization of cloud computing resembles a feudalistic system, causing a loss of privacy and data ownership. Cloud Computing and the Internet in general face widely recognized challenges, such as (1) the centralization of trust in auxiliary systems (e.g., centralized cloud providers), (2) the seamless and permissionless interoperability of fragmented ecosystems and (2) the effectiveness, verifiability, and confidentiality of the computation. Acurast is a decentralized serverless cloud that addresses all these shortcomings, following the call for a global-scale cloud founded on the principles of the open-source movement. In Acurast, a purpose-built orchestrator, a reputation engine, and an attestation service are enshrined in the consensus layer. Developers can off-load their computations and verify executions cryptographically. Furthermore, Acurast offers a modular execution layer, taking advantage of secure hardware and trusted execution environments, removing the trust required in third parties, and reducing them to cryptographic
The effect of magnetic islands on plasma flow and turbulence has been experimentally investigated in the stellarator W7-X. Magnetic configurations with the 5/5 magnetic island positioned at the plasma edge, inside the last closed flux surface, are studied. The main diagnostic used in the present work is a V-band Doppler reflectometer that allows the measurement of the perpendicular plasma flow and density fluctuations with good spatial resolution. A characteristic signature of the 5/5 magnetic island is clearly detected in the perpendicular flow profile. The comparison of the experimental flow and the neoclassically driven $E\times B$ flow indicates that the island contribution to the flow is maximum at the island boundaries and close to zero at the island O-point. Besides, a reduction in the density fluctuation level is found nearby the island O-point. The similarities between these observations and those found in other devices and in gyrokinetic simulations are discussed.
This paper is part of a publication series from the For5G project that has the goal of creating digital twins of sweet cherry trees. At the beginning a brief overview of the revious work in this project is provided. Afterwards the focus shifts to a crucial problem in the fruit farming domain: the difficulty of making reliable yield predictions early in the season. Following three Satin sweet cherry trees along the year 2023 enabled the collection of accurate ground truth data about the development of cherries from dormancy until harvest. The methodology used to collect this data is presented, along with its valuation and visualization. The predictive power of counting objects at all relevant vegetative stages of the fruit development cycle in cherry trees with regards to yield predictions is investigated. It is found that all investigated fruit states are suitable for yield predictions based on linear regression. Conceptionally, there is a trade-off between earliness and external events with the potential to invalidate the prediction. Considering this, two optimal timepoints are suggested that are opening cluster stage before the start of the flowering and the early fruit stage rig