Skip to main content

Showing 1–12 of 12 results for author: Nunes, E

.
  1. arXiv:2307.04037  [pdf, other

    cs.RO

    Employing Drones in Agriculture: An Exploration of Various Drone Types and Key Advantages

    Authors: E. C. Nunes

    Abstract: This article explores the use of drones in agriculture and discusses the various types of drones employed for different agricultural applications. Drones, also known as unmanned aerial vehicles (UAVs), offer numerous advantages in farming practices. They provide real-time and high-resolution data collection, enabling farmers to make informed irrigation, fertilization, and pest management decisions… ▽ More

    Submitted 11 July, 2023; v1 submitted 8 July, 2023; originally announced July 2023.

    Comments: 5 pages, 8 figures

  2. arXiv:2203.03300  [pdf, other

    cs.LG

    Machine Learning based Anomaly Detection for Smart Shirt: A Systematic Review

    Authors: E. C. Nunes

    Abstract: In recent years, the popularity and use of Artificial Intelligence (AI) and large investments on theInternet of Medical Things (IoMT) will be common to use products such as smart socks, smartpants, and smart shirts. These products are known as Smart Textile or E-textile, which has theability to monitor and collect signals that our body emits. These signals make it possible to extractanomalous comp… ▽ More

    Submitted 7 March, 2022; originally announced March 2022.

    Comments: 17 pages, 5 figures, 10 tables

  3. arXiv:2111.11404  [pdf, ps, other

    cond-mat.str-el cond-mat.stat-mech

    Coexistence of spontaneous dimerization and magnetic order in a transverse-field Ising ladder with four-spin interactions

    Authors: J. C. Xavier, R. G. Pereira, M. E. S. Nunes, J. A. Plascak

    Abstract: The spin-1/2 transverse field two-leg Ising ladder with nearest-neighbor exchange and plaquette four-spin interaction $J_{4}$ is studied analytically and numerically with the density matrix renormalization group approach. The quantum phase diagram in the transverse field $B$ versus $J_{4}$ plane has been obtained. There are three different phases: a paramagnetic (PM) phase for high values of the t… ▽ More

    Submitted 22 November, 2021; originally announced November 2021.

    Comments: 10 pages, 5 figures, 2 tables

    Journal ref: Phys. Rev. B 105, 024430 (2022)

  4. arXiv:2105.08868  [pdf, other

    stat.ME

    Markov-Restricted Analysis of Randomized Trials with Non-Monotone Missing Binary Outcomes: Sensitivity Analysis and Identification Results

    Authors: Daniel O. Scharfstein, Jaron J. R. Lee, Aidan McDermott, Aimee Campbell, Edward Nunes, Abigail G. Matthews, Ilya Shpitser

    Abstract: Scharfstein et al. (2021) developed a sensitivity analysis model for analyzing randomized trials with repeatedly measured binary outcomes that are subject to nonmonotone missingness. Their approach becomes computationally intractable when the number of repeated measured is large (e.g., greater than 15). In this paper, we repair this problem by introducing an $m$th-order Markovian restriction. We e… ▽ More

    Submitted 18 May, 2021; originally announced May 2021.

  5. arXiv:2102.07820  [pdf, other

    cs.SD cs.AI cs.LG eess.SP

    Anomalous Sound Detection with Machine Learning: A Systematic Review

    Authors: Eduardo C. Nunes

    Abstract: Anomalous sound detection (ASD) is the task of identifying whether the sound emitted from an object is normal or anomalous. In some cases, early detection of this anomaly can prevent several problems. This article presents a Systematic Review (SR) about studies related to Anamolous Sound Detection using Machine Learning (ML) techniques. This SR was conducted through a selection of 31 (accepted stu… ▽ More

    Submitted 15 February, 2021; originally announced February 2021.

  6. arXiv:2006.10417  [pdf, other

    eess.AS cs.LG cs.SD

    Deep Dense and Convolutional Autoencoders for Unsupervised Anomaly Detection in Machine Condition Sounds

    Authors: Alexandrine Ribeiro, Luis Miguel Matos, Pedro Jose Pereira, Eduardo C. Nunes, Andre L. Ferreira, Paulo Cortez, Andre Pilastri

    Abstract: This technical report describes two methods that were developed for Task 2 of the DCASE 2020 challenge. The challenge involves an unsupervised learning to detect anomalous sounds, thus only normal machine working condition samples are available during the training process. The two methods involve deep autoencoders, based on dense and convolutional architectures that use melspectogram processed sou… ▽ More

    Submitted 19 June, 2020; v1 submitted 18 June, 2020; originally announced June 2020.

    Comments: 5 pages, 3 figures, submitted for DCase 2020 challenge

  7. arXiv:1810.12492  [pdf, other

    cs.CR cs.AI

    DARKMENTION: A Deployed System to Predict Enterprise-Targeted External Cyberattacks

    Authors: Mohammed Almukaynizi, Ericsson Marin, Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Dipsy Kapoor, Timothy Siedlecki

    Abstract: Recent incidents of data breaches call for organizations to proactively identify cyber attacks on their systems. Darkweb/Deepweb (D2web) forums and marketplaces provide environments where hackers anonymously discuss existing vulnerabilities and commercialize malicious software to exploit those vulnerabilities. These platforms offer security practitioners a threat intelligence environment that allo… ▽ More

    Submitted 29 October, 2018; originally announced October 2018.

  8. arXiv:1607.08583  [pdf, other

    cs.CR cs.AI cs.CY

    Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence

    Authors: Eric Nunes, Ahmad Diab, Andrew Gunn, Ericsson Marin, Vineet Mishra, Vivin Paliath, John Robertson, Jana Shakarian, Amanda Thart, Paulo Shakarian

    Abstract: In this paper, we present an operational system for cyber threat intelligence gathering from various social platforms on the Internet particularly sites on the darknet and deepnet. We focus our attention to collecting information from hacker forum discussions and marketplaces offering products and services focusing on malicious hacking. We have developed an operational system for obtaining informa… ▽ More

    Submitted 28 July, 2016; originally announced July 2016.

    Comments: 6 page paper accepted to be presented at IEEE Intelligence and Security Informatics 2016 Tucson, Arizona USA September 27-30, 2016

  9. arXiv:1607.02171  [pdf, other

    cs.AI

    Argumentation Models for Cyber Attribution

    Authors: Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Andrew Ruef

    Abstract: A major challenge in cyber-threat analysis is combining information from different sources to find the person or the group responsible for the cyber-attack. It is one of the most important technical and policy challenges in cyber-security. The lack of ground truth for an individual responsible for an attack has limited previous studies. In this paper, we take a first step towards overcoming this l… ▽ More

    Submitted 7 July, 2016; originally announced July 2016.

    Comments: 8 pages paper to be presented at International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI) 2016 In conjunction with ASONAM 2016 San Francisco, CA, USA, August 19-20, 2016

  10. arXiv:1507.01930  [pdf, other

    cs.CR

    Malware Task Identification: A Data Driven Approach

    Authors: Eric Nunes, Casey Buto, Paulo Shakarian, Christian Lebiere, Stefano Bennati, Robert Thomson, Holger Jaenisch

    Abstract: Identifying the tasks a given piece of malware was designed to perform (e.g. logging keystrokes, recording video, establishing remote access, etc.) is a difficult and time-consuming operation that is largely human-driven in practice. In this paper, we present an automated method to identify malware tasks. Using two different malware collections, we explore various circumstances for each - includin… ▽ More

    Submitted 7 July, 2015; originally announced July 2015.

    Comments: 8 pages full paper, accepted FOSINT-SI (2015)

  11. arXiv:1507.01922  [pdf, other

    cs.CR

    Cyber-Deception and Attribution in Capture-the-Flag Exercises

    Authors: Eric Nunes, Nimish Kulkarni, Paulo Shakarian, Andrew Ruef, Jay Little

    Abstract: Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies. Here, we overcome this limitation by leveraging DEFCON capture-the-flag (CTF) exercise data where the actual ground-truth is known. In this work, we use various clas… ▽ More

    Submitted 7 July, 2015; originally announced July 2015.

    Comments: 4 pages Short name accepted to FOSINT-SI 2015

  12. arXiv:1107.5727  [pdf, ps, other

    gr-qc astro-ph.CO

    Static and spherically symmetric black holes in $f(R)$ theories

    Authors: Santiago Esteban Perez Bergliaffa, Yves Eduardo Chifarelli de Oliveira Nunes

    Abstract: We study some features of static and spherically symmetric solutions (SSS) with a horizon in $f(R)$ theories of gravitation by means of a near-horizon analysis. A necessary condition for an $f(R)$ theory to have this type of solution is obtained. General features of the effective potential are deduced, and it is shown that there exists a limit on the curvature at the horizon, in both cases for any… ▽ More

    Submitted 28 July, 2011; originally announced July 2011.