61 resultados para Training algorithms
Resumo:
Recently, several anonymization algorithms have appeared for privacy preservation on graphs. Some of them are based on random-ization techniques and on k-anonymity concepts. We can use both of them to obtain an anonymized graph with a given k-anonymity value. In this paper we compare algorithms based on both techniques in orderto obtain an anonymized graph with a desired k-anonymity value. We want to analyze the complexity of these methods to generate anonymized graphs and the quality of the resulting graphs.
Resumo:
El projecte de TAV es basa en la transferència d'un sistema de vals de capacitació, i en com aquest sistema de vals és adaptable a altres països o regions. En el document s'analitzen diferents conceptes teòrics sobre la conveniència o no de la implantació d'aquest sistema. A més a més, aquest document és una guia per a les organitzacions interessades en l'adaptació del sistema de vals formatius al seu territori, mostrant els passos a seguir i oferint eines útils per aconseguir-ho.
Resumo:
El projecte de TAV es basa en la transferència d'un sistema de vals de capacitació, i en com aquest sistema de vals és adaptable a altres països o regions. En el document s'analitzen diferents conceptes teòrics sobre la conveniència o no de la implantació d'aquest sistema. A més a més, aquest document és una guia per a les organitzacions interessades en l'adaptació del sistema de vals formatius al seu territori, mostrant els passos a seguir i oferint eines útils per aconseguir-ho.
Resumo:
Summary. The present study reports the effects of referential communication training in individuals formally diagnosed with autism spectrum disorder (ASD). Participants were 20 children with ASD (M age = 14.3 yr., SD = 4.2; 6 girls, 14 boys) in the role of speakers and 20 control children, who acted as listeners. They were all enrolled in mainstream compulsory education. Inclusion/exclusion criteria were defined according to the clinical diagnosis of ASD, the presence or absence of additional or associated disability, previous training in referential communication, and any drug treatment. Speakers were randomly assigned to one of two groups (trained vs untrained). Linguistic age, cognitive level, and autistic symptoms were analyzed, respectively, with the Peabody Picture Vocabulary Test (PPVT), the Wechsler Intelligence Scale (WISCR or WAISIII), and the Autistic Behavior Checklist (ABC). Communicative abilities were analyzed through two indexes related to message complexity and self-regulation. The trained group was trained in referential communication tasks (task analysis, role taking, and task evaluation), while the untrained group took part in a communicative game but without any specific communicative training. The results showed that the complexity of emitted messages had improved statistically significantly in the trained group as an effect of training. Ecological referential communication is shown to be an appropriate paradigm for studying the communicative process and its products and could be used to develop and implement a training program focused on those skills in which individuals with ASD are most deficient.
Resumo:
Ionising radiation (IR) applications are quiet common among several areas of knowledge, medicine or industry. Medical X-rays, Nuclear Medicine, Xrays used in non-destructive testing or applications in research are a few examples. These radiations originate from radioactive materials or radiation emitting devices. Radiation Protection education and training (E&T) is of paramount importance to work safely in areas that imply the use of IR. TheTechnical Unit for Radiation Protection at the University of Barcelona has anextensive expertise in basic, initial and refresher training, in general or specificareas, as well as in courses validated by the Spanish Nuclear Safety Council orto satisfy specific needs with bespoke courses. These specific customer needsare evaluated and on-site courses can also be carried out.
Resumo:
This paper proposes a very fast method for blindly approximating a nonlinear mapping which transforms a sum of random variables. The estimation is surprisingly good even when the basic assumption is not satisfied.We use the method for providing a good initialization for inverting post-nonlinear mixtures and Wiener systems. Experiments show that the algorithm speed is strongly improved and the asymptotic performance is preserved with a very low extra computational cost.
Resumo:
La formació de traductors implica l´ús de procediments i eines que permetin els estudiants familiaritzar-se amb contextos professionals. El software lliure especialitzat inclou eines de qualitat professional i procediments accessibles per a les institucions acadèmiques i els estudiants a distància que treballen a casa seva. Els projectes reals que utilitzen software lliure i traducció col·laborativa (crowdsourcing) constitueixen recursos indispensables en la formació de traductors.
Resumo:
In this paper, we present a comprehensive study of different Independent Component Analysis (ICA) algorithms for the calculation of coherency and sharpness of electroencephalogram (EEG) signals, in order to investigate the possibility of early detection of Alzheimer’s disease (AD). We found that ICA algorithms can help in the artifact rejection and noise reduction, improving the discriminative property of features in high frequency bands (specially in high alpha and beta ranges). In addition to different ICA algorithms, the optimum number of selected components is investigated, in order to help decision processes for future works.
Resumo:
In this paper we present a quantitative comparisons of different independent component analysis (ICA) algorithms in order to investigate their potential use in preprocessing (such as noise reduction and feature extraction) the electroencephalogram (EEG) data for early detection of Alzhemier disease (AD) or discrimination between AD (or mild cognitive impairment, MCI) and age-match control subjects.
Resumo:
Recently, several anonymization algorithms have appeared for privacy preservation on graphs. Some of them are based on random-ization techniques and on k-anonymity concepts. We can use both of them to obtain an anonymized graph with a given k-anonymity value. In this paper we compare algorithms based on both techniques in orderto obtain an anonymized graph with a desired k-anonymity value. We want to analyze the complexity of these methods to generate anonymized graphs and the quality of the resulting graphs.
Resumo:
Els present document te com objectiu detallar el procés que s¿ha dut a terme per la implementació d¿una aplicació que permeti a un esportista l¿enregistrament tant de entrenaments com competicions. Per la implementació de dita aplicació s¿ha escollit Java com a llenguatge de programació i concretament J2EE com la arquitectura a utilitzar.
Resumo:
The traditional model of learning based on knowledge transfer doesn't promote the acquisition of information-related competencies and development of autonomous learning. More needs to be done to embrace learner-centred approaches, based on constructivism, collaboration and co-operation. This new learning paradigm is aligned with the European Higher Education Area (EHEA) requirements. In this sense, a learning experience based in faculty' librarian collaboration was seen as the best option for promoting student engagement and also a way to increase information-related competences in Open University of Catalonia (UOC) academic context. This case study outlines the benefits of teacher-librarian collaboration in terms of pedagogy innovation, resources management and introduction of open educational resources (OER) in virtual classrooms, Information literacy (IL) training and use of 2.0 tools in teaching. Our faculty-librarian's collaboration aims to provide an example of technology-enhanced learning and demonstrate how working together improves the quality and relevance of educational resources in UOC's virtual classrooms. Under this new approach, while teachers change their role from instructors to facilitators of the learning process and extend their reach to students, libraries acquire an important presence in the academic learning communities.
Resumo:
Networks are evolving toward a ubiquitous model in which heterogeneousdevices are interconnected. Cryptographic algorithms are required for developing securitysolutions that protect network activity. However, the computational and energy limitationsof network devices jeopardize the actual implementation of such mechanisms. In thispaper, we perform a wide analysis on the expenses of launching symmetric and asymmetriccryptographic algorithms, hash chain functions, elliptic curves cryptography and pairingbased cryptography on personal agendas, and compare them with the costs of basic operatingsystem functions. Results show that although cryptographic power costs are high and suchoperations shall be restricted in time, they are not the main limiting factor of the autonomyof a device.
Resumo:
This paper presents a Bayesian approach to the design of transmit prefiltering matrices in closed-loop schemes robust to channel estimation errors. The algorithms are derived for a multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) system. Two different optimizationcriteria are analyzed: the minimization of the mean square error and the minimization of the bit error rate. In both cases, the transmitter design is based on the singular value decomposition (SVD) of the conditional mean of the channel response, given the channel estimate. The performance of the proposed algorithms is analyzed,and their relationship with existing algorithms is indicated. As withother previously proposed solutions, the minimum bit error rate algorithmconverges to the open-loop transmission scheme for very poor CSI estimates.
Resumo:
Many engineering problems that can be formulatedas constrained optimization problems result in solutionsgiven by a waterfilling structure; the classical example is thecapacity-achieving solution for a frequency-selective channel.For simple waterfilling solutions with a single waterlevel and asingle constraint (typically, a power constraint), some algorithmshave been proposed in the literature to compute the solutionsnumerically. However, some other optimization problems result insignificantly more complicated waterfilling solutions that includemultiple waterlevels and multiple constraints. For such cases, itmay still be possible to obtain practical algorithms to evaluate thesolutions numerically but only after a painstaking inspection ofthe specific waterfilling structure. In addition, a unified view ofthe different types of waterfilling solutions and the correspondingpractical algorithms is missing.The purpose of this paper is twofold. On the one hand, itoverviews the waterfilling results existing in the literature from aunified viewpoint. On the other hand, it bridges the gap betweena wide family of waterfilling solutions and their efficient implementationin practice; to be more precise, it provides a practicalalgorithm to evaluate numerically a general waterfilling solution,which includes the currently existing waterfilling solutions andothers that may possibly appear in future problems.