6 resultados para key characters

em Dalarna University College Electronic Archive


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Traffic Control Signs or destination boards on roadways offer significant information for drivers. Regulation signs tell something like your speed, turns, etc; Warning signs warn drivers of conditions ahead to help them avoid accidents; Destination signs show distances and directions to various locations; Service signs display location of hospitals, gas and rest areas etc. Because the signs are so important and there is always a certain distance from them to drivers, to let the drivers get information clearly and easily even in bad weather or other situations. The idea is to develop software which can collect useful information from a special camera which is mounted in the front of a moving car to extract the important information and finally show it to the drivers. For example, when a frame contains on a destination drive sign board it will be text something like "Linkoping 50",so the software should extract every character of "Linkoping 50", compare them with the already known character data in the database. if there is extracted character match "k" in the database then output the destination name and show to the driver. In this project C++ will be used to write the code for this software.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This essay presents a portrayal of Heathcliff, Catherine and Isabella from a psychoanalytical perspective with regard to four defense mechanisms; namely, repression, denial, sublimation and projection in order to see how these defense mechanisms have affected the characters’ decisions and behaviour, and led them to their destinations in life. It will include three major sections: repression in characters, denial in characters, and sublimation and projection in characters. These terms will be more clearly defined and explained in the subsequent sections.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches.  The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

When newly immigrated children and young people begin school in Sweden, certain challengesarise. These may result from weak Swedish-language skills and different schooling backgrounds,as well as organizational and pedagogical limitations in the schools. This generates demands onschool leaders to lead and develop the organization and teachers competences to meet these pupils’needs. This situation was behind the initiation of the project “New Immigrants and Learning—Competence Development for Teachers and School Principals.” The project ran in schools infour Swedish municipalities, its aim was to develop leadership, organizational and pedagogicalskills that would facilitate the schooling and integration of newly arrived pupils. This article aimsto describe and discuss a Participant Action Research (PAR) based on a think tank and researchcircles, drawing special attention to the role of the school leaders. It will also examine whether theresearch circles and the project overall served to develop educational and intercultural leadership,organizational conditions, collegial learning, pedagogical methods and competence in terms ofschooling for this pupil group.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Distance teaching is now-a-days used in different shapes. However, it is something different from traditional campus organised education as it systematically uses Information Communication Technology (ICT) as a key element. When the distance teacher education started in Sweden many teacher educators doubted the wisdom of this. They expressed that the educational process to become a teacher would be deteriorated. For instance, they feared for high drop out rates and difficulties to examine in a proper way. The Swedish National Agency for Higher Education has recently edited a report that showed that this form of teacher education was well adapted to the labour market, but the possibilities for the teacher students to shape their education were relatively limited. However, we still know quite little about the effects of this way to educate teacher students. This paper explores the possibility of using distance teacher education.In a case study 20 students, who were the first to finish a complete a distance teacher education at Högskolan Dalarna, were asked in a questionnaire how they had apprehended their education. We also interviewed four of these students, as well as five teacher educators.One of our findings were that the distance teacher education reached new target groups, who not had been able to participate in university studies if it not had been offered in this form. Especially, this was valid for the middle-aged women, living a long distance away from a university, with social responsibilities for children or old parents. Other findings were that these students in general were target oriented and ambitious, wrote more than the campus students and developed that kind of skill better. Marratech, an ICT system for small groups, e-mail and chat were used for the communication. Marratech was considered to permit free and spontaneous communication, both of the teacher educators and the students. Initially the teacher educators were sceptical to distance teacher education, but afterwards they were surprised of how well it had worked. They declared that they had better and nearer contact with their students and more control over the students´ performance, but some parts of the teacher education were better suitable for campus education, for example, power of creating characters. Distance teacher education was considered time consuming and demanded much activity from the teacher educators as the students wanted rapid responses. This study indicates that distance teacher education works well for mature individuals with high motivation. However, it demands more time from the teacher educators, but it gives in general good results. Still, there are pedagogical challenges to overcome. Maybe we should reflect on a mix of distance teacher education and campus based teacher education, instead of separated ways of accomplishing teacher education?