727 resultados para additional key words and phrases


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This project proposes a module for teaching visual composition within the context of a written composition course. Drawing from process writing theory, critical pedagogy, and photo-elicitation, “Composing In Words And Images” gives composition teachers a module and direct instruction for the incorporation of critical visual composition studies in their writing classes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Central Eastern Europe, the research area this paper is concerned with, is a region characterized by a high diversity of languages and cultures. It is, at the same time, an area where political, cultural and social conflicts have emerged over time, nowadays especially in border zones, where people of different ethnic, cultural or linguistic background live. In this context, it is important for us researchers to get balanced interview data, and consequently we very often have to conduct interviews in several different languages and within changing cultural contexts. In order to avoid "communication problems" or even conflictual (interview) situations, which might damage the outcome of the research, we are thus challenged to find appropriate communication strategies for any of these situations. This is especially difficult when we are confronted with language or culture-specific terminology or taboo expressions that carry political meaning(s). Once the interview data is collected and it comes to translating and analysing it, we face further challenges and new questions arise. First of all, we have to decide what a good translation strategy would be. Many words and phrases that exist in one language do not have an exact equivalent in another. Therefore we have to find a solution for translating these expressions and concepts in a way that their meanings do not get "lost by translation". In this paper I discuss and provide insights to these challenges by presenting and discussing numerous examples from the region in question. Specifically, I focus on the deconstruction of the meaning of geographical names and politically loaded expressions in order to show the sensitivities of language, the difficulties of research in multilingual settings and with multilingual data as well as the strategies or "ways out" of certain dilemmas.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

On the basis of a multi-proxy approach and a strategy combining lacustrine and marine records along a north–south transect, data collected in the central Mediterranean within the framework of a collaborative project have led to reconstruction of high-resolution and well-dated palaeohydrological records and to assessment of their spatial and temporal coherency. Contrasting patterns of palaeohydrological changes have been evidenced in the central Mediterranean: south (north) of around 40° N of latitude, the middle part of the Holocene was characterised by lake-level maxima (minima), during an interval dated to ca. 10 300–4500 cal BP to the south and 9000–4500 cal BP to the north. Available data suggest that these contrasting palaeohydrological patterns operated throughout the Holocene, both on millennial and centennial scales. Regarding precipitation seasonality, maximum humidity in the central Mediterranean during the middle part of the Holocene was characterised by humid winters and dry summers north of ca. 40° N, and humid winters and summers south of ca. 40° N. This may explain an apparent conflict between palaeoclimatic records depending on the proxies used for reconstruction as well as the synchronous expansion of tree species taxa with contrasting climatic requirements. In addition, south of ca. 40° N, the first millennium of the Holocene was characterised by very dry climatic conditions not only in the eastern, but also in the central- and the western Mediterranean zones as reflected by low lake levels and delayed reforestation. These results suggest that, in addition to the influence of the Nile discharge reinforced by the African monsoon, the deposition of Sapropel 1 has been favoured (1) by an increase in winter precipitation in the northern Mediterranean borderlands, and (2) by an increase in winter and summer precipitation in the southern Mediterranean area. The climate reversal following the Holocene climate optimum appears to have been punctuated by two major climate changes around 7500 and 4500 cal BP. In the central Mediterranean, the Holocene palaeohydrological changes developed in response to a combination of orbital, ice-sheet and solar forcing factors. The maximum humidity interval in the south-central Mediterranean started ca. 10 300 cal BP, in correlation with the decline (1) of the possible blocking effects of the North Atlantic anticyclone linked to maximum insolation, and/or (2) of the influence of the remnant ice sheets and fresh water forcing in the North Atlantic Ocean. In the north-central Mediterranean, the lake-level minimum interval began only around 9000 cal BP when the Fennoscandian ice sheet disappeared and a prevailing positive NAO-(North Atlantic Oscillation) type circulation developed in the North Atlantic area. The major palaeohydrological oscillation around 4500–4000 cal BP may be a non-linear response to the gradual decrease in insolation, with additional key seasonal and interhemispheric changes. On a centennial scale, the successive climatic events which punctuated the entire Holocene in the central Mediterranean coincided with cooling events associated with deglacial outbursts in the North Atlantic area and decreases in solar activity during the interval 11 700–7000 cal BP, and to a possible combination of NAO-type circulation and solar forcing since ca. 7000 cal BP onwards. Thus, regarding the centennial-scale climatic oscillations, the Mediterranean Basin appears to have been strongly linked to the North Atlantic area and affected by solar activity over the entire Holocene. In addition to model experiments, a better understanding of forcing factors and past atmospheric circulation patterns behind the Holocene palaeohydrological changes in the Mediterranean area will require further investigation to establish additional high-resolution and well-dated records in selected locations around the Mediterranean Basin and in adjacent regions. Special attention should be paid to greater precision in the reconstruction, on millennial and centennial timescales, of changes in the latitudinal location of the limit between the northern and southern palaeohydrological Mediterranean sectors, depending on (1) the intensity and/or characteristics of climatic periods/oscillations (e.g. Holocene thermal maximum versus Neoglacial, as well as, for instance, the 8.2 ka event versus the 4 ka event or the Little Ice Age); and (2) on varying geographical conditions from the western to the eastern Mediterranean areas (longitudinal gradients). Finally, on the basis of projects using strategically located study sites, there is a need to explore possible influences of other general atmospheric circulation patterns than NAO, such as the East Atlantic–West Russian or North Sea–Caspian patterns, in explaining the apparent complexity of palaeoclimatic (palaeohydrological) Holocene records from the Mediterranean area.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Does the word-superiority effect on letter discrimination result in a word-superiority effect on duration judgments? We examined this question in five experiments. In the first four experiments, we have demonstrated that (1) words shown for 32-80 msec were judged as presented longer than non-words shown for the same duration; (2) this word-superiority effect persists if the stimuli are shown for an objective duration of up to 250 msec; and (3) these effects can be extended to judgments of figure-ground contrast and letter size. These findings extend existing data on effects of processing fluency on perceptual judgments. In Experiment 5, we found that duration judgments were higher for words than for pronounceable nonwords, and duration judgments were higher for pronounceable non-words than for nonpronounceable nonwords. We discuss the implications of this finding for the discrepancy-attribution hypothesis.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mirror masked words are embedded into a context that makes them appear as senseless patterns or as strings of unfamiliar letters. Thus, mirror masked words can be shown for several hundreds of milliseconds without being recognised as words. We sought to further investigate effects of nonsconscious reading by monitoring event-related brain potentials (ERPs) while participants observed mirror masked letter strings. ERPs were recorded while participants observed mirror masked words and nonwords. Data of 15 participants was segmented into periods of quasi-stable field topography (microstates). Microstates for masked words and nonwords were compared using randomization tests, statistical parametric scalp maps and Low Resolution Electromagnetic Tomography (LORETA). ERPs to masked words and nonwords showed significant topographic differences between 136 and 256 ms, indicating that stimuli were nonconsciously discriminated. A LORETA model localised sources of activation discriminating between masked words and nonwords in left operculum, the right superior parietal lobe and right superior temporal gyrus indicating higher current density for nonwords than for words in these areas. ERPs of mirror masked stimuli can indicate unconscious discrimination even in cases where behavioural priming is unreliable. This approach might be useful for investigating differences in early, nonconscious stages of word perception.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Neuroimaging (NI) technologies are having increasing impact in the study of complex cognitive and social processes. In this emerging field of social cognitive neuroscience, a central goal should be to increase the understanding of the interaction between the neurobiology of the individual and the environment in which humans develop and function. The study of sex/gender is often a focus for NI research, and may be motivated by a desire to better understand general developmental principles, mental health problems that show female-male disparities, and gendered differences in society. In order to ensure the maximum possible contribution of NI research to these goals, we draw attention to four key principles—overlap, mosaicism, contingency and entanglement—that have emerged from sex/gender research and that should inform NI research design, analysis and interpretation. We discuss the implications of these principles in the form of constructive guidelines and suggestions for researchers, editors, reviewers and science communicators.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Specialization to nectarivory is associated with radiations within different bird groups, including parrots. One of them, the Australasian lories, were shown to be unexpectedly species rich. Their shift to nectarivory may have created an ecological opportunity promoting species proliferation. Several morphological specializations of the feeding tract to nectarivory have been described for parrots. However, they have never been assessed in a quantitative framework considering phylogenetic nonindependence. Using a phylogenetic comparative approach with broad taxon sampling and 15 continuous characters of the digestive tract, we demonstrate that nectarivorous parrots differ in several traits from the remaining parrots. These trait-changes indicate phenotype–environment correlations and parallel evolution, and may reflect adaptations to feed effectively on nectar. Moreover, the diet shift was associated with significant trait shifts at the base of the radiation of the lories, as shown by an alternative statistical approach. Their diet shift might be considered as an evolutionary key innovation which promoted significant non-adaptive lineage diversification through allopatric partitioning of the same new niche. The lack of increased rates of cladogenesis in other nectarivorous parrots indicates that evolutionary innovations need not be associated one-to-one with diversification events.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

QUESTIONS UNDER STUDY The impact of assisted reproductive technology (ART) on Swiss demography was quantified. From 1993 to 2012 the number of deliveries, including multiples, generated by ART was compared with overall delivery numbers. Swiss experts in ART collaborated in a consensus to increase successful outcomes, to reduce the incidence of complications of ART and to validate recommendations through statistical review of available data. METHODS Data generated between 1993 and 2012 and published by the Federal Office of Statistics (BfS) were compared with the Swiss database on ART (FIVNAT-CH) as organised by the Swiss Society of Reproductive Medicine (SGRM). From these analyses a panel of Swiss experts in ART extracted recommendations to improve current practice, to prevent complications related to ART and to recommend changes in current Swiss legislation dealing with ART. RESULTS Since 1993 the age of women giving birth rose together with the number of women asking for ART. This demographic trend was reflected in a rise in the number of deliveries generated by ART (in 2012: 2.2%) and the proportion of multiple births (in 2012: 17.6%). The outcome of ART was most negatively influenced by the age of the treated patient. The number of retrieved oocytes decisively impacted the likelihood of delivery, the risk of multiple births and the incidence of ovarian hyperstimulation syndrome. CONCLUSIONS Optimal ovarian stimulation should be designed for the retrieval of 10 to 15 oocytes per treatment. Swiss legislation should enable and stimulate a policy of elective single embryo transfer to avoid multiple births.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Abstract—In this paper we explore how recent technologies can improve the security of optical networks. In particular, we study how to use quantum key distribution(QKD) in common optical network infrastructures and propose a method to overcome its distance limitations. QKD is the first technology offering information theoretic secretkey distribution that relies only on the fundamental principles of quantum physics. Point-to-point QKDdevices have reached a mature industrial state; however, these devices are severely limited in distance, since signals at the quantum level (e.g., single photons) are highly affected by the losses in the communication channel and intermediate devices. To overcome this limitation, intermediate nodes (i.e., repeaters) are used. Both quantum-regime and trusted, classical repeaters have been proposed in the QKD literature, but only the latter can be implemented in practice. As a novelty, we propose here a new QKD network model based on the use of not fully trusted intermediate nodes, referred to as weakly trusted repeaters. This approach forces the attacker to simultaneously break several paths to get access to the exchanged key, thus improving significantly the security of the network. We formalize the model using network codes and provide real scenarios that allow users to exchange secure keys over metropolitan optical networks using only passive components. Moreover, the theoretical framework allows one to extend these scenarios not only to accommodate more complex trust constraints, but also to consider robustness and resiliency constraints on the network.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Crop simulation models allow analyzing various tillage-rotation combinations and exploring management scenarios. This study was conducted to test the DSSAT (Decision Support System for Agrotechnology Transfer) modelling system in rainfed semiarid central Spain. The focus is on the combined effect of tillage system and winter cereal-based rotations (cereal/legume/fallow) on the crop yield and soil quality. The observed data come from a 16-year field experiment. The CERES and CROPGRO models, included in DSSAT v4.5, were used to simulate crop growth and yield, and DSSAT- CENTURY was used in the soil organic carbon (SOC) and soil nitrogen (SN) simulations. Genetic coefficients were calibrated using part of the observed data. Field observations showed that barley grain yield was lower for continuous cereal (BB) than for vetch (VB) and fallow (FB) rotations for both tillage systems. The CERES-Barley model also reflected this trend. The model predicted higher yield in the conventional tillage (CT) than in the no tillage (NT) probably due to the higher nitrogen availability in the CT, shown in the simulations. The SOC and SN in the top layer only, were higher in NT than in CT, and decreased with depth in both simulated and observed values. These results suggest that CT-VB and CT-FB were the best combinations for the dry land conditions studied. However, CT presented lower SN and SOC content than NT. This study shows how models can be a useful tool for assessing and predicting crop growth and yield, under different management systems and under specific edapho-climatic conditions. Additional key words: CENTURY model; CERES-Barley; crop simulation models; DSSAT; sequential simula- tion; soil organic carbon.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

El extraordinario auge de las nuevas tecnologías de la información, el desarrollo de la Internet de las Cosas, el comercio electrónico, las redes sociales, la telefonía móvil y la computación y almacenamiento en la nube, han proporcionado grandes beneficios en todos los ámbitos de la sociedad. Junto a éstos, se presentan nuevos retos para la protección y privacidad de la información y su contenido, como la suplantación de personalidad y la pérdida de la confidencialidad e integridad de los documentos o las comunicaciones electrónicas. Este hecho puede verse agravado por la falta de una frontera clara que delimite el mundo personal del mundo laboral en cuanto al acceso de la información. En todos estos campos de la actividad personal y laboral, la Criptografía ha jugado un papel fundamental aportando las herramientas necesarias para garantizar la confidencialidad, integridad y disponibilidad tanto de la privacidad de los datos personales como de la información. Por otro lado, la Biometría ha propuesto y ofrecido diferentes técnicas con el fin de garantizar la autentificación de individuos a través del uso de determinadas características personales como las huellas dáctilares, el iris, la geometría de la mano, la voz, la forma de caminar, etc. Cada una de estas dos ciencias, Criptografía y Biometría, aportan soluciones a campos específicos de la protección de datos y autentificación de usuarios, que se verían enormemente potenciados si determinadas características de ambas ciencias se unieran con vistas a objetivos comunes. Por ello es imperativo intensificar la investigación en estos ámbitos combinando los algoritmos y primitivas matemáticas de la Criptografía con la Biometría para dar respuesta a la demanda creciente de nuevas soluciones más técnicas, seguras y fáciles de usar que potencien de modo simultáneo la protección de datos y la identificacíón de usuarios. En esta combinación el concepto de biometría cancelable ha supuesto una piedra angular en el proceso de autentificación e identificación de usuarios al proporcionar propiedades de revocación y cancelación a los ragos biométricos. La contribución de esta tesis se basa en el principal aspecto de la Biometría, es decir, la autentificación segura y eficiente de usuarios a través de sus rasgos biométricos, utilizando tres aproximaciones distintas: 1. Diseño de un esquema criptobiométrico borroso que implemente los principios de la biometría cancelable para identificar usuarios lidiando con los problemas acaecidos de la variabilidad intra e inter-usuarios. 2. Diseño de una nueva función hash que preserva la similitud (SPHF por sus siglas en inglés). Actualmente estas funciones se usan en el campo del análisis forense digital con el objetivo de buscar similitudes en el contenido de archivos distintos pero similares de modo que se pueda precisar hasta qué punto estos archivos pudieran ser considerados iguales. La función definida en este trabajo de investigación, además de mejorar los resultados de las principales funciones desarrolladas hasta el momento, intenta extender su uso a la comparación entre patrones de iris. 3. Desarrollando un nuevo mecanismo de comparación de patrones de iris que considera tales patrones como si fueran señales para compararlos posteriormente utilizando la transformada de Walsh-Hadarmard. Los resultados obtenidos son excelentes teniendo en cuenta los requerimientos de seguridad y privacidad mencionados anteriormente. Cada uno de los tres esquemas diseñados han sido implementados para poder realizar experimentos y probar su eficacia operativa en escenarios que simulan situaciones reales: El esquema criptobiométrico borroso y la función SPHF han sido implementados en lenguaje Java mientras que el proceso basado en la transformada de Walsh-Hadamard en Matlab. En los experimentos se ha utilizado una base de datos de imágenes de iris (CASIA) para simular una población de usuarios del sistema. En el caso particular de la función de SPHF, además se han realizado experimentos para comprobar su utilidad en el campo de análisis forense comparando archivos e imágenes con contenido similar y distinto. En este sentido, para cada uno de los esquemas se han calculado los ratios de falso negativo y falso positivo. ABSTRACT The extraordinary increase of new information technologies, the development of Internet of Things, the electronic commerce, the social networks, mobile or smart telephony and cloud computing and storage, have provided great benefits in all areas of society. Besides this fact, there are new challenges for the protection and privacy of information and its content, such as the loss of confidentiality and integrity of electronic documents and communications. This is exarcebated by the lack of a clear boundary between the personal world and the business world as their differences are becoming narrower. In both worlds, i.e the personal and the business one, Cryptography has played a key role by providing the necessary tools to ensure the confidentiality, integrity and availability both of the privacy of the personal data and information. On the other hand, Biometrics has offered and proposed different techniques with the aim to assure the authentication of individuals through their biometric traits, such as fingerprints, iris, hand geometry, voice, gait, etc. Each of these sciences, Cryptography and Biometrics, provides tools to specific problems of the data protection and user authentication, which would be widely strengthen if determined characteristics of both sciences would be combined in order to achieve common objectives. Therefore, it is imperative to intensify the research in this area by combining the basics mathematical algorithms and primitives of Cryptography with Biometrics to meet the growing demand for more secure and usability techniques which would improve the data protection and the user authentication. In this combination, the use of cancelable biometrics makes a cornerstone in the user authentication and identification process since it provides revocable or cancelation properties to the biometric traits. The contributions in this thesis involve the main aspect of Biometrics, i.e. the secure and efficient authentication of users through their biometric templates, considered from three different approaches. The first one is designing a fuzzy crypto-biometric scheme using the cancelable biometric principles to take advantage of the fuzziness of the biometric templates at the same time that it deals with the intra- and inter-user variability among users without compromising the biometric templates extracted from the legitimate users. The second one is designing a new Similarity Preserving Hash Function (SPHF), currently widely used in the Digital Forensics field to find similarities among different files to calculate their similarity level. The function designed in this research work, besides the fact of improving the results of the two main functions of this field currently in place, it tries to expand its use to the iris template comparison. Finally, the last approach of this thesis is developing a new mechanism of handling the iris templates, considering them as signals, to use the Walsh-Hadamard transform (complemented with three other algorithms) to compare them. The results obtained are excellent taking into account the security and privacy requirements mentioned previously. Every one of the three schemes designed have been implemented to test their operational efficacy in situations that simulate real scenarios: The fuzzy crypto-biometric scheme and the SPHF have been implemented in Java language, while the process based on the Walsh-Hadamard transform in Matlab. The experiments have been performed using a database of iris templates (CASIA-IrisV2) to simulate a user population. The case of the new SPHF designed is special since previous to be applied i to the Biometrics field, it has been also tested to determine its applicability in the Digital Forensic field comparing similar and dissimilar files and images. The ratios of efficiency and effectiveness regarding user authentication, i.e. False Non Match and False Match Rate, for the schemes designed have been calculated with different parameters and cases to analyse their behaviour.