208 resultados para Hiding


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Set in 2008 Puerto Rico, this novel aims to explore the relationship between constructed masks of personal identity, the increasingly interconnected nature of community, and their confluence in the worlds of politics, media, social activism, and business through a narrative examination of the ways in which three primary characters affect the lives of those around them. Jaime, a meditative young man with a penchant for planes, comes home to find the power shut off and his drug-addict mother gone. His best friend, Yarique, a disaffected stoner with a false sense of machismo, becomes an overnight sensation after an escalating series of violent run-ins with his abuelo’s neighbor. Ravolo Soto, a reclusive pitorro distiller, drinks to keep The Other in check, but takes off into the jungles of Lares, hiding out in his father’s mountain shack, after a violent encounter with the police leaves one officer dead.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Luke Banas is a young video artist who lives illegally in the disused Domino sugar refinery in Williamsburg, Brooklyn. While his art is an attempt to fully record and share his own life story, developers want to tear down the building where he works; a building that’s a monument to his hip neighborhood’s industrial past. The novel’s narrator, Lila Fairfax, is a journalist writing her first feature article about Luke and the fate of the factory. Observant and astute, she soon realizes that, despite his obsessive self-revelation, Luke is hiding a secret. Lila’s rational, detached approach to life is disrupted as, in the course of her reporting, she falls in love with Luke and as a result, learns far more than she anticipated. Though primarily a love story, The Sugar Factory is also an investigation of art, and art’s interaction with commerce, history, and new technology.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: This study explores the possibility that religious fundamentalism (RF) may be linked to deficits in personality structure, which is in contrast to the general assumption that religiosity and spirituality are positively related to mature personality development. SAMPLING AND METHODS: To test this hypothesis, 327 (232 female) college students completed the Multidimensional Inventory for Religious/Spiritual Well-Being together with the Innsbrucker Religious Fundamentalism Scale. In addition, the 'vulnerable dark triad' of personality ('vulnerable narcissism', subscale of the Pathological Narcissism Inventory; 'secondary psychopathy', subscale of Levenson's Self-Report Psychopathy Scale; 'borderline personality', of the Borderline Personality Inventory) was assessed. RESULTS: In general, the relation between spirituality and healthy personality functioning was confirmed. In addition to greatly overlapping with 'general religiosity' (p < 0.001), RF was also relevantly predicted by narcissistic ('hiding the self') and borderline ('primitive defenses') personality facets (p < 0.05 for both). CONCLUSIONS: Based on these preliminary data, we conclude that specific structural deficits in personality might lead to more rigorous variants of religious/spiritual beliefs such as RF. Further research in clinical surroundings as well as in religious extremist groups is recommended.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A robust audio watermarking method based on the time-spread (TS) echo hiding scheme is proposed. Compared with existing TS watermarking methods, the approach is more robust as it exploits the characteristics of host signals in the encoding stage. Theoretical analysis and simulation examples demonstrate the effectiveness and advantages of the method.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis aims to identify the world-view of Czesław Miłosz as it underlies his work; a world-view which comprises historical, philosophical and theological perspectives. With this aim an analysis has been made of the books of essays and the collections of articles of the Polish writer. These form a major part of his literary production: twenty seven of the thirty eight volumes. The work The Land of Urlo (1977) has a special relevance to this endeavour. Two principal hypotheses have been formulated: 1. The world-view of Czesław Miłosz grew out of the assimilation of a series of intellectual influences. The catholic education in his childhood. The encounter in his youth with the gnostic Christian Oskar Miłosz and with Marxism. His contact during the period of the Second Word War and at the beginning of its sequel with the hegelian philosopher Tadeusz Kroński. This world-view had crystalized during his exile. From then he completed his reading of Simone Weil, Emanuel Swedenborg, and William Blake. 2. The world-view of Czesław Miłosz is directly related to his understanding of the History of the West from the beginnings of Christianity to contemporary times. The difficulty in understanding the Weltanschauung of Czesław Miłosz is not of a technical nature (expression in an excessively complex language, dispersion of his work in multifarious archives, collections of letters, etc.). It arises – and only to a lesser degree in his political and philosophical-religeous and biographical essays – out of the author's use of a cryptic language with the intention of hiding a part of his message from view...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ce mémoire traite du débat entre le coeur et le devoir et des différentes influences qui ont conduit à la fameuse question : Pourquoi la princesse n’épouse-t-elle pas le duc de Nemours alors que tous les obstacles sont levés ? À défaut de pouvoir répondre définitivement à cette énigme dont seule Madame de La Fayette possède la clé, nous nous sommes concentrée sur les influences qui auraient pu pousser la princesse à sacrifier son coeur pour son devoir. La méthode de recherche utilisée est l’approche de la biographie intellectuelle. Il est évident que le vécu de l'auteure a teinté le contenu de son oeuvre ainsi que l'âme de son héroïne. Nous nous sommes également inspirée de la méthode sociocritique quant aux influences et mouvements de l'époque. Dans le but de simplifier la collecte des sources et l’organisation de la recherche, nous avons regroupé les influences en trois grandes catégories : les influences personnelles, internes et externes. Cette étude a mis en évidence que les moeurs, dans La Princesse de Clèves, sont le miroir de la société du XVIIe siècle. Chaque influence présentée forme le dessin d’une princesse cachant en elle le secret de son renoncement à l'amour.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In echo-based audio watermarking methods, poor robustness and low embedding capacity are the main problems. In this paper, we propose a novel time-spread echo method for audio watermarking, aiming to improve the robustness and the embedding capacity. To improve the robustness, we design an efficient pseudonoise (PN) sequence and a corresponding decoding function. Compared to the conventional PN sequence used in time-spread echo hiding based method, more large peaks are produced during the autocorrelation of the proposed PN sequence. Our decoding function is designed to utilize these peaks to improve the robustness. To enhance the embedding capacity, multiple watermark bits are embedded into one audio segment. This is achieved by varying the delays of added echo signals. Moreover, the security of the proposed method is further improved by scrambling the watermarks at the embedding stage. Compared with the conventional time-spread echo-based method, the proposed method is more robust to conventional attacks and has higher embedding capacity. The effectiveness of our method is illustrated by simulation results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tracking objects that are hidden and then moved is a crucial ability related to object permanence, which develops across several stages in early childhood. In spatial rotation tasks, children observe a target object that is hidden in one of two or more containers before the containers are rotated around a fixed axis. Usually, 30-month-olds fail to find the hidden object after it was rotated by 180°. We examined whether visual discriminability of the containers improves 30-month-olds’ success in this task and whether children perform better after 90° than after 180° rotations. Two potential hiding containers with same or different colors were placed on a board that was rotated by 90° or 180° in a within-subjects design. Children (N D 29) performed above chance level in all four conditions. Their overall success in finding the object did not improve by differently colored containers. However, different colors prevented children from showing an inhibition bias in 90° rotations, that is, choosing the empty container more often when it was located close to them than when it was farther away: This bias emerged in the same colors condition but not in the different colors condition. Results are discussed in view of particular challenges that might facilitate or deteriorate spatial rotation tasks for young children.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Chaque année, le piratage mondial de la musique coûte plusieurs milliards de dollars en pertes économiques, pertes d’emplois et pertes de gains des travailleurs ainsi que la perte de millions de dollars en recettes fiscales. La plupart du piratage de la musique est dû à la croissance rapide et à la facilité des technologies actuelles pour la copie, le partage, la manipulation et la distribution de données musicales [Domingo, 2015], [Siwek, 2007]. Le tatouage des signaux sonores a été proposé pour protéger les droit des auteurs et pour permettre la localisation des instants où le signal sonore a été falsifié. Dans cette thèse, nous proposons d’utiliser la représentation parcimonieuse bio-inspirée par graphe de décharges (spikegramme), pour concevoir une nouvelle méthode permettant la localisation de la falsification dans les signaux sonores. Aussi, une nouvelle méthode de protection du droit d’auteur. Finalement, une nouvelle attaque perceptuelle, en utilisant le spikegramme, pour attaquer des systèmes de tatouage sonore. Nous proposons tout d’abord une technique de localisation des falsifications (‘tampering’) des signaux sonores. Pour cela nous combinons une méthode à spectre étendu modifié (‘modified spread spectrum’, MSS) avec une représentation parcimonieuse. Nous utilisons une technique de poursuite perceptive adaptée (perceptual marching pursuit, PMP [Hossein Najaf-Zadeh, 2008]) pour générer une représentation parcimonieuse (spikegramme) du signal sonore d’entrée qui est invariante au décalage temporel [E. C. Smith, 2006] et qui prend en compte les phénomènes de masquage tels qu’ils sont observés en audition. Un code d’authentification est inséré à l’intérieur des coefficients de la représentation en spikegramme. Puis ceux-ci sont combinés aux seuils de masquage. Le signal tatoué est resynthétisé à partir des coefficients modifiés, et le signal ainsi obtenu est transmis au décodeur. Au décodeur, pour identifier un segment falsifié du signal sonore, les codes d’authentification de tous les segments intacts sont analysés. Si les codes ne peuvent être détectés correctement, on sait qu’alors le segment aura été falsifié. Nous proposons de tatouer selon le principe à spectre étendu (appelé MSS) afin d’obtenir une grande capacité en nombre de bits de tatouage introduits. Dans les situations où il y a désynchronisation entre le codeur et le décodeur, notre méthode permet quand même de détecter des pièces falsifiées. Par rapport à l’état de l’art, notre approche a le taux d’erreur le plus bas pour ce qui est de détecter les pièces falsifiées. Nous avons utilisé le test de l’opinion moyenne (‘MOS’) pour mesurer la qualité des systèmes tatoués. Nous évaluons la méthode de tatouage semi-fragile par le taux d’erreur (nombre de bits erronés divisé par tous les bits soumis) suite à plusieurs attaques. Les résultats confirment la supériorité de notre approche pour la localisation des pièces falsifiées dans les signaux sonores tout en préservant la qualité des signaux. Ensuite nous proposons une nouvelle technique pour la protection des signaux sonores. Cette technique est basée sur la représentation par spikegrammes des signaux sonores et utilise deux dictionnaires (TDA pour Two-Dictionary Approach). Le spikegramme est utilisé pour coder le signal hôte en utilisant un dictionnaire de filtres gammatones. Pour le tatouage, nous utilisons deux dictionnaires différents qui sont sélectionnés en fonction du bit d’entrée à tatouer et du contenu du signal. Notre approche trouve les gammatones appropriés (appelés noyaux de tatouage) sur la base de la valeur du bit à tatouer, et incorpore les bits de tatouage dans la phase des gammatones du tatouage. De plus, il est montré que la TDA est libre d’erreur dans le cas d’aucune situation d’attaque. Il est démontré que la décorrélation des noyaux de tatouage permet la conception d’une méthode de tatouage sonore très robuste. Les expériences ont montré la meilleure robustesse pour la méthode proposée lorsque le signal tatoué est corrompu par une compression MP3 à 32 kbits par seconde avec une charge utile de 56.5 bps par rapport à plusieurs techniques récentes. De plus nous avons étudié la robustesse du tatouage lorsque les nouveaux codec USAC (Unified Audion and Speech Coding) à 24kbps sont utilisés. La charge utile est alors comprise entre 5 et 15 bps. Finalement, nous utilisons les spikegrammes pour proposer trois nouvelles méthodes d’attaques. Nous les comparons aux méthodes récentes d’attaques telles que 32 kbps MP3 et 24 kbps USAC. Ces attaques comprennent l’attaque par PMP, l’attaque par bruit inaudible et l’attaque de remplacement parcimonieuse. Dans le cas de l’attaque par PMP, le signal de tatouage est représenté et resynthétisé avec un spikegramme. Dans le cas de l’attaque par bruit inaudible, celui-ci est généré et ajouté aux coefficients du spikegramme. Dans le cas de l’attaque de remplacement parcimonieuse, dans chaque segment du signal, les caractéristiques spectro-temporelles du signal (les décharges temporelles ;‘time spikes’) se trouvent en utilisant le spikegramme et les spikes temporelles et similaires sont remplacés par une autre. Pour comparer l’efficacité des attaques proposées, nous les comparons au décodeur du tatouage à spectre étendu. Il est démontré que l’attaque par remplacement parcimonieux réduit la corrélation normalisée du décodeur de spectre étendu avec un plus grand facteur par rapport à la situation où le décodeur de spectre étendu est attaqué par la transformation MP3 (32 kbps) et 24 kbps USAC.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article explores the ways in which gender was used in order to transform an exiled and uneducated illegitimate child into a prince. Our study revolves around a member of the royal family, Afonso (c.1480–1504), who was brought up in hiding by peasants and who later, as a teenager, was reincorporated into the court. We argue that the keys to this process of rehabilitation were, on one hand, family politics centred around different configurations and on the other, his introduction into a court environment marked by the ideals of chivalry. Within this dynamic, material culture played a key role, because it gave the prince all the visual attributes of his new status, as well as allowing him the means to create a new self. We shall briefly introduce Afonso and his family context in order to give an insight into his life within changing political and dynastic contexts. Then, we will analyse the expression of manhood in the Portuguese court, using the spectacles at the court as a basis for observation, thus relating gender to material culture in a courtly environment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The developmental progression of emotional competence in childhood provides a robust evidence for its relation to social competence and important adjustment outcomes. This study aimed to analyze how this association is established in middle childhood. For this purpose, we tested 182 Portuguese children aged between 8 and 11 years, of 3rd and 4th grades, in public schools. Firstly, for assessing social competence we used an instrument directed to children using critical social situations within the relationships with peers in the school context - Socially in Action-Peers (SAp) (Rocha, Candeias & Lopes da Silva, 2012); children were assessed by three sources: themselves, their peers and their teacher. Secondly, we assessed children’s emotional understanding, individually, with the Test of Emotion Comprehension (Pons & Harris, 2002; Pons, Harris & Rosnay, 2004). Relations between social competence levels (in a composite score and using self, peers and teachers’ scores) and emotional comprehension components (comprehension of the recognition of emotions, based on facial expressions; external emotional causes; contribute of desire to emotion; emotions based on belief; memory influence under emotional state evaluation; possibility of emotional regulation; possibility of hiding an emotional state; having mixed emotions; contribution of morality to emotion experience) were investigated by means of two SSA (Similarity Structure Analysis) - a Multidimensional Scaling procedure and the external variable as points technique. In the first structural analysis (SSA) we will consider self, peers and teachers’ scores on Social Competence as content variables and TEC as external variable; in the second SSA we will consider TEC components as content variables and Social Competence in their different levels as external variable. The implications of these MDS procedures in order to better understand how social competence and emotional comprehension are related in children is discussed, as well as the repercussions of these findings for social competence and emotional understanding assessment and intervention in childhood is examined.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Some decades of research on emotional development have underlined the contribution of several domains to emotional understanding in childhood. Based on this research, Pons and colleagues (Pons & Harris, 2002; Pons, Harris & Rosnay, 2004) have proposed the Test of Emotion Comprehension (TEC) which assesses nine domains of emotional understanding, namely the recognition of emotions, based on facial expressions; the comprehension of external emotional causes; impact of desire on emotions; emotions based on beliefs; memory influence on emotions; possibility of emotional regulation; possibility of hiding an emotional state; having mixed emotions; contribution of morality to emotional experiences. This instrument was administered individually to 182 Portuguese children aged between 8 and 11 years, of 3rd and 4th grades, in public schools. Additionally, we used the Socially in Action-Peers (SAp) (Rocha, Candeias & Lopes da Silva, 2012) to assess TEC’s criterion-related validity. Mean differences results in TEC by gender and by socio-economic status (SES) were analyzed. The results of the TEC’s psychometric analysis were performed in terms of items’ sensitivity and reliability (stability, test-retest). Finally, in order to explore the theoretical structure underlying TEC a Confirmatory Factor Analysis and a Similarity Structure Analysis were computed. Implications of these findings for emotional understanding assessment and intervention in childhood are discussed.