473 resultados para Toehold Puzzle
Resumo:
The human visual ability to perceive depth looks like a puzzle. We perceive three-dimensional spatial information quickly and efficiently by using the binocular stereopsis of our eyes and, what is mote important the learning of the most common objects which we achieved through living. Nowadays, modelling the behaviour of our brain is a fiction, that is why the huge problem of 3D perception and further, interpretation is split into a sequence of easier problems. A lot of research is involved in robot vision in order to obtain 3D information of the surrounded scene. Most of this research is based on modelling the stereopsis of humans by using two cameras as if they were two eyes. This method is known as stereo vision and has been widely studied in the past and is being studied at present, and a lot of work will be surely done in the future. This fact allows us to affirm that this topic is one of the most interesting ones in computer vision. The stereo vision principle is based on obtaining the three dimensional position of an object point from the position of its projective points in both camera image planes. However, before inferring 3D information, the mathematical models of both cameras have to be known. This step is known as camera calibration and is broadly describes in the thesis. Perhaps the most important problem in stereo vision is the determination of the pair of homologue points in the two images, known as the correspondence problem, and it is also one of the most difficult problems to be solved which is currently investigated by a lot of researchers. The epipolar geometry allows us to reduce the correspondence problem. An approach to the epipolar geometry is describes in the thesis. Nevertheless, it does not solve it at all as a lot of considerations have to be taken into account. As an example we have to consider points without correspondence due to a surface occlusion or simply due to a projection out of the camera scope. The interest of the thesis is focused on structured light which has been considered as one of the most frequently used techniques in order to reduce the problems related lo stereo vision. Structured light is based on the relationship between a projected light pattern its projection and an image sensor. The deformations between the pattern projected into the scene and the one captured by the camera, permits to obtain three dimensional information of the illuminated scene. This technique has been widely used in such applications as: 3D object reconstruction, robot navigation, quality control, and so on. Although the projection of regular patterns solve the problem of points without match, it does not solve the problem of multiple matching, which leads us to use hard computing algorithms in order to search the correct matches. In recent years, another structured light technique has increased in importance. This technique is based on the codification of the light projected on the scene in order to be used as a tool to obtain an unique match. Each token of light is imaged by the camera, we have to read the label (decode the pattern) in order to solve the correspondence problem. The advantages and disadvantages of stereo vision against structured light and a survey on coded structured light are related and discussed. The work carried out in the frame of this thesis has permitted to present a new coded structured light pattern which solves the correspondence problem uniquely and robust. Unique, as each token of light is coded by a different word which removes the problem of multiple matching. Robust, since the pattern has been coded using the position of each token of light with respect to both co-ordinate axis. Algorithms and experimental results are included in the thesis. The reader can see examples 3D measurement of static objects, and the more complicated measurement of moving objects. The technique can be used in both cases as the pattern is coded by a single projection shot. Then it can be used in several applications of robot vision. Our interest is focused on the mathematical study of the camera and pattern projector models. We are also interested in how these models can be obtained by calibration, and how they can be used to obtained three dimensional information from two correspondence points. Furthermore, we have studied structured light and coded structured light, and we have presented a new coded structured light pattern. However, in this thesis we started from the assumption that the correspondence points could be well-segmented from the captured image. Computer vision constitutes a huge problem and a lot of work is being done at all levels of human vision modelling, starting from a)image acquisition; b) further image enhancement, filtering and processing, c) image segmentation which involves thresholding, thinning, contour detection, texture and colour analysis, and so on. The interest of this thesis starts in the next step, usually known as depth perception or 3D measurement.
Resumo:
Presentation Outline -The elements of the jig-saw puzzle -Trends in financial results -Industry charcateristics and problems -Major constraints -Trends in load factors -Financing? -Traffic growth prospects -Productivity is the key -The environmental challenge -Summary of main points
Resumo:
En este artículo el autor explora los cambios ocurridos en la configuración mundial del poder después del 11 de septiembre el 2001. A manera de comparación, describe las manifestaciones del imperialismo en el pasado como formas de terrorismo practicado desde la metrópoli y en la actualidad como formas de terrorismo privado o contra Estados Unidos. El autor rastrea el uso, la utilidad y el ocaso del concepto de ""imperialismo"" y sugiere utilizar el concepto de ""poder de la colonialidad"" para comprender las modalidades coloniales, nacionales y globales del imperialismo. Finalmente y en diálogo con el subcomandante Marcos, el autor identifica y describe las cinco piezas del rompecabezas del imperialismo global actual.
Will the PRIPs' KID live up to its promise to protect investors? ECMI Commentary No. 33, 6 July 2012
Resumo:
Unveiled by the European Commission on July 3rd, the proposed Regulation on key information documents (KID) for packaged retail investment products (PRIPs) represents a step forward in enhancing the protection of retail investors and advancing the single market for financial services. While acknowledging in this Commentary that the KID is a commendable effort, ECMI/CEPS researcher Mirzha de Manuel Aramendía observes that pre-contractual disclosure is just one of the pieces in the jigsaw puzzle of investor protection and regrets that other pieces, such as MiFID and the IMD, are not so ambitiously constructed.
Resumo:
This article contributes to the debate on livelihood diversification in rural sub-Saharan Africa, focusing specifically on the growing economic importance of artisanal and small-scale mining (ASM) in the region. The precipitous decline in the value of many export crops and the removal of subsidies on crucial inputs such as fertilizers have made smallholder production unviable, forcing many farmers to ‘branch out’ into non-farm activities to supplement their incomes. One of the more popular destinations for poor farmers is the low-tech ASM sector which, because of its low barriers to entry, has absorbed millions of rural Africans over the past two decades, the majority of whom are engaged in the extraction of near-surface mineral deposits located on concessions that have been demarcated to multinational corporations. The efforts made hitherto to control this illegal mining activity, both through force and regulation, however, have had little effect, forcing many of the region’s governments and private sector partners to ‘re-think’ their approaches. One strategy that has gained considerable attention throughout the region is intensified support for agrarian-orientated activities, many of which, despite the problems plaguing smallholder agricultural sector and challenges with making it more economically sustainable, are being lauded as appropriate ‘alternative’ sources of employment to artisanal mining. After examining where artisanal mining fits into the de-agrarianization ‘puzzle’ in sub-Saharan Africa, the article critiques the efficacy of ‘re-agrarianization’ as a strategy for addressing the region’s illegal mining problem. A case study of Ghana is used to shed further light on these issues.
Resumo:
The number of properties to hold to achieve a well-diversified real estate property portfolio presents a puzzle, as the estimated number is considerably higher than that seen in actual portfolios. However, Statman (1987) argues that investors should only increase the number of holdings as long as the marginal benefits of diversification exceed their costs. Using this idea we find that the marginal benefits of diversification in real estate portfolios are so small that investors are probably rational in holding small portfolios, at least as far as the reduction in standard deviation is concerned.
Resumo:
One of the most vexing issues for analysts and managers of property companies across Europe has been the existence and persistence of deviations of Net Asset Values of property companies from their market capitalisation. The issue has clear links to similar discounts and premiums in closed-end funds. The closed end fund puzzle is regarded as an important unsolved problem in financial economics undermining theories of market efficiency and the Law of One Price. Consequently, it has generated a huge body of research. Although it can be tempting to focus on the particular inefficiencies of real estate markets in attempting to explain deviations from NAV, the closed end fund discount puzzle indicates that divergences between underlying asset values and market capitalisation are not a ‘pure’ real estate phenomenon. When examining potential explanations, two recurring factors stand out in the closed end fund literature as often undermining the economic rationale for a discount – the existence of premiums and cross-sectional and periodic fluctuations in the level of discount/premium. These need to be borne in mind when considering potential explanations for real estate markets. There are two approaches to investigating the discount to net asset value in closed-end funds: the ‘rational’ approach and the ‘noise trader’ or ‘sentiment’ approach. The ‘rational’ approach hypothesizes the discount to net asset value as being the result of company specific factors relating to such factors as management quality, tax liability and the type of stocks held by the fund. Despite the intuitive appeal of the ‘rational’ approach to closed-end fund discounts the studies have not successfully explained the variance in closed-end fund discounts or why the discount to net asset value in closed-end funds varies so much over time. The variation over time in the average sector discount is not only a feature of closed-end funds but also property companies. This paper analyses changes in the deviations from NAV for UK property companies between 2000 and 2003. The paper present a new way to study the phenomenon ‘cleaning’ the gearing effect by introducing a new way of calculating the discount itself. We call it “ungeared discount”. It is calculated by assuming that a firm issues new equity to repurchase outstanding debt without any variation on asset side. In this way discount does not depend on an accounting effect and the analysis should better explain the effect of other independent variables.
Resumo:
The concepts of rank, underdetermined systems and consistency in linear algebra are discussed in the context of a puzzle. The article begins with a specific example, moving on to a generalization of the example and then to the general n x n case. As well as providing a solution of the puzzle, the article aims to provide students with a greater understanding of these abstract ideas in linear algebra through the study of the puzzle.
Resumo:
Classical counterinsurgency theory – written before the 19th century – has generally strongly opposed atrocities, as have theoreticians writing on how to conduct insurgencies. For a variety of reasons – ranging from pragmatic to religious or humanitarian – theoreticians of both groups have particularly argued for the lenient treatment of civilians associated with the enemy camp, although there is a marked pattern of exceptions, for example, where heretics or populations of cities refusing to surrender to besieging armies are concerned. And yet atrocities – defined here as acts of violence against the unarmed (non-combatants, or wounded or imprisoned enemy soldiers), or needlessly painful and/or humiliating treatment of enemy combatants, beyond any action needed to incapacitate or disarm them – occur frequently in small wars. Examples abound where these exhortations have been ignored, both by forces engaged in an insurgency and by forces trying to put down a rebellion. Why have so many atrocities been committed in war if so many arguments have been put forward against them? This is the basic puzzle for which the individual contributions to this special issue are seeking to find tentative answers, drawing on case studies.
Resumo:
Background: Parental overprotection has commonly been implicated in the development and maintenance of childhood anxiety disorders. Overprotection has been assessed using questionnaire and observational methods interchangeably; however, the extent to which these methods access the same construct has received little attention. Edwards, 2008 and Edwards et al., 2010 developed a promising parent-report measure of overprotection (OP) and reported that, with parents of pre-school children, the measure correlated with observational assessments and predicted changes in child anxiety symptoms. We aimed to validate the use of the OP measure with mothers of children in middle childhood, and examine its association with child and parental anxiety. Methods: Mothers of 90 children (60 clinically anxious, 30 non-anxious) aged 7–12 years completed the measure and engaged in a series of mildly stressful tasks with their child. Results: The internal reliability of the measure was good and scores correlated significantly with observations of maternal overprotection in a challenging puzzle task. Contrary to expectations, OP was not significantly associated with child anxiety status or symptoms, but was significantly associated with maternal anxiety symptoms. Limitations: Participants were predominantly from affluent social groups and of non-minority status. Overprotection is a broad construct, the use of specific sub-dimensions of behavioural constructs may be preferable. Conclusions: The findings support the use of the OP measure to assess parental overprotection among 7–12 year-old children; however, they suggest that parental responses may be more closely related to the degree of parental rather than child anxiety.
Resumo:
In-work benefits have been introduced in a number of Bismarckian welfare regimes in a context of austerity despite being targeted at politically weak constituents and representing a deviation from prevailing welfare institutions. This article addresses this puzzle by looking at the introduction in 2008 of an in-work benefit scheme in France, the Active Income of Solidarity. The analysis reveals that this reform was the result of a cross-cutting alliance between the conservative party and employers, as well as parts of the socialist party and the union movement. The alliance was possible thanks to actors’ multiple interpretations of the reform. The reform was difficult to oppose given its support by experts and public opinion and because it entailed an increase in revenues for low-income workers.
Resumo:
Human ICT implants, such as RFID implants, cochlear implants, cardiac pacemakers, Deep Brain Stimulation, bionic limbs connected to the nervous system, and networked cognitive prostheses, are becoming increasingly complex. With ever-growing data processing functionalities in these implants, privacy and security become vital concerns. Electronic attacks on human ICT implants can cause significant harm, both to implant subjects and to their environment. This paper explores the vulnerabilities which human implants pose to crime victimisation in light of recent technological developments, and analyses how the law can deal with emerging challenges of what may well become the next generation of cybercrime: attacks targeted at technology implanted in the human body. After a state-of-the-art description of relevant types of human implants and a discussion how these implants challenge existing perceptions of the human body, we describe how various modes of attacks, such as sniffing, hacking, data interference, and denial of service, can be committed against implants. Subsequently, we analyse how these attacks can be assessed under current substantive and procedural criminal law, drawing on examples from UK and Dutch law. The possibilities and limitations of cybercrime provisions (eg, unlawful access, system interference) and bodily integrity provisions (eg, battery, assault, causing bodily harm) to deal with human-implant attacks are analysed. Based on this assessment, the paper concludes that attacks on human implants are not only a new generation in the evolution of cybercrime, but also raise fundamental questions on how criminal law conceives of attacks. Traditional distinctions between physical and non-physical modes of attack, between human bodies and things, between exterior and interior of the body need to be re-interpreted in light of developments in human implants. As the human body and technology become increasingly intertwined, cybercrime legislation and body-integrity crime legislation will also become intertwined, posing a new puzzle that legislators and practitioners will sooner or later have to solve.
Resumo:
European labour markets are increasingly divided between insiders in full-time permanent employment and outsiders in precarious work or unemployment. Using quantitative as well as qualitative methods, this thesis investigates the determinants and consequences of labour market policies that target these outsiders in three separate papers. The first paper looks at Active Labour Market Policies (ALMPs) that target the unemployed. It shows that left and right-wing parties choose different types of ALMPs depending on the policy and the welfare regime in which the party is located. These findings reconcile the conflicting theoretical expectations from the Power Resource approach and the insider-outsider theory. The second paper considers the regulation and protection of the temporary work sector. It solves the puzzle of temporary re-regulation in France, which contrasts with most other European countries that have deregulated temporary work. Permanent workers are adversely affected by the expansion of temporary work in France because of general skills and low wage coordination. The interests of temporary and permanent workers for re-regulation therefore overlap in France and left governments have an incentive to re-regulate the sector. The third paper then investigates what determines inequality between median and bottom income workers. It shows that non-inclusive economic coordination increases inequality in the absence of compensating institutions such as minimum wage regulation. The deregulation of temporary work as well as spending on employment incentives and rehabilitation also has adverse effects on inequality. Thus, policies that target outsiders have important economic effects on the rest of the workforce. Three broader contributions can be identified. First, welfare state policies may not always be in the interests of labour, so left parties may not always promote them. Second, the interests of insiders and outsiders are not necessarily at odds. Third, economic coordination may not be conducive to egalitarianism where it is not inclusive.
Resumo:
Why are some states more willing to adopt military innovations than others? Why, for example, were the great powers of Europe able to successfully reform their military practices to better adapt to and participate in the so-called military revolution of the sixteenth and seventeenth centuries while their most important extra-European competitor, the Ottoman Empire, failed to do so? This puzzle is best explained by two factors: civil-military relations and historical timing. In the Ottoman Empire, the emergence of an institutionally strong and internally cohesive army during the early stages of state formation—in the late fourteenth century—equipped the military with substantial bargaining powers. In contrast, the great powers of Europe drew heavily on private providers of military power during the military revolution and developed similar armies only by the second half of the seventeenth century, limiting the bargaining leverage of European militaries over their rulers. In essence, the Ottoman standing army was able to block reform efforts that it believed challenged its parochial interests. Absent a similar institutional challenge, European rulers initiated military reforms and motivated officers and military entrepreneurs to participate in the ongoing military revolution.