942 resultados para Smallest space analysis


Relevância:

100.00% 100.00%

Publicador:

Resumo:

En esta investigación, se busca comprender los procesos de formación de pregrado del Curso de Cartas da UFRN, de estas representaciones sociales acerca de los estudiantes de enseñanza. Por lo tanto, el objetivo fue conocer y analizar las representaciones sociales de curso de pregrado UFRN Cartas sobre la enseñanza. Por lo tanto, se aplica la Técnica de Libre de Palabras Asociación (TALP) con 20 participantes, después de haber sido probados individualmente, utilizando como estímulo palabra "enseñar" y limitar el número de invocaciones a 03 palabras por participante. Esta técnica fue elegida porque es una técnica proyectiva que permite la reducción y racionalización permite acceder al campo semántico de las representaciones sociales, en nuestro caso, en la enseñanza del de pregrado do Curso de Cartas da UFRN. Por lo tanto, llegamos a total de 60 llamadas, análisis de frecuencia después de 41 y 24 después de un análisis del significado que se utilizaron en otro procedimiento aplicado en esta investigación, las calificaciones de Procedimiento de Múltiples Calificaciones (PCM). Estas palabras, sobre la base de las justificaciones de las evocaciones y significados que atribuyen participantes en la investigación, se dividieron en 4 campos semánticos: Campo 1: Aspectos técnicos de la enseñanza, Campo 2: aspectos volitivos, Campo 3: aspectos relacionales de la enseñanza y de Campo 4: Elementos del campo. El PCM se aplicó de forma individual, con 50 estudiantes. Para el análisis de los datos generados, utilizamos Análisis Multidimensional (MDS) para la Escala Multidimensional de Evaluación Análisis gratuito (MSA: Multidimensional Scalogram Analysis) y el análisis de clasificación selectiva de los espacios menores (SSA: Smallest Space Analysis). El mapa generado por el análisis de MSA fue dividido en tres regiones: Aspectos de los aspectos de enseñanza, capacitación y asistencia técnica de los promotores de la profesionalización, la primera región que tiene una sub-regionalización llamada dimensión negativa. El mapa de la SSA análisis se dividió en dos partes y un subfaceta, llamado el aspecto faceta técnica de la enseñanza y la formación, la segunda faceta llamado Vínculo entre el campo y la enseñanza específica y su nombre subfaceta aspecto relacional. Del análisis del contenido de las justificaciones de la PCM, llegó a 5 categorías, a saber: Hacer la enseñanza, la faceta negativa, Escuela, Formación y faceta afectiva del profesor. El TALP aporta pruebas de que algunos de estos estudiantes ve la oportunidad de adquirir unos conocimientos en esta área, la formación en un nivel superior, como quieran, simplemente tienen un título universitario para realizar licitación abierta. El PCM nos ha hecho comprender que el contenido representacional en cuestión se configura desde el universo consensual conectado a la profesión y la formación. Por lo tanto, podemos decir que los titulares de licencias con respecto al tema estudiado anclar la representación social de "enseñar" a la imagen de ser un maestro y objetivar la imagen de la profesión

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is a limited amount of research in the area of missing persons, especially adults. The aim of this research is to expand on the understanding of missing people, by examining adults' behaviours while missing and determining if distinct behavioural themes exist. Based on previous literature it was hypothesised that three behavioural themes will be present; dysfunctional, escape, and unintentional. Thirty-six behaviours were coded from 362 missing person police reports and analysed using smallest space analysis (SSA). This produced a spatial representation of the behaviours, showing three distinct behavioural themes. Seventy percent of the adult missing person reports were classified under one dominant theme, 41% were ‘unintentional’, 18% were ‘dysfunctional’, and 11% were ‘escape’. The relationship between a missing person's dominant behavioural theme and their assigned risk level and demographic characteristics were also analysed. A significant association was found between the age, occupational status, whether they had any mental health issues, and the risk level assigned to the missing person; and their dominant behavioural theme. The findings are the first step in the development of a standardised checklist for a missing person investigation. This has implications on how practitioners prioritise missing adults, and interventions to prevent individuals from going missing. Copyright © 2016 John Wiley & Sons, Ltd.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The first two articles build procedures to simulate vector of univariate states and estimate parameters in nonlinear and non Gaussian state space models. We propose state space speci fications that offer more flexibility in modeling dynamic relationship with latent variables. Our procedures are extension of the HESSIAN method of McCausland[2012]. Thus, they use approximation of the posterior density of the vector of states that allow to : simulate directly from the state vector posterior distribution, to simulate the states vector in one bloc and jointly with the vector of parameters, and to not allow data augmentation. These properties allow to build posterior simulators with very high relative numerical efficiency. Generic, they open a new path in nonlinear and non Gaussian state space analysis with limited contribution of the modeler. The third article is an essay in commodity market analysis. Private firms coexist with farmers' cooperatives in commodity markets in subsaharan african countries. The private firms have the biggest market share while some theoretical models predict they disappearance once confronted to farmers cooperatives. Elsewhere, some empirical studies and observations link cooperative incidence in a region with interpersonal trust, and thus to farmers trust toward cooperatives. We propose a model that sustain these empirical facts. A model where the cooperative reputation is a leading factor determining the market equilibrium of a price competition between a cooperative and a private firm

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The use of Trusted Platform Module (TPM) is be- coming increasingly popular in many security sys- tems. To access objects protected by TPM (such as cryptographic keys), several cryptographic proto- cols, such as the Object Specific Authorization Pro- tocol (OSAP), can be used. Given the sensitivity and the importance of those objects protected by TPM, the security of this protocol is vital. Formal meth- ods allow a precise and complete analysis of crypto- graphic protocols such that their security properties can be asserted with high assurance. Unfortunately, formal verification of these protocols are limited, de- spite the abundance of formal tools that one can use. In this paper, we demonstrate the use of Coloured Petri Nets (CPN) - a type of formal technique, to formally model the OSAP. Using this model, we then verify the authentication property of this protocol us- ing the state space analysis technique. The results of analysis demonstrates that as reported by Chen and Ryan the authentication property of OSAP can be violated.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This thesis evaluates the security of Supervisory Control and Data Acquisition (SCADA) systems, which are one of the key foundations of many critical infrastructures. Specifically, it examines one of the standardised SCADA protocols called the Distributed Network Protocol Version 3, which attempts to provide a security mechanism to ensure that messages transmitted between devices, are adequately secured from rogue applications. To achieve this, the thesis applies formal methods from theoretical computer science to formally analyse the correctness of the protocol.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Primary voice production occurs in the larynx through vibrational movements carried out by vocal folds. However, many problems can affect this complex system resulting in voice disorders. In this context, time-frequency-shape analysis based on embedding phase space plots and nonlinear dynamics methods have been used to evaluate the vocal fold dynamics during phonation. For this purpose, the present work used high-speed video to record the vocal fold movements of three subjects and extract the glottal area time series using an image segmentation algorithm. This signal is used for an optimization method which combines genetic algorithms and a quasi-Newton method to optimize the parameters of a biomechanical model of vocal folds based on lumped elements (masses, springs and dampers). After optimization, this model is capable of simulating the dynamics of recorded vocal folds and their glottal pulse. Bifurcation diagrams and phase space analysis were used to evaluate the behavior of this deterministic system in different circumstances. The results showed that this methodology can be used to extract some physiological parameters of vocal folds and reproduce some complex behaviors of these structures contributing to the scientific and clinical evaluation of voice production. (C) 2010 Elsevier Inc. All rights reserved.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Arrhythmia is one kind of cardiovascular diseases that give rise to the number of deaths and potentially yields immedicable danger. Arrhythmia is a life threatening condition originating from disorganized propagation of electrical signals in heart resulting in desynchronization among different chambers of the heart. Fundamentally, the synchronization process means that the phase relationship of electrical activities between the chambers remains coherent, maintaining a constant phase difference over time. If desynchronization occurs due to arrhythmia, the coherent phase relationship breaks down resulting in chaotic rhythm affecting the regular pumping mechanism of heart. This phenomenon was explored by using the phase space reconstruction technique which is a standard analysis technique of time series data generated from nonlinear dynamical system. In this project a novel index is presented for predicting the onset of ventricular arrhythmias. Analysis of continuously captured long-term ECG data recordings was conducted up to the onset of arrhythmia by the phase space reconstruction method, obtaining 2-dimensional images, analysed by the box counting method. The method was tested using the ECG data set of three different kinds including normal (NR), Ventricular Tachycardia (VT), Ventricular Fibrillation (VF), extracted from the Physionet ECG database. Statistical measures like mean (μ), standard deviation (σ) and coefficient of variation (σ/μ) for the box-counting in phase space diagrams are derived for a sliding window of 10 beats of ECG signal. From the results of these statistical analyses, a threshold was derived as an upper bound of Coefficient of Variation (CV) for box-counting of ECG phase portraits which is capable of reliably predicting the impeding arrhythmia long before its actual occurrence. As future work of research, it was planned to validate this prediction tool over a wider population of patients affected by different kind of arrhythmia, like atrial fibrillation, bundle and brunch block, and set different thresholds for them, in order to confirm its clinical applicability.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The meaning of work is a construct that has been studied more systematically from the 80s, through various approaches and in different occupational categories. This dissertation aims to describe and discuss the meanings of work for construction workers. This is an empirical study whose research supports herself in the Model Attributes Meaning of Work and its respective instrument for measuring the Meaning of Work Inventory (STI). The research involved 402 workers in the construction industry sector in the two capitals of the Brazilian Northeast, with a mean age of 35.8 years (SD = 11.4). To collect the data, besides the IST, the Working Conditions Questionnaire and sociodemographic data were also used. Data were organized and analyzed using the SPSS program. The study used data analysis techniques to Smallest Space Analisys (SSA), descriptive statistics, correlation and analysis of variance. There was evidence of validity of the STI which was structured into five types of value attributes (what work should be), and seven types of descriptive attributes (what is working). The results showed that the work has high centrality and profiling for participants after the family, the most important aspect in the lives of workers. Aspects of personal and economic growth were more emphasized in definition of what the work should be and responsibility and effort were characteristics that best described the reality of work.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Privacy enhancing protocols (PEPs) are a family of protocols that allow secure exchange and management of sensitive user information. They are important in preserving users’ privacy in today’s open environment. Proof of the correctness of PEPs is necessary before they can be deployed. However, the traditional provable security approach, though well established for verifying cryptographic primitives, is not applicable to PEPs. We apply the formal method of Coloured Petri Nets (CPNs) to construct an executable specification of a representative PEP, namely the Private Information Escrow Bound to Multiple Conditions Protocol (PIEMCP). Formal semantics of the CPN specification allow us to reason about various security properties of PIEMCP using state space analysis techniques. This investigation provides us with preliminary insights for modeling and verification of PEPs in general, demonstrating the benefit of applying the CPN-based formal approach to proving the correctness of PEPs.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The use of appropriate features to characterise an output class or object is critical for all classification problems. In order to find optimal feature descriptors for vegetation species classification in a power line corridor monitoring application, this article evaluates the capability of several spectral and texture features. A new idea of spectral–texture feature descriptor is proposed by incorporating spectral vegetation indices in statistical moment features. The proposed method is evaluated against several classic texture feature descriptors. Object-based classification method is used and a support vector machine is employed as the benchmark classifier. Individual tree crowns are first detected and segmented from aerial images and different feature vectors are extracted to represent each tree crown. The experimental results showed that the proposed spectral moment features outperform or can at least compare with the state-of-the-art texture descriptors in terms of classification accuracy. A comprehensive quantitative evaluation using receiver operating characteristic space analysis further demonstrates the strength of the proposed feature descriptors.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

To provide privacy protection, cryptographic primitives are frequently applied to communication protocols in an open environment (e.g. the Internet). We call these protocols privacy enhancing protocols (PEPs) which constitute a class of cryptographic protocols. Proof of the security properties, in terms of the privacy compliance, of PEPs is desirable before they can be deployed. However, the traditional provable security approach, though well-established for proving the security of cryptographic primitives, is not applicable to PEPs. We apply the formal language of Coloured Petri Nets (CPNs) to construct an executable specification of a representative PEP, namely the Private Information Escrow Bound to Multiple Conditions Protocol (PIEMCP). Formal semantics of the CPN specification allow us to reason about various privacy properties of PIEMCP using state space analysis techniques. This investigation provides insights into the modelling and analysis of PEPs in general, and demonstrates the benefit of applying a CPN-based formal approach to the privacy compliance verification of PEPs.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Reducing complexity in Information Systems is a main concern in both research and industry. One strategy for reducing complexity is separation of concerns. This strategy advocates separating various concerns, like security and privacy, from the main concern. It results in less complex, easily maintainable, and more reusable Information Systems. Separation of concerns is addressed through the Aspect Oriented paradigm. This paradigm has been well researched and implemented in programming, where languages such as AspectJ have been developed. However, the rsearch on aspect orientation for Business Process Management is still at its beginning. While some efforts have been made proposing Aspect Oriented Business Process Modelling, it has not yet been investigated how to enact such process models in a Workflow Management System. In this paper, we define a set of requirements that specifies the execution of aspect oriented business process models. We create a Coloured Petri Net specification for the semantics of so-called Aspect Service that fulfils these requirements. Such a service extends the capability of a Workflow Management System with support for execution of aspect oriented business process models. The design specification of the Aspect Service is also inspected through state space analysis.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A class of self-propagating linear and nonlinear travelling wave solutions for compressible rotating fluid is studied using both numerical and analytical techiques. It is shown that, in general, a three dimensional linear wave is not periodic. However, for some range of wave numbers depending on rotation, horizontally propagating waves are periodic. When the rotation ohgr is equal to $$\sqrt {(\gamma - 1)/(4\gamma )}$$ , all horizontal waves are periodic. Here, gamma is the ratio of specific heats. The analytical study is based on phase space analysis. It reveals that the quasi-simple waves are periodic only in some plane, even when the propagation is horizontal, in contrast to the case of non-rotating flows for which there is a single parameter family of periodic solutions provided the waves propagate horizontally. A classification of the singular points of the governing differential equations for quasi-simple waves is also appended.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

[EN] Atemschaukel approaches the falling apart and survival in a historically loaded space, such as a labour camp. This novel offers a relevant research field for the space analysis, focused from the perspective of the Spatial Turn, as not only this theoretical frame but also Herta Müller herself conceive of space as a process, unterstood as a reciprocal interaction with the social practice, thus as a spatial and social construct. The representation of space in Atemschaukel is described in this article as a “swinging movement between boxes and abyss”, where the discourse of Leopold Auberg’s memories oscillates between closed and square spaces, on one hand, and open and giddy spaces, on the other hand. In this oscillating movement it is the open spaces that will most clearly show the process of inner destruction of the subject in such oppressive situations as on labour camps, as well as the permanent damages of deportation.