1000 resultados para Rychener, Ralph


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Concert program for Marriage of Figaro, January 22, 1940

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tese de doutoramento, Farmácia (Química Farmacêutica e Terapêutica), Universidade de Lisboa, Faculdade de Farmácia, 2016

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes an investigation of changes in image appearance when images are viewed at different image sizes on a high-end LCD device. Two digital image capturing devices of different overall image quality were used for recording identical natural scenes with a variety of pictorial contents. From each capturing device, a total of sixty four captured scenes, including architecture, nature, portraits, still and moving objects and artworks under various illumination conditions and recorded noise level were selected. The test set included some images where camera shake was purposefully introduced. An achromatic version of the image set that contained only lightness information was obtained by processing the captured images in CIELAB space. Rank order experiments were carried out to determine which image attribute(s) were most affected when the displayed image size was altered. These evaluations were carried out for both chromatic and achromatic versions of the stimuli. For the achromatic stimuli, attributes such as contrast, brightness, sharpness and noisiness were rank-ordered by the observers in terms of the degree of change. The same attributes, as well as hue and colourfulness, were investigated for the chromatic versions of the stimuli. Results showed that sharpness and contrast were the two most affected attributes with changes in displayed image size. The ranking of the remaining attributes varied with image content and illumination conditions. Further, experiments were carried out to link original scene content to the attributes that changed mostly with changes in image size.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Concert program for Die Fledermaus, November 18, 19, 21, and 22, 1977

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Concert program for The Consul March 2 & 5, 1966

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Concert program for An Evening of Opera Excerpts, December 4, 1965

Relevância:

10.00% 10.00%

Publicador:

Resumo:

É possível assistir nos dias de hoje, a um processo tecnológico evolutivo acentuado por toda a parte do globo. No caso das empresas, quer as pequenas, médias ou de grandes dimensões, estão cada vez mais dependentes dos sistemas informatizados para realizar os seus processos de negócio, e consequentemente à geração de informação referente aos negócios e onde, muitas das vezes, os dados não têm qualquer relacionamento entre si. A maioria dos sistemas convencionais informáticos não são projetados para gerir e armazenar informações estratégicas, impossibilitando assim que esta sirva de apoio como recurso estratégico. Portanto, as decisões são tomadas com base na experiência dos administradores, quando poderiam serem baseadas em factos históricos armazenados pelos diversos sistemas. Genericamente, as organizações possuem muitos dados, mas na maioria dos casos extraem pouca informação, o que é um problema em termos de mercados competitivos. Como as organizações procuram evoluir e superar a concorrência nas tomadas de decisão, surge neste contexto o termo Business Intelligence(BI). A GisGeo Information Systems é uma empresa que desenvolve software baseado em SIG (sistemas de informação geográfica) recorrendo a uma filosofia de ferramentas open-source. O seu principal produto baseia-se na localização geográfica dos vários tipos de viaturas, na recolha de dados, e consequentemente a sua análise (quilómetros percorridos, duração de uma viagem entre dois pontos definidos, consumo de combustível, etc.). Neste âmbito surge o tema deste projeto que tem objetivo de dar uma perspetiva diferente aos dados existentes, cruzando os conceitos BI com o sistema implementado na empresa de acordo com a sua filosofia. Neste projeto são abordados alguns dos conceitos mais importantes adjacentes a BI como, por exemplo, modelo dimensional, data Warehouse, o processo ETL e OLAP, seguindo a metodologia de Ralph Kimball. São também estudadas algumas das principais ferramentas open-source existentes no mercado, assim como quais as suas vantagens/desvantagens relativamente entre elas. Em conclusão, é então apresentada a solução desenvolvida de acordo com os critérios enumerados pela empresa como prova de conceito da aplicabilidade da área Business Intelligence ao ramo de Sistemas de informação Geográfica (SIG), recorrendo a uma ferramenta open-source que suporte visualização dos dados através de dashboards.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Brock's Junior Varsity crew of '76 pictured looking appropriately worn out after practice. Their shirts read "Brock Crew '76: Up Y'Oars" Cox: Kari Syri, Stroke: Ed Cooling, Ralph Martens, Paul Kivell, Don Rickers, Sean Stackwood, Clark Wochis, Jack Pyke, Bow: Bruce Petrie, Coach (the leg on the boat): Tony Biernacki.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Eleanor Misener was Ralph Misener's mother and it is she that the Aquatic Centre is named after. Ralph Misener was the fourth Chancellor of Brock University.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The conceptualization of childhood has changed over the centuries and appears to be undergoing further change in our post-modern culture. While the United Nations Convention on the Right of the Child is designed to give children everywhere basic human rights while taking into consideration their special needs, no recent research has examined adult attitudes toward those rights. In an attempt to understand the attitudes adults hold regarding autonomy rights and to look for some factors that could predict those attitudes, the current study considers values, parenting style, emotions and the issue of parent status as possible predictor variables. A total of 90 participants took part in the research, which had both written and interview components. Results generally failed to establish a reliable set of predictors. However, some interesting information was obtained regarding the endorsement of children's autonomy rights and some general conclusions were reached about our view of children and their rights at the end of the twentieth century.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ontario Editorial Bureau (O.E.B.)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A practical military manual for officers in the Royal Regiment of Artillery. It combines training and field service manuals with lists of equipment, weights, dimensions, and equipment accuracy and performance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Key agreement is a cryptographic scenario between two legitimate parties, who need to establish a common secret key over a public authenticated channel, and an eavesdropper who intercepts all their messages in order to learn the secret. We consider query complexity in which we count only the number of evaluations (queries) of a given black-box function, and classical communication channels. Ralph Merkle provided the first unclassified scheme for secure communications over insecure channels. When legitimate parties are willing to ask O(N) queries for some parameter N, any classical eavesdropper needs Omega(N^2) queries before being able to learn their secret, which is is optimal. However, a quantum eavesdropper can break this scheme in O(N) queries. Furthermore, it was conjectured that any scheme, in which legitimate parties are classical, could be broken in O(N) quantum queries. In this thesis, we introduce protocols à la Merkle that fall into two categories. When legitimate parties are restricted to use classical computers, we offer the first secure classical scheme. It requires Omega(N^{13/12}) queries of a quantum eavesdropper to learn the secret. We give another protocol having security of Omega(N^{7/6}) queries. Furthermore, for any k>= 2, we introduce a classical protocol in which legitimate parties establish a secret in O(N) queries while the optimal quantum eavesdropping strategy requires Theta(N^{1/2+k/{k+1}}) queries, approaching Theta(N^{3/2}) when k increases. When legitimate parties are provided with quantum computers, we present two quantum protocols improving on the best known scheme before this work. Furthermore, for any k>= 2, we give a quantum protocol in which legitimate parties establish a secret in O(N) queries while the optimal quantum eavesdropping strategy requires Theta(N^{1+{k}/{k+1}})} queries, approaching Theta(N^{2}) when k increases.

Relevância:

10.00% 10.00%

Publicador: