955 resultados para manipulation


Relevância:

10.00% 10.00%

Publicador:

Resumo:

When asked to compare two lateralized shapes for horizontal size, neglect patients often indicate the left stimulus to be smaller. Gainotti and Tiacci (1971) hypothesized that this phenomenon might be related to a rightward bias in the patients' gaze. This study aimed to assess the relation between this size underestimation and oculomotor asymmetries. Eye movements were recorded while three neglect patients judged the horizontal extent of two rectangles. Two experimental manipulations were performed to increase the likelihood of symmetrical scanning of the stimulus display. The first manipulation entailed a sequential, rather than simultaneous presentation of the two rectangles. The second required adaptation to rightward displacing prisms, which is known to reduce many manifestations of neglect. All patients consistently underestimated the left rectangle, but the pattern of verbal responses and eye movements suggested different underlying causes. These include a distortion of space perception without ocular asymmetry, a failure to view the full leftward extent of the left stimulus, and a high-level response bias. Sequential presentation of the rectangles and prism adaptation reduced ocular asymmetries without affecting size underestimation. Overall, the results suggest that leftward size underestimation in neglect can arise for a number of different reasons. Incomplete leftward scanning may perhaps be sufficient to induce perceptual size distortion, but it is not a necessary prerequisite.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Throughout the latter months of 2000 and early 2001, the Australian public, media and parliament were engaged in a long and emotive debate about motherhood. This debate constructed the two main protagonists, the unborn 'child' and the potential mother, with a variety of different and often oppositional identities. The article looks at the way that these subject identities interacted during the debate, starting from the premise that policy making has unintended and unacknowledged material outcomes, and using governmentality as a tool through which to analyse and understand processes of identity manipulation and resistance within policy making. The recent debate concerning the right of lesbian and single women to access new reproductive technologies in Australia is used as a case study. Nominally the debate was about access to IVF technology; in reality, however, the debate was about the governing of women and, in particular, the governing of motherhood identities. The article focuses on the parliamentary debate over the drafting of legislation designed to stop lesbian and single women from accessing these technologies, particularly the utilization of the 'unborn' subject within these debates as a device to discipline the identity of 'mother'.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Este paper defende duas id??ias. A primeira, ?? apresentar os diferentes processos da reforma do Estado mexicano, analisados sob as prioridades diversas no decorrer do tempo. As reformas econ??mica, pol??tica, social e administrativa tiveram prioridades e objetivos divergentes. A reforma econ??mica foi sistem??tica e congruente, a pol??tica foi defensiva e pouco abrangente, e a social foi problem??tica e confusa. A reforma administrativa foi, comparativamente, limitada. Uma proposta para desenvolver um sistema administrativo respons??vel pelo servi??o p??blico foi postergada nos ??ltimos 12 anos at?? que, em maio de 1997, finalmente a atual administra????o prop??s um programa de moderniza????o. A segunda id??ia ?? que, mesmo que a atual administra????o tenha a inten????o de desenvolver um novo sistema de accountability e um plano de carreira para o servi??o p??blico, parece plaus??vel que a tradicional pol??tica de controle, atrav??s da estrutura administrativa, possa ser prejudicada se essas propostas realmente reduzirem o poder discricion??rio dos altos cargos p??blicos e submeterem reservas p??blicas a um esquema de controle social mais aberto e formal. Logo, ?? poss??vel dizer que a alternativa escolhida pelos reformistas foi usar uma abordagem gerenciadora, onde a melhoria dos procedimentos e a implementa????o de algumas t??cnicas administrativas avan??adas substituem, pelo menos at?? agora, uma transforma????o mais profunda da estrutura administrativa. Uma estrat??gia de gerenciamento permite, pelo menos at?? o momento, a melhoria dos servi??os atrav??s do aumento da participa????o de servidores p??blicos, sem prejudicar a atual administra????o, como um instrumento para implementar diferentes agendas pol??ticas usando recursos p??blicos. Nosso argumento ?? que, como o programa de moderniza????o est?? sendo implantado, ?? importante estudar minuciosamente as possibilidades de se implementar a reforma do servi??o p??blico e melhorar a responsabilidade do sistema, dada a particular rela????o que existe entre a administra????o p??blica e o sistema pol??tico no M??xico.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Como em toda interação há o desejo de construir perante os outros uma imagem favorável de si próprio (Goffman, 1967), as entrevistas constituem-se em um espaço de confronto, já que é impossível controlar a imagem que um participante faz do outro. Sendo assim, neste trabalho, faz-se uma análise discursivo-pragmática de entrevistas impressas, tendo como base a noção de face, elaborada por Goffman (1967); a Teoria da Polidez, de Brown e Levinson (1987) e a noção de tópico discursivo como princípio de organização textual-discursiva, Koch (1992), Jubran (1992) e Lins (2008). Deste modo, focaliza-se o contexto de interação verbal em entrevistas a figuras do cenário político estadual/nacional realizadas pelo Jornal A Gazeta, publicadas nos anos de 2004, 2006 e 2008. Nas entrevistas, observa-se como acontecem os atos de ameaça às faces positiva e negativa na relação entrevistador-entrevistado, bem como quais estratégias de polidez eles utilizam para salvar e preservar as suas faces a partir do gerenciamento do tópico discursivo, tendo em vista que os atos de ameaça às faces positiva e negativa podem ser minimizados a partir de estratégias de manipulação do tópico. As principais questões que norteiam este estudo são: a necessidade de construção de face positiva é situação sine qua non para convivência social? É característico no gênero Entrevista a manipulação do tópico como estratégia de preservação de face? Quais estratégias de manipulação de tópico discursivo caracterizam a preservação de face? Dessa forma, esta pesquisa se põe relevante no interior das pesquisas sobre linguagem, uma vez que nela são tecidas reflexões sobre questões muito discutidas pela academia ultimamente, porém de forma separada: manipulação do tópico discursivo, no âmbito da Linguística Textual, e preservação de face, no âmbito da Pragmática.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Laparoscopy is a surgical procedure on which operations in the abdomen are performed through small incisions using several specialized instruments. The laparoscopic surgery success greatly depends on surgeon skills and training. To achieve these technical high-standards, different apprenticeship methods have been developed, many based on in vivo training, an approach that involves high costs and complex setup procedures. This paper explores Virtual Reality (VR) simulation as an alternative for novice surgeons training. Even though several simulators are available on the market claiming successful training experiences, their use is extremely limited due to the economic costs involved. In this work, we present a low-cost laparoscopy simulator able to monitor and assist the trainee’s surgical movements. The developed prototype consists of a set of inexpensive sensors, namely an accelerometer, a gyroscope, a magnetometer and a flex sensor, attached to specific laparoscopic instruments. Our approach allows repeated assisted training of an exercise, without time constraints or additional costs, since no human artificial model is needed. A case study of our simulator applied to instrument manipulation practice (hand-eye coordination) is also presented.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The objective of the present study was the exogenous stimulation of ovarian activity and definition of embryo collection, and transfer protocols, in the domestic cat for potential application in non-domestic endangered species. Sixteen adult queens and two adult male reproducers kept in the experimental cat house at the Morphology sector at the Veterinary Department (DVT), UFV, were used in this study. All the queens received a single application of 150 IU Equine Chorionic Gonadotropin (eCG) in the post estrus to induce ovarian activity and 80 to 84 hours later, received a single application of 100 UI Human Chorionic Gonadotropin (hCG) to induce ovulation. After hCG application, only the donor queens were naturally mated. The receptor queens received extra stimulus for induction of ovulation through manipulation of an intravaginal swab. Five to six days after hCG application, the donor queens were subjected to a laparotomy for embryo collection that was performed by trans-horn uterine washing. On average, six embryos were surgically inovulated. They were classified as type I and III compact morula and blastocysts in four receptor queens. Three animals presented pregnancy confirmed by ultrasound at day 36 and two of these animals gave birth to litters of two and four offsprings, respectively, at 66 and 63 days after induction of ovulation. Except for one still birth, all the offspring developed normally.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

What sort of component coordination strategies emerge in a software integration process? How can such strategies be discovered and further analysed? How close are they to the coordination component of the envisaged architectural model which was supposed to guide the integration process? This paper introduces a framework in which such questions can be discussed and illustrates its use by describing part of a real case-study. The approach is based on a methodology which enables semi-automatic discovery of coordination patterns from source code, combining generalized slicing techniques and graph manipulation

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The evolution of computer animation represents one of the most relevant andrevolutionary aspects in the rise of contemporary digital visual culture (Darlew,2000), in particular, phenomena such as cinema “spectacular “ (Ibidem) and videogames. This article analyzes the characteristics of this “culture of simulation” (Turkle, 1995:20) relating the multidisciplinary and spectrum of technical and stylistic choices to the dimension of virtual characters acting. The result of these hybrid mixtures and computerized human motion capture techniques - called virtual cinema, universal capture, motion capture, etc. - cosists mainly on the sophistication of “rotoscoping”, as a new interpretation and appropriation of the captured image. This human motion capture technology, used largely by cinema and digital games, is one of the reasons why the authenticity of the animation is sometimes questioned. It is in the fi eld of 3D computer animation visual that this change is more signifi cant, appearing regularly innovative techniques of image manipulation and “hyper-cinema” (Lamarre, 2006: 31) character’s control with deeper sense of emotions. This shift in the culture that Manovich (2006: 27) calls “photo-GRAPHICS” - and Mulvey (2007) argue that creates a new form of possessive relationship with the viewer, in that it can analyze in detail the image, it can acquire it and modify it - is one of the most important aspects in the rise of Cubbit’s (2007) “cinema of attraction”. This article delves intrinsically into the analyze of virtual character animation — particularly in the fi eld of 3D computer animation and human digital acting.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

É possível encontrar nos mercados de valores mobiliários e/ou outros instrumentos financeiros e/ou nas chamadas bolsas de valores - éticas concretas, reais e definidas? Pensamos que sim. Os fundos éticos são apenas uma das espécies de fundos. Abstract: You can find in the securities markets and / or other financial instruments and / or in so-called exchanges - concrete ethical, real and defined? We think so. Ethical funds are only one species of funds.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ouvimos também muitos a falar em branqueamento de capitais, crimes financeiros, abuso de informação, manipulação do mercado, etc.. Salvo o devido respeito, contudo, poucos sabem o quão difícil é a prova destes crimes! Sabiam que p.e. até meados de 2008, crimes como o abuso de informação ou a manipulação do mercado eram insusceptíveis de interferência nas comunicações?! Sabiam que até hoje, o Código dos Valores Mobiliários não prevê a criminalização das pessoas colectivas e, portanto, dos próprios bancos?! Abstract: We hear too many to talk about money laundering, financial crimes, insider trading, market manipulation, etc .. Unless all due respect, however, few know how hard it is to prove that the crimes! Standing knew that by mid-2008, crimes such as dealing or market manipulation were incapable of interference in communications ?! They knew that to date, the Securities Code does not provide for the criminalization of legal persons and therefore the banks themselves ?!

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nanotechnology is the manipulation of matter on na almost atomic scale to produce new structures, materials, and devices. As potential occupational exposure to nanomaterials (NMs) becomes more prevalente, it is importante that the principles of medical surveillance and risk management be considered for workers in the nanotechnology industry.However, much information about health risk is beyond our current knowledge. Thus, NMs presente new challenges to understanding, predicting, andmanageing potential health risks. First, we briefly describe some general features of NMs and list the most importante types of NMs. This review discusses the toxicological potential of NMs by comparing possible injury mechanism and know, or potentially adverse, health effects. We review the limited research to date for occupational exposure to these particles and how a worker might be exposed to NMs. The principles of medical surveillance are reviewed to further the discussion of occupational health surveillance are reviewed to further the discussion of occupational health surveillance for workers exposed to NMs. We outlinehow occupational health professionals could contribute to a better knowledge of health effects by the utilization of a health surveillance program and by minimizing exposure. Finally, we discuss the early steps towards regulation and the difficulties facing regulators in controlling potentially harmful exposures in the absence of suficiente scientific evidence.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Os crimes de abuso de informação privilegiada e manipulação do mercado estão em relação com a responsabilidade penal das pessoas colectivas como os bancos e com a chamada globalização. § The crimes of insider trading and market manipulation abuse are in relation to the criminal liability of legal persons such as banks and so-called globalization.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Neste texto, pretendemos explorar as possibilidades de manipulação de sons num contexto de realidade aumentada (AR) através da utilização de robots. Utilizamos o comportamento aleatório dos robots, num espaço circunscrito para a modulação em tempo real de duas características do som: a amplitude e a frequência. Acrescentamos a possibilidade de interacção com estes robots dando a oportunidade ao utilizador de manipular a interface física, colocando markers no espaço de acção que alterem o comportamento dos robots e, por conseguinte, o resultado sonoro produzido. Pretendemos demonstrar que através de agentes, programação de aleatórios e manipulação directa desta aplicação, se pode gerar empatia na interacção e atingir resultados sonoros específicos, difíceis de reproduzir de outra forma devido aos ciclos infinitos que a interacção promove.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

RESUMO: O objectivo desta investigação foi analisar as diferenças relativas à produção de recordações falsas, de acordo com o paradigma de associados convergentes. Foram realizadas experiências, nas quais participaram crianças entre os 4 e os 5 anos e adultos. Como metodologia adoptámos a apresentação de dez listas de palavras associadas a uma palavra não incluída na lista (palavra crítica). A ordem das palavras de cada lista foi manipulada de forma a ser apresentada em sentido decrescente de força associativa (ordem standard) ou em sentido crescente (ordem invertida). A instrução fornecida antes da apresentação das listas foi também manipulada nas crianças de forma a incluir uma condição em que se pedia para as crianças repetirem os primeiros três itens de cada lista com o intuito de aumentar a recordação desses itens (instrução de primazia). A predição inicial foi de que este tipo de manipulação ao aumentar a recordação dos itens mais fortemente associados ao item crítico poderia também levar a um aumento das recordações falsas relativas ao item crítico. Os resultados mostraram que a instrução de primazia não teve efeito na produção de memórias falsas e que, nas crianças o uso de listas invertidas diminuiu o número evocações falsas, não tendo qualquer efeito nos adultos. Não foram encontradas diferenças estatisticamente significativas entre as crianças e os adultos relativamente à produção de memórias falsas. ABSTRACT: The purpose of this investigation was to analyze the differences in the production of false memories, according to the paradigm of converging associates. Experiments were carried out, which involved children between 4 and 5 and adults. The methodology adopted was the presentation of ten lists of words associated with a word not included in the list (critical word). The word order of each list was manipulated so as to be presented in descending order of associative strength (standard order) or an increasing trend (inverted order). The instruction given prior to the presentation of lists was also manipulated, in children, to include a condition in which it was asked children to repeat the first three items in each list in order to increase the recall of these items (primacy' instruction). The initial prediction was that this kind of manipulation witch increase the recall of the items most strongly associated with the critical item could also lead to an increase in false memories relative to the critical item. The results showed that the primacy instruction had no effect on production of false memories and that, in children the use of inverted lists reduced the number of false evocations and has no effect in adults. There were no statistically significant differences between children and adults for the production of false memories.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

One of the major problems that prevents the spread of elections with the possibility of remote voting over electronic networks, also called Internet Voting, is the use of unreliable client platforms, such as the voter's computer and the Internet infrastructure connecting it to the election server. A computer connected to the Internet is exposed to viruses, worms, Trojans, spyware, malware and other threats that can compromise the election's integrity. For instance, it is possible to write a virus that changes the voter's vote to a predetermined vote on election's day. Another possible attack is the creation of a fake election web site where the voter uses a malicious vote program on the web site that manipulates the voter's vote (phishing/pharming attack). Such attacks may not disturb the election protocol, therefore can remain undetected in the eyes of the election auditors. We propose the use of Code Voting to overcome insecurity of the client platform. Code Voting consists in creating a secure communication channel to communicate the voter's vote between the voter and a trusted component attached to the voter's computer. Consequently, no one controlling the voter's computer can change the his/her's vote. The trusted component can then process the vote according to a cryptographic voting protocol to enable cryptographic verification at the server's side.