957 resultados para by example
Resumo:
In multivariate time series analysis, the equal-time cross-correlation is a classic and computationally efficient measure for quantifying linear interrelations between data channels. When the cross-correlation coefficient is estimated using a finite amount of data points, its non-random part may be strongly contaminated by a sizable random contribution, such that no reliable conclusion can be drawn about genuine mutual interdependencies. The random correlations are determined by the signals' frequency content and the amount of data points used. Here, we introduce adjusted correlation matrices that can be employed to disentangle random from non-random contributions to each matrix element independently of the signal frequencies. Extending our previous work these matrices allow analyzing spatial patterns of genuine cross-correlation in multivariate data regardless of confounding influences. The performance is illustrated by example of model systems with known interdependence patterns. Finally, we apply the methods to electroencephalographic (EEG) data with epileptic seizure activity.
Resumo:
Systems must co-evolve with their context. Reverse engineering tools are a great help in this process of required adaption. In order for these tools to be flexible, they work with models, abstract representations of the source code. The extraction of such information from source code can be done using a parser. However, it is fairly tedious to build new parsers. And this is made worse by the fact that it has to be done over and over again for every language we want to analyze. In this paper we propose a novel approach which minimizes the knowledge required of a certain language for the extraction of models implemented in that language by reflecting on the implementation of preparsed ASTs provided by an IDE. In a second phase we use a technique referred to as Model Mapping by Example to map platform dependent models onto domain specific model.
Resumo:
From the Introduction. In 2010 the martyring of Mohamed Bouazizi began a ripple of civil uprisings across the Middle East, and would lead to a wave of revolutions that the media would dub the Arab Spring. From North Africa to the Gulf Region, these civil uprisings made major headlines but found little intervention on behalf of world superpowers such as the United States or the European Union. Acting as more of an observer than as an active participant in these revolutions, it would seem that the European Union played a small role in preventing civil unrest, or in aiding in the policing of these oppressive governments. By example of the passive position held by Europe during these revolutions, the EU appears to be ill equipped to handle security issues such as the massive revolutionary chain witnessed across the Mediterranean. Now, however, they have a new opportunity to be involved in a post- Arab Spring Mediterranean. This paper seeks to address some reasons behind the Arab Spring, describe the institutional framework previously and currently in place, as well as to analyze the progress of Europe’s relationship with the Mediterranean by analyzing the EU’s past and current role in the Mediterranean. It will also look at critiques of the EU’s role in the Arab Spring, as well as the opportunities to be taken in the Mediterranean region.
Resumo:
Summary. Parties to the UN Framework Convention on Climate Change are expected to agree on a new international climate agreement applicable to all countries from 2020 at the Paris climate summit in December 2015. This Policy Brief investigates the possible role of the European Union (EU) towards the 2015 Paris climate agreement. It argues for renewed efforts by the EU at coalition building with progressive developing countries, leadership by example and a more prominent, complementary role of individual EU member states. It also argues for a Paris agreement that provides a strong “signal” and “direction”, and discusses what this may entail.
Resumo:
We describe an approach for characterizing the process performed by a quantum gate using quantum process tomography, by first modeling the gate in an extended Hilbert space, which includes nonqubit degrees of freedom. To prevent unphysical processes from being predicted, present quantum process tomography procedures incorporate mathematical constraints, which make no assumptions as to the actual physical nature of the system being described. By contrast, the procedure presented here assumes a particular class of physical processes, and enforces physicality by fitting the data to this model. This allows quantum process tomography to be performed using a smaller experimental data set, and produces parameters with a direct physical interpretation. The approach is demonstrated by example of mode matching in an all-optical controlled-NOT gate. The techniques described are general and could be applied to other optical circuits or quantum computing architectures.
Resumo:
Previous work on formally modelling and analysing program compilation has shown the need for a simple and expressive semantics for assembler level programs. Assembler programs contain unstructured jumps and previous formalisms have modelled these by using continuations, or by embedding the program in an explicit emulator. We propose a simpler approach, which uses techniques from compiler theory in a formal setting. This approach is based on an interpretation of programs as collections of program paths, each of which has a weakest liberal precondition semantics. We then demonstrate, by example, how we can use this formalism to justify the compilation of block-structured high-level language programs into assembler.
Resumo:
Retailers increasingly recognize that environmental responsibility is a strategic imperative. However, little research has investigated or identified the factors that facilitate the successful implementation of environmentally responsible strategies across a network of customer-facing sales units (stores). We propose that a store manager’s ability to lead by example facilitates this process by fostering a supportive climate for store environmental stewardship (SENS-climate). By examining the influence of store managers’ actions on sales associates’ perceptions of the SENS-climate, as well as the subsequent impact on their performance—measured by margins, as well as sales of green and regular products—this study demonstrates that store managers can foster a SENS-climate by articulating their prioritization of environmental responsibility in their operational decisions. These positive effects are sustained by relational factors, such as the moderating effect of the store manager–sales associate dyadic tenure. In contrast, when store managers display high variability in their environmental orientation, it hinders the development of SENS-climate perceptions among sales associates. If sales associates perceive an enabling SENS-climate, they achieve higher margins and more green but fewer regular sales.
Resumo:
The development of new, health supporting food of high quality and the optimization of food technological processes today require the application of statistical methods of experimental design. The principles and steps of statistical planning and evaluation of experiments will be explained. By example of the development of a gluten-free rusk (zwieback), which is enriched by roughage compounds the application of a simplex-centroid mixture design will be shown. The results will be illustrated by different graphics.
Resumo:
In this chapter we provide a comprehensive overview of the emerging field of visualising and browsing image databases. We start with a brief introduction to content-based image retrieval and the traditional query-by-example search paradigm that many retrieval systems employ. We specify the problems associated with this type of interface, such as users not being able to formulate a query due to not having a target image or concept in mind. The idea of browsing systems is then introduced as a means to combat these issues, harnessing the cognitive power of the human mind in order to speed up image retrieval.We detail common methods in which the often high-dimensional feature data extracted from images can be used to visualise image databases in an intuitive way. Systems using dimensionality reduction techniques, such as multi-dimensional scaling, are reviewed along with those that cluster images using either divisive or agglomerative techniques as well as graph-based visualisations. While visualisation of an image collection is useful for providing an overview of the contained images, it forms only part of an image database navigation system. We therefore also present various methods provided by these systems to allow for interactive browsing of these datasets. A further area we explore are user studies of systems and visualisations where we look at the different evaluations undertaken in order to test usability and compare systems, and highlight the key findings from these studies. We conclude the chapter with several recommendations for future work in this area. © 2011 Springer-Verlag Berlin Heidelberg.
Resumo:
In line with the process of financialization and globalization of capital, which has intensified in all latitudes of the globe, the world of work is permeated by his determinations arising and also has been (re) setting from numerous changes expressed by example, in the unbridled expansion of temporary forms of work activities, and flexible outsourced by the growth of informality, forming a new morphology of work. However, regardless of how these forms are expressed in concrete materiality, there is something that unifies: all of them are marked by exponentiation of insecurity and hence the numerous negative effects on the lives of individuals who need to sell their labor power to survive. Given this premise, the present work is devoted to study, within the framework of the Brazilian particularities of transition between Fordism and Toyotism, what we call composite settings of the conditions and labor relations processed within the North river- textile industry Grande. To this end, guided by historical and dialectical materialism, we made use of social research in its qualitative aspect, using semi-structured interviews, in addition to literature review, information retrieval and use of field notes. From our raids, we note that between the time span stretching from the 1990s to the current year, the Natal textile industry has been undergoing a process of successive and intense changes in their modus operandi, geared specifically to the organization and labor management causing, concomitantly, several repercussions for the entire working class.
Resumo:
In line with the process of financialization and globalization of capital, which has intensified in all latitudes of the globe, the world of work is permeated by his determinations arising and also has been (re) setting from numerous changes expressed by example, in the unbridled expansion of temporary forms of work activities, and flexible outsourced by the growth of informality, forming a new morphology of work. However, regardless of how these forms are expressed in concrete materiality, there is something that unifies: all of them are marked by exponentiation of insecurity and hence the numerous negative effects on the lives of individuals who need to sell their labor power to survive. Given this premise, the present work is devoted to study, within the framework of the Brazilian particularities of transition between Fordism and Toyotism, what we call composite settings of the conditions and labor relations processed within the North river- textile industry Grande. To this end, guided by historical and dialectical materialism, we made use of social research in its qualitative aspect, using semi-structured interviews, in addition to literature review, information retrieval and use of field notes. From our raids, we note that between the time span stretching from the 1990s to the current year, the Natal textile industry has been undergoing a process of successive and intense changes in their modus operandi, geared specifically to the organization and labor management causing, concomitantly, several repercussions for the entire working class.
Resumo:
PEREIRA, J. P. ; CASTRO, B. P. S. ; VALENTIM, R. A. M. . Kit Educacional para Controle e Supervisão Aplicado a Nível. Holos, Natal, v. 2, p. 68-72, 2009
Resumo:
Introdução – Os serviços de comunicação móvel para tablets, smartphones, e-book readers desenvolveram-se de forma extremamente rápida nos últimos anos assumindo-se como uma rede de aprendizagem privilegiada para os estudantes. Em 2012, 55% dos estudantes do ensino superior possuíam um smarthphone, 62% dispunham de um ipod e 21% tinham de um tablet. 67% usavam-nos em contexto académico. Objetivo – Apresentar de forma sucinta a resposta das bibliotecas de ensino superior ao crescimento da utilização dos dispositivos móveis e como é que os parceiros das bibliotecas, em especial os editores, estão a potenciar essa utilização. Métodos – A partir de uma seleção e análise de bibliografia sobre a temática realizou-se uma pesquisa na internet, nos sites de bibliotecas de ensino superior e nas páginas dos editores que permitisse aferir evidências. Resultados – Identificaram-se cinco serviços e 23 recursos. Discussão – Um primeiro serviço prende-se com a adaptação dos conteúdos dos websites das bibliotecas de forma a serem lidos por qualquer tipo de dispositivos. Outro serviço identificado foi a disponibilização do catálogo da biblioteca online tornando-o acessível aos dispositivos móveis, permitindo a pesquisa e a localização de informação, a reserva ou a renovação de documentos. Identificou-se o desenvolvimento de algumas coleções especificamente para os dispositivos móveis. Constatou-se a utilização de códigos QR para divulgar normas de funcionamento da biblioteca, recursos, o mapa, o contacto do serviço de referência e para geolocalização. Por fim verificou-se a utilização de SMS para informar os utilizadores sobre reservas, prazos de empréstimo, entre outras informações. O recurso mais comum na maioria dos sites analisados foi a disponibilização de uma versão do website para dispositivos móveis de que são exemplos a Cambridge Journals Online mobile, o EBSCOhost mobile, o SpringerLink, a OVIDToday, o UpToDate, a PubChase e a BrowZine. Com o objetivo de tornar os seus produtos acessíveis on-the go, oferecem inúmeras possibilidades, nomeadamente de pesquisa, de acesso a textos integrais, de elaboração de listas de interesse personalizadas, de leitura offline, entre outras que podemos encontrar na aplicação da EBSCOhost mobile, na JAMA Network, na OVIDToday, no portal de Periódicos CAPES ou na plataforma Ebrary da ProQuest. Em ferramentas como a UpToDate ou os aplicativos da Elsevier e da Micromedex é disponibilizada informação baseada na evidência e recomendações que podem ser aplicadas em consulta. Os gestores de referências bibliográficas como o Mendeley e o Zotero também acompanharam esta tendência e desenvolveram aplicações para dispositivos móveis. Para além disso funcionam de forma integrada com outras aplicações como a Browzine e a Pubchase. Conclusão – O recurso às tecnologias móveis é uma forma das bibliotecas manterem canais de comunicação com os utilizadores, mas embora existam muitas vantagens no uso das tecnologias móveis a implementação destes serviços implica um esforço financeiro e humano que nem todas as bibliotecas serão capazes de cumprir. Encontrar a forma de gerir este processo é o desafio que se impõe no futuro.
Resumo:
PEREIRA, J. P. ; CASTRO, B. P. S. ; VALENTIM, R. A. M. . Kit Educacional para Controle e Supervisão Aplicado a Nível. Holos, Natal, v. 2, p. 68-72, 2009
Resumo:
This thesis presents security issues and vulnerabilities in home and small office local area networks that can be used in cyber-attacks. There is previous research done on single vulnerabilities and attack vectors, but not many papers present full scale attack examples towards LAN. First this thesis categorizes different security threads and later in the paper methods to launch the attacks are shown by example. Offensive security and penetration testing is used as research methods in this thesis. As a result of this thesis an attack is conducted using vulnerabilities in WLAN, ARP protocol, browser as well as methods of social engineering. In the end reverse shell access is gained to the target machine. Ready-made tools are used in the attack and their inner workings are described. Prevention methods are presented towards the attacks in the end of the thesis.