832 resultados para Universidad de Puerto Rico
Resumo:
With the growth of service industry occupations, managing emotions at work has increased as a topic of interest among scholars and practitioners in organisational behaviour and human resource management(Grandey, 2000). Emotional dissonance occurs when there is discrepancy between organisational sanctioned emotions and actual emotions of employees(Zapf, Vogt, Seifert, Mertini, & Isic, 1999). This discrepancy can be associated with significant levels of psychological ill-health (Zapf, Seifert, Schmutte, Mertini, & Holz, 2001). Policing is consistently ranked among the top five stressful/high-risk occupations (e.g. Coman, Evans, Stanley, & Burrows, 1991). Police officers act as the front-line contact when dealing directly with community members; they are expected to be social workers, teachers, role models, and counsellors. Operational police officers are often required to suppress their actual emotions during their work, in order to perform their job to formally designated procedures and standards.
Resumo:
"International Journalism and Democracy" explores a new form of journalism that has been dubbed ‘deliberative journalism’. As the name suggests, these forms of journalism support deliberation — the processes in which citizens recognize and discuss the issues that affect their communities, appraise the potential responses to those issues, and make decisions about whether and how to take action. Authors from across the globe identify the types of journalism that assist deliberative politics in different cultural and political contexts. Case studies from 15 nations spotlight different approaches to deliberative journalism, including strategies that have been sometimes been labeled as public or civic journalism, peace journalism, development journalism, citizen journalism, the street press, community journalism, social entrepreneurism, or other names. Countries that are studied in-depth include the United States, the United Kingdom, Germany, Finland, China, India, Japan, Indonesia, Australia, New Zealand, South Africa, Nigeria, Brazil, Colombia and Puerto Rico. Each of the approaches that are described offers a distinctive potential to support deliberative democracy. However, the book does not present any of these models or case studies as examples of categorical success. Instead, it explores different elements of the nature, strengths, limitations and challenges of each approach, as well as issues affecting their longer-term sustainability and effectiveness. The book also describes the underlying principles of deliberation, the media’s potential role in deliberation from a theoretical and practical perspective, and ongoing issues for deliberative media practitioners.
Resumo:
In the multi-view approach to semisupervised learning, we choose one predictor from each of multiple hypothesis classes, and we co-regularize our choices by penalizing disagreement among the predictors on the unlabeled data. We examine the co-regularization method used in the co-regularized least squares (CoRLS) algorithm, in which the views are reproducing kernel Hilbert spaces (RKHS's), and the disagreement penalty is the average squared difference in predictions. The final predictor is the pointwise average of the predictors from each view. We call the set of predictors that can result from this procedure the co-regularized hypothesis class. Our main result is a tight bound on the Rademacher complexity of the co-regularized hypothesis class in terms of the kernel matrices of each RKHS. We find that the co-regularization reduces the Rademacher complexity by an amount that depends on the distance between the two views, as measured by a data dependent metric. We then use standard techniques to bound the gap between training error and test error for the CoRLS algorithm. Experimentally, we find that the amount of reduction in complexity introduced by co regularization correlates with the amount of improvement that co-regularization gives in the CoRLS algorithm.
Resumo:
In the last decade, smartphones have gained widespread usage. Since the advent of online application stores, hundreds of thousands of applications have become instantly available to millions of smart-phone users. Within the Android ecosystem, application security is governed by digital signatures and a list of coarse-grained permissions. However, this mechanism is not fine-grained enough to provide the user with a sufficient means of control of the applications' activities. Abuse of highly sensible private information such as phone numbers without users' notice is the result. We show that there is a high frequency of privacy leaks even among widely popular applications. Together with the fact that the majority of the users are not proficient in computer security, this presents a challenge to the engineers developing security solutions for the platform. Our contribution is twofold: first, we propose a service which is able to assess Android Market applications via static analysis and provide detailed, but readable reports to the user. Second, we describe a means to mitigate security and privacy threats by automated reverse-engineering and refactoring binary application packages according to the users' security preferences.
Resumo:
Private data stored on smartphones is a precious target for malware attacks. A constantly changing environment, e.g. switching network connections, can cause unpredictable threats, and require an adaptive approach to access control. Context-based access control is using dynamic environmental information, including it into access decisions. We propose an "ecosystem-in-an-ecosystem" which acts as a secure container for trusted software aiming at enterprise scenarios where users are allowed to use private devices. We have implemented a proof-of-concept prototype for an access control framework that processes changes to low-level sensors and semantically enriches them, adapting access control policies to the current context. This allows the user or the administrator to maintain fine-grained control over resource usage by compliant applications. Hence, resources local to the trusted container remain under control of the enterprise policy. Our results show that context-based access control can be done on smartphones without major performance impact.
Resumo:
This chapter briefly introduces the concepts and modeling of gas/isotope separation by two dimensional carbon frameworks, i.e. porous graphene and carbon nanomeshes, on the basis of reviewing recent literatures. The small size of evenly distributed pores on these carbon frameworks make them ideal not only for the separation of small gas molecules but also for isotope separation by utilizing the different zero point energies induced by confinement of the pores. The related simulations were treated by transition state theory, an affordable yet precise method that could be adopted in combination with different levels of theory. Such method could be employed to evaluate the performance, as well as to aid the design, of other 2D carbon frameworks toward the goal of gas/isotope separation in the future.
Resumo:
Echolocation calls of 119 bats belonging to 12 species in three families from Antillean islands of Puerto Rico, Dominica, and St. Vincent were recorded by using time-expansion methods. Spectrograms of calls and descriptive statistics of five temporal and frequency variables measured from calls are presented. The echolocation calls of many of these species, particularly those in the family Phyllostomidae, have not been described previously. The wing morphology of each taxon is described and related to the structure of its echolocation calls and its foraging ecology. Of slow aerial-hawking insectivores, the Mormoopidae and Natalidae Mormoops blainvillii, Pteronotus davyi davyi, P. quadridens fuliginosus, and Natalus stramineus stramineus can forage with great manoeuvrability in background-cluttered space (close to vegetation), and are able to hover. Pteronotus parnellii portoricensis is able to fly and echolocate in highly-cluttered space (dense vegetation). Among frugivores, nectarivores and omnivores in the family Phyllostomidae, Brachyphylla cavernarum intermedia is adapted to foraging in the edges of vegetation in background-cluttered space, while Erophylla bombifrons bombifrons, Glossophaga longirostris rostrata, Artibeus jamaicensis jamaicensis, A. jamaicensis schwartzi and Stenoderma rufum darioi are adapted to foraging under canopies in highly-cluttered space and do not have speed or efficiency in commuting flight. In contrast, Monophyllus plethodon luciae, Sturnira lilium angeli and S. lilium paulsoni are adapted to fly in highly-cluttered space, but can also fly fast and efficiently in open areas.
Resumo:
Compression is desirable for network applications as it saves bandwidth; however, when data is compressed before being encrypted, the amount of compression leaks information about the amount of redundancy in the plaintext. This side channel has led to successful CRIME and BREACH attacks on web traffic protected by the Transport Layer Security (TLS) protocol. The general guidance in light of these attacks has been to disable compression, preserving confidentiality but sacrificing bandwidth. In this paper, we examine two techniques - heuristic separation of secrets and fixed-dictionary compression|for enabling compression while protecting high-value secrets, such as cookies, from attack. We model the security offered by these techniques and report on the amount of compressibility that they can achieve.
Resumo:
A Bitcoin wallet is a set of private keys known to a user and which allow that user to spend any Bitcoin associated with those keys. In a hierarchical deterministic (HD) wallet, child private keys are generated pseudorandomly from a master private key, and the corresponding child public keys can be generated by anyone with knowledge of the master public key. These wallets have several interesting applications including Internet retail, trustless audit, and a treasurer allocating funds among departments. A specification of HD wallets has even been accepted as Bitcoin standard BIP32. Unfortunately, in all existing HD wallets---including BIP32 wallets---an attacker can easily recover the master private key given the master public key and any child private key. This vulnerability precludes use cases such as a combined treasurer-auditor, and some in the Bitcoin community have suspected that this vulnerability cannot be avoided. We propose a new HD wallet that is not subject to this vulnerability. Our HD wallet can tolerate the leakage of up to m private keys with a master public key size of O(m). We prove that breaking our HD wallet is at least as hard as the so-called "one more" discrete logarithm problem.
Resumo:
Dialogue is a spontaneous, free-flowing, and untrammeled form of two-way communication between participants who respect, trust, and empathize with each other. Its ethical superiority and effectiveness in bringing participants together mean it is an important aspect of organizational responses to increasingly-empowered stakeholders. But what happens when dialogue is legally mandated between participants who view each other as a problem, if not actually the enemy? When dialogue is perceived as a contest with the winner securing the prize of dictating organizational behavior? Is this – can this ever be – dialogue? Sometimes what happens in the name of dialogue is far from dialogic, and ‘dialogue’ is reduced to ticking a box on a form, or closing a communication loop. This challenges those very characteristics that are the basis of dialogue’s claim to superiority. This conclusion demonstrates the need for a radical reconsideration of both the theory and practice of dialogue in public relations.
Resumo:
The Drunk Driving Warning System is an alcohol interlock based on performance of the Critical Tracking Task (CTT). An evaluation was undertaken to determine CTT sensitivity to blood alcohol concentration (BAC), particularly at .05 g/100 ml. Subjects were 36 males in 3 age groups (18, 21 to 25, 35 years and above) divided into 2 alcohol consumption categories ("light" and "heavy"), and scored on 4 training and 2 test days (one alcohol and one placebo). The CTT performance declined as BAC increased and was significantly impaired at .05 BAC. However, performance was too variable for in-vehicle use. Age and alcohol consumption pattern were without effect.
Resumo:
The collection of essays set to roll out on Culture Digitally over the next month began its life as a pair of panels spanning the last two annual meetings of the International Communication Association. At the 2014 meetings in Seattle, Washington and the 2015 meetings in San Juan, Puerto Rico, various configurations of the contributors in this collection met to discuss the cultures and communicative practices associated with internet memes and viral media. Our shared goal was to bring smart people together to start to think about these digital media genres—still emerging only a few years ago and now seemingly ubiquitous—above the level of the individual example. Together, we asked questions about how internet memes and viral media might be defined, their roles in popular culture, their relationships to far older scientific and scholarly traditions, and their public implications. Two years and two discussions that ended too quickly later, we decided to write up some of our key arguments from the panels. We’ve compiled these write-ups here, in what we’ve taken to calling “The Culture Digitally Festival of Memeology.” - See more at: http://culturedigitally.org/2015/10/00-the-culture-digitally-festival-of-memeology-an-introduction-ryan-m-milner-jean-burgess/#sthash.2KzDogso.dpuf
Resumo:
Influenza hemagglutinin (HA) is the primary target of the humoral response during infection/vaccination. Current influenza vaccines typically fail to elicit/boost broadly neutralizing antibodies (bnAbs), thereby limiting their efficacy. Although several bnAbs bind to the conserved stem domain of HA, focusing the immune response to this conserved stem in the presence of the immunodominant, variable head domain of HA is challenging. We report the design of a thermotolerant, disulfide-free, and trimeric HA stem-fragment immunogen which mimics the native, prefusion conformation of HA and binds conformation specific bnAbs with high affinity. The immunogen elicited bnAbs that neutralized highly divergent group 1 (H1 and H5 subtypes) and 2 (H3 subtype) influenza virus strains in vitro. Stem immunogens designed from unmatched, highly drifted influenza strains conferred robust protection against a lethal heterologous A/Puerto Rico/8/34 virus challenge in vivo. Soluble, bacterial expression of such designed immunogens allows for rapid scale-up during pandemic outbreaks.