509 resultados para Gates.
Resumo:
The current study builds upon a previous study, which examined the degree to which the lexical properties of students’ essays could predict their vocabulary scores. We expand on this previous research by incorporating new natural language processing indices related to both the surface- and discourse-levels of students’ essays. Additionally, we investigate the degree to which these NLP indices can be used to account for variance in students’ reading comprehension skills. We calculated linguistic essay features using our framework, ReaderBench, which is an automated text analysis tools that calculates indices related to linguistic and rhetorical features of text. University students (n = 108) produced timed (25 minutes), argumentative essays, which were then analyzed by ReaderBench. Additionally, they completed the Gates-MacGinitie Vocabulary and Reading comprehension tests. The results of this study indicated that two indices were able to account for 32.4% of the variance in vocabulary scores and 31.6% of the variance in reading comprehension scores. Follow-up analyses revealed that these models further improved when only considering essays that contained multiple paragraph (R2 values = .61 and .49, respectively). Overall, the results of the current study suggest that natural language processing techniques can help to inform models of individual differences among student writers.
Resumo:
Taken from the Prisons Memory Archive, this documentary film tells the stories of some of those who passed through the gates of the mainly female prison that operated during the Troubles in Northern Ireland. Using protocols of co-ownership, inclusivity and life-storytelling, the film includes prison staff, prisoners, teachers, a solicitor, doctor and chaplain. The film has been screened internationally and locally, where it has been used by community groups to facilitate discussions on how to address the legacy of a violent past.
Resumo:
The construction industry is one of the largest consumers of raw materials and energy and one of the highest contributor to green-houses gases emissions. In order to become more sustainable it needs to reduce the use of both raw materials and energy, thus lim-iting its environmental impact. Developing novel technologies to integrate secondary raw materials (i.e. lightweight recycled aggre-gates and alkali activated “cementless” binders - geopolymers) in the production cycle of concrete is an all-inclusive solution to im-prove both sustainability and cost-efficiency of construction industry. SUS-CON “SUStainable, Innovative and Energy-Efficiency CONcrete, based on the integration of all-waste materials” is an European project (duration 2012-2015), which aim was the inte-gration of secondary raw materials in the production cycle of concrete, thus resulting in innovative, sustainable and cost-effective building solutions. This paper presents the main outcomes related to the successful scaling-up of SUS-CON concrete solutions in traditional production plants. Two European industrial concrete producers have been involved, to design and produce both pre-cast components (blocks and panels) and ready-mixed concrete. Recycled polyurethane foams and mixed plastics were used as aggre-gates, PFA (Pulverized Fuel Ash, a by-product of coal fuelled power plants) and GGBS (Ground Granulated Blast furnace Slag, a by-product of iron and steel industries) as binders. Eventually, the installation of SUS-CON concrete solutions on real buildings has been demonstrated, with the construction of three mock-ups located in Europe (Spain, Turkey and Romania)
Resumo:
Background: Delirium is frequently diagnosed in critically ill patients and is associated with poor clinical outcomes. Haloperidol is the most commonly used drug for delirium despite little evidence of its effectiveness. The aim of this study was to establish whether early treatment with haloperidol would decrease the time that survivors of critical illness spent in delirium or coma. Methods: We did this double-blind, placebo-controlled randomised trial in a general adult intensive care unit (ICU). Critically ill patients (≥18 years) needing mechanical ventilation within 72 h of admission were enrolled. Patients were randomised (by an independent nurse, in 1:1 ratio, with permuted block size of four and six, using a centralised, secure web-based randomisation service) to receive haloperidol 2·5 mg or 0·9% saline placebo intravenously every 8 h, irrespective of coma or delirium status. Study drug was discontinued on ICU discharge, once delirium-free and coma-free for 2 consecutive days, or after a maximum of 14 days of treatment, whichever came first. Delirium was assessed using the confusion assessment method for the ICU (CAM-ICU). The primary outcome was delirium-free and coma-free days, defined as the number of days in the first 14 days after randomisation during which the patient was alive without delirium and not in coma from any cause. Patients who died within the 14 day study period were recorded as having 0 days free of delirium and coma. ICU clinical and research staff and patients were masked to treatment throughout the study. Analyses were by intention to treat. This trial is registered with the International Standard Randomised Controlled Trial Registry, number ISRCTN83567338. Findings: 142 patients were randomised, 141 were included in the final analysis (71 haloperidol, 70 placebo). Patients in the haloperidol group spent about the same number of days alive, without delirium, and without coma as did patients in the placebo group (median 5 days [IQR 0-10] vs 6 days [0-11] days; p=0·53). The most common adverse events were oversedation (11 patients in the haloperidol group vs six in the placebo group) and QTc prolongation (seven patients in the haloperidol group vs six in the placebo group). No patient had a serious adverse event related to the study drug. Interpretation: These results do not support the hypothesis that haloperidol modifies duration of delirium in critically ill patients. Although haloperidol can be used safely in this population of patients, pending the results of trials in progress, the use of intravenous haloperidol should be reserved for short-term management of acute agitation. Funding: National Institute for Health Research. © 2013 Elsevier Ltd.
Resumo:
My thesis explores the formation of the subject in the novels of Faulkner’s Go Down, Moses, Toni Morrison’s Song of Solomon, and Gloria Naylor’s Mama Day. I attach the concept of property in terms of how male protagonists are obsessed with materialistic ownership and with the subordination of women who, as properties, consolidate their manhood. The three novelists despite their racial, gendered, and literary differences share the view that identity and truth are mere social and cultural constructs. I incorporate the work of Judith Butler and other poststructuralist figures, who see identity as a matter of performance rather than a natural entity. My thesis explores the theme of freedom, which I attached to the ways characters use their bodies either to confine or to emancipate themselves from the restricting world of race, class, and gender. The three novelists deconstruct any system of belief that promulgates the objectivity of truth in historical documents. History in the three novels, as with the protagonists, perception of identity, remains a social construct laden with distortions to serve particular political or ideological agendas. My thesis gives voice to African American female characters who are associated with love and racial and gender resistance. They become the reservoirs of the African American legacy in terms of their association with the oral and intuitionist mode of knowing, which subverts the male characters’ obsession with property and with the mainstream empiricist world. In this dissertation, I use the concept of hybridity as a literary and theoretical devise that African-American writers employ. In effect, I embark on the postcolonial studies of Henry Louise Gates, Paul Gilroy, W. E. B Du Bois, James Clifford, and Arjun Appadurai in order to reflect upon the fluidity of Morrison’s and Naylor’s works. I show how these two novelists subvert Faulkner’s essentialist perception of truth, and of racial and gendered identity. They associate the myth of the Flying African with the notion of hybridity by making their male protagonists criss-cross Northern and Southern regions. I refer to Mae Gwendolyn Henderson’s article on “Speaking in Tongues” in my analysis of how Naylor subverts the patriarchal text of both Faulkner and Morrison in embarking on a more feminine version of the flying African, which she relates to an ex-slave, Sapphira Wade, a volatile female character who resists fixed claim over her story and identity. In dealing with the concept of hybridity, I show that Naylor rewrites both authors’ South by making Willow Springs a more fluid space, an assumption that unsettles the scores of critics who associate the island with authenticity and exclusive rootedness.
Resumo:
The Mobile Information Literacy curriculum is a growing collection of training materials designed to build literacies for the millions of people worldwide coming online every month via a mobile phone. Most information information and digital literacy curricula were designed for a PC age, and public and private organizations around the world have used these curricula to help newcomers use computers and the internet effectively and safely. The better curricula address not only skills, but also concepts and attitudes. The central question for this project is: what are the relevant skills, concepts, and attitudes for people using mobiles, not PCs, to access the internet? As part of the Information Strategies for Societies in Transition project, we developed a six-module curriculum for mobile-first users. The project is situated in Myanmar, a country undergoing massive political, economic, and social changes, and where mobile penetration is expected to reach 80% by the end of 2015 from just 4% in 2014. Combined with the country’s history of media censorship, Myanmar presents unique challenges for addressing the needs of people who need the ability to find and evaluate the quality and credibility of information obtained online, understand how to create and share online information effectively, and participate safely and securely.
Resumo:
The Mobile Information Literacy curriculum is a growing collection of training materials designed to build literacies for the millions of people worldwide coming online every month via a mobile phone. Most information information and digital literacy curricula were designed for a PC age, and public and private organizations around the world have used these curricula to help newcomers use computers and the internet effectively and safely. The better curricula address not only skills, but also concepts and attitudes. The central question for this project is: what are the relevant skills, concepts, and attitudes for people using mobiles, not PCs, to access the internet? As part of the Information Strategies for Societies in Transition project, we developed a six-module curriculum for mobile-first users. The project is situated in Myanmar, a country undergoing massive political, economic, and social changes, and where mobile penetration is expected to reach 80% by the end of 2015 from just 4% in 2014. Combined with the country’s history of media censorship, Myanmar presents unique challenges for addressing the needs of people who need the ability to find and evaluate the quality and credibility of information obtained online, understand how to create and share online information effectively, and participate safely and securely.
Resumo:
The Myanmar Book Aid Preservation Foundation (MBAPF) and Enlightened Research Myanmar (EMR) held an Information Symposium titled, From Scarcity to Overload: Finding “Good Enough” Public Information in Myanmar’s Transition in Yangon, Myanmar on January 28-29, 2016. The Symposium was co-sponsored by the University of Washington’s Henry M. Jackson School of International Studies (JSIS) and the Technology & Social Change Group (TASCHA) of the University’s Information School with support from the United States Agency for International Development (USAID), Microsoft, the Bill & Melinda Gates Foundation, and the Asia Foundation. The Information Symposium was held as part of a larger project supported by USAID, Microsoft, the Bill & Melinda Gates Foundation, and the Tableau Foundation implemented by the University of Washington’s JSIS and TASCHA, along with Myanmar partners, MBAPF and EMR. This project, Information Strategies for Societies in Transition, was developed largely because of the staggering challenges Myanmar is facing as it seeks to “catch-up” in the world’s most economically competitive region.
Resumo:
Lo scopo di questa tesi triennale è quello di fornire un'introduzione ad alcuni concetti della computazione quantistica e comprenderne i fenomeni fisici che ne stanno alla base, dall'idea astratta di qubit fino ai più recenti studi sui centri NV, passando attraverso appropriati strumenti matematici. Recentemente si è realizzato che l'uso delle proprietà della meccanica quantistica può migliorare drasticamente le velocità di calcolo. È quindi cresciuto l'interesse nel campo dell'informazione quantistica. Tra le principali difficoltà vi è il fenomeno della decoerenza, responsabile della distruzione degli stati di sovrapposizione quanto-meccanici. Studiamo la dinamica dei sistemi quantistici aperti, soffermandoci sugli aspetti della loro evoluzione rilevanti nel passaggio dal mondo quantico al classico. A tal fine, e per una migliore comprensione della decoerenza, ricaviamo l'equazione master cui deve obbedire la matrice di densità nel noto modello di Jaynes-Cummings per l'interazione ambiente-sistema. In particolare, descriviamo come un ristretto set di manipolazioni sul sistema ci permetta di proteggerlo dalla decoerenza e come tale tecnica, detta disaccoppiamento dinamico, si rivela un utile strumento per la realizzazione di gates quantistici nel caso dei qubit implementati sfruttando i cosiddetti centri NV del diamante.
Resumo:
Thesis (Master's)--University of Washington, 2016-08
Resumo:
Contemporary integrated circuits are designed and manufactured in a globalized environment leading to concerns of piracy, overproduction and counterfeiting. One class of techniques to combat these threats is circuit obfuscation which seeks to modify the gate-level (or structural) description of a circuit without affecting its functionality in order to increase the complexity and cost of reverse engineering. Most of the existing circuit obfuscation methods are based on the insertion of additional logic (called “key gates) or camouflaging existing gates in order to make it difficult for a malicious user to get the complete layout information without extensive computations to determine key-gate values. However, when the netlist or the circuit layout, although camouflaged, is available to the attacker, he/she can use advanced logic analysis and circuit simulation tools and Boolean SAT solvers to reveal the unknown gate-level information without exhaustively trying all the input vectors, thus bringing down the complexity of reverse engineering. To counter this problem, some ‘provably secure’ logic encryption algorithms that emphasize methodical selection of camouflaged gates have been proposed previously in literature [1,2,3]. The contribution of this paper is the creation and simulation of a new layout obfuscation method that uses don't care conditions. We also present proof-of-concept of a new functional or logic obfuscation technique that not only conceals, but modifies the circuit functionality in addition to the gate-level description, and can be implemented automatically during the design process. Our layout obfuscation technique utilizes don’t care conditions (namely, Observability and Satisfiability Don’t Cares) inherent in the circuit to camouflage selected gates and modify sub-circuit functionality while meeting the overall circuit specification. Here, camouflaging or obfuscating a gate means replacing the candidate gate by a 4X1 Multiplexer which can be configured to perform all possible 2-input/ 1-output functions as proposed by Bao et al. [4]. It is important to emphasize that our approach not only obfuscates but alters sub-circuit level functionality in an attempt to make IP piracy difficult. The choice of gates to obfuscate determines the effort required to reverse engineer or brute force the design. As such, we propose a method of camouflaged gate selection based on the intersection of output logic cones. By choosing these candidate gates methodically, the complexity of reverse engineering can be made exponential, thus making it computationally very expensive to determine the true circuit functionality. We propose several heuristic algorithms to maximize the RE complexity based on don’t care based obfuscation and methodical gate selection. Thus, the goal of protecting the design IP from malicious end-users is achieved. It also makes it significantly harder for rogue elements in the supply chain to use, copy or replicate the same design with a different logic. We analyze the reverse engineering complexity by applying our obfuscation algorithm on ISCAS-85 benchmarks. Our experimental results indicate that significant reverse engineering complexity can be achieved at minimal design overhead (average area overhead for the proposed layout obfuscation methods is 5.51% and average delay overhead is about 7.732%). We discuss the strengths and limitations of our approach and suggest directions that may lead to improved logic encryption algorithms in the future. References: [1] R. Chakraborty and S. Bhunia, “HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 28, no. 10, pp. 1493–1502, 2009. [2] J. A. Roy, F. Koushanfar, and I. L. Markov, “EPIC: Ending Piracy of Integrated Circuits,” in 2008 Design, Automation and Test in Europe, 2008, pp. 1069–1074. [3] J. Rajendran, M. Sam, O. Sinanoglu, and R. Karri, “Security Analysis of Integrated Circuit Camouflaging,” ACM Conference on Computer Communications and Security, 2013. [4] Bao Liu, Wang, B., "Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks,"Design, Automation and Test in Europe Conference and Exhibition (DATE), 2014 , vol., no., pp.1,6, 24-28 March 2014.
Resumo:
This thesis covers the challenges of creating and maintaining an introductory engineering laboratory. The history of the University of Illinois Electrical and Computer Engineering department’s introductory course, ECE 110, is recounted. The current state of the course, as of Fall 2008, is discussed along with current challenges arising from the use of a hand-wired prototyping board with logic gates. A plan for overcoming these issues using a new microcontroller-based board with a pseudo hardware description language is discussed. The new microcontroller based system implementation is extensively detailed along with its new accompanying description language. This new system was tried in several sections of the Fall 2008 semester alongside the old system; the students’ final performances with the two different approaches are compared in terms of design, performance, complexity, and enjoyment. The system in its first run shows great promise, increasing the students’ enjoyment, and improving the performance of their designs.
Resumo:
We investigate protocols for generating a state t-design by using a fixed separable initial state and a diagonal-unitary t-design in the computational basis, which is a t-design of an ensemble of diagonal unitary matrices with random phases as their eigenvalues. We first show that a diagonal-unitary t-design generates a O (1/2(N))-approximate state t-design, where N is the number of qubits. We then discuss a way of improving the degree of approximation by exploiting non-diagonal gates after applying a diagonal-unitary t-design. We also show that it is necessary and sufficient to use O (log(2)(t)) -qubit gates with random phases to generate a diagonal-unitary t-design by diagonal quantum circuits, and that each multi-qubit diagonal gate can be replaced by a sequence of multi-qubit controlled-phase-type gates with discrete-valued random phases. Finally, we analyze the number of gates for implementing a diagonal-unitary t-design by non-diagonal two- and one-qubit gates. Our results provide a concrete application of diagonal quantum circuits in quantum informational tasks.