593 resultados para Locating payload
Resumo:
Thematization is recognized as a fundamental phenomenon in the construction of messages and texts by di erent linguistic schools. This location within a text privileges the elements that guide the reader in the orientation and interpretation of discourse at di erent levels. Thematizing a linguistic unit by locating it in the rst-initial position of a clause, paragraph, or text, confers upon it a special status: a signal of the organizational strategy which characterizes di erent text types playing a role as a variable in the distinction of registers, text types and genres. However, in spite of the importance of the study of thematization for message and textual structuring, to date there are no linguistic studies that have undertook the task of validating its aspects in a comparative manner, either for linguistic or computational purposes. This study, therefore, lls a research gap by implementing a methodology based on contrastive corpus annotation, which allows to empirically validate aspects of the phenomenon of Thematization in English and Spanish, it also seeks to develop a bilingual English-Spanish comparable corpus of newspaper texts automatically annotated with thematic features at clausal and discourse levels. The empirically validated categories (Thematic Field and its elements: Textual Theme, Interpersonal Theme, PreHead and Head) are used to annotate a larger corpus of three newspaper genres news reports, editorials and letters to the editor in terms of thematic choices. This characterization, reveals interesting results, such as the use of genre-speci c strategies in thematic position. In addition, the thesis investigates the possibility to automate the annotation of thematic features in the bilingual corpus through the development of a set of JAVA rules implemented in GATE. It also shows the e cacy of this method in comparison with the manual annotation results...
Resumo:
El presente trabajo muestra el avance que se tiene en el proyecto denominado “Diseño y Construcción de un Nano-Satélite”, que se lleva a cabo en la ESIME U.P.-Ticoman del Instituto Politécnico Nacional. Este proyecto tiene como objetivo principal introducir a los alumnos en el que hacer espacial, se trata de un satélite con un peso de un kilogramo y es un cubo de 10 cm de lado y cuya carga útil tiene MEMS (sistema de micro-electromecánicos) que harán las veces de péndulo electrónico, lo anterior y los armónicos gravitacionales permitirán determinar la forma de la tierra. Se presenta el fundamento matemático, los componentes del satélite, el diseño preliminar de la estructura, la manufactura de la estructura, los resultados de un ensaye estructural destructivo y el análisis estático por elementos finitos.
Resumo:
Obnoxious single facility location models are models that have the aim to find the best location for an undesired facility. Undesired is usually expressed in relation to the so-called demand points that represent locations hindered by the facility. Because obnoxious facility location models as a rule are multimodal, the standard techniques of convex analysis used for locating desirable facilities in the plane may be trapped in local optima instead of the desired global optimum. It is assumed that having more optima coincides with being harder to solve. In this thesis the multimodality of obnoxious single facility location models is investigated in order to know which models are challenging problems in facility location problems and which are suitable for site selection. Selected for this are the obnoxious facility models that appear to be most important in literature. These are the maximin model, that maximizes the minimum distance from demand point to the obnoxious facility, the maxisum model, that maximizes the sum of distance from the demand points to the facility and the minisum model, that minimizes the sum of damage of the facility to the demand points. All models are measured with the Euclidean distances and some models also with the rectilinear distance metric. Furthermore a suitable algorithm is selected for testing multimodality. Of the tested algorithms in this thesis, Multistart is most appropriate. A small numerical experiment shows that Maximin models have on average the most optima, of which the model locating an obnoxious linesegment has the most. Maximin models have few optima and are thus not very hard to solve. From the Minisum models, the models that have the most optima are models that take wind into account. In general can be said that the generic models have less optima than the weighted versions. Models that are measured with the rectilinear norm do have more solutions than the same models measured with the Euclidean norm. This can be explained for the maximin models in the numerical example because the shape of the norm coincides with a bound of the feasible area, so not all solutions are different optima. The difference found in number of optima of the Maxisum and Minisum can not be explained by this phenomenon.
Resumo:
With the growth of energy consumption worldwide, conventional reservoirs, the reservoirs called "easy exploration and production" are not meeting the global energy demand. This has led many researchers to develop projects that will address these needs, companies in the oil sector has invested in techniques that helping in locating and drilling wells. One of the techniques employed in oil exploration process is the reverse time migration (RTM), in English, Reverse Time Migration, which is a method of seismic imaging that produces excellent image of the subsurface. It is algorithm based in calculation on the wave equation. RTM is considered one of the most advanced seismic imaging techniques. The economic value of the oil reserves that require RTM to be localized is very high, this means that the development of these algorithms becomes a competitive differentiator for companies seismic processing. But, it requires great computational power, that it still somehow harms its practical success. The objective of this work is to explore the implementation of this algorithm in unconventional architectures, specifically GPUs using the CUDA by making an analysis of the difficulties in developing the same, as well as the performance of the algorithm in the sequential and parallel version
Resumo:
Electrical impedance tomography is applied to the problem of detecting, locating, and tracking fractures in ballistics gelatin. The hardware developed is intended to be physically robust and based on off-the-shelf hardware. Fractures were created in two separate ways: by shooting a .22 caliber bullet into the gelatin and by injecting saline solution into the gelatin. The .22 caliber bullet created an air gap, which was seen as an increase in resistivity. The saline solution created a fluid filled gap, which was seen as a decrease in resistivity. A double linear array was used to take data for each of the fracture mechanisms and a two dimensional cross section was inverted from the data. The results were validated by visually inspecting the samples during the fracture event. It was found that although there were reconstruction errors present, it was possible to reconstruct a representation of the resistive cross section. Simulations were performed to better understand the reconstructed cross-sections and to demonstrate the ability of a ring array, which was not experimentally tested.
Resumo:
The study of volcano deformation data can provide information on magma processes and help assess the potential for future eruptions. In employing inverse deformation modeling on these data, we attempt to characterize the geometry, location and volume/pressure change of a deformation source. Techniques currently used to model sheet intrusions (e.g., dikes and sills) often require significant a priori assumptions about source geometry and can require testing a large number of parameters. Moreover, surface deformations are a non-linear function of the source geometry and location. This requires the use of Monte Carlo inversion techniques which leads to long computation times. Recently, ‘displacement tomography’ models have been used to characterize magma reservoirs by inverting source deformation data for volume changes using a grid of point sources in the subsurface. The computations involved in these models are less intensive as no assumptions are made on the source geometry and location, and the relationship between the point sources and the surface deformation is linear. In this project, seeking a less computationally intensive technique for fracture sources, we tested if this displacement tomography method for reservoirs could be used for sheet intrusions. We began by simulating the opening of three synthetic dikes of known geometry and location using an established deformation model for fracture sources. We then sought to reproduce the displacements and volume changes undergone by the fractures using the sources employed in the tomography methodology. Results of this validation indicate the volumetric point sources are not appropriate for locating fracture sources, however they may provide useful qualitative information on volume changes occurring in the surrounding rock, and therefore indirectly indicate the source location.
Resumo:
Cancer remains one of the world’s most devastating diseases, with more than 10 million new cases every year. However, traditional treatments have proven insufficient for successful medical management of cancer due to the chemotherapeutics’ difficulty in achieving therapeutic concentrations at the target site, non-specific cytotoxicity to normal tissues, and limited systemic circulation lifetime. Although, a concerted effort has been placed in developing and successfully employing nanoparticle(NP)-based drug delivery vehicles successfully mitigate the physiochemical and pharmacological limitations of chemotherapeutics, work towards controlling the subcellular fate of the carrier, and ultimately its payload, has been limited. Because efficient therapeutic action requires drug delivery to specific organelles, the subcellular barrier remains critical obstacle to maximize the full potential of NP-based delivery vehicles. The aim of my dissertation work is to better understand how NP-delivery vehicles’ structural, chemical, and physical properties affect the internalization method and subcellular localization of the nanocarrier. ^ In this work we explored how side-chain and backbone modifications affect the conjugated polymer nanoparticle (CPN) toxicity and subcellular localization. We discovered how subtle chemical modifications had profound consequences on the polymer’s accumulation inside the cell and cellular retention. We also examined how complexation of CPN with polysaccharides affects uptake efficiency and subcellular localization. ^ This work also presents how changes to CPN backbone biodegradability can significantly affect the subcellular localization of the material. A series of triphenyl phosphonium-containing CPNs were synthesized and the effect of backbone modifications have on the cellular toxicity and intracellular fate of the material. A mitochondrial-specific polymer exhibiting time-dependent release is reported. Finally, we present a novel polymerization technique which allows for the controlled incorporation of electron-accepting benzothiadiazole units onto the polymer chain. This facilitates tuning CPN emission towards red emission. ^ The work presented here, specifically, the effect that side-chain and structure, polysaccharide formulation and CPN degradability have on material’s uptake behavior, can help maximize the full potential of NP-based delivery vehicles for improved chemotherapeutic drug delivery.^
Resumo:
Purpose – The purpose of this paper is to contribute to the ongoing debate on governance, accountability, transparency and corporate social responsibility (CSR) in the mining sector of a developing country context. It examines the reporting practices of the two largest transnational gold-mining companies in Tanzania in order to draw attention to the role played by local government regulations and advocacy and campaigning by nationally organised non-governmental organisations (NGOs) with respect to promoting corporate social reporting practices. Design/methodology/approach – The paper takes a political economy perspective to consider the serious implications of the neo-liberal ideologies of the global capitalist economy, as manifested in Tanzania’s regulatory framework and in NGO activism, for the corporate disclosure, accountability and responsibility of transnational companies (TNCs). A qualitative field case study methodology is adopted to locate the largely unfamiliar issues of CSR in the Tanzanian mining sector within a more familiar literature on social accounting. Data for the case study were obtained from interviews and from analysis of documents such as annual reports, social responsibility reports, newspapers, NGO reports and other publicly available documents. Findings – Analysis of interviews, press clips and NGO reports draws attention to social and environmental problems in the Tanzanian mining sector, which are arguably linked to the manifestation of the broader crisis of neo-liberal agendas. While these issues have serious impacts on local populations in the mining areas, they often remain invisible in mining companies’ social disclosures. Increasing evidence of social and environmental ills raises serious questions about the effectiveness of the regulatory frameworks, as well as the roles played by NGOs and other pressure groups in Tanzania. Practical implications – By empowering local NGOs through educational, capacity building, technological and other support, NGOs’ advocacy, campaigning and networking with other civil society groups can play a pivotal role in encouraging corporations, especially TNCs, to adopt more socially and environmentally responsible business practices and to adhere to international and local standards, which in turn may help to improve the lives of many poor people living in developing countries in general, and Tanzania in particular. Originality/value – This paper contributes insights from gold-mining activities in Tanzania to the existing literature on CSR in the mining sector. It also contributes to political economy theory by locating CSR reporting within the socio-political and regulatory context in which mining operations take place in Tanzania. It is argued that, for CSR reporting to be effective, robust regulations and enforcement and stronger political pressure must be put in place.
Resumo:
We investigate the ways young children’s use of mobile touchscreen interfaces is both understood and shaped by parents through the production of YouTube videos and discussions in associated comment threads. This analysis expands on, and departs from, theories of parental mediation, which have traditionally been framed through a media effects approach in analyzing how parents regulate their children’s use of broadcast media, such as television, within family life. We move beyond the limitations of an effects framing through more culturally and materially oriented theoretical lenses of mediation, considering the role mobile interfaces now play in the lives of infants through analysis of the ways parents intermediate between domestic spaces and networked publics. We propose the concept of intermediation, which builds on insights from critical interface studies as well as cultural industries literature to help account for these expanded aspects of digital parenting. Here, parents are not simply moderating children’s media use within the home, but instead operating as an intermediary in contributing to online representations and discourses of children’s digital culture. This intermediary role of parents engages with ideological tensions in locating notions of “naturalness:” the iPad’s gestural interface or the child’s digital dexterity.
Resumo:
Recent marine long-offset transient electromagnetic (LOTEM) measurements yielded the offshore delineation of a fresh groundwater body beneath the seafloor in the region of Bat Yam, Israel. The LOTEM application was effective in detecting this freshwater body underneath the Mediterranean Sea and allowed an estimation of its seaward extent. However, the measured data set was insufficient to understand the hydrogeological configuration and mechanism controlling the occurrence of this fresh groundwater discovery. Especially the lateral geometry of the freshwater boundary, important for the hydrogeological modelling, could not be resolved. Without such an understanding, a rational management of this unexploited groundwater reservoir is not possible. Two new high-resolution marine time-domain electromagnetic methods are theoretically developed to derive the hydrogeological structure of the western aquifer boundary. The first is called Circular Electric Dipole (CED). It is the land-based analogous of the Vertical Electric Dipole (VED), which is commonly applied to detect resistive structures in the subsurface. Although the CED shows exceptional detectability characteristics in the step-off signal towards the sub-seafloor freshwater body, an actual application was not carried out in the extent of this study. It was found that the method suffers from an insufficient signal strength to adequately delineate the resistive aquifer under realistic noise conditions. Moreover, modelling studies demonstrated that severe signal distortions are caused by the slightest geometrical inaccuracies. As a result, a successful application of CED in Israel proved to be rather doubtful. A second method called Differential Electric Dipole (DED) is developed as an alternative to the intended CED method. Compared to the conventional marine time-domain electromagnetic system that commonly applies a horizontal electric dipole transmitter, the DED is composed of two horizontal electric dipoles in an in-line configuration that share a common central electrode. Theoretically, DED has similar detectability/resolution characteristics compared to the conventional LOTEM system. However, the superior lateral resolution towards multi-dimensional resistivity structures make an application desirable. Furthermore, the method is less susceptible towards geometrical errors making an application in Israel feasible. In the extent of this thesis, the novel marine DED method is substantiated using several one-dimensional (1D) and multi-dimensional (2D/3D) modelling studies. The main emphasis lies on the application in Israel. Preliminary resistivity models are derived from the previous marine LOTEM measurement and tested for a DED application. The DED method is effective in locating the two-dimensional resistivity structure at the western aquifer boundary. Moreover, a prediction regarding the hydrogeological boundary conditions are feasible, provided a brackish water zone exists at the head of the interface. A seafloor-based DED transmitter/receiver system is designed and built at the Institute of Geophysics and Meteorology at the University of Cologne. The first DED measurements were carried out in Israel in April 2016. The acquired data set is the first of its kind. The measured data is processed and subsequently interpreted using 1D inversion. The intended aim of interpreting both step-on and step-off signals failed, due to the insufficient data quality of the latter. Yet, the 1D inversion models of the DED step-on signals clearly detect the freshwater body for receivers located close to the Israeli coast. Additionally, a lateral resistivity contrast is observable in the 1D inversion models that allow to constrain the seaward extent of this freshwater body. A large-scale 2D modelling study followed the 1D interpretation. In total, 425 600 forward calculations are conducted to find a sub-seafloor resistivity distribution that adequately explains the measured data. The results indicate that the western aquifer boundary is located at 3600 m - 3700 m before the coast. Moreover, a brackish water zone of 3 Omega*m to 5 Omega*m with a lateral extent of less than 300 m is likely located at the head of the freshwater aquifer. Based on these results, it is predicted that the sub-seafloor freshwater body is indeed open to the sea and may be vulnerable to seawater intrusion.
Resumo:
This executive order by Governor Nikki R. Haley establishes the Crime Victims Services Transition Team to address operational matters surrounding the execution of consolidating and co-locating crime victims services from multiple state agencies and services to the Attorney General's Office, Crime Victims Services.
Resumo:
Chaque année, le piratage mondial de la musique coûte plusieurs milliards de dollars en pertes économiques, pertes d’emplois et pertes de gains des travailleurs ainsi que la perte de millions de dollars en recettes fiscales. La plupart du piratage de la musique est dû à la croissance rapide et à la facilité des technologies actuelles pour la copie, le partage, la manipulation et la distribution de données musicales [Domingo, 2015], [Siwek, 2007]. Le tatouage des signaux sonores a été proposé pour protéger les droit des auteurs et pour permettre la localisation des instants où le signal sonore a été falsifié. Dans cette thèse, nous proposons d’utiliser la représentation parcimonieuse bio-inspirée par graphe de décharges (spikegramme), pour concevoir une nouvelle méthode permettant la localisation de la falsification dans les signaux sonores. Aussi, une nouvelle méthode de protection du droit d’auteur. Finalement, une nouvelle attaque perceptuelle, en utilisant le spikegramme, pour attaquer des systèmes de tatouage sonore. Nous proposons tout d’abord une technique de localisation des falsifications (‘tampering’) des signaux sonores. Pour cela nous combinons une méthode à spectre étendu modifié (‘modified spread spectrum’, MSS) avec une représentation parcimonieuse. Nous utilisons une technique de poursuite perceptive adaptée (perceptual marching pursuit, PMP [Hossein Najaf-Zadeh, 2008]) pour générer une représentation parcimonieuse (spikegramme) du signal sonore d’entrée qui est invariante au décalage temporel [E. C. Smith, 2006] et qui prend en compte les phénomènes de masquage tels qu’ils sont observés en audition. Un code d’authentification est inséré à l’intérieur des coefficients de la représentation en spikegramme. Puis ceux-ci sont combinés aux seuils de masquage. Le signal tatoué est resynthétisé à partir des coefficients modifiés, et le signal ainsi obtenu est transmis au décodeur. Au décodeur, pour identifier un segment falsifié du signal sonore, les codes d’authentification de tous les segments intacts sont analysés. Si les codes ne peuvent être détectés correctement, on sait qu’alors le segment aura été falsifié. Nous proposons de tatouer selon le principe à spectre étendu (appelé MSS) afin d’obtenir une grande capacité en nombre de bits de tatouage introduits. Dans les situations où il y a désynchronisation entre le codeur et le décodeur, notre méthode permet quand même de détecter des pièces falsifiées. Par rapport à l’état de l’art, notre approche a le taux d’erreur le plus bas pour ce qui est de détecter les pièces falsifiées. Nous avons utilisé le test de l’opinion moyenne (‘MOS’) pour mesurer la qualité des systèmes tatoués. Nous évaluons la méthode de tatouage semi-fragile par le taux d’erreur (nombre de bits erronés divisé par tous les bits soumis) suite à plusieurs attaques. Les résultats confirment la supériorité de notre approche pour la localisation des pièces falsifiées dans les signaux sonores tout en préservant la qualité des signaux. Ensuite nous proposons une nouvelle technique pour la protection des signaux sonores. Cette technique est basée sur la représentation par spikegrammes des signaux sonores et utilise deux dictionnaires (TDA pour Two-Dictionary Approach). Le spikegramme est utilisé pour coder le signal hôte en utilisant un dictionnaire de filtres gammatones. Pour le tatouage, nous utilisons deux dictionnaires différents qui sont sélectionnés en fonction du bit d’entrée à tatouer et du contenu du signal. Notre approche trouve les gammatones appropriés (appelés noyaux de tatouage) sur la base de la valeur du bit à tatouer, et incorpore les bits de tatouage dans la phase des gammatones du tatouage. De plus, il est montré que la TDA est libre d’erreur dans le cas d’aucune situation d’attaque. Il est démontré que la décorrélation des noyaux de tatouage permet la conception d’une méthode de tatouage sonore très robuste. Les expériences ont montré la meilleure robustesse pour la méthode proposée lorsque le signal tatoué est corrompu par une compression MP3 à 32 kbits par seconde avec une charge utile de 56.5 bps par rapport à plusieurs techniques récentes. De plus nous avons étudié la robustesse du tatouage lorsque les nouveaux codec USAC (Unified Audion and Speech Coding) à 24kbps sont utilisés. La charge utile est alors comprise entre 5 et 15 bps. Finalement, nous utilisons les spikegrammes pour proposer trois nouvelles méthodes d’attaques. Nous les comparons aux méthodes récentes d’attaques telles que 32 kbps MP3 et 24 kbps USAC. Ces attaques comprennent l’attaque par PMP, l’attaque par bruit inaudible et l’attaque de remplacement parcimonieuse. Dans le cas de l’attaque par PMP, le signal de tatouage est représenté et resynthétisé avec un spikegramme. Dans le cas de l’attaque par bruit inaudible, celui-ci est généré et ajouté aux coefficients du spikegramme. Dans le cas de l’attaque de remplacement parcimonieuse, dans chaque segment du signal, les caractéristiques spectro-temporelles du signal (les décharges temporelles ;‘time spikes’) se trouvent en utilisant le spikegramme et les spikes temporelles et similaires sont remplacés par une autre. Pour comparer l’efficacité des attaques proposées, nous les comparons au décodeur du tatouage à spectre étendu. Il est démontré que l’attaque par remplacement parcimonieux réduit la corrélation normalisée du décodeur de spectre étendu avec un plus grand facteur par rapport à la situation où le décodeur de spectre étendu est attaqué par la transformation MP3 (32 kbps) et 24 kbps USAC.
Resumo:
El presente trabajo se realizó con el objetivo de tener una visión completa de las teorías del liderazgo, teniendo de este una concepción como proceso y poder examinar las diversas formas de aplicación en las organizaciones contemporáneas. El tema es enfocado desde la perspectiva organizacional, un mundo igualmente complejo, sin desconocer su importancia en otros ámbitos como la educación, la política o la dirección del estado. Su enfoque tiene que ver con el estudio académico del cual es la culminación y se enmarca dentro de la perspectiva constitucional de la Carta Política Colombiana que reconoce la importancia capital que tienen la actividad económica y la iniciativa privada en la constitución de empresas. Las diversas visiones del liderazgo han sido aplicadas de distintas maneras en las organizaciones contemporáneas y han generado diversos resultados. Hoy, no es posible pensar en una organización que no haya definido su forma de liderazgo y en consecuencia, confluyen en el campo empresarial multitud de teorías, sin que pueda afirmarse que una sola de ellas permita el manejo adecuado y el cumplimiento de los objetivos misionales. Por esta razón se ha llegado a concebir el liderazgo como una función compleja, en un mundo donde las organizaciones mismas se caracterizan no solo por la complejidad de sus acciones y de su conformación, sino también porque esta característica pertenece también al mundo de la globalización. Las organizaciones concebidas como máquinas que en sentido metafórico logran reconstituirse sus estructuras a medida que están en interacción con otras en el mundo globalizado. Adaptarse a las cambiantes circunstancias hace de las organizaciones conglomerados en permanente dinámica y evolución. En este ámbito puede decirse que el liderazgo es también complejo y que es el liderazgo transformacional el que más se acerca al sentido de la complejidad.
Resumo:
Resumo: Apesar da existência de anteriores estudos, tanto em termos nacionais como regionais, e que demonstram a forte presença de escravos em Évora nos séculos XV e XVI, localizar a população escrava na documentação de instituições religiosas femininas da cidade e entender a sua condição de vida nessas comunidades não se revela fácil. Muitas das referências à sua existência são indiretas, ao fazerem parte de um dote ou doação (constando como bens a que se atribui um determinado valor), que podia ser testamentária, de partilhas e sentenças. São também de difícil perceção as tarefas desempenhadas no quotidiano de espaços claustrais, especialmente os femininos, sujeitos às exigências pós-tridentinas. Só com a apresentação de alguns casos, a juntar aos já conhecidos, poderemos sugerir algumas considerações sobre esta matéria. Abstract: Despite the existence of previous studies, both national and regional, studies that demonstrate a strong presence of slaves in Évora in the 15th and 16th centuries, locating them in documents from the city’s female religious communities and understanding their living conditions in those communities is not an easy task. Many of the references to their existence are indirect and related to a dowry or donation (being mentioned as assets with an assigned value), which could be associated with a will, a partition or a sentence. It is also difficult to ascertain the tasks they performed in the everyday life of cloistered communities, particularly the female ones, subject to the post-Tridentine requirements. Only by presenting a series of cases, other than the ones that are already known, will we be able to suggest considerations on this matter.
Resumo:
This article seeks to illustrate the path that the conception of the Right to Education has followed and the interpretation that has being made of it in the different stages. In each one of these stages, the experts in the subject have categorized this Right from the beginning, locating it among Human Rights in the fundamental place that it deserves, or that should deserve, serving as an entrance door to the enjoyment of a full social citizenship, that becomes aware and guarantor of many other Rights that derive from it.