835 resultados para independent auditor
Resumo:
The process in which girls and boys are constructed and construct themselves to pupils takes place in a context where conceptions of “the good pupil” are distinctly manifested in national school documents. In different types of texts concerning school and education, the image of the pupil that society wants to create emerges. Documents from early childhood education up to university level prioritise qualities such as independence, initiative, accountability and freedom to make ones own choices. Qualities or competencies that are preferred during a certain period change as time passes and society develops. The idea of the democratic subject is not the same today as it was 25 years ago. The purpose of this article is to emphasise and compare different desired qualities described in two Swedish national curricula, competencies that pupils in the compulsory school are supposed to develop. The discussion encompasses the political ideas of the pupil during a period of twenty-five years in light of changes in Western societies during the last decades.
Resumo:
The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches. The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.
Resumo:
It is now-a-days more and more common in the academic world to use new forms of “learning-tools”. One of those is the “reflection protocol”, which usually consist of a few pages of freely written text, related to something the students have read. There seems to be a lot of different opinions about the value to use this method. Some teachers and students are enthusiastic and others are rather critical. To write a “reflection protocol” is not in the first place to do a summery, a review, not even to analyze a text. Instead it is about to write down thoughts and questions that comes up as a result of the reading. It is also about doing associations, reflections and to interpret a text and relate this to a theme of some kind. The purpose to use “reflection protocols” is, as we see it, mainly for the student to practice independent thinking from a scientific point of view, but it also gives a possibility to a better understanding of another person’s thinking. This seems to open up for a fruitful dialogue and a way to learn. We will in this paper discuss if that could be the case.
Resumo:
In this note, in an independent private values auction framework, I discuss the relationship between the set of types and the distribution of types. I show that any set of types, finite dimensional or not, can be extended to a larger set of types preserving incentive compatibility constraints, expected revenue and bidder’s expected utilities. Thus for example we may convexify a set of types making our model amenable to the large body of theory in economics and mathematics that relies on convexity assumptions. An interesting application of this extension procedure is to show that although revenue equivalence is not valid in general if the set of types is not convex these mechanism have underlying distinct allocation mechanism in the extension. Thus we recover in these situations the revenue equivalence.
Resumo:
This thesis presents DCE, or Dynamic Conditional Execution, as an alternative to reduce the cost of mispredicted branches. The basic idea is to fetch all paths produced by a branch that obey certain restrictions regarding complexity and size. As a result, a smaller number of predictions is performed, and therefore, a lesser number of branches are mispredicted. DCE fetches through selected branches avoiding disruptions in the fetch flow when these branches are fetched. Both paths of selected branches are executed but only the correct path commits. In this thesis we propose an architecture to execute multiple paths of selected branches. Branches are selected based on the size and other conditions. Simple and complex branches can be dynamically predicated without requiring a special instruction set nor special compiler optimizations. Furthermore, a technique to reduce part of the overhead generated by the execution of multiple paths is proposed. The performance achieved reaches levels of up to 12% when comparing a Local predictor used in DCE against a Global predictor used in the reference machine. When both machines use a Local predictor, the speedup is increased by an average of 3-3.5%.
Resumo:
We study tournaments with many ex-ante asymmetric (heterogeneous) contestants as an independent-private-values all-pay auction. The asymmetry is either with respect to the distribution of valuations for the prize or the risk preferences. By characterizing equilibria in tnonotone strategies we show that tournaments \:vith man~y heterogenous contestants are qualitatively distinct. First, with two (or many ex-ante identical) participants, a contestant always exerts some effort with positive probability. In contrast, with many asymmetric participants, one 1night not exert any effort at all, even if there is a positive probability that he has the highest valuation among ali. Second, in tournan1ents with t'wo (o r n1any ex-ante h01nogenous) contestants, equilibrium effort densities are decreasing. This prediction is at odds with experimental evidence that shows the empírica! density might be increasing at high effort levels. V\.lith rnany heterogeneous contestants, however. the increasing bid density is consistent with an equilibrium behavior.
Resumo:
Objective: To determine chronological and corrected ages at acquisition of motor abilities up to independent walking in very low birth weight preterms and to determine up to what point it is necessary to use corrected age.Methods: This was a longitudinal study of preterms with birth weight < 1,500 g and gestational age <= 34 weeks, free from neurosensory sequelae, selected at the high-risk infants follow-up clinic at the Hospital das Clinicas, Faculdade de Medicine de Botucatu, Universidade Estadual Paulista (UNESP) in Botucatu, Brazil, between 1998 to 2003, and assessed every 2 months until acquisition of independent walking.Results: Nine percent of the 155 preterms recruited were excluded from the study, leaving a total of 143 patients. The mean gestational age was 30 +/- 2 weeks, birth weight was 1,130 +/- 222 g, 59% were female and 44% were small for gestational age. Preterms achieved head control in their second month, could sit independent at 7 months and walked at 12.8 months' corrected age, corresponding to the 4th, 9th and 15th months of chronological age. There were significant differences between chronological age and corrected age for all motor abilities. Preterms who were small for their gestational age acquired motor abilities later, but still within expected limits.Conclusions: Very low birth weight preterms, free from neurosensory disorders, acquired their motor abilities within the ranges expected for their corrected ages. Corrected age should be used until independent walking is achieved.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Objective: In an attempt to clarify the clonality and genetic relationships that are involved in the tumorigenesis of uterine leiomyomas, we used a total of 43 multiple leiomyomas from 14 patients and analyzed the allelic status with 15 microsatellite markers and X chromosome inactivation analysis.Study design: We have used a set of 15 microsatellite polymorphism markers mapped on 3q, 7p, 11, and 15q by automated analysis. The X chromosome inactivation was evaluated by the methylation status of the X-linked androgen receptor gene.Results: Loss of heterozygosity analysis showed a different pattern in 7 of the 8 cases with allelic loss for at least 1 of 15 microsatellite markers that were analyzed. A similar loss of heterozygosity findings at 7p22-15 was detected in 3 samples from the same patient. X chromosome inactivation analysis demonstrated the same inactivated allele in all tumors of the 9 of 12 informative patients;. different inactivation patterns were observed in 3 cases.Conclusion: Our data support the concept that uterine leiomyomas are derived from a single cell but are generated independently in the uterus. Loss of heterozygosity findings at 7p22-15 are consistent with previous data that suggested the relevance of chromosomal aberrations at 7p that were involved in individual uterine leiomyomas. (C) 2005 Mosby, Inc. All rights reserved.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)