918 resultados para Representation of history
Resumo:
The Cliff Mine, an archaeological site situated on the Keweenaw Peninsula of Michigan, is the location of the first successful attempt to mine native copper in North America. Under the management of the Pittsburgh & Boston Mining Company from 1845-1879, two-third of the Cliff’s mineral output was in the form of mass copper, some pieces of which weighed over 5 tons when removed from the ground. The unique nature of mass copper and the Cliff Mine’s handling of it make it one of the best examples of early mining processes in the Keweenaw District. Mass copper only constituted 2% of the entire product of the Lake Superior copper districts, and the story of early mining on the Peninsula is generally overshadowed by later, longer running mines such as the Calumet & Helca and Quincy Mining Companies. Operating into the mid-twentieth century, the size and duration of these later mines would come to define the region, though they would not have been possible without the Cliff’s early success. Research on the Cliff Mine has previously focused on social and popular history, neglecting the structural remains. However, these remains are physical clues to the technical processes that defined early mining on the Keweenaw. Through archaeological investigations, these processes and their associated networks were documented as part of the 2010 Michigan Technological Archaeology Field School’s curriculum. The project will create a visual representation of these processes utilizing Geographic Information Systems software. This map will be a useful aid in future research, community engagement and possible future interpretive planning.
Resumo:
Chaque année, le piratage mondial de la musique coûte plusieurs milliards de dollars en pertes économiques, pertes d’emplois et pertes de gains des travailleurs ainsi que la perte de millions de dollars en recettes fiscales. La plupart du piratage de la musique est dû à la croissance rapide et à la facilité des technologies actuelles pour la copie, le partage, la manipulation et la distribution de données musicales [Domingo, 2015], [Siwek, 2007]. Le tatouage des signaux sonores a été proposé pour protéger les droit des auteurs et pour permettre la localisation des instants où le signal sonore a été falsifié. Dans cette thèse, nous proposons d’utiliser la représentation parcimonieuse bio-inspirée par graphe de décharges (spikegramme), pour concevoir une nouvelle méthode permettant la localisation de la falsification dans les signaux sonores. Aussi, une nouvelle méthode de protection du droit d’auteur. Finalement, une nouvelle attaque perceptuelle, en utilisant le spikegramme, pour attaquer des systèmes de tatouage sonore. Nous proposons tout d’abord une technique de localisation des falsifications (‘tampering’) des signaux sonores. Pour cela nous combinons une méthode à spectre étendu modifié (‘modified spread spectrum’, MSS) avec une représentation parcimonieuse. Nous utilisons une technique de poursuite perceptive adaptée (perceptual marching pursuit, PMP [Hossein Najaf-Zadeh, 2008]) pour générer une représentation parcimonieuse (spikegramme) du signal sonore d’entrée qui est invariante au décalage temporel [E. C. Smith, 2006] et qui prend en compte les phénomènes de masquage tels qu’ils sont observés en audition. Un code d’authentification est inséré à l’intérieur des coefficients de la représentation en spikegramme. Puis ceux-ci sont combinés aux seuils de masquage. Le signal tatoué est resynthétisé à partir des coefficients modifiés, et le signal ainsi obtenu est transmis au décodeur. Au décodeur, pour identifier un segment falsifié du signal sonore, les codes d’authentification de tous les segments intacts sont analysés. Si les codes ne peuvent être détectés correctement, on sait qu’alors le segment aura été falsifié. Nous proposons de tatouer selon le principe à spectre étendu (appelé MSS) afin d’obtenir une grande capacité en nombre de bits de tatouage introduits. Dans les situations où il y a désynchronisation entre le codeur et le décodeur, notre méthode permet quand même de détecter des pièces falsifiées. Par rapport à l’état de l’art, notre approche a le taux d’erreur le plus bas pour ce qui est de détecter les pièces falsifiées. Nous avons utilisé le test de l’opinion moyenne (‘MOS’) pour mesurer la qualité des systèmes tatoués. Nous évaluons la méthode de tatouage semi-fragile par le taux d’erreur (nombre de bits erronés divisé par tous les bits soumis) suite à plusieurs attaques. Les résultats confirment la supériorité de notre approche pour la localisation des pièces falsifiées dans les signaux sonores tout en préservant la qualité des signaux. Ensuite nous proposons une nouvelle technique pour la protection des signaux sonores. Cette technique est basée sur la représentation par spikegrammes des signaux sonores et utilise deux dictionnaires (TDA pour Two-Dictionary Approach). Le spikegramme est utilisé pour coder le signal hôte en utilisant un dictionnaire de filtres gammatones. Pour le tatouage, nous utilisons deux dictionnaires différents qui sont sélectionnés en fonction du bit d’entrée à tatouer et du contenu du signal. Notre approche trouve les gammatones appropriés (appelés noyaux de tatouage) sur la base de la valeur du bit à tatouer, et incorpore les bits de tatouage dans la phase des gammatones du tatouage. De plus, il est montré que la TDA est libre d’erreur dans le cas d’aucune situation d’attaque. Il est démontré que la décorrélation des noyaux de tatouage permet la conception d’une méthode de tatouage sonore très robuste. Les expériences ont montré la meilleure robustesse pour la méthode proposée lorsque le signal tatoué est corrompu par une compression MP3 à 32 kbits par seconde avec une charge utile de 56.5 bps par rapport à plusieurs techniques récentes. De plus nous avons étudié la robustesse du tatouage lorsque les nouveaux codec USAC (Unified Audion and Speech Coding) à 24kbps sont utilisés. La charge utile est alors comprise entre 5 et 15 bps. Finalement, nous utilisons les spikegrammes pour proposer trois nouvelles méthodes d’attaques. Nous les comparons aux méthodes récentes d’attaques telles que 32 kbps MP3 et 24 kbps USAC. Ces attaques comprennent l’attaque par PMP, l’attaque par bruit inaudible et l’attaque de remplacement parcimonieuse. Dans le cas de l’attaque par PMP, le signal de tatouage est représenté et resynthétisé avec un spikegramme. Dans le cas de l’attaque par bruit inaudible, celui-ci est généré et ajouté aux coefficients du spikegramme. Dans le cas de l’attaque de remplacement parcimonieuse, dans chaque segment du signal, les caractéristiques spectro-temporelles du signal (les décharges temporelles ;‘time spikes’) se trouvent en utilisant le spikegramme et les spikes temporelles et similaires sont remplacés par une autre. Pour comparer l’efficacité des attaques proposées, nous les comparons au décodeur du tatouage à spectre étendu. Il est démontré que l’attaque par remplacement parcimonieux réduit la corrélation normalisée du décodeur de spectre étendu avec un plus grand facteur par rapport à la situation où le décodeur de spectre étendu est attaqué par la transformation MP3 (32 kbps) et 24 kbps USAC.
Resumo:
The authors present a proposal to develop intelligent assisted living environments for home based healthcare. These environments unite the chronical patient clinical history sematic representation with the ability of monitoring the living conditions and events recurring to a fully managed Semantic Web of Things (SWoT). Several levels of acquired knowledge and the case based reasoning that is possible by knowledge representation of the health-disease history and acquisition of the scientific evidence will deliver, through various voice based natural interfaces, the adequate support systems for disease auto management but prominently by activating the less differentiated caregiver for any specific need. With these capabilities at hand, home based healthcare providing becomes a viable possibility reducing the institutionalization needs. The resulting integrated healthcare framework will provide significant savings while improving the generality of health and satisfaction indicators.
Resumo:
Universidade Estadual de Campinas . Faculdade de Educação Física
Resumo:
Background: Neotropical freshwater stingrays (Batoidea: Potamotrygonidae) host a diverse parasite fauna, including cestodes. Both cestodes and their stingray hosts are marine-derived, but the taxonomy of this host/parasite system is poorly understood. Methodology: Morphological and molecular (Cytochrome oxidase I) data were used to investigate diversity in freshwater lineages of the cestode genus Rhinebothrium Linton, 1890. Results were based on a phylogenetic hypothesis for 74 COI sequences and morphological analysis of over 400 specimens. Cestodes studied were obtained from 888 individual potamotrygonids, representing 14 recognized and 18 potentially undescribed species from most river systems of South America. Results: Morphological species boundaries were based mainly on microthrix characters observed with scanning electron microscopy, and were supported by COI data. Four species were recognized, including two redescribed (Rhinebothrium copianullum and R. paratrygoni), and two newly described (R. brooksi n. sp. and R. fulbrighti n. sp.). Rhinebothrium paranaensis Menoret & Ivanov, 2009 is considered a junior synonym of R. paratrygoni because the morphological features of the two species overlap substantially. The diagnosis of Rhinebothrium Linton, 1890 is emended to accommodate the presence of marginal longitudinal septa observed in R. copianullum and R. brooksi n. sp. Patterns of host specificity and distribution ranged from use of few host species in few river basins, to use of as many as eight host species in multiple river basins. Significance: The level of intra-specific morphological variation observed in features such as total length and number of proglottids is unparalleled among other elasmobranch cestodes. This is attributed to the large representation of host and biogeographical samples. It is unclear whether the intra-specific morphological variation observed is unique to this freshwater system. Nonetheless, caution is urged when using morphological discontinuities to delimit elasmobranch cestode species because the amount of variation encountered is highly dependent on sample size and/or biogeographical representation.
Resumo:
In Natural Language Processing (NLP) symbolic systems, several linguistic phenomena, for instance, the thematic role relationships between sentence constituents, such as AGENT, PATIENT, and LOCATION, can be accounted for by the employment of a rule-based grammar. Another approach to NLP concerns the use of the connectionist model, which has the benefits of learning, generalization and fault tolerance, among others. A third option merges the two previous approaches into a hybrid one: a symbolic thematic theory is used to supply the connectionist network with initial knowledge. Inspired on neuroscience, it is proposed a symbolic-connectionist hybrid system called BIO theta PRED (BIOlogically plausible thematic (theta) symbolic-connectionist PREDictor), designed to reveal the thematic grid assigned to a sentence. Its connectionist architecture comprises, as input, a featural representation of the words (based on the verb/noun WordNet classification and on the classical semantic microfeature representation), and, as output, the thematic grid assigned to the sentence. BIO theta PRED is designed to ""predict"" thematic (semantic) roles assigned to words in a sentence context, employing biologically inspired training algorithm and architecture, and adopting a psycholinguistic view of thematic theory.
Resumo:
The transition of plasmons from propagating to localized state was studied in disordered systems formed in GaAs/AlGaAs superlattices by impurities and by artificial random potential. Both the localization length and the linewidth of plasmons were measured by Raman scattering. The vanishing dependence of the plasmon linewidth on the disorder strength was shown to be a manifestation of the strong plasmon localization. The theoretical approach based on representation of the plasmon wave function in a Gaussian form well accounted for by the obtained experimental data.
Resumo:
In this paper, a formulation for representation of stiffeners in plane stress by the boundary elements method (BEM) in linear analysis is presented. The strategy is to adopt approximations for the displacements in the central line of the stiffener. With this simplification the Spurious oscillations in the stress along stiffeners with small thickness is prevented. Worked examples are analyzed to show the efficiency of these techniques, especially in the insertion of very narrow sub-regions, in which quasi-singular integrals are calculated, with stiffeners that are much stiffer than the main domain. The results obtained with this formulation are very close to those obtained with other formulations. (C) 2007 Elsevier Ltd. All rights reserved.
Resumo:
This paper investigates the validity of a simplified equivalent reservoir representation of a multi-reservoir hydroelectric system for modelling its optimal operation for power maximization. This simplification, proposed by Arvanitidis and Rosing (IEEE Trans Power Appar Syst 89(2):319-325, 1970), imputes a potential energy equivalent reservoir with energy inflows and outflows. The hydroelectric system is also modelled for power maximization considering individual reservoir characteristics without simplifications. Both optimization models employed MINOS package for solution of the non-linear programming problems. A comparison between total optimized power generation over the planning horizon by the two methods shows that the equivalent reservoir is capable of producing satisfactory power estimates with less than 6% underestimation. The generation and total reservoir storage trajectories along the planning horizon obtained by equivalent reservoir method, however, presented significant discrepancies as compared to those found in the detailed modelling. This study is motivated by the fact that Brazilian generation system operations are based on the equivalent reservoir method as part of the power dispatch procedures. The potential energy equivalent reservoir is an alternative which eliminates problems with the dimensionality of state variables in a dynamic programming model.
Resumo:
The objective of this study was to estimate the first-order intrinsic kinetic constant (k(1)) and the liquid-phase mass transfer coefficient (k(c)) in a bench-scale anaerobic sequencing batch biofilm reactor (ASBBR) fed with glucose. A dynamic heterogeneous mathematical model, considering two phases (liquid and solid), was developed through mass balances in the liquid and solid phases. The model was adjusted to experimental data obtained from the ASBBR applied for the treatment of glucose-based synthetic wastewater with approximately 500 mg L-1 of glucose, operating in 8 h batch cycles, at 30 degrees C and 300 rpm. The values of the parameters obtained were 0.8911 min(-1) for k(1) and 0.7644 cm min(-1) for kc. The model was validated utilizing the estimated parameters with data obtained from the ASBBR operating in 3 h batch cycles, with a good representation of the experimental behavior. The solid-phase mass transfer flux was found to be the limiting step of the overall glucose conversion rate.
Resumo:
This paper discusses the need to simultaneously monitor voltage unbalance and harmonic distortions in addition to root-mean-square voltage values. An alternative way to obtain the parameters related to voltage unbalance at fundamental frequency as well as voltage harmonic distortions is here proposed, which is based on the representation of instantaneous values at the axes and at the instantaneous Euclidean norm. A new power-quality (PQ) index is then proposed to combine the effects of voltage unbalance and harmonic distortions. This new index is easily implemented into existing electronic power meters. This PQ index is determined from the analysis of temperature rise in induction motor windings, which were tested for long periods of time. This paper also shows that these voltage disturbances, which are harmful to the lifetime expectancy of motors, can be measured by alternative ways in relation to conventional methods. Although this paper deals with induction motors only, the results show the relevance for further studies on other pieces of equipment.
Resumo:
This paper focuses on the flexural behavior of RC beams externally strengthened with Carbon Fiber Reinforced Polymers (CFRP) fabric. A non-linear finite element (FE) analysis strategy is proposed to support the beam flexural behavior experimental analysis. A development system (QUEBRA2D/FEMOOP programs) has been used to accomplish the numerical simulation. Appropriate constitutive models for concrete, rebars, CFRP and bond-slip interfaces have been implemented and adjusted to represent the composite system behavior. Interface and truss finite elements have been implemented (discrete and embedded approaches) for the numerical representation of rebars, interfaces and composites.
Resumo:
The objective of this work is to develop an improved model of the human thermal system. The features included are important to solve real problems: 3D heat conduction, the use of elliptical cylinders to adequately approximate body geometry, the careful representation of tissues and important organs, and the flexibility of the computational implementation. Focus is on the passive system, which is composed by 15 cylindrical elements and it includes heat transfer between large arteries and veins. The results of thermal neutrality and transient simulations are in excellent agreement with experimental data, indicating that the model represents adequately the behavior of the human thermal system. (C) 2009 Elsevier Ltd. All rights reserved.
Resumo:
We examine the representation of judgements of stochastic independence in probabilistic logics. We focus on a relational logic where (i) judgements of stochastic independence are encoded by directed acyclic graphs, and (ii) probabilistic assessments are flexible in the sense that they are not required to specify a single probability measure. We discuss issues of knowledge representation and inference that arise from our particular combination of graphs, stochastic independence, logical formulas and probabilistic assessments. (C) 2007 Elsevier B.V. All rights reserved.
Resumo:
In this study, the concept of cellular automata is applied in an innovative way to simulate the separation of phases in a water/oil emulsion. The velocity of the water droplets is calculated by the balance of forces acting on a pair of droplets in a group, and cellular automata is used to simulate the whole group of droplets. Thus, it is possible to solve the problem stochastically and to show the sequence of collisions of droplets and coalescence phenomena. This methodology enables the calculation of the amount of water that can be separated from the emulsion under different operating conditions, thus enabling the process to be optimized. Comparisons between the results obtained from the developed model and the operational performance of an actual desalting unit are carried out. The accuracy observed shows that the developed model is a good representation of the actual process. (C) 2010 Published by Elsevier Ltd.