970 resultados para Lot-sizing
Resumo:
We consider the problem of detecting a large number of different classes of objects in cluttered scenes. Traditional approaches require applying a battery of different classifiers to the image, at multiple locations and scales. This can be slow and can require a lot of training data, since each classifier requires the computation of many different image features. In particular, for independently trained detectors, the (run-time) computational complexity, and the (training-time) sample complexity, scales linearly with the number of classes to be detected. It seems unlikely that such an approach will scale up to allow recognition of hundreds or thousands of objects. We present a multi-class boosting procedure (joint boosting) that reduces the computational and sample complexity, by finding common features that can be shared across the classes (and/or views). The detectors for each class are trained jointly, rather than independently. For a given performance level, the total number of features required, and therefore the computational cost, is observed to scale approximately logarithmically with the number of classes. The features selected jointly are closer to edges and generic features typical of many natural structures instead of finding specific object parts. Those generic features generalize better and reduce considerably the computational cost of an algorithm for multi-class object detection.
Resumo:
A computer may gather a lot of information from its environment in an optical or graphical manner. A scene, as seen for instance from a TV camera or a picture, can be transformed into a symbolic description of points and lines or surfaces. This thesis describes several programs, written in the language CONVERT, for the analysis of such descriptions in order to recognize, differentiate and identify desired objects or classes of objects in the scene. Examples are given in each case. Although the recognition might be in terms of projections of 2-dim and 3-dim objects, we do not deal with stereoscopic information. One of our programs (Polybrick) identifies parallelepipeds in a scene which may contain partially hidden bodies and non-parallelepipedic objects. The program TD works mainly with 2-dimensional figures, although under certain conditions successfully identifies 3-dim objects. Overlapping objects are identified when they are transparent. A third program, DT, works with 3-dim and 2-dim objects, and does not identify objects which are not completely seen. Important restrictions and suppositions are: (a) the input is assumed perfect (noiseless), and in a symbolic format; (b) no perspective deformation is considered. A portion of this thesis is devoted to the study of models (symbolic representations) of the objects we want to identify; different schemes, some of them already in use, are discussed. Focusing our attention on the more general problem of identification of general objects when they substantially overlap, we propose some schemes for their recognition, and also analyze some problems that are met.
Resumo:
Ginseng is one of the most expensive Chinese herbal medicines and the effectiveness of ginseng depends strongly on its botanical sources and the use of different parts of the plants. In this study, a microchip electrophoresis method coupled with the polymerase chain reaction (PCR)-short tandem repeats (STR) technique was developed for rapid authentication of ginseng species. A low viscosity hydroxypropyl methylcellulose (HPMC) solution was used as the sieving matrix for separation of the amplified STR fragments. The allele sizing of the amplified PCR products could be detected within 240 s or less. Good reproducibility and accuracy of the fragment size were obtained with the relative standard deviation for the allele sizes less than 1.0% (n = 11). At two microsatellite loci (CT 12, CA 33), American ginseng had a different allele pattern on the electropherograms compared with that of the Oriental ginseng. Moreover, cultivated and wild American ginseng can be distinguished on the basis of allele sizing. This work establishes the feasibility of fast genetic authentication of ginseng species by use of microchip electrophoresis.
Resumo:
Malicious software (malware) have significantly increased in terms of number and effectiveness during the past years. Until 2006, such software were mostly used to disrupt network infrastructures or to show coders’ skills. Nowadays, malware constitute a very important source of economical profit, and are very difficult to detect. Thousands of novel variants are released every day, and modern obfuscation techniques are used to ensure that signature-based anti-malware systems are not able to detect such threats. This tendency has also appeared on mobile devices, with Android being the most targeted platform. To counteract this phenomenon, a lot of approaches have been developed by the scientific community that attempt to increase the resilience of anti-malware systems. Most of these approaches rely on machine learning, and have become very popular also in commercial applications. However, attackers are now knowledgeable about these systems, and have started preparing their countermeasures. This has lead to an arms race between attackers and developers. Novel systems are progressively built to tackle the attacks that get more and more sophisticated. For this reason, a necessity grows for the developers to anticipate the attackers’ moves. This means that defense systems should be built proactively, i.e., by introducing some security design principles in their development. The main goal of this work is showing that such proactive approach can be employed on a number of case studies. To do so, I adopted a global methodology that can be divided in two steps. First, understanding what are the vulnerabilities of current state-of-the-art systems (this anticipates the attacker’s moves). Then, developing novel systems that are robust to these attacks, or suggesting research guidelines with which current systems can be improved. This work presents two main case studies, concerning the detection of PDF and Android malware. The idea is showing that a proactive approach can be applied both on the X86 and mobile world. The contributions provided on this two case studies are multifolded. With respect to PDF files, I first develop novel attacks that can empirically and optimally evade current state-of-the-art detectors. Then, I propose possible solutions with which it is possible to increase the robustness of such detectors against known and novel attacks. With respect to the Android case study, I first show how current signature-based tools and academically developed systems are weak against empirical obfuscation attacks, which can be easily employed without particular knowledge of the targeted systems. Then, I examine a possible strategy to build a machine learning detector that is robust against both empirical obfuscation and optimal attacks. Finally, I will show how proactive approaches can be also employed to develop systems that are not aimed at detecting malware, such as mobile fingerprinting systems. In particular, I propose a methodology to build a powerful mobile fingerprinting system, and examine possible attacks with which users might be able to evade it, thus preserving their privacy. To provide the aforementioned contributions, I co-developed (with the cooperation of the researchers at PRALab and Ruhr-Universität Bochum) various systems: a library to perform optimal attacks against machine learning systems (AdversariaLib), a framework for automatically obfuscating Android applications, a system to the robust detection of Javascript malware inside PDF files (LuxOR), a robust machine learning system to the detection of Android malware, and a system to fingerprint mobile devices. I also contributed to develop Android PRAGuard, a dataset containing a lot of empirical obfuscation attacks against the Android platform. Finally, I entirely developed Slayer NEO, an evolution of a previous system to the detection of PDF malware. The results attained by using the aforementioned tools show that it is possible to proactively build systems that predict possible evasion attacks. This suggests that a proactive approach is crucial to build systems that provide concrete security against general and evasion attacks.
Resumo:
Thomas, R. & Urquhart, C. NHS Wales e-library portal evaluation. (For Informing Healthcare Strategy implementation programme). Aberystwyth: Department of Information Studies, University of Wales Aberystwyth Follow-on to NHS Wales User Needs study Sponsorship: Informing Healthcare, NHS Wales
Resumo:
Wydział Filologii Polskiej i Klasycznej: Instytut Filologii Polskiej
Resumo:
Wydział Nauk Politycznych i Dziennikarstwa
Resumo:
Wydział Historyczny: Instytut Historii
Resumo:
Las personas somos seres sociales, las relaciones con otros y otras nos construyen. Vivir con los demás puede generar conflictos y dificultades, generando malestar en agresores/as, víctimas y espectadores/as. Existen múltiples factores de riesgo favorecedores de conductas que dificultan la convivencia, las investigaciones sobre este fenómeno coinciden en que son los factores socio familiares los más influyentes, los estilos de comunicación familiar, el contexto social en el que se habita, los medios de comunicación. Como futuros/as docentes no podemos ser ajenos/as a estas influencias sociales y al protagonismo que tiene la escuela en la aparición de estos comportamientos, es necesario acercarse a estas dificultades de convivencia, identificar las conductas e interrogarnos sobre estrategias que pueden disminuir el mal clima escolar y estos comportamientos que también influyen en el aprendizaje.
Resumo:
One can say that our times are dominated by visual communication. Usually all day long we have been faced by various pictures, visual forms and symbols. According to the subject of the book 'Archaeology-Culture-Ideologies' I found it interesting to pay attention to the problem of visual representation, or better say visual symbols in nowadays communication and culture, their meaning and importance. From this point of view I would like to show the role of archaeologists who discover, interpret or even create some of them. The subject is not new of course, but the most often it is taken into consideration by the scholars who practice in social anthropology or philosophy and quite rarely it appear in studies of archaeologies, especially in Polish tradition. In my opinion the subject concerning visual symbols communication and archaeology arise several important questions that are also valid for the theme of book 'Archaeology-Culture-Ideologies'. The first is socio-cultural role of our discipline, next the danger of political and propaganda misuse of the results of archaeological research and then also commercialisation of the archaeological activities. The problem of visualisation and visual-communication can be the matter of various studies. In my paper from the beginning I would like to present the general view concerning visual symbols and figural motifs and the main ideas and approaches to study them from different humanistic perspectives. Then in my presentation I am going to discuss the question why in our culture the visual symbols and representations became so popular – compare to other ways of human expression, for example verbal symbol communication. I would like to see the problem in historical perspective as well. There are a lot of evidences, which support the statement about the power of visual symbols in history. In ancient times for example Horace in 'Ars Poetica' suggested that human mind usually is much more impressed by eyes than by ears. In my opinion that is quite often in human culture that visual impression is before mental one. Visual representations and symbols are very powerful, they can show and communicate various phenomena, they act immediately and quite often in easily way they can associate. So for archaeological research it could be very important to make some studies concerning the ancient symbols and general iconography and also it would be grateful to make some attempts for the study what kind of potential meaning could have visual symbols. In my paper I can only make some general statement about it. But the most important for the topic is reflection on prehistoric and ancient visual symbols and representation and their presence in contemporary culture. So after some general statements concerning the visual symbols examined from various perspectives finally I would like to point out with support of some examples how ancient and prehistoric visual symbols and images are still used and captured by contemporary culture and what is or should be the role of archaeologists activity concerning this matter.
Resumo:
Wydział Nauk Geograficznych i Geologicznych
Resumo:
Projeto de Pós-Graduação/Dissertação apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do grau de Mestre em Ciências Farmacêuticas
Resumo:
Projeto de Pós-Graduação/Dissertação apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do grau de Mestre em Ciências Farmacêuticas
Resumo:
Entrepreneurship is having the courage to transform an idea in reality and with it achieve personal, financial and recognition satisfaction. The psychological ability to handle failure has proven essential in success. Goal: Analyse the importance of idiosyncratic psychological aspects in the success of entrepreneurs. Method: Observational study, using a case study, a group of 20 entrepreneurs from the idea presentation phase to company incorporation during a period of two months. Results: During the observation period 4 distinct psychological phases of the entrepreneurs were observed, being it possible to describe them as follows: absorption of information and knowledge; application of the gathered knowledge to their specific cases; frustration generated by criticism, namely from investors who don’t recognize the value of their projects; realism and implementation of the project. Having passed more than 6 months after the analysis period, one can verify the entrepreneurs who have travelled the 4 phases and specially reached the realism of Phase 4, are today developing their projects being that the remaining ones, majority of which weren’t able to overcome Phase 3, are in a similar situation as at the end of the initial two months. Conclusion: The ability to cope with frustration and rejection is a determinant factor in the success of the entrepreneur. The ability to learn from rejection, more than resilience help the entrepreneur to proceed. Therefore, based on the observations, entrepreneurship has a lot to gain if besides technical assistance also coaching assistance is provided.
Resumo:
The topic of this thesis is an acoustic scattering technique for detennining the compressibility and density of individual particles. The particles, which have diameters on the order of 10 µm, are modeled as fluid spheres. Ultrasonic tone bursts of 2 µsec duration and 30 MHz center frequency scatter from individual particles as they traverse the focal region of two confocally positioned transducers. One transducer acts as a receiver while the other both transmits and receives acoustic signals. The resulting scattered bursts are detected at 90° and at 180° (backscattered). Using either the long wavelength (Rayleigh) or the weak scatterer (Born) approximations, it is possible to detennine the compressibility and density of the particle provided we possess a priori knowledge of the particle size and the host properties. The detected scattered signals are digitized and stored in computer memory. With this information we can compute the mean compressibility and density averaged over a population of particles ( typically 1000 particles) or display histograms of scattered amplitude statistics. An experiment was run first run to assess the feasibility of using polystyrene polymer microspheres to calibrate the instrument. A second study was performed on the buffy coat harvested from whole human blood. Finally, chinese hamster ovary cells which were subject to hyperthermia treatment were studied in order to see if the instrument could detect heat induced membrane blebbing.