914 resultados para uncontrolled vocabulary


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cette lecture, tant critique, comparative, et théorique que pédagogique, s’ancre dans le constat, premièrement, qu’il advient aux étudiantEs en littérature de se (re)poser la question des coûts et complicités qu’apprendre à lire et à écrire présuppose aujourd’hui; deuxièmement, que nos pratiques littéraires se trament au sein de lieux empreints de différences, que l’on peut nommer, selon le contexte, métaphore, récit, ville; et, troisièmement, que les efforts et investissements requis sont tout autant couteux et interminable qu’un plaisir et une nécessité politique. Ces conclusions tendent vers l’abstrait et le théorique, mais le langage en lequel elles sont articulées, langage corporel et urbain, de la dépendance et de la violence, cherche d’autant plus une qualité matérielle et concrète. Or, l’introduction propose un survol des lectures et comparaisons de Heroine de Gail Scott qui centre ce projet; identifie les contextes institutionnels, historiques, et personnels qui risquent, ensuite, de décentrer celui-ci. Le premier chapitre permet de cerner le matérialisme littéraire qui me sert de méthode par laquelle la littérature, à la fois, sollicite et offre une réponse à ces interrogations théoriques. Inspirée de l’œuvre de Gail Scott et Réjean Ducharme, premièrement, et de Walter Benjamin, Elisabeth Grosz, et Pierre Macherey ensuite, ‘matérialisme’ fait référence à cette collection de figures de pratiques littéraires et urbaines qui proviennent, par exemple, de Georges Perec, Michel DeCerteau, Barbara Johnson, et Patricia Smart, et qui invitent ensuite une réflexions sur les relations entre corporalité et narrativité, entre la nécessité et la contingence du littéraire. De plus, une collection de figures d’un Montréal littéraire et d’une cité pédagogique, acquis des œuvres de Zygmunt Bauman, Partricia Godbout, et Lewis Mumford, constitue en effet un vocabulaire nous permettant de mieux découvrir (et donc enseigner) ce que lire et apprendre requiert. Le deuxième chapitre propose une lecture comparée de Heroine et des romans des auteures québécoises Anne Dandurand, Marie Gagnon, et Tess Fragoulis, dans le contexte, premièrement, les débats entourant l’institutionnalisation de la littérature (anglo)Québécoise et, deuxièmement, des questions pédagogiques et politiques plus larges et plus urgentes que nous pose, encore aujourd’hui, cette violence récurrente qui s’acharna, par exemple, sur la Polytechnique en 1989. Or, cette intersection de la violence meurtrière, la pratique littéraire, et la pédagogie qui en résulte se pose et s’articule, encore, par le biais d’une collection de figures de styles. En fait, à travers le roman de Scott et de l’œuvre critique qui en fait la lecture, une série de craques invite à reconnaître Heroine comme étant, ce que j’appelle, un récit de dépendance, au sein duquel se concrétise une temporalité récursive et une logique d’introjection nous permettant de mieux comprendre la violence et, par conséquent, le pouvoir d’une pratique littéraire sur laquelle, ensuite, j’appuie ma pédagogie en devenir. Jetant, finalement, un regard rétrospectif sur l’oeuvre dans son entier, la conclusion de ce projet se tourne aussi vers l’avant, c’est-à-dire, vers ce que mes lectures dites matérialistes de la littérature canadienne et québécoise contribuent à mon enseignement de la langue anglaise en Corée du Sud. C’est dans ce contexte que les propos de Jacques Rancière occasionnent un dernier questionnement quant à l’historique des débats et des structures pédagogiques en Corée, d’une part, et, de l’autre, les conclusions que cette lecture de la fiction théorique de Gail Scott nous livre.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Les politiques de confidentialité définissent comment les services en ligne collectent, utilisent et partagent les données des utilisateurs. Bien qu’étant le principal moyen pour informer les usagers de l’utilisation de leurs données privées, les politiques de confidentialité sont en général ignorées par ces derniers. Pour cause, les utilisateurs les trouvent trop longues et trop vagues, elles utilisent un vocabulaire souvent difficile et n’ont pas de format standard. Les politiques de confidentialité confrontent également les utilisateurs à un dilemme : celui d’accepter obligatoirement tout le contenu en vue d’utiliser le service ou refuser le contenu sous peine de ne pas y avoir accès. Aucune autre option n’est accordée à l’utilisateur. Les données collectées des utilisateurs permettent aux services en ligne de leur fournir un service, mais aussi de les exploiter à des fins économiques (publicités ciblées, revente, etc). Selon diverses études, permettre aux utilisateurs de bénéficier de cette économie de la vie privée pourrait restaurer leur confiance et faciliter une continuité des échanges sur Internet. Dans ce mémoire, nous proposons un modèle de politique de confidentialité, inspiré du P3P (une recommandation du W3C, World Wide Web Consortium), en élargissant ses fonctionnalités et en réduisant sa complexité. Ce modèle suit un format bien défini permettant aux utilisateurs et aux services en ligne de définir leurs préférences et besoins. Les utilisateurs ont la possibilité de décider de l’usage spécifique et des conditions de partage de chacune de leurs données privées. Une phase de négociation permettra une analyse des besoins du service en ligne et des préférences de l’utilisateur afin d’établir un contrat de confidentialité. La valeur des données personnelles est un aspect important de notre étude. Alors que les compagnies disposent de moyens leur permettant d’évaluer cette valeur, nous appliquons dans ce mémoire, une méthode hiérarchique multicritères. Cette méthode va permettre également à chaque utilisateur de donner une valeur à ses données personnelles en fonction de l’importance qu’il y accorde. Dans ce modèle, nous intégrons également une autorité de régulation en charge de mener les négociations entre utilisateurs et services en ligne, et de générer des recommandations aux usagers en fonction de leur profil et des tendances.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The crisis in the foundations of mathematics is a conceptual crisis. I suggest that we embrace the crisis and adopt a pluralist position towards foundations. There are many foundations in mathematics. However, ‘many foundations’ (for one building) is an oxymoron. Therefore, we shift vocabulary to say that mathematics, as one discipline, is composed of many different theories. This entails that there are no absolute mathematical truths, only truths within a theory. There is no unified, consistent ontology, only ontology within a theory.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Les cellules endothéliales (EC) constituent une première barrière physique à la dissémination de virus pléiotropiques circulant par voie hématogène mais leur contribution à la défense innée anti-virale est peu connue. Des dysfonctions des EC de la barrière hémato-encéphalique (BMEC) et des sinusoïdes hépatiques (LSEC) ont été rapportées dans des neuropathologies et des hépatites aiguës ou chroniques d’origine virale, suggérant que des atteintes à leur intégrité contribuent à la pathogenèse. Les sérotypes de coronavirus de l’hépatite murine (MHV), se différenciant par leur capacité à induire des hépatites et des maladies neurologiques de sévérité variable et/ou leur tropisme pour les EC, représentent des modèles viraux privilégiés pour déterminer les conséquences de l’infection des EC sur la pathogenèse virale. Lors d’infection par voie hématogène, le sérotype MHV3, le plus virulent des MHV, induit une hépatite fulminante, caractérisée par une réponse inflammatoire sévère, et des lésions neurologiques secondaires alors que le sérotype moins virulent, MHV-A59, induit une hépatite modérée sans atteintes secondaires du système nerveux central (SNC). Par ailleurs, le sérotype MHV3, à la différence du MHV-A59, démontre une capacité à stimuler la production de cytokines par la voie TLR2. Les variants atténués du MHV3, les virus 51.6-MHV3 et YAC-MHV3, sont caractérisés par un faible tropisme pour les LSEC et induisent respectivement une hépatite modérée et subclinique. Compte tenu de l’importance des LSEC dans le maintien de la tolérance hépatique et de l’élimination des pathogènes circulants, il a été postulé que la sévérité de l’hépatite et de la réponse inflammatoire lors d’infections par les MHV est associée à la réplication virale et à l’altération des propriétés tolérogéniques et vasculaires des LSEC. Les désordres inflammatoires hépatiques pourraient résulter d’une activation différentielle du TLR2, plutôt que des autres TLR et des hélicases, selon les sérotypes. D’autre part, compte tenu du rôle des BMEC dans la prévention des infections du SNC, il a été postulé que l’invasion cérébrale secondaire par les coronavirus est reliée à l’infection des BMEC et le bris subséquent de la barrière hémato-encéphalique (BHE). À l’aide d’infections in vivo et in vitro par les différents sérotypes MHV, chez des souris ou des cultures de BMEC et de LSEC, nous avons démontré, d’une part, que l’infection in vitro des LSEC par le sétotype MHV3, à la différence des variants 51.6- et YAC-MHV3, altérait la production du facteur vasodilatant NO et renversait leur phénotype tolérogénique en favorisant la production de cytokines et de chimiokines inflammatoires. Ces dysfonctions se traduisaient in vivo par une réponse inflammatoire incontrôlée et une dérégulation du recrutement intrahépatique de leucocytes, favorisant la réplication virale et les dommages hépatiques. Nous avons aussi démontré, à l’aide de souris TLR2 KO et de LSEC dont l’expression du TLR2 a été abrogée par des siRNA, que la sévérité de l’hépatite et de la réponse inflammatoire induite par le sérotype MHV3, dépendait en partie de l’induction et de l’activation préférentielle du TLR2 par le virus dans le foie. D’autre part, la sévérité de la réplication virale au foie et des désordres dans le recrutement leucocytaire intrahépatique induits par le MHV3, et non par le MHV-A59 et le 51.6-MHV3, corrélaient avec une invasion virale subséquente du SNC, au niveau de la BHE. Nous avons démontré que l’invasion cérébrale du MHV3 était associée à une infection productive des BMEC et l’altération subséquente des protéines de jonctions serrées occludine, VE-cadhérine et ZO-1 se traduisant par une augmentation de la perméabilité de la BHE et l’entrée consécutive du virus dans le cerveau. Dans l’ensemble, les résultats de cette étude mettent en lumière l’importance du maintien de l’intégrité structurale et fonctionnelle des LSEC et des BMEC lors d’infections virales aigües par des MHV afin de limiter les dommages hépatiques associés à l’induction d’une réponse inflammatoire exagérée et de prévenir le passage des virus au cerveau suite à une dissémination par voie hématogène. Ils révèlent en outre un nouveau rôle aggravant pour le TLR2 dans l’évolution de l’hépatite virale aigüe ouvrant la voie à de nouvelles avenues thérapeutiques visant à moduler l’activité inflammatoire du TLR2.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The present thesis is an attempt to understand the role of GABA, GABAA and GABAB receptors in the regulation of liver cell proliferation using in vivo and in vitro models. The work also focuses on the brain GABAergic changes associated with normal and neoplastic cell growth in liver and to delineate its regulatory function. The investigation of mechanisms involving mitogenic models without cell necrosis may contribute our knowledge about both on cell growth, carcinogenesis, liver pathology and treatment. Objectives of the present study are, to induce controlled liver cell proliferation by partial hepatectomy and lead nitrate administration and uncontrolled cell proliferation by N-nitrosodiethylamine treatment in male Wistar rats, the changes in the content of GABA, GABAA,GABAB in various rat brain regions. To study the GABAA and GABAB receptor changes in brain stem, hypothalamus, cerebellum and cerebral cortex during the active cortex during the period of active DNA synthesis in liver of different experimental groups. The changes in GABAA and GABAB receptor function of the brain stem, hypothalamus and cerebellum play an important role sympathetic regulation of cell proliferation and neoplastic growth in liver. The decrease in GABA content in brain stem, hypothalamus and cerebellum during regeneration and neoplasia in liver. The time course of brain GABAergic changes was closely correlated with that of heptic DNA synthesis. The functional significance of these changes was further explored by studying the changes in GABAA and GABAB receptors in brain.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A new procedure for the classification of lower case English language characters is presented in this work . The character image is binarised and the binary image is further grouped into sixteen smaller areas ,called Cells . Each cell is assigned a name depending upon the contour present in the cell and occupancy of the image contour in the cell. A data reduction procedure called Filtering is adopted to eliminate undesirable redundant information for reducing complexity during further processing steps . The filtered data is fed into a primitive extractor where extraction of primitives is done . Syntactic methods are employed for the classification of the character . A decision tree is used for the interaction of the various components in the scheme . 1ike the primitive extraction and character recognition. A character is recognized by the primitive by primitive construction of its description . Openended inventories are used for including variants of the characters and also adding new members to the general class . Computer implementation of the proposal is discussed at the end using handwritten character samples . Results are analyzed and suggestions for future studies are made. The advantages of the proposal are discussed in detail .

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A critical survey of the fruits and vegetable markets of the towns and cities in South India reveals that banana fruit stalk wastes share a dominant proportion among the solid wastes generated. In the light of the review of literature presented in the foregoing section, few reports are available on the utilisation of banana waste for the production of alcoholic beverages, biogas, and single cell protein. However, it is not yet tried for the production of industrial enzymes. Moreover, preliminary fermentation studies conducted under uncontrolled conditions revealed that banana fruit stalk could be aptly utilised as solid substrate? for the industrial production of microbial amylases and cellulases at a cheaper cost. Therefore, it was proposed to conduct a detailed study towards the development of a suitable fermentation process for the production of industrial enzymes using banana fruit stalk wastes, which is rich in carbohydrate, as solid substrate, employing bacteria, under SSF.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Fish, a natural resource, has received great attention from all over the world. since it provides a cheap protein, employment and income to the millions of people for centuries. So fishermen, industrialist and multinationals are trying to exploit the marine resources to their maximum benefit by using modern craft, advance fishing equipments and efficient gear. Fishery resources in the open system particularly in oceans, were considered to be unlimited. However, recent developments in the innovation of efficient craft and gear using well tested material fitted with modern equipments that have greatly enhanced the mobility of craft, agility of gear and the ability of equipments to locate fishery resources have proved otherwise. Hence as the exploitation increases with more effort entering the fishery, the catch per unit of fishing effort starts to decline due to the limitness of the resources. The heavy fishing pressure in the recent past led to commercial extinction of a number of stocks such as. the North Sea herring, California sardine, Japanese Sardine and Peruvian anchovy (FAO. 1968: Gulland, 1974). In India, seer fish from Palk-Bay declined due to uncontrolled fishing (Devaraj 1983).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Statistical Machine Translation (SMT) is one of the potential applications in the field of Natural Language Processing. The translation process in SMT is carried out by acquiring translation rules automatically from the parallel corpora. However, for many language pairs (e.g. Malayalam- English), they are available only in very limited quantities. Therefore, for these language pairs a huge portion of phrases encountered at run-time will be unknown. This paper focuses on methods for handling such out-of-vocabulary (OOV) words in Malayalam that cannot be translated to English using conventional phrase-based statistical machine translation systems. The OOV words in the source sentence are pre-processed to obtain the root word and its suffix. Different inflected forms of the OOV root are generated and a match is looked up for the word variants in the phrase translation table of the translation model. A Vocabulary filter is used to choose the best among the translations of these word variants by finding the unigram count. A match for the OOV suffix is also looked up in the phrase entries and the target translations are filtered out. Structuring of the filtered phrases is done and SMT translation model is extended by adding OOV with its new phrase translations. By the results of the manual evaluation done it is observed that amount of OOV words in the input has been reduced considerably

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper discusses the implementation details of a child friendly, good quality, English text-to-speech (TTS) system that is phoneme-based, concatenative, easy to set up and use with little memory. Direct waveform concatenation and linear prediction coding (LPC) are used. Most existing TTS systems are unit-selection based, which use standard speech databases available in neutral adult voices.Here reduced memory is achieved by the concatenation of phonemes and by replacing phonetic wave files with their LPC coefficients. Linguistic analysis was used to reduce the algorithmic complexity instead of signal processing techniques. Sufficient degree of customization and generalization catering to the needs of the child user had been included through the provision for vocabulary and voice selection to suit the requisites of the child. Prosody had also been incorporated. This inexpensive TTS systemwas implemented inMATLAB, with the synthesis presented by means of a graphical user interface (GUI), thus making it child friendly. This can be used not only as an interesting language learning aid for the normal child but it also serves as a speech aid to the vocally disabled child. The quality of the synthesized speech was evaluated using the mean opinion score (MOS).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As the number of resources on the web exceeds by far the number of documents one can track, it becomes increasingly difficult to remain up to date on ones own areas of interest. The problem becomes more severe with the increasing fraction of multimedia data, from which it is difficult to extract some conceptual description of their contents. One way to overcome this problem are social bookmark tools, which are rapidly emerging on the web. In such systems, users are setting up lightweight conceptual structures called folksonomies, and overcome thus the knowledge acquisition bottleneck. As more and more people participate in the effort, the use of a common vocabulary becomes more and more stable. We present an approach for discovering topic-specific trends within folksonomies. It is based on a differential adaptation of the PageRank algorithm to the triadic hypergraph structure of a folksonomy. The approach allows for any kind of data, as it does not rely on the internal structure of the documents. In particular, this allows to consider different data types in the same analysis step. We run experiments on a large-scale real-world snapshot of a social bookmarking system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Context awareness, dynamic reconfiguration at runtime and heterogeneity are key characteristics of future distributed systems, particularly in ubiquitous and mobile computing scenarios. The main contributions of this dissertation are theoretical as well as architectural concepts facilitating information exchange and fusion in heterogeneous and dynamic distributed environments. Our main focus is on bridging the heterogeneity issues and, at the same time, considering uncertain, imprecise and unreliable sensor information in information fusion and reasoning approaches. A domain ontology is used to establish a common vocabulary for the exchanged information. We thereby explicitly support different representations for the same kind of information and provide Inter-Representation Operations that convert between them. Special account is taken of the conversion of associated meta-data that express uncertainty and impreciseness. The Unscented Transformation, for example, is applied to propagate Gaussian normal distributions across highly non-linear Inter-Representation Operations. Uncertain sensor information is fused using the Dempster-Shafer Theory of Evidence as it allows explicit modelling of partial and complete ignorance. We also show how to incorporate the Dempster-Shafer Theory of Evidence into probabilistic reasoning schemes such as Hidden Markov Models in order to be able to consider the uncertainty of sensor information when deriving high-level information from low-level data. For all these concepts we provide architectural support as a guideline for developers of innovative information exchange and fusion infrastructures that are particularly targeted at heterogeneous dynamic environments. Two case studies serve as proof of concept. The first case study focuses on heterogeneous autonomous robots that have to spontaneously form a cooperative team in order to achieve a common goal. The second case study is concerned with an approach for user activity recognition which serves as baseline for a context-aware adaptive application. Both case studies demonstrate the viability and strengths of the proposed solution and emphasize that the Dempster-Shafer Theory of Evidence should be preferred to pure probability theory in applications involving non-linear Inter-Representation Operations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the vision of Mark Weiser on ubiquitous computing, computers are disappearing from the focus of the users and are seamlessly interacting with other computers and users in order to provide information and services. This shift of computers away from direct computer interaction requires another way of applications to interact without bothering the user. Context is the information which can be used to characterize the situation of persons, locations, or other objects relevant for the applications. Context-aware applications are capable of monitoring and exploiting knowledge about external operating conditions. These applications can adapt their behaviour based on the retrieved information and thus to replace (at least a certain amount) the missing user interactions. Context awareness can be assumed to be an important ingredient for applications in ubiquitous computing environments. However, context management in ubiquitous computing environments must reflect the specific characteristics of these environments, for example distribution, mobility, resource-constrained devices, and heterogeneity of context sources. Modern mobile devices are equipped with fast processors, sufficient memory, and with several sensors, like Global Positioning System (GPS) sensor, light sensor, or accelerometer. Since many applications in ubiquitous computing environments can exploit context information for enhancing their service to the user, these devices are highly useful for context-aware applications in ubiquitous computing environments. Additionally, context reasoners and external context providers can be incorporated. It is possible that several context sensors, reasoners and context providers offer the same type of information. However, the information providers can differ in quality levels (e.g. accuracy), representations (e.g. position represented in coordinates and as an address) of the offered information, and costs (like battery consumption) for providing the information. In order to simplify the development of context-aware applications, the developers should be able to transparently access context information without bothering with underlying context accessing techniques and distribution aspects. They should rather be able to express which kind of information they require, which quality criteria this information should fulfil, and how much the provision of this information should cost (not only monetary cost but also energy or performance usage). For this purpose, application developers as well as developers of context providers need a common language and vocabulary to specify which information they require respectively they provide. These descriptions respectively criteria have to be matched. For a matching of these descriptions, it is likely that a transformation of the provided information is needed to fulfil the criteria of the context-aware application. As it is possible that more than one provider fulfils the criteria, a selection process is required. In this process the system has to trade off the provided quality of context and required costs of the context provider against the quality of context requested by the context consumer. This selection allows to turn on context sources only if required. Explicitly selecting context services and thereby dynamically activating and deactivating the local context provider has the advantage that also the resource consumption is reduced as especially unused context sensors are deactivated. One promising solution is a middleware providing appropriate support in consideration of the principles of service-oriented computing like loose coupling, abstraction, reusability, or discoverability of context providers. This allows us to abstract context sensors, context reasoners and also external context providers as context services. In this thesis we present our solution consisting of a context model and ontology, a context offer and query language, a comprehensive matching and mediation process and a selection service. Especially the matching and mediation process and the selection service differ from the existing works. The matching and mediation process allows an autonomous establishment of mediation processes in order to transfer information from an offered representation into a requested representation. In difference to other approaches, the selection service selects not only a service for a service request, it rather selects a set of services in order to fulfil all requests which also facilitates the sharing of services. The approach is extensively reviewed regarding the different requirements and a set of demonstrators shows its usability in real-world scenarios.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis describes a methodology, a representation, and an implemented program for troubleshooting digital circuit boards at roughly the level of expertise one might expect in a human novice. Existing methods for model-based troubleshooting have not scaled up to deal with complex circuits, in part because traditional circuit models do not explicitly represent aspects of the device that troubleshooters would consider important. For complex devices the model of the target device should be constructed with the goal of troubleshooting explicitly in mind. Given that methodology, the principal contributions of the thesis are ways of representing complex circuits to help make troubleshooting feasible. Temporally coarse behavior descriptions are a particularly powerful simplification. Instantiating this idea for the circuit domain produces a vocabulary for describing digital signals. The vocabulary has a level of temporal detail sufficient to make useful predictions abut the response of the circuit while it remains coarse enough to make those predictions computationally tractable. Other contributions are principles for using these representations. Although not embodied in a program, these principles are sufficiently concrete that models can be constructed manually from existing circuit descriptions such as schematics, part specifications, and state diagrams. One such principle is that if there are components with particularly likely failure modes or failure modes in which their behavior is drastically simplified, this knowledge should be incorporated into the model. Further contributions include the solution of technical problems resulting from the use of explicit temporal representations and design descriptions with tangled hierarchies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In a distributed model of intelligence, peer components need to communicate with one another. I present a system which enables two agents connected by a thick twisted bundle of wires to bootstrap a simple communication system from observations of a shared environment. The agents learn a large vocabulary of symbols, as well as inflections on those symbols which allow thematic role-frames to be transmitted. Language acquisition time is rapid and linear in the number of symbols and inflections. The final communication system is robust and performance degrades gradually in the face of problems.