920 resultados para Secret--Aspect psychologique--Enquêtes
Resumo:
Text is the main method of communicating information in the digital age. Messages, blogs, news articles, reviews, and opinionated information abounds on the Internet. People commonly purchase products online and post their opinions about purchased items. This feedback is displayed publicly to assist others with their purchasing decisions, creating the need for a mechanism with which to extract and summarize useful information for enhancing the decision-making process. Our contribution is to improve the accuracy of extraction by combining different techniques from three major areas, named Data Mining, Natural Language Processing techniques and Ontologies. The proposed framework sequentially mines product’s aspects and users’ opinions, groups representative aspects by similarity, and generates an output summary. This paper focuses on the task of extracting product aspects and users’ opinions by extracting all possible aspects and opinions from reviews using natural language, ontology, and frequent “tag” sets. The proposed framework, when compared with an existing baseline model, yielded promising results.
Resumo:
This paper proposes a physically motivated reappraisal of manoeuvring models for ships and presents a new model developed from first principles by application of low aspect-ratio aerodynamic theory and Lagrangian mechanics. The coefficients of the model are shown to be related to physical processes, and validation is presented using the results from a planar motion mechanism dataset.
Resumo:
This series of research vignettes is aimed at sharing current and interesting research findings from international entrepreneurship researchers. In this vignette, Dr. Martin Obschonka, considers the relationship between entrepreneurship and rule-breaking.
Resumo:
A crucial issue with hybrid quantum secret sharing schemes is the amount of data that is allocated to the participants. The smaller the amount of allocated data, the better the performance of a scheme. Moreover, quantum data is very hard and expensive to deal with, therefore, it is desirable to use as little quantum data as possible. To achieve this goal, we first construct extended unitary operations by the tensor product of n, n ≥ 2, basic unitary operations, and then by using those extended operations, we design two quantum secret sharing schemes. The resulting dual compressible hybrid quantum secret sharing schemes, in which classical data play a complementary role to quantum data, range from threshold to access structure. Compared with the existing hybrid quantum secret sharing schemes, our proposed schemes not only reduce the number of quantum participants, but also the number of particles and the size of classical shares. To be exact, the number of particles that are used to carry quantum data is reduced to 1 while the size of classical secret shares also is also reduced to l−2 m−1 based on ((m+1, n′)) threshold and to l−2 r2 (where r2 is the number of maximal unqualified sets) based on adversary structure. Consequently, our proposed schemes can greatly reduce the cost and difficulty of generating and storing EPR pairs and lower the risk of transmitting encoded particles.
Resumo:
Secret Millionaires Club is an animated series of 26 webisodes featuring Warren Buffett (CEO and largest shareholder of Berkshire Hathaway) as a secret mentor to a group of kids who learn practical life lessons during fun-filled adventures in business.
Senator Elizabeth Warren fights the White House over the secret Trans-Pacific Partnership #TPP #TPPA
Resumo:
In his visit to the G20 in Brisbane, President Barack Obama sought to promote his ambitious Pacific Rim trade agreement — the Trans-Pacific Partnership (TPP). He told an audience at the University of Queensland: We’ll keep leading the effort to realize the Trans-Pacific Partnership to lower barriers, open markets, export goods, and create good jobs for our people. But with the 12 countries of the TPP making up nearly 40 percent of the global economy, this is also about something bigger. It is our chance to put in place new, high standards for trade in the 21st century that uphold our values. So, for example, we are pushing new standards in this trade agreement, requiring countries that participate to protect their workers better and to protect the environment better, and protect intellectual property that unleashes innovation, and baseline standards to ensure transparency and rule of law.
Resumo:
Product reviews are the foremost source of information for customers and manufacturers to help them make appropriate purchasing and production decisions. Natural language data is typically very sparse; the most common words are those that do not carry a lot of semantic content, and occurrences of any particular content-bearing word are rare, while co-occurrences of these words are rarer. Mining product aspects, along with corresponding opinions, is essential for Aspect-Based Opinion Mining (ABOM) as a result of the e-commerce revolution. Therefore, the need for automatic mining of reviews has reached a peak. In this work, we deal with ABOM as sequence labelling problem and propose a supervised extraction method to identify product aspects and corresponding opinions. We use Conditional Random Fields (CRFs) to solve the extraction problem and propose a feature function to enhance accuracy. The proposed method is evaluated using two different datasets. We also evaluate the effectiveness of feature function and the optimisation through multiple experiments.
Resumo:
The Anti-Counterfeiting Trade Agreement (ACTA) 2011 - Twitter hashtag #ACTA - is a controversial trade agreement designed to provide for stronger enforcement of intellectual property rights.
Resumo:
This thesis successfully introduced the intellectual framework of immunology in the development of bone biomaterials. The project identified the regulatory role of biomaterials to the immune-response in terms of bone formation and healing of bone defects. The novel methods developed in the project will significantly change the ways of biomaterials assessment and evaluation.
Resumo:
Protocols for secure archival storage are becoming increasingly important as the use of digital storage for sensitive documents is gaining wider practice. Wong et al.[8] combined verifiable secret sharing with proactive secret sharing without reconstruction and proposed a verifiable secret redistribution protocol for long term storage. However their protocol requires that each of the receivers is honest during redistribution. We proposed[3] an extension to their protocol wherein we relaxed the requirement that all the recipients should be honest to the condition that only a simple majority amongst the recipients need to be honest during the re(distribution) processes. Further, both of these protocols make use of Feldman's approach for achieving integrity during the (redistribution processes. In this paper, we present a revised version of our earlier protocol, and its adaptation to incorporate Pedersen's approach instead of Feldman's thereby achieving information theoretic secrecy while retaining integrity guarantees.
Resumo:
The prevalence and developmental course of supposed ‘secret language’ was examined in a cohort of twins and closely spaced singletons pairs, with systematic assessments at 20 months and again at 36 months. Two forms of apparent ‘secret language’ were examined: (1) shared understanding—speech directed generally but unintelligible to the parent, although apparently clearly understood within the child pair, and (2) private language directed exclusively to the other twin/sibling—not intelligible to the parent, but apparently clearly understood and used only within the child pair. Both occurred in singleton pairs, but the rate was much higher in twins. In most cases it seemed to be a developmental phenomenon occurring in the second year of life with the emergence of immature speech, and decreasing considerably over the next 16 months. A small group of children, primarily male twins, was reported to use a private language at 36 months. This group had poorer cognitive and language functioning, and was characterized by highly dependent relationships. Some aspects of the twins’ home environment were less stimulating and less responsive, most probably reflecting the abilities and relationships of the children. A follow-up of these children when they were ~6 years of age showed that language outcome was poor for the subgroup (n = 4) who did not develop normal language alongside the use of a private language.
Resumo:
In much the same way that a squirrel stores a range of food in a range of places, the Australian Curriculum, Assessment and Reporting Authority’s (ACARA) Australian Curriculum: English (ACARA, 2015) stores references to grammar in a range of places. This paper explores some seemingly ‘hidden’ grammars within the AC:E to (re)discover their genesis and how they unfold across Foundation to Year 6. The first ‘Secret Squirrel’ moment centres on the introduction of a new grammar which weaves traditional Latin-based and Systemic Functional Linguistics (SFL) theory. The second ‘Secret Squirrel’ moment centres on the use of one sub-system of SFL Theory, the System of Appraisal, and its potential to provide an analytical lens for ‘reading’ the interpersonal meaning within narratives. The remainder of the paper draws on Goodson’s (1990) notion of curriculum as a social construction, paying attention to the levels of processes and (potential) practice. This part of the paper focuses on the System of Appraisal as it is introduced in the AC:E and then translates the Content Descriptions to an example analysis. One stimulus text, Melanie Watt’s (2012) children’s picture book ‘Scaredy Squirrel at the Beach’, is introduced then analysed using the System of Appraisal as an analytical lens for identifying how language choices ‘go to work’ (Macken-Horarik, 2003, p. 285) on readers, that is how Watt’s language choices are crafted so a ‘compliant’ child reader (Martin & White, 2005, p. 62) has the opportunity to ‘feel with’ and thus ‘adjudicate’ the behaviour of characters in particular ways (Macken-Horarik, 2003, p. 285).
Resumo:
‘Conditions of Compromise and Failure (The Dickensian Aspect)' acts as a re-enactment of the common trope of television detective dramas. A result of the artist’s repeated immersions in the television program ‘The Wire’, the work forms a node-map of all the named characters featured on the show. While each coloured thread represents and connects together the Byzantine narrative between all of the characters, the sheer mass of connections obfuscates any clear reading at all.