885 resultados para implicit authentication
Resumo:
abstract With many visual speech animation techniques now available, there is a clear need for systematic perceptual evaluation schemes. We describe here our scheme and its application to a new video-realistic (potentially indistinguishable from real recorded video) visual-speech animation system, called Mary 101. Two types of experiments were performed: a) distinguishing visually between real and synthetic image- sequences of the same utterances, ("Turing tests") and b) gauging visual speech recognition by comparing lip-reading performance of the real and synthetic image-sequences of the same utterances ("Intelligibility tests"). Subjects that were presented randomly with either real or synthetic image-sequences could not tell the synthetic from the real sequences above chance level. The same subjects when asked to lip-read the utterances from the same image-sequences recognized speech from real image-sequences significantly better than from synthetic ones. However, performance for both, real and synthetic, were at levels suggested in the literature on lip-reading. We conclude from the two experiments that the animation of Mary 101 is adequate for providing a percept of a talking head. However, additional effort is required to improve the animation for lip-reading purposes like rehabilitation and language learning. In addition, these two tasks could be considered as explicit and implicit perceptual discrimination tasks. In the explicit task (a), each stimulus is classified directly as a synthetic or real image-sequence by detecting a possible difference between the synthetic and the real image-sequences. The implicit perceptual discrimination task (b) consists of a comparison between visual recognition of speech of real and synthetic image-sequences. Our results suggest that implicit perceptual discrimination is a more sensitive method for discrimination between synthetic and real image-sequences than explicit perceptual discrimination.
Resumo:
Interviews with more than 40 leaders in the Boston area health care industry have identified a range of broadly-felt critical problems. This document synthesizes these problems and places them in the context of work and family issues implicit in the organization of health care workplaces. It concludes with questions about possible ways to address such issues. The defining circumstance for the health care industry nationally as well as regionally at present is an extraordinary reorganization, not yet fully negotiated, in the provision and financing of health care. Hoped-for controls on increased costs of medical care – specifically the widespread replacement of indemnity insurance by market-based managed care and business models of operation--have fallen far short of their promise. Pressures to limit expenditures have produced dispiriting conditions for the entire healthcare workforce, from technicians and aides to nurses and physicians. Under such strains, relations between managers and workers providing care are uneasy, ranging from determined efforts to maintain respectful cooperation to adversarial negotiation. Taken together, the interviews identify five key issues affecting a broad cross-section of occupational groups, albeit in different ways: Staffing shortages of various kinds throughout the health care workforce create problems for managers and workers and also for the quality of patient care. Long work hours and inflexible schedules place pressure on virtually every part of the healthcare workforce, including physicians. Degraded and unsupportive working conditions, often the result of workplace "deskilling" and "speed up," undercut previous modes of clinical practice. Lack of opportunities for training and advancement exacerbate workforce problems in an industry where occupational categories and terms of work are in a constant state of flux. Professional and employee voices are insufficiently heard in conditions of rapid institutional reorganization and consolidation. Interviewees describe multiple impacts of these issues--on the operation of health care workplaces, on the well being of the health care workforce, and on the quality of patient care. Also apparent in the interviews, but not clearly named and defined, is the impact of these issues on the ability of workers to attend well to the needs of their families--and the reciprocal impact of workers' family tensions on workplace performance. In other words, the same things that affect patient care also affect families, and vice versa. Some workers describe feeling both guilty about raising their own family issues when their patients' needs are at stake, and resentful about the exploitation of these feelings by administrators making workplace policy. The different institutions making up the health care system have responded to their most pressing issues with a variety of specific stratagems but few that address the complexities connecting relations between work and family. The MIT Workplace Center proposes a collaborative exploration of next steps to probe these complications and to identify possible locations within the health care system for workplace experimentation with outcomes benefiting all parties.
Resumo:
TCP flows from applications such as the web or ftp are well supported by a Guaranteed Minimum Throughput Service (GMTS), which provides a minimum network throughput to the flow and, if possible, an extra throughput. We propose a scheme for a GMTS using Admission Control (AC) that is able to provide different minimum throughput to different users and that is suitable for "standard" TCP flows. Moreover, we consider a multidomain scenario where the scheme is used in one of the domains, and we propose some mechanisms for the interconnection with neighbor domains. The whole scheme uses a small set of packet classes in a core-stateless network where each class has a different discarding priority in queues assigned to it. The AC method involves only edge nodes and uses a special probing packet flow (marked as the highest discarding priority class) that is sent continuously from ingress to egress through a path. The available throughput in the path is obtained at the egress using measurements of flow aggregates, and then it is sent back to the ingress. At the ingress each flow is detected using an implicit way and then it is admission controlled. If it is accepted, it receives the GMTS and its packets are marked as the lowest discarding priority classes; otherwise, it receives a best-effort service. The scheme is evaluated through simulation in a simple "bottleneck" topology using different traffic loads consisting of "standard" TCP flows that carry files of varying sizes
Resumo:
In dam inspection tasks, an underwater robot has to grab images while surveying the wall meanwhile maintaining a certain distance and relative orientation. This paper proposes the use of an MSIS (mechanically scanned imaging sonar) for relative positioning of a robot with respect to the wall. An imaging sonar gathers polar image scans from which depth images (range & bearing) are generated. Depth scans are first processed to extract a line corresponding to the wall (with the Hough transform), which is then tracked by means of an EKF (Extended Kalman Filter) using a static motion model and an implicit measurement equation associating the sensed points to the candidate line. The line estimate is referenced to the robot fixed frame and represented in polar coordinates (rho&thetas) which directly corresponds to the actual distance and relative orientation of the robot with respect to the wall. The proposed system has been tested in simulation as well as in water tank conditions
Resumo:
The purpose of resource management is the efficient and effective use of network resources, for instance bandwidth. In this article, a connection oriented network scenario is considered, where a certain amount of bandwidth is reserved for each label switch path (LSP), which is a logical path, in a MPLS or GMPLS environment. Assuming there is also some kind of admission control (explicit or implicit), these environments typically provide quality of service (QoS) guarantees. It could happen that some LSPs become busy, thus rejecting connections, while other LSPs may be under-utilised. We propose a distributed lightweight monitoring technique, based on threshold values, the objective of which is to detect congestion when it occurs in an LSP and activate the corresponding alarm which will trigger a dynamic bandwidth reallocation mechanism
Resumo:
El islam puede concebir una forma de gobierno democrático, bajo el termino de democracia de Norberto Bobbio, con valores musulmanes implícitos, también se evidencia el rechazo a la intervención de Occidente en presencia y en pensamiento. Resaltando así durante el proceso democrático Irán, su cultura y así exponer una nueva versión de lo que entiende por democracia, versión diferente a la libertad entendida por Occidente.
Resumo:
Exam questions and solutions in PDF
Resumo:
Exam questions and solutions in LaTex. Diagrams for the questions are all together in the support.zip file, as .eps files
Resumo:
Exam questions and solutions in PDF
Resumo:
Exam questions and solutions in LaTex. Diagrams for the questions are all together in the support.zip file, as .eps files
Resumo:
Abstract Passwords are the most common form of authentication, and most of us will have to log in to several accounts every day which require passwords. Unfortunately, passwords often do not do a good job of proving who we are, and come with a host of usability problems. Probably the only reason that passwords still exist is that there often isn't a better alternative, so we are likely to be stuck with them for the foreseeable future. Password cracking has been a problem for years, and becomes more problematic as computer become more powerful and attackers get a better idea of the sort of passwords people use. This presentation will look at two free password cracking tools: Hashcat and John the Ripper, and how even a non-expert on a laptop (i.e. me) can use them effectively. An introduction to some of the research surrounding the economics and usability of passwords will also be discussed. Note that the speaker is not an expert in this area, so it will be a fairly informal since I'm sure you're all tired after a long term.
Resumo:
Transmeconomics es la propuesta de un modelo para realizar periodismo económico a través de las narrativas transmediáticas. En este sentido, se realiza una reconstrucción de lo que se ha hecho en cuanto a periodismo económico en Colombia para obtener algunas bases teóricas de cómo funciona este tipo de periodismo especializado y se recurre a la producción transmediatica para la elaboración de una página web disponible para dispositivos móviles, en la cual se plasma la idea de cómo se podría elaborar un modelo eficiente para transmitir este tipo de información. Asimismo, se crea una sección en la que se enseña a la población algunos conceptos de la economía para que la información publicada sea más fácil de entender.
Resumo:
El terrorismo en la actualidad es considerado como uno de los conceptos más controversiales en los campos social, académico y político. El término se empieza a utilizar después de la Revolución Francesa, pero recientemente, a raíz de los atentados del 11 de septiembre de 2001, ha tomado suma relevancia y ha motivado numerosas investigaciones para tratar de entender qué es terrorismo. Aunque a la fecha existen varias revisiones sistemáticas, este trabajo tiene como propósito revisar, agrupar y concretar diferentes teorías y conceptos formulados por los autores que han trabajado sobre el concepto de “terrorismo” con el fin de entender las implicaciones de su utilización en el discurso, y cómo esto afecta la dinámica interna de las sociedades en relación con la violencia, las creencias, los estereotipos entre otros elementos. Para lograrlo, se revisaron 56 artículos, publicados entre los años 1985 y 2013; 10 fuentes secundarias entre noticias y artículos de periódicos correspondientes a los años 1995-2013 y 10 estudios estadísticos cuyos resultados nos aportan a la comprensión del tema en cuestión. La búsqueda se limitó al desarrollo histórico del terrorismo, sus diferentes dimensiones y el concepto social de la realidad de terrorismo. Los hallazgos demuestran que la palabra “terrorismo” constituye un concepto que como tal es un vehículo lingüístico que puede ser utilizado con fines, estratégicos movilizando al público conforme a través del discurso e intereses políticos, destacando la necesidad de estudiar las implicaciones psicológicas y sociales de su uso.
Resumo:
Cuando se habla de los límites y fronteras de Europa, actualmente no están definidos en su totalidad, resultando problemático en la subregión del este, donde se encuentran Estados como Ucrania, Bielorrusia, Turquía y otros más. La delgada línea que divide a Europa de Asia aún es confusa, por lo cual delimitar el concepto de europeidad implica contemplar más variables que lo geográfico y cultural. De esta manera, la incertidumbre que existe está relacionada con los atributos que tiene la europeidad, y como los ciudadanos se identifican con ella. La europeidad antes que un conjunto de valores atribuible a los ciudadanos o una herencia cultural común, es un concepto difuso, efímero y esquivo para algunos autores. La trascendencia de este concepto se hace manifiesta en el artículo 49 del Tratado de la Unión Europea donde se estipulan las condiciones para ser miembro de la Unión Europea (UE). Aunque ser miembro de la UE no es lo mismo que ser europeo hasta este momento es la forma más aceptable para denominar a un Estado como europeo.