827 resultados para Cartographic Representation
Resumo:
Knowledge is the key for success. The adequate treatment you make on data for generating knowledge can make a difference in projects, processes, and networks. Such a treatment is the main goal of two important areas: knowledger representation and management. Our aim, in this book, is collecting sorne innovative ways of representing and managing knowledge proposed by several Latin American researchers under the premise of improving knowledge.
Resumo:
This article focuses on the construction of heritage in rural Portugal. Drawing on anthropological fieldwork in the village of Castelo Rodrigo, it analyses the extensive protection and exhibition of domestic architecture in the framework of a State-led local development programme. By bringing in the messiness of daily practices, the article goes beyond neat theoretical formulations in the study of heritage such as Foucault’s theory of “governmentality” and Kirshenblatt-Gimblett’s notion of “second life as heritage”. It argues that the “conduct of conduct” is actually nowhere near as effective as its theoretical formulation might have us believe, and the second life as heritage suffocates the first life of houses as social habitats for the village population.
Resumo:
Avian influenza, or 'bird 'flu' arrived in Norfolk in April 2006 in the form of the low pathogenic strain H7N3. In February 2007 a highly pathogenic strain, H5N1, which can pose a risk to humans, was discovered in Suffolk. We examine how a local newspaper reported the outbreaks, focusing on the linguistic framing of biosecurity. Consistent with the growing concern with securitisation among policymakers, issues were discussed in terms of space (indoor–outdoor; local–global; national–international) and flows (movement, barriers and vectors) between spaces (farms, sheds and countries). The apportioning of blame along the lines of 'them and us'– Hungary and England – was tempered by the reporting on the Hungarian operations of the British poultry company. Explanations focused on indoor and outdoor farming and alleged breaches of biosecurity by the companies involved. As predicted by the idea of securitisation, risks were formulated as coming from outside the supposedly secure enclaves of poultry production.
Resumo:
Bahadur representation and its applications have attracted a large number of publications and presentations on a wide variety of problems. Mixing dependency is weak enough to describe the dependent structure of random variables, including observations in time series and longitudinal studies. This note proves the Bahadur representation of sample quantiles for strongly mixing random variables (including ½-mixing and Á-mixing) under very weak mixing coe±cients. As application, the asymptotic normality is derived. These results greatly improves those recently reported in literature.
Resumo:
"1401212-15 State (INR)."
Resumo:
Purpose: To evaluate and compare the performance of Ripplet Type-1 transform and directional discrete cosine transform (DDCT) and their combinations for improved representation of MRI images while preserving its fine features such as edges along the smooth curves and textures. Methods: In a novel image representation method based on fusion of Ripplet type-1 and conventional/directional DCT transforms, source images were enhanced in terms of visual quality using Ripplet and DDCT and their various combinations. The enhancement achieved was quantified on the basis of peak signal to noise ratio (PSNR), mean square error (MSE), structural content (SC), average difference (AD), maximum difference (MD), normalized cross correlation (NCC), and normalized absolute error (NAE). To determine the attributes of both transforms, these transforms were combined to represent the entire image as well. All the possible combinations were tested to present a complete study of combinations of the transforms and the contrasts were evaluated amongst all the combinations. Results: While using the direct combining method (DDCT) first and then the Ripplet method, a PSNR value of 32.3512 was obtained which is comparatively higher than the PSNR values of the other combinations. This novel designed technique gives PSNR value approximately equal to the PSNR’s of parent techniques. Along with this, it was able to preserve edge information, texture information and various other directional image features. The fusion of DDCT followed by the Ripplet reproduced the best images. Conclusion: The transformation of images using Ripplet followed by DDCT ensures a more efficient method for the representation of images with preservation of its fine details like edges and textures.
Resumo:
The purpose of this thesis was to draw new insights on Thomas Berger’s classic American novel, Little Big Man, and his representation of fictional violence that is a substantial aspect of any text on the Indian Wars and “Custer’s Last Stand”. History’s major world wars led to shifts in the political climate and a noted change in the way that violence was represented in the arts. Historical, fictional, and cinematic treatments of “Custer’s Last Stand” and violence were each considered in relation to the text. Berger's version of the famed story is a revision of history that shows the protagonist as a dual-member of two violent societies. The thesis concluded that Berger’s updated American legends and unique “white renegade” character led to a representation of violence that spoke to the current state of affairs in 1964 when the world was becoming much more hostile and chaotic place.
Resumo:
A dedicated algorithm for sparse spectral representation of music sound is presented. The goal is to enable the representation of a piece of music signal as a linear superposition of as few spectral components as possible, without affecting the quality of the reproduction. A representation of this nature is said to be sparse. In the present context sparsity is accomplished by greedy selection of the spectral components, from an overcomplete set called a dictionary. The proposed algorithm is tailored to be applied with trigonometric dictionaries. Its distinctive feature being that it avoids the need for the actual construction of the whole dictionary, by implementing the required operations via the fast Fourier transform. The achieved sparsity is theoretically equivalent to that rendered by the orthogonal matching pursuit (OMP) method. The contribution of the proposed dedicated implementation is to extend the applicability of the standard OMP algorithm, by reducing its storage and computational demands. The suitability of the approach for producing sparse spectral representation is illustrated by comparison with the traditional method, in the line of the short time Fourier transform, involving only the corresponding orthonormal trigonometric basis.
Resumo:
For each quasi-metric space X we consider the convex lattice SLip(1)(X) of all semi-Lipschitz functions on X with semi-Lipschitz constant not greater than 1. If X and Y are two complete quasi-metric spaces, we prove that every convex lattice isomorphism T from SLip(1)(Y) onto SLip(1)(X) can be written in the form Tf = c . (f o tau) + phi, where tau is an isometry, c > 0 and phi is an element of SLip(1)(X). As a consequence, we obtain that two complete quasi-metric spaces are almost isometric if, and only if, there exists an almost-unital convex lattice isomorphism between SLip(1)(X) and SLip(1) (Y).
Resumo:
Tesis inédita presentada en la Universidad Europea de Madrid. Facultad de Ciencias Sociales. Programa de Doctorado en Economía y Empresa
Resumo:
Chaque année, le piratage mondial de la musique coûte plusieurs milliards de dollars en pertes économiques, pertes d’emplois et pertes de gains des travailleurs ainsi que la perte de millions de dollars en recettes fiscales. La plupart du piratage de la musique est dû à la croissance rapide et à la facilité des technologies actuelles pour la copie, le partage, la manipulation et la distribution de données musicales [Domingo, 2015], [Siwek, 2007]. Le tatouage des signaux sonores a été proposé pour protéger les droit des auteurs et pour permettre la localisation des instants où le signal sonore a été falsifié. Dans cette thèse, nous proposons d’utiliser la représentation parcimonieuse bio-inspirée par graphe de décharges (spikegramme), pour concevoir une nouvelle méthode permettant la localisation de la falsification dans les signaux sonores. Aussi, une nouvelle méthode de protection du droit d’auteur. Finalement, une nouvelle attaque perceptuelle, en utilisant le spikegramme, pour attaquer des systèmes de tatouage sonore. Nous proposons tout d’abord une technique de localisation des falsifications (‘tampering’) des signaux sonores. Pour cela nous combinons une méthode à spectre étendu modifié (‘modified spread spectrum’, MSS) avec une représentation parcimonieuse. Nous utilisons une technique de poursuite perceptive adaptée (perceptual marching pursuit, PMP [Hossein Najaf-Zadeh, 2008]) pour générer une représentation parcimonieuse (spikegramme) du signal sonore d’entrée qui est invariante au décalage temporel [E. C. Smith, 2006] et qui prend en compte les phénomènes de masquage tels qu’ils sont observés en audition. Un code d’authentification est inséré à l’intérieur des coefficients de la représentation en spikegramme. Puis ceux-ci sont combinés aux seuils de masquage. Le signal tatoué est resynthétisé à partir des coefficients modifiés, et le signal ainsi obtenu est transmis au décodeur. Au décodeur, pour identifier un segment falsifié du signal sonore, les codes d’authentification de tous les segments intacts sont analysés. Si les codes ne peuvent être détectés correctement, on sait qu’alors le segment aura été falsifié. Nous proposons de tatouer selon le principe à spectre étendu (appelé MSS) afin d’obtenir une grande capacité en nombre de bits de tatouage introduits. Dans les situations où il y a désynchronisation entre le codeur et le décodeur, notre méthode permet quand même de détecter des pièces falsifiées. Par rapport à l’état de l’art, notre approche a le taux d’erreur le plus bas pour ce qui est de détecter les pièces falsifiées. Nous avons utilisé le test de l’opinion moyenne (‘MOS’) pour mesurer la qualité des systèmes tatoués. Nous évaluons la méthode de tatouage semi-fragile par le taux d’erreur (nombre de bits erronés divisé par tous les bits soumis) suite à plusieurs attaques. Les résultats confirment la supériorité de notre approche pour la localisation des pièces falsifiées dans les signaux sonores tout en préservant la qualité des signaux. Ensuite nous proposons une nouvelle technique pour la protection des signaux sonores. Cette technique est basée sur la représentation par spikegrammes des signaux sonores et utilise deux dictionnaires (TDA pour Two-Dictionary Approach). Le spikegramme est utilisé pour coder le signal hôte en utilisant un dictionnaire de filtres gammatones. Pour le tatouage, nous utilisons deux dictionnaires différents qui sont sélectionnés en fonction du bit d’entrée à tatouer et du contenu du signal. Notre approche trouve les gammatones appropriés (appelés noyaux de tatouage) sur la base de la valeur du bit à tatouer, et incorpore les bits de tatouage dans la phase des gammatones du tatouage. De plus, il est montré que la TDA est libre d’erreur dans le cas d’aucune situation d’attaque. Il est démontré que la décorrélation des noyaux de tatouage permet la conception d’une méthode de tatouage sonore très robuste. Les expériences ont montré la meilleure robustesse pour la méthode proposée lorsque le signal tatoué est corrompu par une compression MP3 à 32 kbits par seconde avec une charge utile de 56.5 bps par rapport à plusieurs techniques récentes. De plus nous avons étudié la robustesse du tatouage lorsque les nouveaux codec USAC (Unified Audion and Speech Coding) à 24kbps sont utilisés. La charge utile est alors comprise entre 5 et 15 bps. Finalement, nous utilisons les spikegrammes pour proposer trois nouvelles méthodes d’attaques. Nous les comparons aux méthodes récentes d’attaques telles que 32 kbps MP3 et 24 kbps USAC. Ces attaques comprennent l’attaque par PMP, l’attaque par bruit inaudible et l’attaque de remplacement parcimonieuse. Dans le cas de l’attaque par PMP, le signal de tatouage est représenté et resynthétisé avec un spikegramme. Dans le cas de l’attaque par bruit inaudible, celui-ci est généré et ajouté aux coefficients du spikegramme. Dans le cas de l’attaque de remplacement parcimonieuse, dans chaque segment du signal, les caractéristiques spectro-temporelles du signal (les décharges temporelles ;‘time spikes’) se trouvent en utilisant le spikegramme et les spikes temporelles et similaires sont remplacés par une autre. Pour comparer l’efficacité des attaques proposées, nous les comparons au décodeur du tatouage à spectre étendu. Il est démontré que l’attaque par remplacement parcimonieux réduit la corrélation normalisée du décodeur de spectre étendu avec un plus grand facteur par rapport à la situation où le décodeur de spectre étendu est attaqué par la transformation MP3 (32 kbps) et 24 kbps USAC.
Resumo:
Il Mar Egeo è un bacino chiuso dove ha luogo una parte significativa dell'attività ciclonica del Mediterraneo. Inoltre, è circondato da città densamente popolate e ricche di risorse, quindi essere in grado di tracciare ed esaminare le caratteristiche degli intensi fenomeni meteorologici come i cicloni può prevenire i pericoli naturali che provocano perdite umane e danni economici. Questo studio tratta le caratteristiche principali dei sistemi a bassa pressione avvenuti nel Mar Egeo dal 1979 al 2020 ed è basato sul dataset di ERA5. Nello specifico, si tratta di un’analisi statistica delle loro caratteristiche come il numero medio di occorrenza per ogni mese dell’anno, la loro velocità di propagazione, la loro durata, la distanza percorsa dal momento della loro formazione fino al punto della loro dissipazione, lo spostamento fra la posizione di formazione e di dissipazione nonché` la loro distribuzione spaziale nelle 4 stagioni. Quello che è stato osservato è un’attività ciclonica rilevante che ha luogo nel Mar Egeo che costituisce uno dei posti del Mediterraneo con attività ciclonica non trascurabile. Si è fatto un confronto quantitativo tra i cicloni e più in generale le attività cicloniche che passano o nascono nel Mar Egeo con i cicloni che hanno luogo nel Mediterraneo nel suo complesso e quello che è stato trovato è che il Mar Egeo è un’area del Mediterraneo con attività ciclonica rilevante, e con caratteristiche simili dei cicloni che avvengono nel Mar Mediterraneo.
Resumo:
The objective of the present research is to describe and explain populist actors and populism as a concept and their representation on social and legacy media during the 2019 EU elections in Finland, Italy and The Netherlands. This research tackles the topic of European populism in the context of political communication and its relation to both the legacy and digital media within the hybrid media system. Departing from the consideration that populism and populist rhetoric are challenging concepts to define, I suggest that they should be addressed and analyzed through the usage of a combination of methods and theoretical perspectives, namely Communication Studies, Corpus Linguistics, Political theory, Rhetoric and Corpus-Assisted Discourse Studies. This thesis considers data of different provenance. On the one hand, for the Legacy media part, newspapers articles were collected in the three countries under study from the 1st until the 31st of May 2019. Each country’s legacy system is represented by three different quality papers and the articles were collected according to a selection of keywords (European Union Elections and Populism in each of the three languages). On the other hand, the Digital media data takes into consideration Twitter tweets collected during the same timeframe based on particular country-specific hashtags and tweets by identified populist actors. In order to meet the objective of this study, three research questions are posed and the analysis leading to the results are exhaustively presented and further discussed. The results of this research provide valuable and novel insights on how populism as a theme and a concept is being portrayed in the context of the European elections both in legacy and digital media and political communication in general.
Resumo:
One of the main features of nineteenth-century fiction is the quasi-total disappearance of the epistolary novel that had had its heydays in the previous century. For this reason, some scholars have declared the “death” of the letter in literature after the transitional romantic period. However, Victorian novels overflow with letters that are embedded, quoted in part or described and commented on by narrators or characters. Even when its content is not revealed to the reader, the letter becomes a signifier loaded with meanings, also and particularly so, when it is burnt, torn, hidden, found or buried. The Postal Reform of 1839-40 caused the number of letters sent every year in Britain to grow from 75 to 410 million in only 14 years, and the mediatic campaign that supported it drew the attention of the population to the material aspects concerning this means of communication. Newspapers became more affordable too and they promoted a taste for sensationalism that often involved the “spectacularization” of private correspondence. Starting from an excursus on the history of the letter aimed at identifying the key aspects of the genre, this work deals with some real love correspondences from people belonging to different classes in the period from 1840 to the 1870s, to then analyse their fictional and pictorial counterparts. The general picture that emerges from this analysis is that of a Victorian society where letters were able to break down the boundaries between high and low forms of cultural expressions and where, more than ever, letters were present in people’s everyday lives as well as in the art and literature they enjoyed.
Resumo:
Extreme weather events related to deep convection are high-impact critical phenomena whose reliable numerical simulation is still challenging. High-resolution (convection-permitting) modeling setups allow to switch off physical parameterizations accountable for substantial errors in convection representation. A new convection-permitting reanalysis over Italy (SPHERA) has been produced at ARPAE to enhance the representation and understanding of extreme weather situations. SPHERA is obtained through a dynamical downscaling of the global reanalysis ERA5 using the non-hydrostatic model COSMO at 2.2 km grid spacing over 1995-2020. This thesis aims to verify the expectations placed on SPHERA by analyzing two weather phenomena that are particularly challenging to simulate: heavy rainfall and hail. A quantitative statistical analysis over Italy during 2003-2017 for daily and hourly precipitation is presented to compare the performance of SPHERA with its driver ERA5 considering the national network of rain gauges as reference. Furthermore, two extreme precipitation events are deeply investigated. SPHERA shows a quantitative added skill over ERA5 for moderate to severe and rapid accumulations in terms of adherence to the observations, higher detailing of the spatial fields, and more precise temporal matching. These results prompted the use of SPHERA for the investigation of hailstorms, for which the combination of multiple information is crucial to reduce the substantial uncertainties permeating their understanding. A proxy for hail is developed by combining hail-favoring environmental numerical predictors with observations of ESWD hail reports and satellite overshooting top detections. The procedure is applied to the extended summer season (April-October) of 2016-2018 over the whole SPHERA spatial domain. The results indicate maximum hail likelihood over pre-Alpine regions and the northern Adriatic sea around 15 UTC in June-July, in agreement with recent European hail climatologies. The method demonstrates enhanced performance in case of severe hail occurrences and the ability to separate between ambient signatures depending on hail severity.