185 resultados para hacker taggers


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Conceptualisations of disability that emphasise the contextual and cultural nature of disability and the embodiment of these within a national system of data collection present a number of challenges especially where this process is devolved to schools. The requirement for measures based on contextual and subjective experiences gives rise to particular difficulties in achieving parity in the way data is analysed and reported. This paper presents an account of the testing of a tool intended for use by schools as they collect data from parents to identify children who meet the criteria of disability established in Disability Discrimination Acts (DDAs). Data were validated through interviews with parents and teachers and observations of children and highlighted the pivotal role of the criterion of impact. The findings are set in the context of schools meeting their legal duties to identify disabled children and their support needs in a way that captures the complexity of disabled children’s school lives and provides useful and useable data.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Equality Act 2010 will be implemented in full in 2011, and schools in the UK will have to provide special aids or services for children with disabilities where this provision is considered reasonable. This paper reports on staff perspectives on the use and usefulness of a parental questionnaire on disability from a sample of 49 schools (mainstream and special) located in 12 local authorities. Most schools found the process of administering the parent questionnaire undemanding; just under half of the sample indicated that they would take some action as a result of the data collected from the parental questionnaire (e.g., to inform plans for targeting or monitoring support for children, and to contact parents and follow-up issues they had mentioned); and about one-third of schools recorded unanticipated findings from the parental questionnaire, that is, the identification of children whose disabilities were not previously known to the school. Implications for schools are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There has been an ongoing concern about the lack of reliable data on disabled children in schools. To date there has been no consistent way of identifying and categorising disabilities. Schools in England are currentlyrequired to collect data on children with Special Educational Need (SEN), but this does not capture information about all disabled children. The lack of this information may seriously restrict capacity at all levels of policy and practice to understand and respond to the needs of disabled children and their families in line with Disability Discrimination Act (2005) and the single Equality Act (2010). The aim of the project was to test the draft tools for identifying disability and accompanying guidance in a sample of all types of maintained schools in order to assess their usability and reliability and whether they resulted in the generation of robust and consistent data that could reliably inform school returns for the annual School Census.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Schools need to identify disabled pupils in accordance with their Disability Equality Duty. This research assisted in the development of suitable tools to allow them to identify disabled children in accordance with the definition set out in the Disability Discrimination Act (DDA) by surveying parents and, via the use of purpose-designed activities, the children themselves.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents an open-source canopy height profile (CHP) toolkit designed for processing small-footprint full-waveform LiDAR data to obtain the estimates of effective leaf area index (LAIe) and CHPs. The use of the toolkit is presented with a case study of LAIe estimation in discontinuous-canopy fruit plantations. The experiments are carried out in two study areas, namely, orange and almond plantations, with different percentages of canopy cover (48% and 40%, respectively). For comparison, two commonly used discrete-point LAIe estimation methods are also tested. The LiDAR LAIe values are first computed for each of the sites and each method as a whole, providing “apparent” site-level LAIe, which disregards the discontinuity of the plantations’ canopies. Since the toolkit allows for the calculation of the study area LAIe at different spatial scales, between-tree-level clumpingcan be easily accounted for and is then used to illustrate the impact of the discontinuity of canopy cover on LAIe retrieval. The LiDAR LAIe estimates are therefore computed at smaller scales as a mean of LAIe in various grid-cell sizes, providing estimates of “actual” site-level LAIe. Subsequently, the LiDAR LAIe results are compared with theoretical models of “apparent” LAIe versus “actual” LAIe, based on known percent canopy cover in each site. The comparison of those models to LiDAR LAIe derived from the smallest grid-cell sizes against the estimates of LAIe for the whole site has shown that the LAIe estimates obtained from the CHP toolkit provided values that are closest to those of theoretical models.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches.  The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This dissertation aims to look into the structure of the event Circuito Regional de Performance BodeArte1 to think how it collaborate with its proposal providing theoretical points to relevant questions to the comprehension of Brazilian performance art in contemporaneity, since its conceptual format until its occurrence and practical limitations. From this proposition the dissertation is organized into three chapters guided for the following aspects: the resumption of the events encompassed on the occurrence of Circuit BodeArte as well as a tabulation of the data reunited in its history, the presentation of its conceptual choices, and the metaphors conducted by the use of the term performance and how they can lead us to the idea of a performance-as-BodeArte. The methodological structures moved for this organization are qualitative, and have been formed from printed materials, texts, festival programs, blog, videos, photos, interviews, lectures and forums, plus our own memory as a producer and performer of the event, looking through these set points of the epistemological organization contained on the proposal of the Circuito, expanding and discussing them. This way this research moves between the propositions of this event in its three editions, promoting discussions that dialogue with concepts such as the emergence of Steve Johnson (2004), the metaphors of thought proposed by Christine Greiner (2005), the idea of performance hacker of Maria Beatriz de Medeiros (AQUINO, et al., 2012), as well as other propositions presented by Jan Swidzinski (2005) and Eleonora Fabião (2012)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Pós-graduação em Educação - IBRC

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A etiquetagem morfossintática é uma tarefa básica requerida por muitas aplicações de processamento de linguagem natural, tais como análise gramatical e tradução automática, e por aplicações de processamento de fala, por exemplo, síntese de fala. Essa tarefa consiste em etiquetar palavras em uma sentença com as suas categorias gramaticais. Apesar dessas aplicações requererem etiquetadores que demandem maior precisão, os etiquetadores do estado da arte ainda alcançam acurácia de 96 a 97%. Nesta tese, são investigados recursos de corpus e de software para o desenvolvimento de um etiquetador com acurácia superior à do estado da arte para o português brasileiro. Centrada em uma solução híbrida que combina etiquetagem probabilística com etiquetagem baseada em regras, a proposta de tese se concentra em um estudo exploratório sobre o método de etiquetagem, o tamanho, a qualidade, o conjunto de etiquetas e o gênero dos corpora de treinamento e teste, além de avaliar a desambiguização de palavras novas ou desconhecidas presentes nos textos a serem etiquetados. Quatro corpora foram usados nos experimentos: CETENFolha, Bosque CF 7.4, Mac-Morpho e Selva Científica. O modelo de etiquetagem proposto partiu do uso do método de aprendizado baseado em transformação(TBL) ao qual foram adicionadas três estratégias, combinadas em uma arquitetura que integra as saídas (textos etiquetados) de duas ferramentas de uso livre, o TreeTagger e o -TBL, com os módulos adicionados ao modelo. No modelo de etiquetador treinado com o corpus Mac-Morpho, de gênero jornalístico, foram obtidas taxas de acurácia de 98,05% na etiquetagem de textos do Mac-Morpho e 98,27% em textos do Bosque CF 7.4, ambos de gênero jornalístico. Avaliou-se também o desempenho do modelo de etiquetador híbrido proposto na etiquetagem de textos do corpus Selva Científica, de gênero científico. Foram identificadas necessidades de ajustes no etiquetador e nos corpora e, como resultado, foram alcançadas taxas de acurácia de 98,07% no Selva Científica, 98,06% no conjunto de teste do Mac-Morpho e 98,30% em textos do Bosque CF 7.4. Esses resultados são significativos, pois as taxas de acurácia alcançadas são superiores às do estado da arte, validando o modelo proposto em busca de um etiquetador morfossintático mais confiável.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we present the results of a coherent narrow-band search for continuous gravitational-wave signals from the Crab and Vela pulsars conducted on Virgo VSR4 data. In order to take into account a possible small mismatch between the gravitational-wave frequency and two times the star rotation frequency, inferred from measurement of the electromagnetic pulse rate, a range of 0.02 Hz around two times the star rotational frequency has been searched for both the pulsars. No evidence for a signal has been found and 95% confidence level upper limits have been computed assuming both that polarization parameters are completely unknown and that they are known with some uncertainty, as derived from x-ray observations of the pulsar wind torii. For Vela the upper limits are comparable to the spin-down limit, computed assuming that all the observed spin-down is due to the emission of gravitational waves. For Crab the upper limits are about a factor of 2 below the spin-down limit, and represent a significant improvement with respect to past analysis. This is the first time the spin-down limit is significantly overcome in a narrow-band search.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present results of a search for continuously emitted gravitational radiation, directed at the brightest low-mass x-ray binary, Scorpius X-1. Our semicoherent analysis covers 10 days of LIGO S5 data ranging from 50-550 Hz, and performs an incoherent sum of coherent F-statistic power distributed amongst frequency-modulated orbital sidebands. All candidates not removed at the veto stage were found to be consistent with noise at a 1% false alarm rate. We present Bayesian 95% confidence upper limits on gravitational-wave strain amplitude using two different prior distributions: a standard one, with no a priori assumptions about the orientation of Scorpius X-1; and an angle-restricted one, using a prior derived from electromagnetic observations. Median strain upper limits of 1.3 x 10(-24) and 8 x 10(-25) are reported at 150 Hz for the standard and angle-restricted searches respectively. This proof-of-principle analysis was limited to a short observation time by unknown effects of accretion on the intrinsic spin frequency of the neutron star, but improves upon previous upper limits by factors of similar to 1.4 for the standard, and 2.3 for the angle-restricted search at the sensitive region of the detector.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Advanced LIGO gravitational wave detectors are second-generation instruments designed and built for the two LIGO observatories in Hanford, WA and Livingston, LA, USA. The two instruments are identical in design, and are specialized versions of a Michelson interferometer with 4 km long arms. As in Initial LIGO, Fabry-Perot cavities are used in the arms to increase the interaction time with a gravitational wave, and power recycling is used to increase the effective laser power. Signal recycling has been added in Advanced LIGO to improve the frequency response. In the most sensitive frequency region around 100 Hz, the design strain sensitivity is a factor of 10 better than Initial LIGO. In addition, the low frequency end of the sensitivity band is moved from 40 Hz down to 10 Hz. All interferometer components have been replaced with improved technologies to achieve this sensitivity gain. Much better seismic isolation and test mass suspensions are responsible for the gains at lower frequencies. Higher laser power, larger test masses and improved mirror coatings lead to the improved sensitivity at mid and high frequencies. Data collecting runs with these new instruments are planned to begin in mid-2015.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Carneiro SMBS, Sousa-Neto MD, Rached-Junior FA, Miranda CES, Silva SRC, Silva-Sousa YTC. Push-out strength of root fillings with or without thermomechanical compaction. International Endodontic Journal, 45, 821828, 2012. Abstract Aim To evaluate the influence of thermomechanical compaction (Taggers hybrid technique THT) on the push-out strength of several root filling materials to root dentine. Methodology Root canals of eighty roots in human canines were prepared with the ProTaper system and filled with one of the following materials, using either lateral compaction (LC) (n = 40) or THT (n = 40): AH Plus/gutta-percha (GP) (n = 10), Sealer 26/GP (n = 10), Epiphany SE/Resilon (n = 10) and Epiphany SE/GP (n = 10). Three 2-mm-thick dentine slices were obtained from each third of each root. The root filling in the first slice was subjected to a push-out test to evaluate the bond strength of the materials to intraradicular dentine. Data (in MPa) were analysed using anova and post hoc Tukeys test (P < 0.05). Failure mode was determined at x25 magnification. The other two slices were prepared for scanning electron microscopy (SEM) to examine the surface of the filling materials. Results Lateral compaction (1.34 +/- 1.14 MPa) was associated with a significantly higher bond strength (P < 0.05) than the THT (0.97 +/- 0.88 MPa). AH Plus/GP (2.23 +/- 0.83 MPa) and Sealer 26/GP (1.86 +/- 0.50 MPa) had significantly higher bond strengths than the other materials and differed significantly from each other (P < 0.05). There was a significant difference (P < 0.05) between the coronal (1.36 +/- 1.15 MPa), middle (1.14 +/- 1.05 MPa) and apical thirds (0.95 +/- 0.83 MPa). Considering the technique and root filling material interaction, AH Plus/GP-LC was associated with the highest mean values (2.65 +/- 0.66 MPa) (P < 0.05). Sealer 26/GP-LC (2.10 +/- 0.46 MPa), AH Plus/GP-THT (1.81 +/- 0.78 MPa) and Sealer 26/GP-TH (1.63 +/- 0.44 MPa) had intermediate values that were not significantly different from each other (P > 0.05). Epiphany SE was associated with the lowest mean values (3.70 +/- 0.86 MPa) (P < 0.05), regardless of the root filling technique and type of solid material (cone). Adhesive failures predominated in the specimens filled with Epiphany SE, whilst mixed and cohesive failures were more frequent in those filled with AH Plus and Sealer 26, regardless of the root filling technique. SEM analysis revealed that LC produced a dense and well-compacted filling whilst the use of a hybrid thermomechanical technique resulted in the solid material (GP or Resilon) intermingled within sealer to form a nonhomogenous mass. Conclusion Lateral compaction was associated with higher bond strengths of the materials to intraradicular dentine than a hybrid technique using thermomechanical compaction. The greatest push-out strengths were obtained when the canals were filled with LC of AH Plus and GP cones.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Lo scopo di questa tesi è quello di progettare e sviluppare un sistema informatico in grado di verificare la possibilità di bypassare le comuni misure di sicurezza al fine di indicare soluzioni e strategie difensive efficaci. Più in dettaglio ci occuperemo di simulare gli atteggiamenti di un hacker, alta- mente invasivi e pericolosi, atti a compromettere l’intero sistema telematico su scala mondiale. Studiando i social network e le informazioni personali, ci si è resi conto, infatti, di come sia facile ed altamente probabile causare gravi danni sia all’intera popolazione del web che all’integrità delle infrastrutture telematiche.