928 resultados para Belief revision
Resumo:
With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily cause millions of dollar in damage to an organization. Detecting these attacks is an important issue of computer security. There are many types of attacks and they fall into four main categories, Denial of Service (DoS) attacks, Probe, User to Root (U2R) attacks, and Remote to Local (R2L) attacks. Within these categories, DoS and Probe attacks continuously show up with greater frequency in a short period of time when they attack systems. They are different from the normal traffic data and can be easily separated from normal activities. On the contrary, U2R and R2L attacks are embedded in the data portions of the packets and normally involve only a single connection. It becomes difficult to achieve satisfactory detection accuracy for detecting these two attacks. Therefore, we focus on studying the ambiguity problem between normal activities and U2R/R2L attacks. The goal is to build a detection system that can accurately and quickly detect these two attacks. In this dissertation, we design a two-phase intrusion detection approach. In the first phase, a correlation-based feature selection algorithm is proposed to advance the speed of detection. Features with poor prediction ability for the signatures of attacks and features inter-correlated with one or more other features are considered redundant. Such features are removed and only indispensable information about the original feature space remains. In the second phase, we develop an ensemble intrusion detection system to achieve accurate detection performance. The proposed method includes multiple feature selecting intrusion detectors and a data mining intrusion detector. The former ones consist of a set of detectors, and each of them uses a fuzzy clustering technique and belief theory to solve the ambiguity problem. The latter one applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The final decision is a combination of the outputs of feature selecting and data mining detectors. The experimental results indicate that our ensemble approach not only significantly reduces the detection time but also effectively detect U2R and R2L attacks that contain degrees of ambiguous information.
Resumo:
Goddesses in African religions are spirits that affect humans and demand reverence from them. They are also embodiments of ideas that African people have about women, their powers and their roles in society. This study focused on Mame Wata, a goddess in Half Assini, an Nzema-speaking coastal community in western Ghana. It sought to resolve a paradox, that is, the fact that, the goddess is at the center of a Pentecostalist tradition even though traditional Pentecostalism in Ghana views her as an agent of the devil. The study involved fieldwork in this community of the goddess's female worshippers led by Agyimah, a charismatic man, and an agent of the goddess. The study interpreted the goddess as a post-colonial invented symbol personifying both pre-colonial and emerging ideas about female power. Findings from the study also show that through Mame Wata the followers celebrate the spirituality of the female.
Resumo:
Rapid development in industry have contributed to more complex systems that are prone to failure. In applications where the presence of faults may lead to premature failure, fault detection and diagnostics tools are often implemented. The goal of this research is to improve the diagnostic ability of existing FDD methods. Kernel Principal Component Analysis has good fault detection capability, however it can only detect the fault and identify few variables that have contribution on occurrence of fault and thus not precise in diagnosing. Hence, KPCA was used to detect abnormal events and the most contributed variables were taken out for more analysis in diagnosis phase. The diagnosis phase was done in both qualitative and quantitative manner. In qualitative mode, a networked-base causality analysis method was developed to show the causal effect between the most contributing variables in occurrence of the fault. In order to have more quantitative diagnosis, a Bayesian network was constructed to analyze the problem in probabilistic perspective.
Resumo:
Peer reviewed
Resumo:
Jane Smiley retells the tale of “King Lear” through the perspective of one of the evil sisters, in her novel “A Thousand Acres”. While the literary canon places William Shakespeare and his plays at the top of the list, I disagree that the canon should denote what is considered “classic” and what would be disregarded. Jane Smiley's novel is not canonized, but why? Her feminist revision of “King Lear” answers why Goneril and Regan were so evil. I argue that “King Lear” (both the text and the play) does not provide the evidence of dysfunction that Smiley's novel exhibits. “A Thousand Acres” opens up questions about gender formation, issues that are misrepresented and occluded in Shakespeare's “King Lear”. By bringing the trauma of incest to the forefront of the novel, its reverse emotional structures allow the reader to obtain a new perspective to a complex four-century-old play.
Resumo:
50 years after the birth of the Nouvelle Vague, the inheritance that the contemporary cinema receives from it is inevitable. Figures and visual motifs; stories, themes, faces or common places; aesthetic and language devices. The echoes appear in various ways, each affiliation involves a different relationship and therefore a dissimilar approximation to its analysis. And yet, both the academy and the film critics maintain their will to think the Nouvelle Vague as a whole, a universe, a stream or an aesthetic trend. However, does a Nouvelle Vague’s aesthetic exist? And if so: why and how to address their historical revision? Taking Deleuze’s thesis on the time-image and Serge Daney’s assertion according to which 50 years after the birth of the Nouvelle Vague, the inheritance that the contemporary cinema receives from it is inevitable. Figures and visual motifs; stories, themes, faces or common places; aesthetic and language devices. The echoes appear in various ways, each affiliation involves a different relationship and therefore a dissimilar approximation to its analysis. And yet, both the academy and the film critics maintain their will to think the Nouvelle Vague as a whole, a universe, a stream or an aesthetic trend. However, does a Nouvelle Vague’s aesthetic exist? And if so: why and how to address their historical revision? Taking Deleuze’s thesis on the time-image and Serge Daney’s assertion according to which
Resumo:
von Renward Meyer
Resumo:
Bakgrund Revisionsplikten avskaffades 1 november 2010 i Sverige. Detta innebar att cirka 250,000 små aktiebolag inte längre var tvingade till revision. Idag har det gått drygt fem år sedan beslutet togs om att avskaffa revisionsplikten och trots detta väljer en del små aktiebolag att revidera sina räkenskaper. Syfte Syftet med studien var att få en djupare förståelse för varför små aktiebolag, som inte omfattas av revisionsplikten, väljer att revidera sina räkenskaper. Metod Vi har använt oss av en kvalitativ metod och genomfört semistrukturerade intervjuer med företagsrepresentanter för små aktiebolag. Det empiriska materialet har analyserats genom en innehållsanalys. Slutsats Vår studie visar att små aktiebolag efterfrågar frivillig revision främst av fyra anledningar. Dessa är: Spritt delägarskap Försäkran om att den interna bokföringen är korrekt Rutinmässigt av företagsledning med erfarenhet från revisionspliktade företag Önskan om att uppfattas som legitima
Resumo:
What opportunities and challenges are presented to religious education across the globe by the basic human right of freedom of religion and belief? To what extent does religious education facilitate or inhibit ‘freedom of religion’ in schools? What contribution can religious education make to freedom in the modern world? This volume provides answers to these and related questions by drawing together a selection of the papers delivered at the seventeenth session of the International Seminar on Religious Education and Values held in Ottawa in 2010. These reflections from international scholars, drawing upon historical, theoretical and empirical perspectives, provide insights into the development of religious education in a range of national contexts, from Europe to Canada and South Africa, as well as illuminating possible future directions for the subject.
Resumo:
Belief in a Just World research found evidence that one feels threatened whenever one witnesses an innocent victim suffering, often resorting to secondary victimization to neutralize the observed injustice. However, literature has neglected the explanatory power of adolescent deviant behavior in victimization processes. This study (n = 284 students) aims to determine the impact of the adolescents' deviant behavior, BJW and victim's innocence on secondary victimization. Additionally, we analyzed juvenile deviant behavior's impact on victim identification. Juveniles who committed more deviant behaviors identified less with the victim than those with lower deviance levels. The interaction effects show that juveniles who are strong just world believers and have higher delinquency engaged significantly more in secondary victimization when confronted with an innocent victim. These results clarify the role played by adolescent deviant behavior and BJW in secondary victimization judgments regarding situations with innocent and non-innocent victims.
Resumo:
I argue (1) that Alvin Plantinga’s theory of warrant is plausible and (2) that, contrary to the Pandora’s Box objection, there are certain serious world religions that cannot successfully use Plantinga’s epistemology to demonstrate that their beliefs could be warranted in the same way that Christian belief can be warranted. In arguing for (1), I deploy Ernest Sosa’s Swampman case to show that Plantinga’s proper function condition is a necessary condition for warrant. I then engage three objections to Plantinga’s theory of warrant, each of which attempts to demonstrate that his conditions for warrant are neither necessary nor sufficient. Having defended the plausibility of Plantinga’s theory of warrant, I present and expand his key arguments to the effect that naturalism cannot make use of it. These arguments provide the conceptual tools that are needed to argue for (2): that there are certain world religions that cannot legitimately use Plantinga’s theory of warrant to demonstrate that their beliefs could be warranted in the same way that Christian belief can be warranted.
Resumo:
Shows stages and operations undertaken in revising the New Jersey state base map.