983 resultados para Visual identity


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Thèse réalisée en collaboration avec le Département de neurosciences et pharmacologie de l'Université de Copenhague, Danemark.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Modern Painters vol. III, IV et V est une œuvre tripartite développée après 1850, en synchronie avec la guerre de Crimée (1854-56), la répression de la révolte indienne (1857-59) et la deuxième guerre d’indépendance d’Italie (1859). Marqué par ces événements politiques, Ruskin met en œuvre une stratégie complexe pour configurer dans un langage symbolique les frontières et les taxonomies impériales de l’espace européen. Il développe des stratégies de présentation qui combinent le texte et les illustrations pour créer des allégories mentales et visuelles, construites à partir des stéréotypes littéraires et culturels véhiculés dans l’espace britannique. L’auteur met ses derniers volumes de Modern Painters sous le signe de « la crise de la civilisation » représentée par les conflagrations de Crimée, d’Inde et d’Italie, en exprimant son soutien pour la nouvelle alliance entre l’Angleterre et la France. Un autre motif est son obsession avec la réforme sociale via un retour aux valeurs chrétiennes traditionnelles.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Derek Parfit est célèbre pour avoir soutenu que l'identité personnelle ne comptait pas pour déterminer la survie d'une personne. Sa phrase « personal identity is not what matters » est inspirée d'une approche réductionniste de l'identité personnelle qui consiste à dire que la personne humaine se réduit à un corps, un cerveau et une série d'événements mentaux causalement liés. Dans cette optique, ce qui compte, c'est la continuité psychologique. Cet article vise à montrer que dans des dynamiques de reconnaissances (et de non-reconnaissances), l'identité personnelle peut compter dans la définition de l'identité personnelle à travers le temps ; en deux mots, que l'identité personnelle compte. Partant des conceptions narrativistes défendues par Paul Ricoeur et Charles Taylor, j'en viens à défendre une théorie constructiviste-institutionnaliste de l'identité personnelle qui prend en considération le caractère institué et construit de l'identité personnelle. Le but de cet article est donc de défendre la thèse selon laquelle l'identité personnelle compte pour dans les réflexions éthiques et politiques.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secret sharing schemes allow a secret to be shared among a group of participants so that only qualified subsets of participants can recover the secret. A visual cryptography scheme (VCS) is a special kind of secret sharing scheme in which the secret to share consists of an image and the shares consist of xeroxed transparencies which are stacked to recover the shared image. In this thesis we have given the theoretical background of Secret Sharing Schemes and the historical development of the subject. We have included a few examples to improve the readability of the thesis. We have tried to maintain the rigor of the treatment of the subject. The limitations and disadvantages of the various forms secret sharing schemes are brought out. Several new schemes for both dealing and combining are included in the thesis. We have introduced a new number system, called, POB number system. Representation using POB number system has been presented. Algorithms for finding the POB number and POB value are given.We have also proved that the representation using POB number system is unique and is more efficient. Being a new system, there is much scope for further development in this area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Las prácticas obligatorias de la materia Percepción Visual constituyen un complemento de trabajo en el que deben integrarse los conocimientos informativos y los de índole formativa (técnicas, procedimientos, metodología, etc.). De acuerdo con ello, hemos seleccionado cinco cuestiones que en el pasado han sido objeto de verificación experimental, considerando, por un lado, la pertenencia al temario de las asignaturas y, por otro lado, la viabilidad de las experimentaciones, habida cuenta de la infraestructura material requerida (equipo, aparatos, material, etc.) y los condicionantes académicos (relación: número de alumnos / clase; espacios disponibles [aulas y laboratorios], condiciones ambientales, tiempo disponible, etc.). Las practicas experimentales en percepción visual ofrecen la posibilidad de que los estudiantes puedan aplicar los procedimientos experimentales adecuados, operativizando las variables (medición), estableciendo relaciones entre ellas (hipótesis) y planteando predicciones que se someterán a prueba a partir de los datos registrados. Llevan a los estudiantes a confrontar el modelo o las teorías con la realidad (verificación) y a buscar interpretaciones plausibles de las relaciones evidenciadas empíricamente entre las variables. Introducen al alumno en el rigor, la precisión, el control, la sistematicidad y la objetividad, frente a la especulación gratuita.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Màster Oficial en Gestió del Patrimoni Cultural

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis is an outcome of the investigations carried out on the development of an Artificial Neural Network (ANN) model to implement 2-D DFT at high speed. A new definition of 2-D DFT relation is presented. This new definition enables DFT computation organized in stages involving only real addition except at the final stage of computation. The number of stages is always fixed at 4. Two different strategies are proposed. 1) A visual representation of 2-D DFT coefficients. 2) A neural network approach. The visual representation scheme can be used to compute, analyze and manipulate 2D signals such as images in the frequency domain in terms of symbols derived from 2x2 DFT. This, in turn, can be represented in terms of real data. This approach can help analyze signals in the frequency domain even without computing the DFT coefficients. A hierarchical neural network model is developed to implement 2-D DFT. Presently, this model is capable of implementing 2-D DFT for a particular order N such that ((N))4 = 2. The model can be developed into one that can implement the 2-D DFT for any order N upto a set maximum limited by the hardware constraints. The reported method shows a potential in implementing the 2-D DF T in hardware as a VLSI / ASIC

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Anticipating the increase in video information in future, archiving of news is an important activity in the visual media industry. When the volume of archives increases, it will be difficult for journalists to find the appropriate content using current search tools. This paper provides the details of the study we conducted about the news extraction systems used in different news channels in Kerala. Semantic web technologies can be used effectively since news archiving share many of the characteristics and problems of WWW. Since visual news archives of different media resources follow different metadata standards, interoperability between the resources is also an issue. World Wide Web Consortium has proposed a draft for an ontology framework for media resource which addresses the intercompatiblity issues. In this paper, the w3c proposed framework and its drawbacks is also discussed

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this computerized, globalised and internet world our computer collects various types of information’s about every human being and stores them in files secreted deep on its hard drive. Files like cache, browser history and other temporary Internet files can be used to store sensitive information like logins and passwords, names addresses, and even credit card numbers. Now, a hacker can get at this information by wrong means and share with someone else or can install some nasty software on your computer that will extract your sensitive and secret information. Identity Theft posses a very serious problem to everyone today. If you have a driver’s license, a bank account, a computer, ration card number, PAN card number, ATM card or simply a social security number you are more than at risk, you are a target. Whether you are new to the idea of ID Theft, or you have some unanswered questions, we’ve compiled a quick refresher list below that should bring you up to speed. Identity theft is a term used to refer to fraud that involves pretending to be someone else in order to steal money or get other benefits. Identity theft is a serious crime, which is increasing at tremendous rate all over the world after the Internet evolution. There is widespread agreement that identity theft causes financial damage to consumers, lending institutions, retail establishments, and the economy as a whole. Surprisingly, there is little good public information available about the scope of the crime and the actual damages it inflicts. Accounts of identity theft in recent mass media and in film or literature have centered on the exploits of 'hackers' - variously lauded or reviled - who are depicted as cleverly subverting corporate firewalls or other data protection defenses to gain unauthorized access to credit card details, personnel records and other information. Reality is more complicated, with electronic identity fraud taking a range of forms. The impact of those forms is not necessarily quantifiable as a financial loss; it can involve intangible damage to reputation, time spent dealing with disinformation and exclusion from particular services because a stolen name has been used improperly. Overall we can consider electronic networks as an enabler for identity theft, with the thief for example gaining information online for action offline and the basis for theft or other injury online. As Fisher pointed out "These new forms of hightech identity and securities fraud pose serious risks to investors and brokerage firms across the globe," I am a victim of identity theft. Being a victim of identity theft I felt the need for creating an awareness among the computer and internet users particularly youngsters in India. Nearly 70 per cent of Indian‘s population are living in villages. Government of India already started providing computer and internet facilities even to the remote villages through various rural development and rural upliftment programmes. Highly educated people, established companies, world famous financial institutions are becoming victim of identity theft. The question here is how vulnerable the illiterate and innocent rural people are if they suddenly exposed to a new device through which some one can extract and exploit their personal data without their knowledge? In this research work an attempt has been made to bring out the real problems associated with Identity theft in developed countries from an economist point of view.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Now a days, email has become the most widely communication way in daily life. The main reason for using email is probably because of the convenience and speed in which it can be transmitted irrespective of geographical distances. To improve security and efficiency of email system, most of the email system adopt PKI and IBE encryption schemes. However, both PKI and IBE encryption schemes have their own shortcomings and consequently bring security issues to email systems. This paper proposes a new secure email system based on IBE which combines finger print authentication and proxy service for encryption and decryption

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Presentation at the 1997 Dagstuhl Seminar "Evaluation of Multimedia Information Retrieval", Norbert Fuhr, Keith van Rijsbergen, Alan F. Smeaton (eds.), Dagstuhl Seminar Report 175, 14.04. - 18.04.97 (9716). - Abstract: This presentation will introduce ESCHER, a database editor which supports visualization in non-standard applications in engineering, science, tourism and the entertainment industry. It was originally based on the extended nested relational data model and is currently extended to include object-relational properties like inheritance, object types, integrity constraints and methods. It serves as a research platform into areas such as multimedia and visual information systems, QBE-like queries, computer-supported concurrent work (CSCW) and novel storage techniques. In its role as a Visual Information System, a database editor must support browsing and navigation. ESCHER provides this access to data by means of so called fingers. They generalize the cursor paradigm in graphical and text editors. On the graphical display, a finger is reflected by a colored area which corresponds to the object a finger is currently pointing at. In a table more than one finger may point to objects, one of which is the active finger and is used for navigating through the table. The talk will mostly concentrate on giving examples for this type of navigation and will discuss some of the architectural needs for fast object traversal and display. ESCHER is available as public domain software from our ftp site in Kassel. The portable C source can be easily compiled for any machine running UNIX and OSF/Motif, in particular our working environments IBM RS/6000 and Intel-based LINUX systems. A porting to Tcl/Tk is under way.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

El trabajo es fruto de las actividades elaboradas para la fase presencial del 'Curso básico de Internet a distancia' organizado por el CPR de Cartagena-La Unión