955 resultados para m-TOR


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Joseph Wright; 2 ft. 2 in.x 2 ft. 6 in.; oil on canvas

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Published originally, London, 1826.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A pesquisa trabalha a Torá como objeto de culto anicônico no pósexílio, apresentando sua face ritualística no culto do Israel Antigo. É proposto que a centralização da Torá no período do Segundo Templo seria uma construção ideológica macroestrutural i.e., uma tradição inventada do grupo sacerdotal pós-exílico em vista de unificar a nação que se reconstruía e reconfigurava. Para tal análise, observam- se três recortes distintos ligados à questão: (1) a materialidade do culto em suas continuidades e rupturas com a religião israelita pré-exílica, a partir da análise da cultura material e da análise da literatura bíblica de quatro objetos cúlticos centrais da OHD, bamah, massebah, Asherá e arca; (2) as práticas redacionais que advogavam a centralização da Torá com inspiração nos demais cultos e concepções do divino no Antigo Israel, especialmente observada na análise exegética do Sl 19, como um dos principais Salmos da Torá que teriam sido produzidos no período para promulgar a nova prática; e (3) a editoração dos diversos textos canônicos que teriam sido retroprojeções legitimadores da visão posterior centralizadora da Torá, através da criação de uma tipologia da materialidade dos textos e da Torá advinda da análise exegética de diversos textos. Com tal panorama, sob pesquisa exegética de orientação histórico-crítica, é proposto um modelo de quatro instâncias de construção do aniconismo pós-exílico, centralizado na Torá e atingindo as diferentes camadas da religião judaíta.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Survey research of the commercial food service industry with regard to tips and tip allocation revealed that 50 percent of restaurateurs require that employees report a minimum amount or percentage of sales and over 50 percent which allocate tips report them as employee income. The authors discuss these results and point out other problems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dopo alcuni risultati preliminari di algebra commutativa, la tesi introduce e sviluppa lo studio del funtore di tensorizzazione e del funtore Hom, e dei loro derivati Tor e Ext su moduli generici e con esempi di calcolo su Z.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis investigates the problem of robot navigation using only landmark bearings. The proposed system allows a robot to move to a ground target location specified by the sensor values observed at this ground target posi- tion. The control actions are computed based on the difference between the current landmark bearings and the target landmark bearings. No Cartesian coordinates with respect to the ground are computed by the control system. The robot navigates using solely information from the bearing sensor space. Most existing robot navigation systems require a ground frame (2D Cartesian coordinate system) in order to navigate from a ground point A to a ground point B. The commonly used sensors such as laser range scanner, sonar, infrared, and vision do not directly provide the 2D ground coordi- nates of the robot. The existing systems use the sensor measurements to localise the robot with respect to a map, a set of 2D coordinates of the objects of interest. It is more natural to navigate between the points in the sensor space corresponding to A and B without requiring the Cartesian map and the localisation process. Research on animals has revealed how insects are able to exploit very limited computational and memory resources to successfully navigate to a desired destination without computing Cartesian positions. For example, a honeybee balances the left and right optical flows to navigate in a nar- row corridor. Unlike many other ants, Cataglyphis bicolor does not secrete pheromone trails in order to find its way home but instead uses the sun as a compass to keep track of its home direction vector. The home vector can be inaccurate, so the ant also uses landmark recognition. More precisely, it takes snapshots and compass headings of some landmarks. To return home, the ant tries to line up the landmarks exactly as they were before it started wandering. This thesis introduces a navigation method based on reflex actions in sensor space. The sensor vector is made of the bearings of some landmarks, and the reflex action is a gradient descent with respect to the distance in sensor space between the current sensor vector and the target sensor vec- tor. Our theoretical analysis shows that except for some fully characterized pathological cases, any point is reachable from any other point by reflex action in the bearing sensor space provided the environment contains three landmarks and is free of obstacles. The trajectories of a robot using reflex navigation, like other image- based visual control strategies, do not correspond necessarily to the shortest paths on the ground, because the sensor error is minimized, not the moving distance on the ground. However, we show that the use of a sequence of waypoints in sensor space can address this problem. In order to identify relevant waypoints, we train a Self Organising Map (SOM) from a set of observations uniformly distributed with respect to the ground. This SOM provides a sense of location to the robot, and allows a form of path planning in sensor space. The navigation proposed system is analysed theoretically, and evaluated both in simulation and with experiments on a real robot.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Network-based Intrusion Detection Systems (NIDSs) analyse network traffic to detect instances of malicious activity. Typically, this is only possible when the network traffic is accessible for analysis. With the growing use of Virtual Private Networks (VPNs) that encrypt network traffic, the NIDS can no longer access this crucial audit data. In this paper, we present an implementation and evaluation of our approach proposed in Goh et al. (2009). It is based on Shamir's secret-sharing scheme and allows a NIDS to function normally in a VPN without any modifications and without compromising the confidentiality afforded by the VPN.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A growing literature seeks to explain differences in individuals' self-reported satisfaction with their jobs. The evidence so far has mainly been based on cross-sectional data and when panel data have been used, individual unobserved heterogeneity has been modelled as an ordered probit model with random effects. This article makes use of longitudinal data for Denmark, taken from the waves 1995-1999 of the European Community Household Panel, and estimates fixed effects ordered logit models using the estimation methods proposed by Ferrer-i-Carbonel and Frijters (2004) and Das and van Soest (1999). For comparison and testing purposes a random effects ordered probit is also estimated. Estimations are carried out separately on the samples of men and women for individuals' overall satisfaction with the jobs they hold. We find that using the fixed effects approach (that clearly rejects the random effects specification), considerably reduces the number of key explanatory variables. The impact of central economic factors is the same as in previous studies, though. Moreover, the determinants of job satisfaction differ considerably between the genders, in particular once individual fixed effects are allowed for.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides the obvious feature which is to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor encrypted traffic. Our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. In this paper, we introduce a novel protocol that utilises a secret-sharing scheme to detect attacks in encrypted networks.