22,076 research outputs found

    The Legal Approach to Crime and Correction

    Get PDF
    This report documents the research and experiments on evaluating the possibilities of using OpenCV for developing a markerless augmented reality applications using the structure from motion algorithm. It gives a background on what augmented reality is and how it can be used and also theory about camera calibration and the structure from motion algorithm is presented. Based on the theory the algorithm was implemented using OpenCV and evaluated regarding its performance and possibilities when creating markerless augmented reality applications

    The Youth Correction Authority Act

    Get PDF

    The Youth Correction Authority Act

    Get PDF
    Since wireless communication has become a standard feature in the daily life, smartphones and tablets among other things are integrated with the Bluetooth technology. While in some parts of the day wireless communication can be used for searching the internet and share information on social networks without the need of having a secure connection, there are some other parts where the security might become of high importance. When the technology gets integrated in companies the security problem becomes more evident. This is because when the radio signals spread in the medium they can be accessed by anyone that is in reach in the network and the information that was sent may not be intended for everyone. To secure the network from unintended users becomes important when handling fragile information, which companies may deal with daily.  This paper gives an introduction on which security features and techniques that already exist in some personal area networks. From this it has been clear that a security feature could be implemented on the baseband layer of Bluetooth to increase the secrecy during the transmission since at the moment security is only implemented on higher layers using encryption algorithms.  This paper proposes a conceptual idea of improving the secrecy in the network by using a wiretap code that is implemented before the error-correction coding in the Bluetooth's baseband. By disabling the ARQ scheme in Bluetooth one can modulate the channel as a Packet Erasure Channel that will lose packet with a certain probability. By using a nested code structure, the message can then be securely sent by using a higher rate than what the eavesdropper can recover due to the amount of errors the received signal will have. The performance of the concept is evaluated with the secrecy throughput, secrecy outage and the leakage

    Designs for generalized linear models with random block effects via information matrix approximations

    No full text
    The selection of optimal designs for generalized linear mixed models is complicated by the fact that the Fisher information matrix, on which most optimality criteria depend, is computationally expensive to evaluate. Our focus is on the design of experiments for likelihood estimation of parameters in the conditional model. We provide two novel approximations that substantially reduce the computational cost of evaluating the information matrix by complete enumeration of response outcomes, or Monte Carlo approximations thereof: (i) an asymptotic approximation which is accurate when there is strong dependence between observations in the same block; (ii) an approximation via Kriging interpolators. For logistic random intercept models, we show how interpolation can be especially effective for finding pseudo-Bayesian designs that incorporate uncertainty in the values of the model parameters. The new results are used to provide the first evaluation of the efficiency, for estimating conditional models, of optimal designs from closed-form approximations to the information matrix derived from marginal models. It is found that correcting for the marginal attenuation of parameters in binary-response models yields much improved designs, typically with very high efficiencies. However, in some experiments exhibiting strong dependence, designs for marginal models may still be inefficient for conditional modelling. Our asymptotic results provide some theoretical insights into why such inefficiencies occur

    Euclidean Actions, Instantons, Solitons and Supersymmetry

    Full text link
    Theories with axionic scalars admit three different Euclidean formulations, obtained by Wick rotation, Wick rotation combined with analytic continuation of the axionic scalars, and Wick rotation combined with Hodge dualization. We investigate the relation between these formulations for a class of theories which contains the sigma models of N=2 vector multiplets as a special case. It is shown that semi-classical amplitudes can be expressed equivalently using the two types of axionic actions, while the Hodge dualized version gives a different value for the instanton action unless the integration constants associated with the axion fields are chosen in a particular way. With this choice the instanton action is equal to the mass of the soliton or black hole obtained by dimensional lifting with respect to time. For supersymmetric models we use the Euclidean supersymmetry algebra to derive a Euclidean BPS condition, and we identify a geometrical criterion which distinguishes BPS from non-BPS extremal solutions.Comment: 38 page

    New VISTAs in Science Education

    Get PDF
    In the summer of 2012, a colleague and I attended the four-week Virginia Initiative for Science Teaching and Achievement (VISTA) Elementary Summer Science Institute where we were trained to conduct inquiry-based science teaching in a problem-based learning setting. We then implemented our training in our own academic classrooms by developing a Problem-Based Learning unit meeting the objectives of our Virginia standards-based science curriculum and selecting a topic with tics to our local community. Toward demonstrating that students, teachers, and educational systems stand to benefit from the implementation of this methodology, this article clarifies the following aspects: 1) outlines the problem, scenario, and process of developing a Problem-Based Leaming unit; 2) explains the delivery in the classroom; 3) analyzes ongoing formative and summative assessments; 4) and, discusses the influence on students, teachers, and instruction as a whole

    The impacts of new A8 migration in Leeds

    Get PDF
    New arrivals from Eastern Europe have made regular headlines in the popular press in recent times, not only for the unprecedented magnitude of the flows involved, but also for their impacts – positive and negative – on regions and localities up and down the country. This paper reports on a recently completed research project aimed at finding out more about A8 migrants in Leeds

    Studies of interactive plasma processes in the polar cusp

    Get PDF
    Progress during the reporting period is presented. Several distinctly different areas of research are presently being pursued: (1) studies of the thermal structure of polar outflows; (2) Prognoz data analysis; and (3) Ulysses Jupiter encounter
    corecore