Search results for "Notice"

showing 10 items of 63 documents

Exploration of the Oxynoticeratidae ornamental morphospace using the discrete cosine transform (DCT) to analyze rib patterns.

2006

The discrete cosine transform (DCT) is a Fourier-related transform widely used in signal processing and well suited to analyzing open outlines such as ammonite ribs. The method is applied here to depict and decipher the ribbing morphospace of a large group of Lower Jurassic ammonites composed of the Oxynoticeratidae and their close ancestors. Because they are clearly associated with buoyancy and/or swimming ability, the usually clearly involute, comparatively smooth and compressed shells of these ammonites may well be misleading taxonomic markers. In this context, quantitative analysis of the ribbing pattern using the DCT may significantly improve our perception of the ornamental patterns e…

0106 biological sciencesAmmonite010506 paleontologyOxynoticerasEcologybiologyFeature (archaeology)Range (biology)PaleontologyContext (language use)biology.organism_classification010603 evolutionary biology01 natural scienceslanguage.human_languagePaleontologyGenusGleviceraslanguageDiscrete cosine transform[SDU.STU.PG] Sciences of the Universe [physics]/Earth Sciences/PaleontologyGeneral Agricultural and Biological SciencesEcology Evolution Behavior and Systematics0105 earth and related environmental sciences[ SDU.STU.PG ] Sciences of the Universe [physics]/Earth Sciences/Paleontology
researchProduct

Natural visibility graphs for diagnosing attention deficit hyperactivity disorder (ADHD)

2016

“NOTICE: this is the author’s version of a work that was accepted for publication in Electronic Notes in Discrete Mathematics. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Electronic Notes in Discrete Mathematics, [Volume 54, October 2016, Pages 337-342] DOI 10.1016/j.endm.2016.09.058 ¨

0301 basic medicinemedia_common.quotation_subjectAttention deficit hyperactivity disorder03 medical and health sciencesDisk formatting0302 clinical medicinemedicineDiscrete Mathematics and CombinatoricsAttention deficit hyperactivity disorderNatural (music)Quality (business)Mathematicsmedia_commonNoticebusiness.industryApplied MathematicsVisibility (geometry)medicine.disease030104 developmental biologyPublishingKolmogorov-Smirnov testbusinessMATEMATICA APLICADANatural visibility graph030217 neurology & neurosurgeryCognitive psychology
researchProduct

Subjective ranking of concert halls substantiated through orthogonal objective parameters.

2015

[EN] This paper studies the global subjective assessment, obtained from mean values of the results of surveys addressed to members of the audience of live concerts in Spanish auditoriums, through the mean values of the three orthogonal objective parameters (Tmid, IACCE3, and LEV), expressed in just noticeable differences (JNDs), regarding the best-valued hall. Results show that a linear combination of the relative variations of orthogonal parameters can largely explain the overall perceived quality of the sample. However, the mean values of certain orthogonal parameters are not representative, which shows that an alternative approach to the problem is necessary. Various possibilities are pr…

Acoustics and UltrasonicsStatistical methodsSample (statistics)Perceived qualityArchitectural acousticsArts and Humanities (miscellaneous)RankingAcoustical measurementsFISICA APLICADAStatisticsAcoustic analysisLinear combinationJust noticeableMATEMATICA APLICADAAcoustic modelingMathematicsThe Journal of the Acoustical Society of America
researchProduct

A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory

2018

Advanced Persistent Threat(APT) attacks are a major concern for the modern societal digital infrastructures due to their highly sophisticated nature. The purpose of these attacks varies from long period espionage in high level environment to causing maximal destruction for targeted cyber environment. Attackers are skilful and well funded by governments in many cases. Due to sophisticated methods it is highly important to study proper countermeasures to detect these attacks as early as possible. Current detection methods under-performs causing situations where an attack can continue months or even years in a targeted environment. We propose a novel method for analysing APT attacks through OO…

Advanced persistent threatNoticeComputer science05 social sciences020206 networking & telecommunicationsOODA loop02 engineering and technologyBlack Swan theoryComputer securitycomputer.software_genreFlow networkBlack swan theorynetwork anomaly detectionLong periodAdvanced Persistent Thread (APT)0502 economics and businessOODA loop0202 electrical engineering electronic engineering information engineeringcomputer050203 business & management
researchProduct

Molecular biology, China and the West

2000

More than 15 years ago, in November 1985, I travelled to China for the first time. I joined a symposium on developmental biology in the Shanghai Institute of Cell Biology (CBI), organised by the Chinese Academy of Sciences and the Max‐Planck‐Gesellschaft in Germany. The symposium was meant to provide perspectives for the future of the Max Planck Guest Laboratory, just founded in the CBI. When I attended, I did not anticipate that my visit to Shanghai would initiate a long‐term commitment to China. I did not even expect to return to China in the near future. But early in 1987, my colleague Uli Schwarz from the Max Planck Institute of Developmental Biology in Tubingen, who was and still is in…

ChinaHistoryNoticeInternational Educational ExchangeLibrary scienceHistory 20th CenturyAdventureBiochemistryChinese academy of sciencesEuropeMax planck institutesymbols.namesakeGermanyOverhead projectorGeneticssymbolsHumansPlanckChinaScience & SocietyMolecular BiologyPhd studentsEMBO reports
researchProduct

Look at them and they will notice you : Distractor-independent attentional capture by direct gaze in change blindness

2018

Humans have shown a detection advantage of direct vs. averted gaze stimuli in visual search tasks. However, instead of attentional capture by direct gaze, the detection advantage in visual search may depend on attention-grabbing potential of the distractor stimuli to which the target needs to be compared. We investigated attentional capture by direct gaze using the change blindness paradigm, in which successful detection does not require comparison between the target and the distractor items. Participants detected a masked gaze direction change in one of four simultaneously presented schematic faces. The distractor gaze directions were systematically varied across three experiments. Changes…

Cognitive NeuroscienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONExperimental and Cognitive Psychologyhavaitseminen050105 experimental psychologyGaze perception03 medical and health sciencesstare-in-the-crowd effectsilmänliikkeet0302 clinical medicineArts and Humanities (miscellaneous)0501 psychology and cognitive scienceschange detectionta515Visual searchCommunicationchange blindnessNoticebusiness.industryPsykologia - Psychology05 social sciencesVisual search tasksGazeChange blindnesskatsetarkkailubusinessPsychology030217 neurology & neurosurgeryChange detectiongaze perceptionCognitive psychology
researchProduct

Dusting Off the Turing Test

2012

Hold up both hands and spread your fingers apart. Now put your palms together and fold your two middle fingers down till the knuckles on both fingers touch each other. While holding this position, one after the other, open and close each pair of opposing fingers by an inch or so. Notice anything? Of course you did. But could a computer without a body and without human experiences ever answer that question or a million others like it? And even if recent revolutionary advances in collecting, storing, retrieving, and analyzing data lead to such a computer, would this machine qualify as “intelligent”?

Communicationsymbols.namesakeMultidisciplinaryNoticeComputer sciencebusiness.industryTuring testsymbolsbusinessScience
researchProduct

Supervisory Review of Key Functions

2015

Picking up from the Chap. 7 examination of the term “key functions” and of the key function holders, this chapter undertakes an examination of the supervisory review of key functions. In particular, this inquiry involves the areas of supervision of the key function holders as to fit-and-proper monitoring, the issue of remuneration of key function holders, the duties of notice and disclosure attendant on a change in key function holders, and the powers of insurance supervisory authorities in the supervision of key function holders.

ComputingMilieux_THECOMPUTINGPROFESSIONNoticebusiness.industrySupervisory boardmedia_common.quotation_subjectComputingMilieux_LEGALASPECTSOFCOMPUTINGAccountingTerm (time)ComputingMilieux_GENERALRemunerationKey (cryptography)businessFunction (engineering)media_common
researchProduct

Racialization, Othering, and Coping Among Adult International Adoptees in Finland

2015

This qualitative interview study examined experiences of racialization and coping among 14 adult international adoptees in Finland. The results show that adoptees encounter a range of racializations by which they are made ‘other’ and excluded from Finnishness. Racialization mostly occurs indirectly and subtly, and often by significant others, and consequently is more difficult to cope with. The findings suggest that the Finnish adoption community and adoption research should pay more attention to experiences of racialization among adoptees and take notice of the context-specific nature of coping when supporting adoptees to develop strategies that reduce discrimination and protect their well…

Coping (psychology)Sociology and Political ScienceNoticemedia_common.quotation_subjectQualitative interviewsrasismiselviytymineninternational adoptionPsychological interventionGender studiesta5142Racismcopingracializationta5141otheringRacializationta516SociologyLawracismta515Demographymedia_commonAdoption Quarterly
researchProduct

(Pa)labra[r] (en) el texto. Lector/autor en la poesía rupturista de Mario Martín Gijón

2018

La creación de los poetas españoles contemporáneos, quizá debido a la proximidad temporal, hasta ahora no se ha convertido en un objeto predilecto de investigación. El siglo XXI cambia el paradigma en la creación del ecosistema poético: se nota una floración de propuestas cada vez más individuales. Aunque la crítica postula alejarse de los estudios llevados a cabo desde el punto de vista generacional, sigue agrupando la diversidad de propuestas poéticas en tendencias o líneas estéticas. Además, si se tiene en cuenta que los pocos acercamientos críticos que se han realizado en ese campo se limitan a dar un panorama bastante extenso de la poética española de las primeras décadas del siglo XXI…

Cultural StudiesLinguistics and LanguageHistoryUNESCO::CIENCIAS DE LAS ARTES Y LAS LETRASLiterature and Literary TheoryPoetryNoticeCommunicationmedia_common.quotation_subjectArtLanguage and LinguisticsPoetics:CIENCIAS DE LAS ARTES Y LAS LETRAS [UNESCO]Humanitiesmedia_common
researchProduct