1,495 research outputs found

    Freedom Dreaming Through Waking Nightmares: A Duoethnography Of Education Scholars Navigating Public Schooling As Parents

    Get PDF
    As advocates for public schools, public school teachers, and the promise of public education, we experience tension related to our roles as parents of school-aged children. While our vision of both schools and our own children’s education goes beyond “academic” success, a struggle arises at the intersection of our personal and professional roles. With that in mind, this paper discusses the tensions we experience as both teacher educators and parents. Our inquiry took a reflective nature as we worked to gain clarity into and highlight the differences between the pushes and pulls we feel given the intersections of our personal and professional roles. This tension is even more palpable at a time when being critical of public education, even in a loving and productive manner, only feeds its critics and further burdens its exhausted and alienated teachers

    Open-set Speaker Identification

    Get PDF
    This study is motivated by the growing need for effective extraction of intelligence and evidence from audio recordings in the fight against crime, a need made ever more apparent with the recent expansion of criminal and terrorist organisations. The main focus is to enhance open-set speaker identification process within the speaker identification systems, which are affected by noisy audio data obtained under uncontrolled environments such as in the street, in restaurants or other places of businesses. Consequently, two investigations are initially carried out including the effects of environmental noise on the accuracy of open-set speaker recognition, which thoroughly cover relevant conditions in the considered application areas, such as variable training data length, background noise and real world noise, and the effects of short and varied duration reference data in open-set speaker recognition. The investigations led to a novel method termed “vowel boosting” to enhance the reliability in speaker identification when operating with varied duration speech data under uncontrolled conditions. Vowels naturally contain more speaker specific information. Therefore, by emphasising this natural phenomenon in speech data, it enables better identification performance. The traditional state-of-the-art GMM-UBMs and i-vectors are used to evaluate “vowel boosting”. The proposed approach boosts the impact of the vowels on the speaker scores, which improves the recognition accuracy for the specific case of open-set identification with short and varied duration of speech material

    The Covert Life of Hospital Architecture

    Get PDF
    The Covert Life of Hospital Architecture addresses hospital architecture as a set of interlocked, overlapping spatial and social conditions. It identifies ways that planned-for and latent functions of hospital spaces work jointly to produce desired outcomes such as greater patient safety, increased scope for care provider communication and more intelligible corridors. By advancing space syntax theory and methods, the volume brings together emerging research on hospital environments. Opening with a description of hospital architecture that emphasizes everyday relations, the sequence of chapters takes an unusually comprehensive view that pairs spaces and occupants in hospitals: the patient room and its intervisibility with adjacent spaces, care teams and on-ward support for their work and the intelligibility of public circulation spaces for visitors. The final chapter moves outside the hospital to describe the current healthcare crisis of the global pandemic as it reveals how healthcare institutions must evolve to be adaptable in entirely new ways. Reflective essays by practicing designers follow each chapter, bringing perspectives from professional practice into the discussion. The Covert Life of Hospital Architecture makes the case that latent dimensions of space as experienced have a surprisingly strong link to measurable outcomes, providing new insights into how to better design hospitals through principles that have been tested empirically. It will become a reference for healthcare planners, designers, architects and administrators, as well as for readers from sociology, psychology and other areas of the social sciences

    The Covert Life of Hospital Architecture

    Get PDF
    The Covert Life of Hospital Architecture addresses hospital architecture as a set of interlocked, overlapping spatial and social conditions. It identifies ways that planned-for and latent functions of hospital spaces work jointly to produce desired outcomes such as greater patient safety, increased scope for care provider communication and more intelligible corridors. By advancing space syntax theory and methods, the volume brings together emerging research on hospital environments. Opening with a description of hospital architecture that emphasizes everyday relations, the sequence of chapters takes an unusually comprehensive view that pairs spaces and occupants in hospitals: the patient room and its intervisibility with adjacent spaces, care teams and on-ward support for, and the intelligibility of public circulation spaces for visitors. The final chapter moves outside the hospital to describe the current healthcare crisis of the global pandemic as it reveals how healthcare institutions must evolve to be adaptable in entirely new ways. Reflective essays by practicing designers follow each chapter, bringing perspectives from professional practice into the discussion. The Covert Life of Hospital Architecture makes the case that latent dimensions of space as experienced have a surprisingly strong link to measurable outcomes, providing new insights into how to better design hospitals through principles that have been tested empirically. It will become a reference for healthcare planners, designers, architects and administrators, as well as for readers from sociology, psychology and other areas of the social sciences

    Secure and efficient storage of multimedia: content in public cloud environments using joint compression and encryption

    Get PDF
    The Cloud Computing is a paradigm still with many unexplored areas ranging from the technological component to the de nition of new business models, but that is revolutionizing the way we design, implement and manage the entire infrastructure of information technology. The Infrastructure as a Service is the delivery of computing infrastructure, typically a virtual data center, along with a set of APIs that allow applications, in an automatic way, can control the resources they wish to use. The choice of the service provider and how it applies to their business model may lead to higher or lower cost in the operation and maintenance of applications near the suppliers. In this sense, this work proposed to carry out a literature review on the topic of Cloud Computing, secure storage and transmission of multimedia content, using lossless compression, in public cloud environments, and implement this system by building an application that manages data in public cloud environments (dropbox and meocloud). An application was built during this dissertation that meets the objectives set. This system provides the user a wide range of functions of data management in public cloud environments, for that the user only have to login to the system with his/her credentials, after performing the login, through the Oauth 1.0 protocol (authorization protocol) is generated an access token, this token is generated only with the consent of the user and allows the application to get access to data/user les without having to use credentials. With this token the framework can now operate and unlock the full potential of its functions. With this application is also available to the user functions of compression and encryption so that user can make the most of his/her cloud storage system securely. The compression function works using the compression algorithm LZMA being only necessary for the user to choose the les to be compressed. Relatively to encryption it will be used the encryption algorithm AES (Advanced Encryption Standard) that works with a 128 bit symmetric key de ned by user. We build the research into two distinct and complementary parts: The rst part consists of the theoretical foundation and the second part is the development of computer application where the data is managed, compressed, stored, transmitted in various environments of cloud computing. The theoretical framework is organized into two chapters, chapter 2 - Background on Cloud Storage and chapter 3 - Data compression. Sought through theoretical foundation demonstrate the relevance of the research, convey some of the pertinent theories and input whenever possible, research in the area. The second part of the work was devoted to the development of the application in cloud environment. We showed how we generated the application, presented the features, advantages, and safety standards for the data. Finally, we re ect on the results, according to the theoretical framework made in the rst part and platform development. We think that the work obtained is positive and that ts the goals we set ourselves to achieve. This research has some limitations, we believe that the time for completion was scarce and the implementation of the platform could bene t from the implementation of other features.In future research it would be appropriate to continue the project expanding the capabilities of the application, test the operation with other users and make comparative tests.A Computação em nuvem é um paradigma ainda com muitas áreas por explorar que vão desde a componente tecnológica à definição de novos modelos de negócio, mas que está a revolucionar a forma como projetamos, implementamos e gerimos toda a infraestrutura da tecnologia da informação. A Infraestrutura como Serviço representa a disponibilização da infraestrutura computacional, tipicamente um datacenter virtual, juntamente com um conjunto de APls que permitirá que aplicações, de forma automática, possam controlar os recursos que pretendem utilizar_ A escolha do fornecedor de serviços e a forma como este aplica o seu modelo de negócio poderão determinar um maior ou menor custo na operacionalização e manutenção das aplicações junto dos fornecedores. Neste sentido, esta dissertação propôs· se efetuar uma revisão bibliográfica sobre a temática da Computação em nuvem, a transmissão e o armazenamento seguro de conteúdos multimédia, utilizando a compressão sem perdas, em ambientes em nuvem públicos, e implementar um sistema deste tipo através da construção de uma aplicação que faz a gestão dos dados em ambientes de nuvem pública (dropbox e meocloud). Foi construída uma aplicação no decorrer desta dissertação que vai de encontro aos objectivos definidos. Este sistema fornece ao utilizador uma variada gama de funções de gestão de dados em ambientes de nuvem pública, para isso o utilizador tem apenas que realizar o login no sistema com as suas credenciais, após a realização de login, através do protocolo Oauth 1.0 (protocolo de autorização) é gerado um token de acesso, este token só é gerado com o consentimento do utilizador e permite que a aplicação tenha acesso aos dados / ficheiros do utilizador ~em que seja necessário utilizar as credenciais. Com este token a aplicação pode agora operar e disponibilizar todo o potencial das suas funções. Com esta aplicação é também disponibilizado ao utilizador funções de compressão e encriptação de modo a que possa usufruir ao máximo do seu sistema de armazenamento cloud com segurança. A função de compressão funciona utilizando o algoritmo de compressão LZMA sendo apenas necessário que o utilizador escolha os ficheiros a comprimir. Relativamente à cifragem utilizamos o algoritmo AES (Advanced Encryption Standard) que funciona com uma chave simétrica de 128bits definida pelo utilizador. Alicerçámos a investigação em duas partes distintas e complementares: a primeira parte é composta pela fundamentação teórica e a segunda parte consiste no desenvolvimento da aplicação informática em que os dados são geridos, comprimidos, armazenados, transmitidos em vários ambientes de computação em nuvem. A fundamentação teórica encontra-se organizada em dois capítulos, o capítulo 2 - "Background on Cloud Storage" e o capítulo 3 "Data Compression", Procurámos, através da fundamentação teórica, demonstrar a pertinência da investigação. transmitir algumas das teorias pertinentes e introduzir, sempre que possível, investigações existentes na área. A segunda parte do trabalho foi dedicada ao desenvolvimento da aplicação em ambiente "cloud". Evidenciámos o modo como gerámos a aplicação, apresentámos as funcionalidades, as vantagens. Por fim, refletimos sobre os resultados , de acordo com o enquadramento teórico efetuado na primeira parte e o desenvolvimento da plataforma. Pensamos que o trabalho obtido é positivo e que se enquadra nos objetivos que nos propusemos atingir. Este trabalho de investigação apresenta algumas limitações, consideramos que o tempo para a sua execução foi escasso e a implementação da plataforma poderia beneficiar com a implementação de outras funcionalidades. Em investigações futuras seria pertinente dar continuidade ao projeto ampliando as potencialidades da aplicação, testar o funcionamento com outros utilizadores e efetuar testes comparativos.Fundação para a Ciência e a Tecnologia (FCT
    corecore