6,100 research outputs found
A constructive and unifying framework for zero-bit watermarking
In the watermark detection scenario, also known as zero-bit watermarking, a
watermark, carrying no hidden message, is inserted in content. The watermark
detector checks for the presence of this particular weak signal in content. The
article looks at this problem from a classical detection theory point of view,
but with side information enabled at the embedding side. This means that the
watermark signal is a function of the host content. Our study is twofold. The
first step is to design the best embedding function for a given detection
function, and the best detection function for a given embedding function. This
yields two conditions, which are mixed into one `fundamental' partial
differential equation. It appears that many famous watermarking schemes are
indeed solution to this `fundamental' equation. This study thus gives birth to
a constructive framework unifying solutions, so far perceived as very
different.Comment: submitted to IEEE Trans. on Information Forensics and Securit
THE EFFECTS OF COMPUTER SKILL IN STUDENT`S ACHIEVEMENT THROUGH THE USE OF LEARNING MANAGEMENT SYSTEM FOR INFORMATION TECHNOLOGY SUBJECT AMONG GRADE 10 STUDENTS
THE EFFECTS OF COMPUTER SKILL IN STUDENT`S ACHIEVEMENT THROUGH THE USE OF LEARNING MANAGEMENT SYSTEM FOR INFORMATION TECHNOLOGY SUBJECT AMONG GRADE 10 STUDENTS - computer skill, student achievement, e-learning, learning management system, MOODL
HUBUNGAN MANAJEMEN DIRI DENGAN STRES KERJA PADA KARYAWAN TETAP
Setiap perusahaan memiliki deskripsi pekerjaan yang berbeda, hal ini dapat
mempengaruhi beban kerja yang diterima pada karyawan. Tingkat beban kerja yang berlebih
dapat menciptakan stres kerja pada karyawan di dalam perusahaan. Manajemen diri sangat
dibutuhkan untuk mengendalikan tingkat stres kerja yang dialami oleh karyawan. Penelitian
ini bertujuan untuk mengetauhi hubungan antara manajemen diri dengan stres kerja pada
karyawan tetap. Penelitian ini menggunakan pendekatan kuantitatif dengan metode
korelasional, teknik pengambilan sampel pada penelitian ini mengguanakan purpopsive
sampling. Subjek pada penelitian ini berjumlah 201 yang merupakan karyawan tetap yang telah
melewati masa percobaan bekerja selama maksimal 3 bulan, mendapatkan gaji minimal UMR
daerah dan telah bekerja selama 1 tahun lebih. Alat ukur yang digunakan Self-Control and Self�Management Scale (SCMS) dan the new job stress scale. Uji analisis menggunakan uji korelasi
spearman rho dengan bantuan software IBM SPSS Statistics 27.0.1. Hasil penelitian
menunjukan bahwa ada hubungan negatif yang signifikan antara manajemen diri dengan stres
kerj
Towards joint decoding of binary Tardos fingerprinting codes
The class of joint decoder of probabilistic fingerprinting codes is of utmost
importance in theoretical papers to establish the concept of fingerprint
capacity. However, no implementation supporting a large user base is known to
date. This article presents an iterative decoder which is, as far as we are
aware of, the first practical attempt towards joint decoding. The
discriminative feature of the scores benefits on one hand from the
side-information of previously accused users, and on the other hand, from
recently introduced universal linear decoders for compound channels. Neither
the code construction nor the decoder make precise assumptions about the
collusion (size or strategy). The extension to incorporate soft outputs from
the watermarking layer is straightforward. An extensive experimental work
benchmarks the very good performance and offers a clear comparison with
previous state-of-the-art decoders.Comment: submitted to IEEE Trans. on Information Forensics and Security. -
typos corrected, one new plot, references added about ECC based
fingerprinting code
Worst case attacks against binary probabilistic traitor tracing codes
An insightful view into the design of traitor tracing codes should
necessarily consider the worst case attacks that the colluders can lead. This
paper takes an information-theoretic point of view where the worst case attack
is defined as the collusion strategy minimizing the achievable rate of the
traitor tracing code. Two different decoders are envisaged, the joint decoder
and the simple decoder, as recently defined by P. Moulin
\cite{Moulin08universal}. Several classes of colluders are defined with
increasing power. The worst case attack is derived for each class and each
decoder when applied to Tardos' codes and a probabilistic version of the
Boneh-Shaw construction. This contextual study gives the real rates achievable
by the binary probabilistic traitor tracing codes. Attacks usually considered
in literature, such as majority or minority votes, are indeed largely
suboptimal. This article also shows the utmost importance of the time-sharing
concept in a probabilistic codes.Comment: submitted to IEEE Trans. on Information Forensics and Securit
Barriers to and supports for success for Maori students in the Psychology Department at the University of Waikato
The overall objective for this evaluation was to investigate the barriers to participating in tertiary education for Maori, and supports for academic success for Maori students in the Psychology Department. With this objective in mind, we set out to:
Investigate the barriers that impede success for Maori students in the Psychology Department.
Identify variables of success and how they can be more effectively managed within the Psychology Department.
Identify factors that contribute to Maori students continuing their studies through to graduate level.
Provide recommendations for future development of a supportive environment for Maori students in the Psychology Department
Orientation covariant aggregation of local descriptors with embeddings
Image search systems based on local descriptors typically achieve orientation
invariance by aligning the patches on their dominant orientations. Albeit
successful, this choice introduces too much invariance because it does not
guarantee that the patches are rotated consistently. This paper introduces an
aggregation strategy of local descriptors that achieves this covariance
property by jointly encoding the angle in the aggregation stage in a continuous
manner. It is combined with an efficient monomial embedding to provide a
codebook-free method to aggregate local descriptors into a single vector
representation. Our strategy is also compatible and employed with several
popular encoding methods, in particular bag-of-words, VLAD and the Fisher
vector. Our geometric-aware aggregation strategy is effective for image search,
as shown by experiments performed on standard benchmarks for image and
particular object retrieval, namely Holidays and Oxford buildings.Comment: European Conference on Computer Vision (2014
Place attachment of Ngāi Te Ahi to Hairini Marae
Twelve members of Ngāi Te Ahi, a hapū from Tauranga, were interviewed to explore how they talk about their place attachment to Hairini Marae. This was organized around five key dimensions of place attachment taken from the literature—continuity, distinctiveness, symbolism, attachment and familiarity. We found that in discussing all dimensions, place attachment was equally about social and cultural relationships, history, and socialization. Place attachment for groups such as Māori is complex because it encompasses all social relationships past and present. The implication for those working with Māori is to take seriously the wider connotations of place when talking to Māori about marae, traditional homelands, and their land
- …