Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "hidden" wg kryterium: Temat


Tytuł:
Pozaideologiczne uwikłania. Ukryty program we współczesnej debacie edukacyjnej
Beyond Ideological Entanglement. The Hidden Agenda in the Contemporary Educational Debate
Autorzy:
Pauluk, Dorota
Powiązania:
https://bibliotekanauki.pl/articles/26850905.pdf
Data publikacji:
2013-04-30
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
hidden curriculum
ideology
education
Opis:
The purpose of this article is to reconstruct a state of the debate ongoing for over a half of the century on the so-called the hidden program. The different theoretical positions are compared and presented – from those who take the hidden program as a central concept and category, to those denying its presence in social sciences. Contentious issues have been outlined, above all in the views of the nature, sources and results of this phenomenon. Vigorous discussions ongoing in the English literature, often having the ideological roots, are used by the author to present the own perspective of the hidden program as an important educational category, but ignored in Polish science, that may become an inspiration for theorists and practitioners and also may become a tool for diagnosis and critique.
Źródło:
Kultura i Edukacja; 2013, 2(95); 7-28
1230-266X
Pojawia się w:
Kultura i Edukacja
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Detection of selective cationic amphipatic antibacterial peptides by Hidden Markov models
Autorzy:
Polanco, Carlos
Samaniego, Jose
Powiązania:
https://bibliotekanauki.pl/articles/1040652.pdf
Data publikacji:
2009
Wydawca:
Polskie Towarzystwo Biochemiczne
Tematy:
Hidden Markov models
antibacterial peptides
Opis:
Antibacterial peptides are researched mainly for the potential benefit they have in a variety of socially relevant diseases, used by the host to protect itself from different types of pathogenic bacteria. We used the mathematical-computational method known as Hidden Markov models (HMMs) in targeting a subset of antibacterial peptides named Selective Cationic Amphipatic Antibacterial Peptides (SCAAPs). The main difference in the implementation of HMMs was focused on the detection of SCAAP using principally five physical-chemical properties for each candidate SCAAPs, instead of using the statistical information about the amino acids which form a peptide. By this method a cluster of antibacterial peptides was detected and as a result the following were found: 9 SCAAPs, 6 synthetic antibacterial peptides that belong to a subregion of Cecropin A and Magainin 2, and 19 peptides from the Cecropin A family. A scoring function was developed using HMMs as its core, uniquely employing information accessible from the databases.
Źródło:
Acta Biochimica Polonica; 2009, 56, 1; 167-176
0001-527X
Pojawia się w:
Acta Biochimica Polonica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The hidden curriculum in military schools
Autorzy:
Kozina, Andrija
Powiązania:
https://bibliotekanauki.pl/articles/1310791.pdf
Data publikacji:
2015
Wydawca:
Akademia Sztuki Wojennej
Tematy:
hidden curriculum
military schools
andragogy
Opis:
Military education, as an integral and inseparable part of building the army as an institution, is changing its identity and tends to be becoming a place of development, changes, scientific research, quality teaching and education. Adoption of the National Curriculum Framework is creating conditions for these changes. Introduction of the military schools curriculum will inevitably lead to the hidden curriculum. In adult education (andragogy), the hidden curriculum appears in a more vigorous and influential form. The ability to function and the high reliability of the military system are based on hierarchy in which the formation of will is carried out from top downwards. The most prominent factors are command, obedience and reporting. In such an environment, we recognise the positive and negative effects of the hidden curriculum in Croatian military schools.
Źródło:
Security and Defence Quarterly; 2015, 6, 1; 89-104
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Education and the Praxiology of the Hidden Curriculum
Autorzy:
Airaksinen, Timo
Powiązania:
https://bibliotekanauki.pl/articles/468760.pdf
Data publikacji:
2005
Wydawca:
Polska Akademia Nauk. Instytut Filozofii i Socjologii PAN
Tematy:
training
shooling
Bildung
hidden curriculum
Opis:
Abstract: The intuitive idea of this paper is very simple, namely, when the educational work progresses from training, through shooling towards Bildung the role of the Hidden Curriculum increases. I analyse the concepts mentioned above one after the other and pay special attention to that of the Hidden Curriculum. It is not an easy concept to understand. It also seems like a potentially harmful factor in education. Finally I introduce the key praxiological notions of efficicieny and effectiveness and consider how this changes our view of the role of the Hidden Curriculum in education. My conclusion is that praxiological considerations can be used to keep the effects of the Hidden Curriculum at bay.
Źródło:
Prakseologia; 2005, 145; 33-42
0079-4872
Pojawia się w:
Prakseologia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Women in the Polish Industry — Employment Numbers and Structure in the Years 1945-1956
Autorzy:
Chumiński, Jędrzej
Powiązania:
https://bibliotekanauki.pl/articles/1390648.pdf
Data publikacji:
2019-12-31
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
women
workers
industry
hidden unemployment
Opis:
The first decade of the Polish People’s Republic (PPR) saw a radical increase in the number of workers employed in the industry. Many of the new workers were women, whose situation on the job market was much more dynamic than men’s. New staff was mainly recruited from the rural population. Workers were poorly educated and had little work experience, which begs a question regarding the economic rationale behind this process. Some of the new employees could actually be included in the category of “hidden unemployment”. Their marginal productivity equaled zero, which means that their work had no actual impact on the gross national income. Furthermore, such “unemployment at work” negatively impacts morale and work quality, leads to increased staff turnover, and essentially prevents workers from improving their financial situation. Considering the poorer socio-demographic characteristics of women compared to men, one can pose the thesis that the rate of needless employment was significantly higher among women than among men.
Źródło:
Studia Historiae Oeconomicae; 2019, 37; 147-176
0081-6485
Pojawia się w:
Studia Historiae Oeconomicae
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ukryty wymiar afrykańskiej przestrzeni
The hidden dimension of the African space
Autorzy:
Łapott, Jacek
Powiązania:
https://bibliotekanauki.pl/articles/567124.pdf
Data publikacji:
2010
Wydawca:
Uniwersytet Warmińsko-Mazurski w Olsztynie. Instytut Nauk Politycznych
Tematy:
African space
Mali
Hidden dimension
Opis:
The characteristic "tourist invasion" and other aspects of modern globalisation now ongoing in Africa and specifically in Mali cause substantial changes in the local culture. In particular it affects the Dogon tribe, attractive to many. At the same time ethnologists begin to realize that something is „becoming missing". A certain research age comes to an end and scientific materials collected and gathered appear to be only fragments of a whole that would be difficult to complete. On the other hand, from the Dogon perspective the attempts to save their heritage are not always met with understanding and approval. Frequently these attempts may even become desperate. The events of my last and the previous research season seem to confirm this opinion. On the 27th October 2008 (the penultimate day of our expedition) Pangale Dolo, one of the "initiated" guardians of the "hidden dimension" of the culture came to our camp with the proposal to show us something interesting. We went with him to the border of the Sanga village where among fields we found a low, long rock formation with shallow caves. 'That's where first Nommo, our ancestors, descended from the sky' he said. 'First four sat on this rock', 'in this place they fought Jurugu' and so went the story of the most esoteric part of the tribe's life. Next, on the other side of the village we were shown the landing site of the "first blacksmith's ark", the cave where he set up the first smithy and so on. It became apparent that the myth we were told differs somewhat from the information gathered by the French ethnologists 60 years ago. Maybe during our next expedition we will be able to verify this information. In the near future this subject will take form of a separate publication. Before that I have tried at least several times to get any information on this subject and always same upon a "brick wall" which no one was willing to cross with me (us). This time it was different. The Dogon seeing our painstaking efforts and almost desperation to learn the modern image of their culture, without asking have taken upon themselves the role of "the question answerer" but also (more importantly) the side willing to pick the dialogue in this matter. We had the opportunity to get to know a fragment of the "hidden space" of their culture.
Źródło:
Forum Politologiczne; 2010, 10 - Przestrzeń i granice we współczesnej Afryce; 19-28
1734-1698
Pojawia się w:
Forum Politologiczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Znaki obecności Boga. Kilka uwag o istocie cudu w twórczości Gustawa Herlinga-Grudzińskiego
Autorzy:
Panas, Paweł
Powiązania:
https://bibliotekanauki.pl/articles/2141028.pdf
Data publikacji:
2011
Wydawca:
Instytut Studiów Międzynarodowych i Edukacji Humanum
Tematy:
miracle
sign
christianity
hidden God
Opis:
The text is an attempt at describing two main theses about the religious dimension Herling-Grudzinski’s literary papers. First (taken directly from Pascal): God is hidden and this is the reason for human suffering. Second: a man needs God so he looks even for the smallest signs of His presence. Hence the writer so often returns to the problem of miracle. These miracles are always true signs of the presence of God. Herling-Grudzinski’s characters must be accurate in reading these signs which unfortunately is not always successful.
Źródło:
Humanum. Międzynarodowe Studia Społeczno-Humanistyczne; 2011, 2(7); 151-159
1898-8431
Pojawia się w:
Humanum. Międzynarodowe Studia Społeczno-Humanistyczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Satelitarne wyznaczanie współrzędnych punktów niedostępnych
Satellite determination of hidden points
Autorzy:
Uznański, A.
Powiązania:
https://bibliotekanauki.pl/articles/249105.pdf
Data publikacji:
2018
Wydawca:
Stowarzyszenie Inżynierów i Techników Komunikacji Rzeczpospolitej Polskiej
Tematy:
RTK
RTN
COGO
punkty niedostępne (Hidden Point)
dalmierz laserowy
inklinometr
Hidden Point
laser rangefinder
inclinometer
Opis:
Satelitarne pomiary kinematyczne w czasie rzeczywistym RTK i RTN są aktualnie powszechnie stosowaną techniką pomiarową przez wykonawców robót geodezyjnych. Jest to technika najefektywniejsza. Jednym z mankamentów pomiarów satelitarnych jest wymóg ustawienia anteny satelitarnej nad punktem mierzonym. Wiele szczegółów sytuacyjnych nie można pomierzyć ten sposób (budynki stacyjne, wiaty, słupy trakcyjne, drzewa, itp). Punktami niedostępnymi dla pomiarów satelitarnych mogą być również punkty z bardzo przesłoniętym horyzontem (szpalery wysokich drzew wzdłuż linii kolejowych). W pracy przedstawiono metody praktycznego wyznaczania pozycji punktów formalnie niedostępnych do pomiaru technikami satelitarnymi RTK/RTN, wykorzystujące funkcje COGO, dalmierz laserowy oraz inklinometr w odbiorniku satelitarnym.
Satellite RTR and RTN real-time kinematic measurements are currently widely used measuring technique by geodetic contractors. This is the most effective technique. One of the drawbacks of satellite measurements is the requirement to set the satellite dish above the measured point. Many situational details cannot be measured by this way (station buildings, sheds, traction poles, trees, etc.). The hidden points for satellite measurements may also be points with a very obscured horizon (rows of tall trees along the railway lines). The methods of practical determination of the positions of points not technically available for measurement by RTK / RTN satellite techniques, use COGO functions, laser rangefinder and inclinometer in a satellite receiver have been presented in the paper.
Źródło:
Zeszyty Naukowo-Techniczne Stowarzyszenia Inżynierów i Techników Komunikacji w Krakowie. Seria: Materiały Konferencyjne; 2018, 1(115); 123-131
1231-9171
Pojawia się w:
Zeszyty Naukowo-Techniczne Stowarzyszenia Inżynierów i Techników Komunikacji w Krakowie. Seria: Materiały Konferencyjne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Social Order and Network Security. Exploratory Research on TOR Hidden Network
Autorzy:
Stefański, Robert
Powiązania:
https://bibliotekanauki.pl/articles/450803.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Łódzki. Wydział Ekonomiczno-Socjologiczny
Tematy:
TOR
hidden network
social order
system
Opis:
As Internet becomes to grow outside of its physical carriers, it gains more influence over various subsystems constituting the social system in general. This manifestation is especially visible in the economical plane, in which a certain sym- biotic relationship between the world wide network and other outernet institutions and organizations first occurred. With Internet becoming the modern central hub and a binder for various system components, it is safe to assume, that events taking place over the web, may or will have repercussions in the non-virtual reality. It is already valid to point out, that although the borderline between virtual and non-virtual realities is less and less visible, it may be sometimes required to artificially introduce this distinction. By present - ing some of the possible actions that individuals may take while using hidden network ser - vices, an attempt shall be made, to determine what the possible outcome of the existence of such structures within the Internet may be from sociological perspective.
Źródło:
Władza sądzenia; 2015, 5. Bezpieczeństwo Między sądzeniem a stanem rzeczy
2300-1690
Pojawia się w:
Władza sądzenia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Performance evaluation of different universal steganalysis techniques in JPG files
Autorzy:
Emam, A. M.
Ouf, M. M.
Powiązania:
https://bibliotekanauki.pl/articles/106230.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
steganalysis
evaluation
hidden data in files
Opis:
Steganalysis is the art of detecting the presence of hidden data in files. In the last few years, there have been a lot of methods provided for steganalysis. Each method gives a good result depending on the hiding method. This paper aims at the evaluation of five universal steganalysis techniques which are “Wavelet based steganalysis”, “Feature Based Steganalysis”, “Moments of characteristic function using wavelet decomposition based steganalysis”, “Empirical Transition Matrix in DCT Domain based steganalysis”, and “Statistical Moment using jpeg2D array and 2D characteristic function”. A large Dataset of Images -1000 images- are subjected to three types of steganographic techniques which are “Outguess”, “F5” and “Model Based” with the embedding rate of 0.05, 0.1, and 0.2. It was followed by extracting the steganalysis feature used by each steganalysis technique for the stego images as well as the cover image. Then half of the images are devoted to train the classifier. The Support vector machine with a linear kernel is used in this study. The trained classifier is then used to test the other half of images, and the reading is reported The “Empirical Transition Matrix in DCT Domain based steganalysis” achieves the highest values among all the properties measured and it becomes the first choice for the universal steganalysis technique.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2012, 12, 3; 121-139
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An adaptive hidden Markov model for indoor OFDM based wireless systems
Autorzy:
Verikoukis, Ch.V.
Powiązania:
https://bibliotekanauki.pl/articles/308130.pdf
Data publikacji:
2004
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
hidden Markov model
OFDM
multicarrier transmission
Opis:
Detailed physical layer simulation of orthogonal frequency division multiplexing (OFDM) systems requires programs that execute too slowly due to long coherence time of the indoor mobile channel. Evaluation of higher layers of such systems is simplified if suitable models for reproduction of channel errors statistics are available. An adaptive hidden Markov model (HMM) for indoor OFDM based systems that accurately reproduces error statistics of the real system with less computational effort than the exact simulation is presented in this paper. The standard HMM methodology has been modified in order to reproduce the periodicity in the error positions of the OFDM systems. The proposed model is validated by comparison of three statistical parameters: number of errors, length of the errors run and length of the error-free intervals in a frame of bits.
Źródło:
Journal of Telecommunications and Information Technology; 2004, 2; 61-65
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Steganographic algorithm of hiding information in sound based on Fourier transform and masking
Autorzy:
Kozieł, G.
Powiązania:
https://bibliotekanauki.pl/articles/206286.pdf
Data publikacji:
2011
Wydawca:
Polska Akademia Nauk. Instytut Badań Systemowych PAN
Tematy:
keywords steganography
hidden communication
Fourier transform
Opis:
A new steganographicmethod based on Fourier transform is proposed. Data is attached in the frequency domain within the limits of the audible band. Masked frequencies are used to conceal information in order to make the changes inaudible for human ear. This approach allows for modification in the sound frequency band only, and does not require any additional modifications. It also allows for concealing information efficiently, minimizing the number of changes and gaining robustness with respect to popular sound transformations.
Źródło:
Control and Cybernetics; 2011, 40, 4; 1231-1247
0324-8569
Pojawia się w:
Control and Cybernetics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Konwergencja dochodowa: mocne i słabe strony istniejących podejść
Autorzy:
Bernardelli, Michał
Próchniak, Mariusz
Witkowski , Bartosz
Powiązania:
https://bibliotekanauki.pl/articles/630519.pdf
Data publikacji:
2017
Wydawca:
Szkoła Główna Handlowa w Warszawie
Tematy:
Economic growth, Convergence, Hidden Markov model
Opis:
The paper presents the review of the literature on income-level convergence(catching-up). The analysis includes convergence defined as the tendency toward equalization of income levels between countries. Unlike typical survey papers, the article focuses on the identification of weaknesses in the hitherto empirical studies on convergence. Apart from the standard types of the catching-up process (beta and sigma convergence), papers with the alternative measures of convergence(gamma and rho) are also analyzed. Both these elements constitute the value added of this research. The authors conclude that despite many empirical approaches, there is still much room for proposing new theoretical and empirical methods to analyze the catching-up process. Among others, studies that use hidden Markov models in the analysis of convergence are absent.
Źródło:
Kwartalnik Kolegium Ekonomiczno-Społecznego Studia i Prace; 2017, 3; 71-86
2082-0976
Pojawia się w:
Kwartalnik Kolegium Ekonomiczno-Społecznego Studia i Prace
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Failure finding tasks in Reliability Centred Maintenance
Wyszukiwanie uszkodzeń urządzeń w systemie utrzymania ruchu ukierunkowanym na niezawodność i bezpieczeństwo
Autorzy:
Kołodziejski, M.
Powiązania:
https://bibliotekanauki.pl/articles/360543.pdf
Data publikacji:
2011
Wydawca:
Akademia Morska w Szczecinie. Wydawnictwo AMSz
Tematy:
utrzymanie ruchu
uszkodzenia jawne
uszkodzenia ukryte
wyszukiwanie uszkodzeń ukrytych
RCM
hidden and evident faults
hidden faults finding
Opis:
Paper presented difference between Reliability Centered Maintenance and reactive/preventive maintenance. Methods of performing RCM analysis which lead to selecting the most appropriate maintenance policy were described. Tasks designed to detect hidden failures – failure finding tasks – and the difference between hidden and evident failures were presented. Importance of failure finding tasks in failure prevention was discussed. Methods of how to determine the frequency of failure finding tasks were described. It was presented RCM analysis as a method to maintain desired availability of offshore dynamic positioning platform MSV “Regalia”.
W artykule przedstawiono różnicę pomiędzy RCM (Reliability Centred Maintenance) a tradycyjnymi systemami zarządzania utrzymaniem ruchu urządzeń. Omówiono sposób prowadzenia analizy zgodnej z zasadami RCM, na podstawie której dobiera się odpowiednią strategię utrzymania ruchu. Omówiono różnicę pomiędzy uszkodzeniami jawnymi i ukrytymi. Przedstawiono zadania wyszukiwania uszkodzeń ukrytych urządzeń jako narzędzia służącego do zapobiegania awariom. Zaprezentowano metody służące do wyznaczenia częstości wykonywania czynności wyszukiwania uszkodzeń. Na przykładzie platformy utrzymującej pozycję w sposób dynamiczny zaprezentowano działania wynikające z analizy RCM, zmierzające do utrzymania obiektu w stanie zdatności funkcjonalnej.
Źródło:
Zeszyty Naukowe Akademii Morskiej w Szczecinie; 2011, 28 (100) z. 1; 53-59
1733-8670
2392-0378
Pojawia się w:
Zeszyty Naukowe Akademii Morskiej w Szczecinie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A new three-dimensional chaotic system with a hidden attractor, circuit design and application in wireless mobile robot
Autorzy:
Vaidyanathan, S.
Sambas, A.
Mamat, M.
Sanjaya, M.
Powiązania:
https://bibliotekanauki.pl/articles/229628.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
chaos
chaotic systems
hidden attractors
circuit simulation
Opis:
This research work proposes a new three-dimensional chaotic system with a hidden attractor. The proposed chaotic system consists of only two quadratic nonlinearities and the system possesses no critical points. The phase portraits and basic qualitative properties of the new chaotic system such as Lyapunov exponents and Lyapunov dimension have been described in detail. Finally, we give some engineering applications of the new chaotic system like circuit simulation and control of wireless mobile robot.
Źródło:
Archives of Control Sciences; 2017, 27, 4; 541-554
1230-2384
Pojawia się w:
Archives of Control Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies