137 Matching Annotations
  1. Aug 2024
  2. Jul 2024
  3. May 2024
  4. Apr 2024
    1. However, sinceevery block in GSN is signed, when one breaches privacy within the protocol the breach carriestheir signature so the culprit can be identified.

      What stops a culprit to send off-group a message that is not his own? We can only achieve the "culprit detection" by addressing and signing every message we send to A. This is a lot of re-signing. And we won't have a convergent DAG.

  5. Mar 2024
    1. Résumé de la vidéo [00:00:00][^1^][1] - [00:12:53][^2^][2]:

      Cette vidéo présente le rôle crucial du psychologue scolaire dans le soutien des élèves en difficulté, en évaluant leur intelligence et en proposant des solutions adaptées pour améliorer leur parcours éducatif.

      Points forts: + [00:00:00][^3^][3] Le rôle du psychologue scolaire * Évalue l'intelligence des élèves * Propose des solutions éducatives + [00:01:36][^4^][4] L'intervention du psychologue * Réalise un bilan intellectuel et psychologique * Suggère des orientations ou des redoublements + [00:06:07][^5^][5] Formation et rémunération * Détails sur la formation requise * Salaire de débutant à fin de carrière + [00:07:12][^6^][6] Cas pratiques d'intervention * Exemples d'accompagnement d'élèves * Discussion sur les défis en zone rurale + [00:10:00][^7^][7] Rencontres avec les parents * Diagnostic et solutions pour les élèves * Importance de l'acceptation parentale

    1. les négligences sont bien perçues dans la petite enfance mais pas très bien perçu à l'adolescence
    2. Résumé de la vidéo [00:00:07][^1^][1] - [00:21:14][^2^][2]:

      La vidéo aborde l'impact des négligences sur le parcours des enfants, soulignant la difficulté de les repérer et de les mesurer, ainsi que les défis associés à leur diagnostic et à leur traitement dans le système de santé.

      Points forts: + [00:00:07][^3^][3] Introduction au sujet * Importance de l'expression sur les négligences + [00:01:07][^4^][4] Définition des négligences * Absence de réponse aux besoins fondamentaux + [00:02:06][^5^][5] Problèmes de diagnostic * Manque de données et difficulté d'évaluation + [00:03:08][^6^][6] Facteurs de risque * Confusion entre facteurs de risque et prédictifs + [00:06:09][^7^][7] Diagnostic médical * Complexité et absence de standardisation + [00:07:00][^8^][8] Codage des négligences * Limitations du système de codage actuel + [00:09:03][^9^][9] Caractérisation judiciaire * Défis dans l'identification et la caractérisation des dommages + [00:11:13][^10^][10] Collecte de données * Obstacles au croisement des données de recherche + [00:13:27][^11^][11] Cas clinique * Exemple réel illustrant les défis de la négligence + [00:17:02][^12^][12] Expérimentation nationale * Initiative pour améliorer les soins et la coordination Résumé de la vidéo [00:21:16][^1^][1] - [00:36:04][^2^][2] : La vidéo aborde l'impact des négligences sur les enfants en protection de l'enfance, en mettant l'accent sur l'importance d'une coordination médicale adaptée et sur les défis liés aux systèmes d'information et à la recherche.

      Points forts : + [00:21:16][^3^][3] Coordination médicale * Plus de 300 médecins pour les bilans annuels * Importance de la coordination sur-mesure + [00:23:22][^4^][4] Recherche et données * Difficultés liées à la collecte de données pour la recherche * Importance des bilans standardisés + [00:25:00][^5^][5] Systèmes d'information * Problèmes avec les systèmes informatiques * Différences entre les systèmes des ARS + [00:27:27][^6^][6] Collecte de données * Entraves à la collecte et à l'utilisation des données * Complexité des interactions entre soins et recherche + [00:30:17][^7^][7] Avancées malgré les obstacles * Réalisation des bilans annuels pour les enfants * Importance de la vue externe des professionnels de ville + [00:31:18][^8^][8] Négligences et violences * Exemples concrets de négligences et de violences intriquées * Difficultés de prise en charge et d'identification des violences

    1. Résumé de la vidéo [00:00:00][^1^][1] - [00:30:24][^2^][2]:

      La vidéo traite de l'application des principes de la théorie de l'attachement dans l'évaluation des capacités parentales, en particulier dans le contexte de la protection de l'enfance au Québec. Elle souligne l'augmentation significative des signalements traités par la DPJ et l'importance d'une évaluation précise pour le placement des enfants.

      Points clés: + [00:00:00][^3^][3] Introduction à la théorie de l'attachement * Application dans l'évaluation des capacités parentales + [00:00:58][^4^][4] Statistiques sur la maltraitance * Augmentation des signalements au Québec + [00:03:01][^5^][5] Importance de l'évaluation * Impact sur les décisions de placement des enfants + [00:06:41][^6^][6] Définition des capacités parentales * Large vision par la DPJ + [00:07:45][^7^][7] Facteurs influençant les capacités parentales * Risques et protections issus de l'environnement écologique + [00:11:07][^8^][8] Défis de l'évaluation des capacités parentales * Manque de consensus et méthodes d'évaluation + [00:15:58][^9^][9] Principes pour évaluer les capacités parentales * Évaluation des forces et limites, qualité des interactions, et potentiel de changement + [00:22:03][^10^][10] Rôle de la théorie de l'attachement * Interventions de courte durée pour améliorer la sensibilité parentale + [00:25:11][^11^][11] Attachement désorganisé chez les enfants maltraités * Comportements contradictoires et besoin d'évaluation précise Résumé de la vidéo [00:30:27][^1^][1] - [00:59:54][^2^][2]:

      La vidéo présente une conférence sur l'évaluation des capacités parentales et l'importance d'intégrer la théorie de l'attachement dans ce processus. Elle souligne l'efficacité des interventions basées sur l'attachement pour améliorer les relations parent-enfant et les comportements des enfants.

      Points forts: + [00:30:27][^3^][3] L'importance de l'attachement * Nécessité d'intégrer l'attachement dans l'évaluation des capacités parentales + [00:33:04][^4^][4] Efficacité des interventions * Les interventions fondées sur l'attachement améliorent l'adaptation sociale et émotionnelle des enfants + [00:34:11][^5^][5] Intervention relationnelle * Utilisation de la rétroaction vidéo pour valoriser les comportements sensibles des parents + [00:41:22][^6^][6] Recherche sur l'évaluation * Étude des bénéfices d'un protocole d'évaluation intégrant une intervention sur l'attachement + [00:45:43][^7^][7] Décisions de placement * Impact de l'intervention relationnelle sur les décisions de placement et la récurrence de maltraitance + [00:57:52][^8^][8] Prédiction de la récurrence * L'évaluation basée sur l'intervention relationnelle prédit mieux la récurrence de maltraitance Résumé de la vidéo [00:59:58][^1^][1] - [01:22:22][^2^][2]:

      La vidéo aborde l'évaluation des capacités parentales et l'impact des traumatismes vécus dans l'enfance sur la capacité à prendre soin des enfants. Elle souligne l'importance de la théorie de l'attachement et de la formation des évaluateurs pour améliorer les jugements et les interventions.

      Points forts: + [01:00:34][^3^][3] Analyse des évaluations * Importance des antécédents de maltraitance * Influence des traumatismes sur les propositions + [01:02:02][^4^][4] Formation des évaluateurs * Impact de la théorie de l'attachement * Développement des habiletés d'observation + [01:03:18][^5^][5] Mesures dans les protocoles d'évaluation * Nécessité d'observer l'interaction parent-enfant * Importance de la sensibilité et du potentiel de changement + [01:04:35][^6^][6] Supervision et rétroaction vidéo * Utilisation des vidéos pour la supervision * Effet positif sur la réduction des défenses des parents + [01:06:02][^7^][7] Recommandations pour les protocoles d'évaluation * Formation continue en théorie de l'attachement * Création d'équipes spécialisées en intervention relationnelle + [01:07:26][^8^][8] Importance de la supervision continue * Supervision basée sur les vidéos des familles * Maintien et développement de l'expertise des intervenants

  6. Feb 2024
    1. As long as money hasexisted, the problem of counterfeit currency has too, but it became aparticular problem once printed notes went into general circulation. Ineighteenth-century North America, Benjamin Franklin – who owned a firmthat printed money for several of the colonies – hit on the idea of misspellingPennsylvania on official currency, on the grounds that forgers would spell it

      correctly and the notes could easily be spotted as counterfeit, but that only went so far.

  7. Oct 2023
    1. revenir un peu sur les représentation qui sont trop communément admises que les enfants maltraités les enfants en grande difficultés seraient en échec 00:42:41 scolaire déjà l'équipe de Koffman d 94 relevait que les enfants victimes de maltraitance étaient de tiers avoir de bons résultats à l'école donc en plus ce qui est intéressant c'est que ces 00:42:54 enfantsl ils passent sous les radars parce que comme ils surinvestissent l'école au moins l'école ils arrivent à y vivre ils sont pas repérés à l'école on va avoir plutôt tendance à repérer ceux qui sont remarqués ceux qui sont en échec scolaire
  8. Jul 2023
    1. A second, complementary, approach relies on post-hoc machine learning and forensic anal-ysis to passively identify statistical and physical artifacts left behind by media manipulation.For example, learning-based forensic analysis techniques use machine learning to automati-cally detect manipulated visual and auditory content (see e.g. [94]). However, these learning-based approaches have been shown to be vulnerable to adversarial attacks [95] and contextshift [96]. Artifact-based techniques exploit low-level pixel artifacts introduced during synthe-sis. But these techniques are vulnerable to counter-measures like recompression or additivenoise. Other approaches involve biometric features of an individual (e.g., the unique motionproduced by the ears in synchrony with speech [97]) or behavioral mannerisms [98]). Biomet-ric and behavioral approaches are robust to compression changes and do not rely on assump-tions about the moment of media capture, but they do not scale well. However, they may bevulnerable to future generative-AI systems that may adapt and synthesize individual biometricsignals.

      Examples of methods for detecting machine generated visual media

  9. Jun 2023
  10. Mar 2023
    1. Google has had the ability to harden SafetyNet checks using hardware-backed key attestation for several years now. The fact that they refrained to do so for 3 years has allowed users to enjoy root and Magisk Modules without sacrificing the ability to use banking apps. However, it seems that Magisk's ability to effectively hide the bootloader unlock status is soon coming to an end. It's a change that we've expected for years, but we're sad to see it finally go into effect.
  11. Nov 2022
  12. Aug 2022
  13. Jun 2022
    1. What is color for?" And instead of telling you, I'll just show you. What you see here is a jungle scene, 00:02:08 and you see the surfaces according to the amount of light that those surfaces reflect. Now, can any of you see the predator that's about to jump out at you? And if you haven't seen it yet, you're dead, right? (Laughter) Can anyone see it? Anyone? No? Now let's see the surfaces according to the quality of light that they reflect. And now you see it. So, color enables us to see 00:02:32 the similarities and differences between surfaces, according to the full spectrum of light that they reflect. But what you've just done is in many respects mathematically impossible. Why? Because, as Berkeley tells us, we have no direct access to our physical world, other than through our senses. And the light that falls onto our eyes is determined by multiple things in the world, not only the color of objects, 00:02:56 but also the color of their illumination, and the color of the space between us and those objects. You vary any one of those parameters, and you'll change the color of the light that falls onto your eye. This is a huge problem, because it means that the same image could have an infinite number of possible real-world sources

      BEing journey 2 pattern detection

  14. Mar 2022
  15. Feb 2022
  16. Jan 2022
  17. Dec 2021
  18. Nov 2021
  19. Oct 2021
    1. FAKE NEWS DETECTION IN PRACTICE

      The article showed the scientific processes that can be used in analyzing information and how they applied it in fact-checking. Technology makes fact-checking easier and faster but humans are still the most accurate. That is why studying information science is important because of its relevance to the society.

  20. May 2021
  21. Apr 2021
  22. Mar 2021
    1. López, J. A. M., Arregui-Garcĺa, B., Bentkowski, P., Bioglio, L., Pinotti, F., Boëlle, P.-Y., Barrat, A., Colizza, V., & Poletto, C. (2020). Anatomy of digital contact tracing: Role of age, transmission setting, adoption and case detection. MedRxiv, 2020.07.22.20158352. https://doi.org/10.1101/2020.07.22.20158352

  23. Feb 2021
    1. But I’m afraid it’s perfectly possible to ship one version of your code to GitHub and a different version to npm.
    2. The point is, just because you don’t see it, doesn’t mean it’s not happening. It’s been more than two years and as far as I know, no one has ever noticed one of my requests. Maybe it’s been in your site this whole time
    3. Also the URL looks a lot like the 300 other requests to ad networks your site makes.
    4. I’d notice the network requests going out!Where would you notice them? My code won’t send anything when the DevTools are open (yes even if un-docked).I call this the Heisenberg Manoeuvre: by trying to observe the behaviour of my code, you change the behaviour of my code.
  24. Jan 2021
    1. If you manage to make Svelte aware of what needs to be tracked, chances are that the resulting code will be more performant than if you roll your own with events or whatever. In part because it will use Svelte's runtime code that is already present in your app, in part because Svelte produces seriously optimized change tracking code, that would be hard to hand code all while keeping it human friendly. And in part because your change tracking targets will be more narrow.
  25. Dec 2020
    1. This creates an options object with a getter function for the passive property; the getter sets a flag, passiveSupported, to true if it gets called. That means that if the browser checks the value of the passive property on the options object, passiveSupported will be set to true; otherwise, it will remain false. We then call addEventListener() to set up a fake event handler, specifying those options, so that the options will be checked if the browser recognizes an object as the third parameter.
  26. Nov 2020
    1. Svelte's advantage here is that it indicates the need for an update at the place where the associated data is updated, instead of at each place the data is used. Then each template expression of reactive statement is able to check very quickly if it needs to rerender or not.
    2. But you can still run into strange race conditions where the browser displays stale data depending on if some other unrelated code has caused a digest update to run after the buggy code or not.
    1. The advantage of ngOnChanges() is that we get all the changes at once if the component has several @Input()s. However, if we have a single @Input() a setter is probably the better approach.
    1. To detect foreign DNA in 5 ml of lake water, 15 ml of lake water must be screened.

      Why is this multiplied by 3? Related to statistical error of subsampling - rule of three)

  27. Oct 2020
    1. Identify your user agents When deploying software that makes requests to other sites, you should set a custom User-Agent header to identify the software and provide a means to contact its maintainers. Many of the automated requests we receive have generic user-agent headers such as Java/1.6.0 or Python-urllib/2.1 which provide no information on the actual software responsible for making the requests.
    1. Perhaps we should detect URLSearchParams objects differently (using duck typing detection instead of instanceof window.URLSearchParams, for example) but the solution isn't adding a specific polyfill to Axios (as it'd increase the bundle size and still won't work with other polyfills).
    1. Sometimes we can’t implement a solution that’s fully spec-compliant, and in those cases using a polyfill might be the wrong answer. A polyfill would translate into telling the rest of the codebase that it’s okay to use the feature, that it’ll work just like in modern browsers, but it might not in edge cases.
  28. Sep 2020
    1. LOD was defined as <x>bi + ksbi, where <x>bi equals the mean of the no-template controls, sbi is s.d. of no-template controls and k = 2.479 (99% confidence interval)

      ddPCR

  29. Aug 2020
  30. Jul 2020
    1. LoD = LoB + 1.645(SD low concentration sample)

      LoD is the lowest analyte concentration likely to be reliably distinguished from the LoB and at which detection is feasible. LoD is determined by utilising both the measured LoB and test replicates of a sample known to contain a low concentration of analyte.

      LoB is the highest apparent analyte concentration expected to be found when replicates of a blank sample containing no analyte are tested.

      LoB = meanblank + 1.645(SDblank)

    1. Zhong, H., Wang, Y., Shi, Z., Zhang, L., Ren, H., He, W., Zhang, Z., Zhu, A., Zhao, J., Xiao, F., Yang, F., Liang, T., Ye, F., Zhong, B., Ruan, S., Gan, M., Zhu, J., Li, F., Li, F., … Zhao, J. (2020). Characterization of Microbial Co-infections in the Respiratory Tract of hospitalized COVID-19 patients. MedRxiv, 2020.07.02.20143032. https://doi.org/10.1101/2020.07.02.20143032

    1. Davis, J. T., Chinazzi, M., Perra, N., Mu, K., Piontti, A. P. y, Ajelli, M., Dean, N. E., Gioannini, C., Litvinova, M., Merler, S., Rossi, L., Sun, K., Xiong, X., Halloran, M. E., Longini, I. M., Viboud, C., & Vespignani, A. (2020). Estimating the establishment of local transmission and the cryptic phase of the COVID-19 pandemic in the USA. MedRxiv, 2020.07.06.20140285. https://doi.org/10.1101/2020.07.06.20140285

  31. Jun 2020
  32. May 2020
    1. Chu, H. Y., Englund, J. A., Starita, L. M., Famulare, M., Brandstetter, E., Nickerson, D. A., Rieder, M. J., Adler, A., Lacombe, K., Kim, A. E., Graham, C., Logue, J., Wolf, C. R., Heimonen, J., McCulloch, D. J., Han, P. D., Sibley, T. R., Lee, J., Ilcisin, M., … Bedford, T. (2020). Early Detection of Covid-19 through a Citywide Pandemic Surveillance Platform. New England Journal of Medicine, NEJMc2008646. https://doi.org/10.1056/NEJMc2008646

  33. Apr 2020
    1. Adams, E. R., Anand, R., Andersson, M. I., Auckland, K., Baillie, J. K., Barnes, E., Bell, J., Berry, T., Bibi, S., Carroll, M., Chinnakannan, S., Clutterbuck, E., Cornall, R. J., Crook, D. W., Silva, T. D., Dejnirattisai, W., Dingle, K. E., Dold, C., Eyre, D. W., … Sanchez, V. (2020). Evaluation of antibody testing for SARS-Cov-2 using ELISA and lateral flow immunoassays. MedRxiv, 2020.04.15.20066407. https://doi.org/10.1101/2020.04.15.20066407

  34. Feb 2020
  35. Sep 2019
  36. Mar 2018
    1. J.M. Berger Former Brookings Expert

      Paying attention to the qualifications of the author(s)/composer(s) is another crucial role in crap detection at it will help discern whether or not to take the piece seriously or to use it for further research.

    2. Markaz

      In the Rheinghold text , he explains the importance of pay attention the website layout as well as content. However, in doing so, you must tune your crap detection and remember that not everything with a fancy layout is reliable, and vice versa.

    3. I took a detailed look at how ISIS functions online, breaking it down into a five-part template, which can be implemented in different ways depending on the target’s disposition:

      Rather than simply stating information, the author (Berger) explains his source and the way in which he broke his research down into smaller categories. This citation is also apart of crap detection with a reliable source.

    4. detected through social media analysis,

      The implementing of this specific link gives important attribution and increases source reliability. The text makes a statement and is able to back it up with an external, secure source.

    5. there are practical and ethical limits to how much we can interdict discovery.

      Though Rheinghold stresses the importance of crap detection and researching your sources, he accepts the fact that there a limits that we reach in terms of discernment of validity. This is shown as the ISIS busters reach ethical and practical limits of search. It is important in the way that one mustn't get overwhelmed with finding the true source origin because you can only go so far.

    6. stripping away the mystique and focusing on the mechanics.

      Rheinghold stresses the importance of looking at the base of things, rather than simply the makeup and what you see initially, it is important to dig deeper and look at sources from a questionable yet structured angle.

    7. Monday, November 9, 2015

      The article ends in 'edu' which, as Rheinghold states, increases estimation of its credibility.

    8. This post originally appeared on VOX-Pol.

      Considering that the origin of this post comes from a non-secure site, that appears a tad amateur - also brings forth speculation. It is a blog site, and considering this - I somehow take what is posted 'with a grain of salt'.

    9. How does ISIS acquire new recruits online and convince them to take action? J.M. Berger explains, arguing that efforts to counter terrorists’ online activity can be more effective if the mechanics are clearly understood.

      I begin critiquing this article based on Rheinghold's initial conversation with his daughter. In the text Rheinghold suggests using a free internet service - Whois , in order to search for validity in research. After plugging this domain name into the site, I find that the name of the registered owner is 'Educase'. Educase is a nonprofit core data service for research and analysis.

    10. How terrorists recruit online (and how to stop it)

      I will be connecting this text through Howard Rheinghold's "Crap Detection 101" from chapter 2 of his book Net Smart - How to Thrive Online. This allows for further critic of this article in terms of this theme.

  37. Feb 2017
    1. how it uses zones

      Does anyone have an authoritative link for this concept of zones and how they work? It'd be much appreciated.

  38. Jan 2017
    1. Early event detection problems can go here. Two example cases just came to my mind are: 1- in emergency response: detecting a disaster quickly is important. 2- in computational journalism: many locals suddenly start talking about an event means something newsworthy is going on.

  39. Nov 2016
    1. Finally, by assuming the non-detection of a species to indicate absence from a given grid cell, we introduced an extra level of error into our models. This error depends on the probability of false absence given imperfect detection (i.e., the probability that a species was present but remained undetected in a given grid cell [73]): the higher this probability, the higher the risk of incorrectly quantifying species-climate relationships [73].

      This will be an ongoing challenge for species distribution modeling, because most of the data appropriate for these purposes is not collected in such a way as to allow the straightforward application of standard detection probability/occupancy models. This could potentially be addressed by developing models for detection probability based on species and habitat type. These models could be built on smaller/different datasets that include the required data for estimating detectability.

  40. Nov 2015
    1. Presentation summarizing an approach to duplicate web page detection that was developed by a researcher whilst at Google in the early 2000s

  41. Sep 2015
  42. arxiv.org arxiv.org
    1. Given an LSH familyH, the LSH scheme amplifiesthe gap between the high probabilityP1and the lowprobabilityP2by concatenating several functions

      Useful recap of LSH

    2. Recent survey paper for hashing-based approaches to similarity search

    1. This paper has a very useful overview of previous work that is worth reading under section 9.

    2. We used the following publicly available real datasets in the experiment

      Datasets used are DBPL, ENRON, UNIREF-4GRAM. All small (<1M records) in web terms and I would guess, all with small document sizes.

      Given a lengthy paper, could potentially divide into smaller documents (1 doc === 1 page) and do signature calculation on a per-page basis. This could have the benefit of bounding the search time by limiting the number of pages that need to be rendered to text in order to start the lookup process.