802 research outputs found
Teaching translation: objectives and methods
The article is focused on the set of items: teaching translation, objectives, exercises and assignments (both word-centered and text-centered translation), translation analysis. The choice of the items is motivated by the dominant functions of transatology (nominative and communicative). The latter succeed in identification of adequate, congruent, equivalent translation. The article discusses the problems of professional validity, theoretical insertions, textocentric analysis. Gains, achievements, goals and perspective vistas are the highlights herein. The ways of translation adaptation have been outlined, among them are conceptualization, de-focusing, redundancy (language economy). The rendering of the original texts into target ones brings the diversity of the exercises and assignments what is the focus centre of the paper. The paper gives an opportunity to make translation analyses of the original and target texts. Semantic isotopy, textual non-linearity, self-organization, rhisomatic way of arranging textual cohesion and coherence, ramified architectonics and interpretation plurality remain actual, urgent, still unsolved problems in translatology. The major principles are manifested in conceptualization, de-focusing, expanse, redundancy (language economy) specific arrangement
Teaching Translation: Objectives and Methods
Advanced Education - Indexed in: ESCI (Web of Science), Index Copernicus (ICV 2014=54,81), DOAJ, CrossRef, WorldCat, Ulrich's Periodicals Directory, SprintKnowledge, Google Scholar, BASE, OAJI, Cite Factor, UIF, Research Bible, I2OR, SIS.Стання присвячена навчанню перекладу та перекладацькому аналізу. Сучасній парадигмі вищої освіти притаманні нові особистісні технології вивчення іноземної мови. Основним дидактичним принципом на часі є поєднання змісту, форм та інструментарія навчального процесу. В залежності від наукових здобутків модифікуються і методичні засади викладання іноземної мови На сучасному етапі у царині методики провідними є синергетичний, системно-функціональний та антропоцентричний підходи до тлумачення одиниць мови.Статья посвящена обучению переводу, переводческому анализу. Современной парадигме высшего образования необходимы новые формы и технологии для изучения иностранных языков.The article is focused on the set of items: teaching translation, objectives, exercises and assignments (both word-centered and text-centered translation), translation analysis. The choice of the items is motivated by the dominant functions of transatology (nominative and communicative). The latter succeed in identification of adequate, congruent, equivalent translation. The article discusses the problems of professional validity, theoretical insertions, textocentric analysis. Gains, achievements, goals and perspective vistas are the highlights herein. The ways of translation adaptation have been outlined, among them are conceptualization, de-focusing, redundancy (language economy). The rendering of the original texts into target ones brings the diversity of the exercises and assignments what is the focus centre of the paper. The paper gives an opportunity to make translation analyses of the original and target texts. Semantic isotopy, textual non-linearity, self-organization, rhisomatic way of arranging textual cohesion and coherence, ramified architectonics and interpretation plurality remain actual, urgent, still unsolved problems in translatology. The major principles are manifested in conceptualization, de-focusing, expanse, redundancy (language economy) specific arrangement
WiFi-Based Human Activity Recognition Using Attention-Based BiLSTM
Recently, significant efforts have been made to explore human activity recognition (HAR) techniques that use information gathered by existing indoor wireless infrastructures through WiFi signals without demanding the monitored subject to carry a dedicated device. The key intuition is that different activities introduce different multi-paths in WiFi signals and generate different patterns in the time series of channel state information (CSI). In this paper, we propose and evaluate a full pipeline for a CSI-based human activity recognition framework for 12 activities in three different spatial environments using two deep learning models: ABiLSTM and CNN-ABiLSTM. Evaluation experiments have demonstrated that the proposed models outperform state-of-the-art models. Also, the experiments show that the proposed models can be applied to other environments with different configurations, albeit with some caveats. The proposed ABiLSTM model achieves an overall accuracy of 94.03%, 91.96%, and 92.59% across the 3 target environments. While the proposed CNN-ABiLSTM model reaches an accuracy of 98.54%, 94.25% and 95.09% across those same environments
Teaching Translation and Cross-cultural Communication
Стання присвячена навчанню перекладу та перекладацькому аналізу. Сучасній парадигмі вищої освіти притаманні нові особистісні технології вивчення іноземної мови. Основним дидактичним принципом на часі є поєднання змісту, форм та інструментарія навчального процесу. В залежності від наукових здобутків модифікуються і методичні засади викладання іноземної мовиСтатья посвящена обучению переводу, переводческому анализу. Современной парадигме высшего образования необходимы новые формы и технологии для изучения иностранных языков. Основным современным дидактическим принципом является объединение перевода, кросс-культурной коммуникации и новых методов обучения иностранных языков.The article discusses the problems of professional validity, theoretical insertions, textocentric analysis. Gains, achievements, goals and perspective vistas are the highlights herein. The ways of translation adaptation have been outlined, among them are conceptualization, de-focusing, redundancy (language economy). The rendering of the original texts into target ones brings the diversity of the exercises and assignments what is the focus centre of the paper. The paper gives an opportunity to make translation analyses of the original and target texts. Semantic isotopy, textual non-linearity, self-organization, rhisomatic way of arranging textual cohesion and coherence, ramified architectonics and interpretation plurality remain actual, urgent, still unsolved problems in translatology
BlogForever: D2.5 Weblog Spam Filtering Report and Associated Methodology
This report is written as a first attempt to define the BlogForever spam detection strategy. It comprises a survey of weblog spam technology and approaches to their detection. While the report was written to help identify possible approaches to spam detection as a component within the BlogForver software, the discussion has been extended to include observations related to the historical, social and practical value of spam, and proposals of other ways of dealing with spam within the repository without necessarily removing them. It contains a general overview of spam types, ready-made anti-spam APIs available for weblogs, possible methods that have been suggested for preventing the introduction of spam into a blog, and research related to spam focusing on those that appear in the weblog context, concluding in a proposal for a spam detection workflow that might form the basis for the spam detection component of the BlogForever software
BlogForever: D3.1 Preservation Strategy Report
This report describes preservation planning approaches and strategies recommended by the BlogForever project as a core component of a weblog repository design. More specifically, we start by discussing why we would want to preserve weblogs in the first place and what it is exactly that we are trying to preserve. We further present a review of past and present work and highlight why current practices in web archiving do not address the needs of weblog preservation adequately. We make three distinctive contributions in this volume: a) we propose transferable practical workflows for applying a combination of established metadata and repository standards in developing a weblog repository, b) we provide an automated approach to identifying significant properties of weblog content that uses the notion of communities and how this affects previous strategies, c) we propose a sustainability plan that draws upon community knowledge through innovative repository design
Recommended from our members
TOWARDS RELIABLE CIRCUMVENTION OF INTERNET CENSORSHIP
The Internet plays a crucial role in today\u27s social and political movements by facilitating the free circulation of speech, information, and ideas; democracy and human rights throughout the world critically depend on preserving and bolstering the Internet\u27s openness. Consequently, repressive regimes, totalitarian governments, and corrupt corporations regulate, monitor, and restrict the access to the Internet, which is broadly known as Internet \emph{censorship}. Most countries are improving the internet infrastructures, as a result they can implement more advanced censoring techniques. Also with the advancements in the application of machine learning techniques for network traffic analysis have enabled the more sophisticated Internet censorship. In this thesis, We take a close look at the main pillars of internet censorship, we will introduce new defense and attacks in the internet censorship literature.
Internet censorship techniques investigate users’ communications and they can decide to interrupt a connection to prevent a user from communicating with a specific entity. Traffic analysis is one of the main techniques used to infer information from internet communications. One of the major challenges to traffic analysis mechanisms is scaling the techniques to today\u27s exploding volumes of network traffic, i.e., they impose high storage, communications, and computation overheads. We aim at addressing this scalability issue by introducing a new direction for traffic analysis, which we call \emph{compressive traffic analysis}. Moreover, we show that, unfortunately, traffic analysis attacks can be conducted on Anonymity systems with drastically higher accuracies than before by leveraging emerging learning mechanisms. We particularly design a system, called \deepcorr, that outperforms the state-of-the-art by significant margins in correlating network connections. \deepcorr leverages an advanced deep learning architecture to \emph{learn} a flow correlation function tailored to complex networks. Also to be able to analyze the weakness of such approaches we show that an adversary can defeat deep neural network based traffic analysis techniques by applying statistically undetectable \emph{adversarial perturbations} on the patterns of live network traffic.
We also design techniques to circumvent internet censorship. Decoy routing is an emerging approach for censorship circumvention in which circumvention is implemented with help from a number of volunteer Internet autonomous systems, called decoy ASes. We propose a new architecture for decoy routing that, by design, is significantly stronger to rerouting attacks compared to \emph{all} previous designs. Unlike previous designs, our new architecture operates decoy routers only on the downstream traffic of the censored users; therefore we call it \emph{downstream-only} decoy routing. As we demonstrate through Internet-scale BGP simulations, downstream-only decoy routing offers significantly stronger resistance to rerouting attacks, which is intuitively because a (censoring) ISP has much less control on the downstream BGP routes of its traffic. Then, we propose to use game theoretic approaches to model the arms races between the censors and the censorship circumvention tools. This will allow us to analyze the effect of different parameters or censoring behaviors on the performance of censorship circumvention tools. We apply our methods on two fundamental problems in internet censorship.
Finally, to bring our ideas to practice, we designed a new censorship circumvention tool called \name. \name aims at increasing the collateral damage of censorship by employing a ``mass\u27\u27 of normal Internet users, from both censored and uncensored areas, to serve as circumvention proxies
BlogForever D2.4: Weblog spider prototype and associated methodology
The purpose of this document is to present the evaluation of different solutions for capturing blogs, established methodology and to describe the developed blog spider prototype
- …