118 research outputs found

    A computational analysis of hedging in English to Polish translations of film subtitles.

    Get PDF
    openThe thesis presents a new pragmatic annotation scheme for the phenomenon of hedging which allows for a computational analysis of its occurrences in English and Polish film subtitles. First and foremost, the definition of the concept of hedging is provided, as well as an overview of its evolution within linguistic studies and its several classifications. The general notions concerning linguistic annotation and parallel corpora are discussed in the following sections, along with some references to the relevance of a computational analysis to other fields of study, such as computer-assisted translation. The second chapter introduces the Opensubtitles and the ParTy corpora and explains the selection of texts which, having been converted into CONLL-U format, are subsequently the object of a quantitative and contrastive analysis of various occurrences of hedges in English original material and its Polish translation. Thus assembled evidence constitutes the basis for the development of a pragmatic annotation scheme specific to hedges. Lastly, the application of the aforementioned scheme to the chosen texts allows for a more thorough analysis and discussion of certain cases presenting the phenomenon in question. The thesis ends with some considerations on the value of the annotation scheme for future study.The thesis presents a new pragmatic annotation scheme for the phenomenon of hedging which allows for a computational analysis of its occurrences in English and Polish film subtitles. First and foremost, the definition of the concept of hedging is provided, as well as an overview of its evolution within linguistic studies and its several classifications. The general notions concerning linguistic annotation and parallel corpora are discussed in the following sections, along with some references to the relevance of a computational analysis to other fields of study, such as computer-assisted translation. The second chapter introduces the Opensubtitles and the ParTy corpora and explains the selection of texts which, having been converted into CONLL-U format, are subsequently the object of a quantitative and contrastive analysis of various occurrences of hedges in English original material and its Polish translation. Thus assembled evidence constitutes the basis for the development of a pragmatic annotation scheme specific to hedges. Lastly, the application of the aforementioned scheme to the chosen texts allows for a more thorough analysis and discussion of certain cases presenting the phenomenon in question. The thesis ends with some considerations on the value of the annotation scheme for future study

    Система функціональної безпеки технологічного процесу

    Get PDF
    Пояснювальна записка дипломного проекту складається з трьох розділів, містить 1 таблицю, 1 додаток та 45 джерел – загалом 70 сторінки. Об`єкт дослідження: математична модель впливу загроз на інформаційну систему обробки персональних даних. Мета дипломного проєкту: Мета дослідження полягає в розробці та впровадженні ефективної системи функціональної безпеки для технологічного процесу з метою запобігання можливим аварійним ситуаціям, збереження ресурсів та забезпечення надійності функціонування. У першомуу розділі було проведено аналіз існуючих рішень та їх порівняння, вибір метода тестування. У третьому розділі було проведено аналіз існуючих архітектур, порівняння їх між та вибір архітектури для нашох модулі. У третьому розділі було проведено введення до користування системою, показано інтерфейс та взаємодія користувача з інтерфейсом.The explanatory note of the diploma project consists of three sections, contains 1 table, 1 appendix and 45 sources - a total of 70 pages. The object of the study: a mathematical model of the influence of threats on the information system of personal data processing. The purpose of the diploma project: The purpose of the research is to develop and implement an effective system of functional safety for the technological process in order to prevent possible emergency situations, save resources and ensure the reliability of functioning. In the first section, the analysis of existing solutions and their comparison, the choice of a testing method was carried out. In the third section, an analysis of existing architectures was carried out, a comparison between them and the choice of architecture for our modules. In the third section, an introduction to using the system was made, the interface and user interaction with the interface were shown

    Modeling Deception for Cyber Security

    Get PDF
    In the era of software-intensive, smart and connected systems, the growing power and so- phistication of cyber attacks poses increasing challenges to software security. The reactive posture of traditional security mechanisms, such as anti-virus and intrusion detection systems, has not been sufficient to combat a wide range of advanced persistent threats that currently jeopardize systems operation. To mitigate these extant threats, more ac- tive defensive approaches are necessary. Such approaches rely on the concept of actively hindering and deceiving attackers. Deceptive techniques allow for additional defense by thwarting attackers’ advances through the manipulation of their perceptions. Manipu- lation is achieved through the use of deceitful responses, feints, misdirection, and other falsehoods in a system. Of course, such deception mechanisms may result in side-effects that must be handled. Current methods for planning deception chiefly portray attempts to bridge military deception to cyber deception, providing only high-level instructions that largely ignore deception as part of the software security development life cycle. Con- sequently, little practical guidance is provided on how to engineering deception-based techniques for defense. This PhD thesis contributes with a systematic approach to specify and design cyber deception requirements, tactics, and strategies. This deception approach consists of (i) a multi-paradigm modeling for representing deception requirements, tac- tics, and strategies, (ii) a reference architecture to support the integration of deception strategies into system operation, and (iii) a method to guide engineers in deception mod- eling. A tool prototype, a case study, and an experimental evaluation show encouraging results for the application of the approach in practice. Finally, a conceptual coverage map- ping was developed to assess the expressivity of the deception modeling language created.Na era digital o crescente poder e sofisticação dos ataques cibernéticos apresenta constan- tes desafios para a segurança do software. A postura reativa dos mecanismos tradicionais de segurança, como os sistemas antivírus e de detecção de intrusão, não têm sido suficien- tes para combater a ampla gama de ameaças que comprometem a operação dos sistemas de software actuais. Para mitigar estas ameaças são necessárias abordagens ativas de defesa. Tais abordagens baseiam-se na ideia de adicionar mecanismos para enganar os adversários (do inglês deception). As técnicas de enganação (em português, "ato ou efeito de enganar, de induzir em erro; artimanha usada para iludir") contribuem para a defesa frustrando o avanço dos atacantes por manipulação das suas perceções. A manipula- ção é conseguida através de respostas enganadoras, de "fintas", ou indicações erróneas e outras falsidades adicionadas intencionalmente num sistema. É claro que esses meca- nismos de enganação podem resultar em efeitos colaterais que devem ser tratados. Os métodos atuais usados para enganar um atacante inspiram-se fundamentalmente nas técnicas da área militar, fornecendo apenas instruções de alto nível que ignoram, em grande parte, a enganação como parte do ciclo de vida do desenvolvimento de software seguro. Consequentemente, há poucas referências práticas em como gerar técnicas de defesa baseadas em enganação. Esta tese de doutoramento contribui com uma aborda- gem sistemática para especificar e desenhar requisitos, táticas e estratégias de enganação cibernéticas. Esta abordagem é composta por (i) uma modelação multi-paradigma para re- presentar requisitos, táticas e estratégias de enganação, (ii) uma arquitetura de referência para apoiar a integração de estratégias de enganação na operação dum sistema, e (iii) um método para orientar os engenheiros na modelação de enganação. Uma ferramenta protó- tipo, um estudo de caso e uma avaliação experimental mostram resultados encorajadores para a aplicação da abordagem na prática. Finalmente, a expressividade da linguagem de modelação de enganação é avaliada por um mapeamento de cobertura de conceitos

    IoT Applications Computing

    Get PDF
    The evolution of emerging and innovative technologies based on Industry 4.0 concepts are transforming society and industry into a fully digitized and networked globe. Sensing, communications, and computing embedded with ambient intelligence are at the heart of the Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Industry 4.0 technologies with expanding applications in manufacturing, transportation, health, building automation, agriculture, and the environment. It is expected that the emerging technology clusters of ambient intelligence computing will not only transform modern industry but also advance societal health and wellness, as well as and make the environment more sustainable. This book uses an interdisciplinary approach to explain the complex issue of scientific and technological innovations largely based on intelligent computing

    Asian Yearbook of International Law, Volume 23 (2017)

    Get PDF
    The Yearbook aims to promote research, studies and writings in the field of international law in Asia, as well as to provide an intellectual platform for the discussion and dissemination of Asian views and practices on contemporary international legal issues. ; Readership: All interested in International Law and Asian Law

    Cracking Matrix Modes of Operation with Goodness-of-Fit Statistics

    Get PDF
    The Hill cipher is a classical poly-alphabetical cipher based on matrices. Although known plaintext attacks for the Hill cipher have been known for almost a century, feasible ciphertext only attacks have been developed only about ten years ago and for small matrix dimensions. In this paper we extend the ciphertext only attacks for the Hill cipher in two ways. First, we present two attacks for the affine version of the Hill cipher. Secondly, we show that the presented attacks can be extended to several modes of operations. We also provide the reader with several experimental results and show how the message\u27s language can influence the presented attacks

    Validando documentación publicada electrónicamente a través de métodos esteganográficos

    Get PDF
    Actualmente, diversos organismos proveen gran cantidad de documentación mediante medios computarizados. Se presenta información académica y/o administrativa, se presentan formularios, noticias, resoluciones del ámbito público, etc., y en muchos casos esos formularios son utilizados para generar posteriores trámites administrativos. Sin embargo, es poco común que esa información, o documentos, sean validados para comprobar su autenticidad, integridad, etc. Las revisiones son no automatizadas y el elemento se presupone correcto solamente por las características que el receptor puede reconocer, ello implica riesgo. La información puede resultar corrupta, los documentos alterados y podría conducirse a disputas de índole administrativo/legal. Es necesario que cualquier documento/información difundido por medios masivos, tenga la posibilidad de ser verificado en su originalidad e integridad. Con este objetivo, buscamos establecer una metodología, usando herramientas esteganográficas, que brinden una respuesta a esta necesidad. Los desafíos son importantes y originales. Las herramientas existentes son ineficientes cuando el documento emitido se transfiere en diferentes soportes (impresión, fotocopia, etc.). Buscamos una metodología integral, ya que la sola herramienta no es suficiente para abarcar las múltiples situaciones posibles. Desarrollaremos el sistema de soporte informático necesario, y aunque se aplicarán técnicas esteganográficas, se pretende que sean solamente el soporte técnico de la metodología: nuestro principal objetivo.Sociedad Argentina de Informática e Investigación Operativ

    A comparison of the philosophical traditions of Neo-Casuistry and situation ethics in the context of morality issues arising in the ‘Fourth Industrial Revolution’

    Get PDF
    The purpose of this research is through extensive examination to compare and contrast two very different ethical decision-making frameworks, both forged in the Christian tradition. An examination will be undertaken of Neo-Casuistry and Christian Situationism and their respective abilities to provide their practitioners with the tools for moral decision-making, moral resolution and ultimately moral truth that will serve to positively address moral dilemma and/or moral conflict resulting from the use of Fourth Order Technologies (4OT) in the Fourth Industrial Revolution (4IR) Neo-Casuistry falls within the Catholic tradition and Christian Situationism falls within the Protestant tradition and the abilities of both religious, ethical decision-making frameworks to provide moral truth in 4IR will be examined, assessed and compared within the contemporary context of ‘privacy’ and the ‘personal’. The results of this research will support that an ethical decision-making framework that judiciously makes use of the ‘best practices’ from each of the traditions would appear to provide 4IR with the most suitable and practical means of finding moral truth in situations of moral dilemma and/or moral conflict.Religious Studies and ArabicD. Phil. (Religious Studies
    corecore