109 research outputs found

    Zināšanās bāzētu un korpusā bāzētu metožu kombinētā izmantošanas mašīntulkošanā

    Get PDF
    ANOTĀCIJA. Mašīntulkošanas (MT) sistēmas tiek būvētas izmantojot dažādas metodes (zināšanās un korpusā bāzētas). Zināšanās bāzēta MT tulko tekstu, izmantojot cilvēka rakstītus likumus. Korpusā bāzēta MT izmanto no tulkojumu piemēriem automātiski izgūtus modeļus. Abām metodēm ir gan priekšrocības, gan trūkumi. Šajā darbā tiek meklēta kombināta metode MT kvalitātes uzlabošanai, kombinējot abas metodes. Darbā tiek pētīta metožu piemērotība latviešu valodai, kas ir maza, morfoloģiski bagāta valoda ar ierobežotiem resursiem. Tiek analizētas esošās metodes un tiek piedāvātas vairākas kombinētās metodes. Metodes ir realizētas un novērtētas, izmantojot gan automātiskas, gan cilvēka novērtēšanas metodes. Faktorēta statistiskā MT ar zināšanās balstītu morfoloģisko analizatoru ir piedāvāta kā perspektīvākā. Darbā aprakstīts arī metodes praktiskais pielietojums. Atslēgas vārdi: mašīntulkošana (MT), zināšanās balstīta MT, korpusā balstīta MT, kombinēta metodeABSTRACT. Machine Translation (MT) systems are built using different methods (knowledge-based and corpus-based). Knowledge-based MT translates text using human created rules. Corpus-based MT uses models which are automatically built from translation examples. Both methods have their advantages and disadvantages. This work aims to find a combined method to improve the MT quality combining both methods. An applicability of the methods for Latvian (a small, morphologically rich, under-resourced language) is researched. The existing MT methods have been analyzed and several combined methods have been proposed. Methods have been implemented and evaluated using an automatic and human evaluation. The factored statistical MT with a rule-based morphological analyzer is proposed to be the most promising. The practical application of methods is described. Keywords: Machine Translation (MT), Rule-based MT, Statistical MT, Combined approac

    E-learning for lifelong learning in Latvia

    Get PDF
    This White Paper on e-Learning for Lifelong Learning in Latvia is one among a number of white papers dealing with e-Learning and lifelong learning in specific countries in Asia and Europe. The production of these white papers is an Asian-European initiative, with offspring in the e-ASEM network ― the research network on the Development of ICT skills, e-Learning and the culture of e-Learning in Lifelong Learning ― under the ASEM Education and Research Hub for Lifelong Learning. The aim of the White Paper article is to explore the concept of e-learning and lifelong learning in the context of Latvia taking into account the relevant government policy, regulations and financing issues

    Suicide in Eastern Europe, the Commonwealth of Independent States, and the Baltic Countries: Social and Public Health Determinants

    Get PDF
    While suicide is a major public health problem worldwide, the countries of the former Soviet Union, including the Baltic States and the Commonwealth of Independent States (CIS), have some of the highest rates in the world. High suicide rates across Eastern Europe have been correlated with the post-Soviet transitional period and the societal changes associated with that transition. Many scholars have speculated that the sudden collapse of the paternalistic Soviet system and the introduction of a market economy - and the psychosocial distress that ensued.contributed to the suicide mortality crisis that most of the former Soviet republics experienced in the 1990s. It is unclear whether the transitional period has ended or is still ongoing. While suicide mortality rates in many countries have declined since then, they remain alarmingly high. In some countries, such as Belarus, the rates have increased. From September 14 to 15, 2010, suicidologists and other scholars and professionals with expertise in suicide and suicide prevention gathered in Tallinn, Estonia, to discuss the evidence base for social and public health determinants of suicide in the Baltic States, the CIS, and Eastern Europe. The participants identified research and data gaps that, if filled, would strengthen the foundation for developing effective suicide prevention policies and programs. This report summarizes the presentations and discussions that took place during the conference

    Role-Based Access-Control for Databases

    Get PDF
    Liikudes üha enam paberivaba ari suunas, hoitakse üha enam tundlikku informatsiooni andmebaasides. Sellest tulenevalt on andmebaasid ründajatele väärtuslik sihtmärk. Levinud meetod andmete kaitseks on rollipõhine ligipääsu kontroll (role-based access control), mis piirab süsteemi kasutajate õiguseid vastavalt neile omistatud rollidele. Samas on turvameetmete realiseerimine arendajate jaoks aeganõudev käsitöö, mida teostatakse samaaegselt rakenduse toimeloogika realiseerimisega. Sellest tulenevalt on raskendatud turva vajaduste osas kliendiga läbirääkimine projekti algfaasides. See omakorda suurendab projekti reaalsete arenduskulude kasvamise riski, eriti kui ilmnevad turvalisuse puudujäägid realisatsioonis. Tänapäeva veebirakendustes andmebaasi ühenduste puulimine (connec-tion pooling ), kus kasutatakse üht ja sama ühendust erinevate kasutajate teenindamiseks, rikub vähima vajaliku õiguse printsiipi. Kõikidel ühendunud kasutajatel on ligipääs täpselt samale hulgale andmetele, mille tulemusena võib lekkida tundlik informatsioon (näiteks SQLi süstimine (SQL injection ) või vead rakenduses). Lahenduseks probleemile pakume välja vahendid rollipõhise ligipääsu kontorolli disainimiseks tarkvara projekteerimise faasis. Rollipõhise ligipääsu kontorolli modelleerimiseks kasutame UML'i laiendust SecureUML. Antud mudelist on võimalik antud töö raames valminud vahenditega genereerida koodi, mis kontrollib ligipääsu õiguseid andmebaasi tasemel. Antud madaltasemekontroll vähendab riski, et kasutajad näevad andmeid, millele neil ligipääsu õigused puuduvad. Antud töös läbiviidud uuring näitas, et mudelipõhine turvalisuse arendamise kvaliteet on kõrgem võrreldes programmeerijate poolt kirjutatud koodiga. Kuna turvamudel on loodud projekteerimise faasis on selle semantiline täielikkus ja korrektsus kõrge, millest tulenevalt on seda kerge lugeda ja muuta ning seda on lihtsam kasutada arendajate ja klientide vahelises suhtluses.With the constant march towards a paperless business environment, database systems are increasingly being used to hold more and more sensitive information. This means they present an increasingly valuable target for attackers. A mainstream method for information system security is Role-based Access Control (RBAC), which restricts system access to authorised users. However the implementation of the RBAC policy remains a human intensive activity, typically, performed at the implementation stage of the system development. This makes it difficult to communicate security solutions to the stakeholders earlier and raises the system development cost, especially if security implementation errors are detected. The use of connection pooling in web applications, where all the application users connect to the database via the web server with the same database connection, violates the the principle of minimal privilege. Every connected user has, in principle, access to the same data. This may leave the sensitive data vulnerable to SQL injection attacks or bugs in the application. As a solution we propose the application of the model-driven development to define RBAC mechanism for data access at the design stages of the system development. The RBAC model created using the SecureUML approach is automatically translated to source code, which implements the modelled security rules at the database level. Enforcing access-control at this low level limits the risk of leaking sensitive data to unauthorised users. In out case study we compared SecureUML and the traditional security model, written as a source code, mixed with business logic and user-interface statements. The case study showed that the model-driven security development results in significantly better quality for the security model. Hence the security model created at the design stage contains higher semantic completeness and correctness, it is easier to modify and understand, and it facilitates a better communication of security solutions to the system stakeholders than the security model created at the implementation stage

    Seasonal and spatial variability of major organic contaminants in solution and suspension of the Pomeranian Bight

    Get PDF
    Studies of hexachlorocyclohexane-isomers (HCHs) and selected triazine herbicides in solution and suspension were carried out in the Pomeranian Bight in 1995. The concentrations of HCHs and triazines were determined by gas-liquid chromatography (GC) or by GC in connection with quadrupole mass spectrometry(GC/MS). Particulate and dissolved material were separated by means of an in-situ filtration/extraction system. The seasonal variability and regional distribution of the various components were investigated in January, April, July and September 1995. Their distribution in the western Pomeranian Bight is described. The concentrations of individual hexachlorocyclohexane-isomers were in the range of 100–1 000 pg l–1 in solution and 20 to 60 pg l–1 in suspension. The levels of the triazines in solution showed pronounced differences between the individual components (atrazine (2–20 ng l–1), simazine (5–30 ng l–1), terbuthylazine (< 5 ng l–1)), but they were one order of magnitude higher compared with the hexachlorocyclohexane-isomers. The concentration of triazines in suspension was low, often below the limit of detection (25 pg l–1)

    Papers on anthropology XVIII

    Get PDF
    Eelkäija: Tartu Ülikooli toimetised. Antropoloogia-alaseid töid, ISSN 0207-4575http://www.ester.ee/record=b1339521*es

    Second Assessment of Climate Change for the Baltic Sea Basin

    Get PDF
    Earth System Sciences; Atmospheric Sciences; Baltic Sea; Environmental Impacts; Regional Climate Change; Regional Climate Projection

    Hybrid Warfare

    Get PDF
    This book is available as open access through the Bloomsbury Open Access programme and is available on www.bloomsburycollections.com. Hybrid Warfare refers to a military strategy that blends conventional warfare, so-called ‘irregular warfare’ and cyber-attacks with other influencing methods, such as fake news, diplomacy and foreign political intervention. As Hybrid Warfare becomes increasingly commonplace, there is an imminent need for research bringing attention to how these challenges can be addressed in order to develop a comprehensive approach towards Hybrid Threats and Hybrid Warfare. This volume supports the development of such an approach by bringing together practitioners and scholarly perspectives on the topic and by covering the threats themselves, as well as the tools and means to counter them, together with a number of real-world case studies. The book covers numerous aspects of current Hybrid Warfare discourses including a discussion of the perspectives of key western actors such as NATO, the US and the EU; an analysis of Russia and China’s Hybrid Warfare capabilities; and the growing threat of cyberwarfare. A range of global case studies – featuring specific examples from the Baltics, Taiwan, Ukraine, Iran and Catalonia – are drawn upon to demonstrate the employment of Hybrid Warfare tactics and how they have been countered in practice. Finally, the editors propose a new method through which to understand the dynamics of Hybrid Threats, Warfare and their countermeasures, termed the ‘Hybridity Blizzard Model’. With a focus on practitioner insight and practicable International Relations theory, this volume is an essential guide to identifying, analysing and countering Hybrid Threats and Warfare

    Across disciplinary boundaries towards a sustainable life: psychodynamic reflection on human behaviour ; dedicated with eternal gratitude and in high esteem to Prof. Dr. Rainer Fuchs

    Full text link
    Contents: Introduction: Inga Krättli: Long-term Responsibility for a Sustainable Life: Introductory Panel Session and Roundtable Discussion (15-22); Part 1: On Organisations and Philosophies of Development: Isolde M. Schönstein: Die Verantwortung der Kirchen für nachhaltige Entwicklung (25-33); Emil Brix: Zivilgesellschaft als Chance für die Demokratie (35-42); Michal Sicinski: Ecology and Sustainable Development within a General Social Theory: Old and New Approaches (43-52); Part 2: On Higher Education and Cases of Institution Building: Norbert Derner: Mutual Relationships of Personal Interests and the Evolution of Complex Social Systems (55-59); R. Garleja, I. Kerpe: Innovative Changes in the Social Demand for Lifelong Education (61-66); Richard J. Bartak: Bioakademie - Bildungsprojekt zum ökologischen Landbau in der Tschechischen Republik (67-74); Vijaya Sherry Chand, Elmar A. Stuhler and Sasi Misra: The Fachhochschule System of Higher Education: University of Applied Sciences, Landshut and University of Applied Sciences, Freising-Weihenstephan (75-86); Part 3: Interdisciplinary Studies on National Parks, Ecotourism and Investment: Jan W. Dobrowolski: An Interdisciplinary Study of, and Education for, the Sustainable Development of National Park Regions in Poland and a New Concept of Sound Tourism Management applied to the Cinque Terre National Park in Italy (89-100); Aleksandra Wagner, Jan W. Dobrowolski, Maria Zielinska: Ecotourism as a Factor of Sustainable Development of Specially Protected Regions (101-108); Philippos Nicolopoulos: The Large Scale Investments in Alternative Tourism and Sustainable Development: The Case of Crete and Arcadia (109-121); Part 4: Living Space Resources, Evaluation of Raw Materials, Agricultural and Food Policy: Drago Muvrin: Sustainable Development through Research and Learning. Sustainable Development and Habitation. An Approach to the Use of Living Space Resources (125-136); Ingeborg Bauer: Basic Principles of the Bavarian Agricultural Policy and its Contribution to Sustainable Development (137-142); Aija Melngaile: Global Aspects of Food Chain Development (143-149); Richard J. Bartak: Evaluating the Use of Raw Materials for Food Production from Economic, Ecological, Ethical and Social Points of View (151-162); Part 5: International Agricultural Research for Development: Sabine Homann, Andre van Rooyen, Thinah Moyo and Zivayi Nengomasha: Strengthening Livestock Market Flows and Feeding Practices for Improved Livelihoods in Southern Zimbabwe (165-173); Sabine Homann, Barbara Rischkowsky, Jörg Steinbach, Michael Kirk: Towards Endogenous Development: Borana Pastoralists' Response to Environmental and Institutional Changes (175-182); Sabine Homann, Barbara Rischkowsky, Jörg Steinbach: Herd Mobility Leads the Way for Sustainable Pastoral Development: The Case of Borana Rangelands, Southern Ethiopia (183-194); Part 6: Aspects of Eco-Design and Development, Innovation as well as Renewable Energy Sources: Marion Hersh: Ecodesign for All: Principles and Practice (197-216); Jozica Knez-Riedl: Developing a Sustainable/Holistic Firm (217-225); Majda Bastic: Analysis of Slovenian New Products from Environmental Viewpoint (227-234); Jan Fiedler: The Economics of Renewable Energy Sources in the Czech Republic (235-240); Part 7: Technological Issues and Opportunities: Zinaida Klestova, Alexander Makarenko, Eugene Samorodov: Geoinformational Systems in society Transformation. System Analysis and Transregional Infrastructure (243-250); T. Abadjieva: Effect of Solar Radiation on Materials and Design of Buildings in Botswana (251-258); Vera Vokolkova: Road Transport and its Contribution to Global Warming with Special Regards to Developing Countries (259-269); Dana Wenscheova: Transportation and Environment in the City of Brno (271-275); Antonin Kremr: The Modrice Project - Reconstruction and Intensification of the City Waste Water Treatment Plant in Brno (277-280); Part 8: Latvian Processes and Methodologies: I. Skards, J. Raipulis, I. Karlsone, V. Strazdina: Why Have Suicide Rates in Baltic States Increased after Restoration of Independence after 1990 (283-296); Ilmars Skards, Jekabs Raipulis, Ilga Karlsone: Demographic Situation in Latvia and the Conditions which Limit it (297-310); A. Goldsteins: State Forest Certification Activities in Latvia (311-315); Part 9: Our New Enemy: Timi Ecimovic: The Climate Change System (319-334); Melanie Thun: "Shishmaref Must Yield" (335-336); Werner Zeppenfeld: Tuvalu: An Island Nation Cables SOS (337); Part 10: Possible Follow up Studies: Rainer Fuchs, Shalini Misra: Need and Possibility for Analysing Human Motivation Potential - Related to Sustainability (341-363); Rainer Fuchs: Goal-oriented Action: The Interaction of Process Components in Terms of Cybernetic Theory (365-380); Elmar A. Stuhler: The Usefulness of Action Psychology for Multipurpose Agribusiness (381-393); Elmar A. Stuhler: Retrospect and Prospect (395-400)

    Hybrid Warfare

    Get PDF
    This book is available as open access through the Bloomsbury Open Access programme and is available on www.bloomsburycollections.com. Hybrid Warfare refers to a military strategy that blends conventional warfare, so-called ‘irregular warfare’ and cyber-attacks with other influencing methods, such as fake news, diplomacy and foreign political intervention. As Hybrid Warfare becomes increasingly commonplace, there is an imminent need for research bringing attention to how these challenges can be addressed in order to develop a comprehensive approach towards Hybrid Threats and Hybrid Warfare. This volume supports the development of such an approach by bringing together practitioners and scholarly perspectives on the topic and by covering the threats themselves, as well as the tools and means to counter them, together with a number of real-world case studies. The book covers numerous aspects of current Hybrid Warfare discourses including a discussion of the perspectives of key western actors such as NATO, the US and the EU; an analysis of Russia and China’s Hybrid Warfare capabilities; and the growing threat of cyberwarfare. A range of global case studies – featuring specific examples from the Baltics, Taiwan, Ukraine, Iran and Catalonia – are drawn upon to demonstrate the employment of Hybrid Warfare tactics and how they have been countered in practice. Finally, the editors propose a new method through which to understand the dynamics of Hybrid Threats, Warfare and their countermeasures, termed the ‘Hybridity Blizzard Model’. With a focus on practitioner insight and practicable International Relations theory, this volume is an essential guide to identifying, analysing and countering Hybrid Threats and Warfare
    corecore