17,466 research outputs found

    Building a family ontology to meet consistency criteria

    Get PDF
    Semantic web is an extension of the current web in which the existing information on the web are organized and encoded more meaningfully using ontology language, thus enabling effective communication among machines and humans. Ontology is the backbone of the semantic web that contributes to knowledge sharing among intended parties over distributed systems around the world. In the past few years, semantic web has been widely accepted by a variety of fields for better knowledge representation, communication, sharing and reasoning on the web. Now, there are existing genealogical ontologies proposed by different groups of researchers once semantic web has emerged as third generation of the web. However, existing ontologies still lack certain important concepts and properties to support the domain of family relations. This may lead to the inability of the ontology to deliver full potential of exchanging family history information among all interested parties. Moreover, existing ontologies do not employ the full potential of SWRL rules to reason the individuals within the ontology. The main aim of this research is to build a new Family Ontology which obeys the consistency criteria. Consistency checking ensures there are no contradictory concepts found within the resulting ontology. The consistency of Family Ontology will be evaluated using FACT++, HermiT and Pellet reasoners. By augmenting the additional axioms and testing the resulting ontology thoroughly using reasoner tools, the proposed Family Ontology is expected to achieve a consistency of 100%.This research is meaningful and significant to all humans since everyone has his or her own unique family history. The proposed ontology also facilitates effective and efficient communication among all intended parties since shared vocabularies and standards are employed by the proposed ontology

    Spartan Daily, November 1, 1937

    Get PDF
    Volume 26, Issue 28https://scholarworks.sjsu.edu/spartandaily/2668/thumbnail.jp

    Quoting Shakespeare in the British Novel from Dickens to Wodehouse

    Get PDF
    Novelists heralded as Victorian Shakespeares frequently navigated the varied nineteenth-century practices of Shakespeare quotation (in the classroom in compilation books, in stage spoofs) to construct the relationship between narrator and character, and to negotiate the dialogue between Shakespeare\u27s voice and the voice of the novel. This chapter looks at three novelists whose practices intersect and contrast: George Eliot, who resists the Bardolatrous imputation of a Shakespearean character\u27s wisdom to its author by distinguishing her own characters\u27 inept Shakespeare quotations from her narrative voice; Thomas Hardy, who claims the authority of Shakespearean pastoral, regional language against the glib quotations of his more cosmopolitan characters; and a latter-day Victorian, P.G. Wodehouse, who plays the irreverent, defamiliarising gambits of Victorian Shakespeare burlesques against the educational and commonplace authority that Shakespeare quotations accrue

    Breaking Through: University Of New Hampshire Stormwater Center 2016 Report

    Get PDF

    Back to the Drawing Board : Inventing a Sociology of Technology

    Get PDF

    On the application of raised-cosine wavelets for multicarrier systems design

    Get PDF
    YesNew orthogonal wavelet transforms can be designed by changing the wavelet basis functions or by constructing new low-pass filters (LPF). One family of wavelet may appeal, in use, to a particular application than another. In this study, the wavelet transform based on raisedcosine spectrum is used as an independent orthogonal wavelet to study multicarrier modulation behaviour over multipath channel environment. Then, the raised-cosine wavelet is compared with other well-known orthogonal wavelets that are used, also, to build multicarrier modulation systems. Traditional orthogonal wavelets do not have side-lobes, while the raised-cosine wavelets have lots of side-lobes; these characteristics influence the wavelet behaviour. It will be shown that the raised-cosine wavelet transform, as an orthogonal wavelet, does not support the design of multicarrier application well like the existing well-known orthogonal wavelets

    Automatic Detection of Vague Words and Sentences in Privacy Policies

    Full text link
    Website privacy policies represent the single most important source of information for users to gauge how their personal data are collected, used and shared by companies. However, privacy policies are often vague and people struggle to understand the content. Their opaqueness poses a significant challenge to both users and policy regulators. In this paper, we seek to identify vague content in privacy policies. We construct the first corpus of human-annotated vague words and sentences and present empirical studies on automatic vagueness detection. In particular, we investigate context-aware and context-agnostic models for predicting vague words, and explore auxiliary-classifier generative adversarial networks for characterizing sentence vagueness. Our experimental results demonstrate the effectiveness of proposed approaches. Finally, we provide suggestions for resolving vagueness and improving the usability of privacy policies.Comment: 10 page

    DESIGN OF NOVEL GENERALIZED LOW PASS FILTER CASCADED WITH PASSBAND NOTCH FOR MRI APPLICATIONS

    Get PDF
    Synthesis and design of a lumped-element low-pass filter cascaded with passband notch are done in this project. The filter synthesis and design are stringently carried out using Maple and done based on exact computations involving mainly the determination of the elements specifications. The design of the filter consisted of utilization of inductors and capacitors with Chebyshev approximation in which the elements values are obtained through insertion loss method and the resulting circuit is simulated via Advanced Digital Systems (ADS). The resulting frequency response of the filter is conforming to the given specifications with a total filter order of less than 15 in order to allow a better selective response and also avoid high power loss, high cost and complication in prototype fabrication later on. The main advantage of the cascaded filter is its better ability to increase the signal to noise ratio in Magnetic Resonance Imaging (MRI) equipment

    An approach to preventing spam using Access Codes with a combination of anti-spam mechanisms

    Get PDF
    Spam is becoming a more and more severe problem for individuals, networks, organisations and businesses. The losses caused by spam are billions of dollars every year. Research shows that spam contributes more than 80% of e-mails with an increased in its growth rate every year. Spam is not limited to emails; it has started affecting other technologies like VoIP, cellular and traditional telephony, and instant messaging services. None of the approaches (including legislative, collaborative, social awareness and technological) separately or in combination with other approaches, can prevent sufficient of the spam to be deemed a solution to the spam problem. The severity of the spam problem and the limitations of the state-of-the-Art solutions create a strong need for an efficient anti-spam mechanism that can prevent significant volumes of spam without showing any false positives. This can be achieved by an efficient anti-spam mechanism such as the proposed anti-spam mechanism known as "Spam Prevention using Access Codes", SPAC. SPAC targets spam from two angles i.e. to prevent/block spam and to discourage spammers by making the infrastructure environment very unpleasant for them. In addition to the idea of Access Codes, SPAC combines the ideas behind some of the key current technological anti-spam measures to increase effectiveness. The difference in this work is that SPAC uses those ideas effectively and combines them in a unique way which enables SPAC to acquire the good features of a number of technological anti-spam approaches without showing any of the drawbacks of these approaches. Sybil attacks, Dictionary attacks and address spoofing have no impact on the performance of SPAC. In fact SPAC functions in a similar way (i.e. as for unknown persons) for these sorts of attacks. An application known as the "SPAC application" has been developed to test the performance of the SPAC mechanism. The results obtained from various tests on the SPAC application show that SPAC has a clear edge over the existing anti-spam technological approaches
    • …
    corecore