302 research outputs found

    The Effects of Turkish Vowel Harmony In Word Recognition

    Get PDF
    This thesis examines the effects of Turkish vowel harmony in visual word recognition. Turkish is among a few languages with vowel harmony, which is a process in which words contain vowels only from one specific vowel category. These categories are defined by the vowel’s phonological qualities (i.e., similar mouth and lip movement in pronunciation). In Turkish, categories depend on the vowel’s roundness/flatness, backness/frontness and whether the vowel’s pitch. Vowel harmony occurs naturally in language and is not taught formally. Instead, it is believed to occur due to decreased effort of words with vowel harmony in speech production (Khalilzadeh, 2010). Vowel harmony is very common in Turkish, with over half of all Turkish words (root words and affixes), containing vowel harmony (Güngör, 2003). Turkish is particularly interesting because it contains two types of vowel harmony: primary and secondary vowel harmony. Primary vowel harmony depends on the frontness and backness in vowels and secondary vowel harmony depends on whether a vowel is high or low pitch, in addition to the roundness and flatness. Although vowel harmony is very common, disharmony exists among some native Turkish words, foreign loanwords and compounds. Vowel harmony was explored in this thesis within the context of reading, with a focus on primary vowel harmony. There were two studies, including three experiments. The first study consisted of the development of a database of words in Turkish. The database includes all words from an obtained Turkish lexicon, the number of vowels in each word, the word length, whether the word has primary or secondary vowel harmony, word frequency and the syllabified version of each word. The second study consisted of three separate lexical decision task experiments, with each having 30 Turkish speaking participants. Experiment 1 consisted of a straight lexical decision task, with a 3 (Target harmony type: front harmony, back harmony, no harmony) x 2 (Target type: word, nonword) design. Experiments 2 and 3 were masked priming studies with word (Experiment 2) and nonword (Experiment 3) primes, in a 3 (Prime harmony type: front harmony, back harmony, no harmony) x 3 (Target harmony type: front harmony, back harmony, no harmony) x 2 (Target type: word, nonword) design. As predicted for Experiment 1, words with vowel harmony had faster and more accurate responses than words without vowel harmony. Nonwords with back vowel harmony had slower and less accurate responses than nonwords without harmony, which was also in line with the prediction. For Experiments 2 and 3, it was predicted that matching harmony types (i.e., front vowel harmony prime - front vowel harmony target) would have faster and more accurate responses. Results of Experiment 2 did not support the prediction in both latency and accuracy. Results of Experiment 3 supported the predicted results in both latency and accuracy. Overall, the results these experiments suggest that primary vowel harmony facilitates word recognition. This is believed to occur due to the usage of phonemic cues in word recognition. Past research has shown that both phonology and orthography is involved in word recognition, especially in languages with shallow orthography such as Turkish (Frost, 1998; Katz & Frost, 1992). In addition, it has been shown that words with harmony are easier to pronounce (Walker, 2005). Word recognition could have been facilitated since vowel harmony is a phonological category of words that are easier to pronounce

    A Binomial Crossover Based Artificial Bee Colony Algorithm for Cryptanalysis of Polyalphabetic Cipher

    Get PDF
    Cryptography is one of the common approaches to secure private data and cryptanalysis involves breaking down a coded cipher text without having the key. Cryptanalysis by brute force cannot be accepted as an effective approach and hence, metaheuristic algorithms performing systematic search can be applied to derive the optimal key. In this study, our aim is to examine the overall suitability of Artificial Bee Colony algorithm in the cryptanalysis of polyalphabetic cipher. For this purpose, using a number of different key lengths in both English and Turkish languages, basic Artificial Bee Colony algorithm (ABC) is applied in the cryptanalysis of Vigenere cipher. In order to improve the ABC algorithm\u27s convergence speed, a modified binomial crossover based Artificial Bee Colony algorithm (BCABC) is proposed by introducing a binomial crossoverbased phase after employed bee phase for a precise search of global optimal solution. Different keys in various sizes, various cipher texts in both English and Turkish languages are used in the experiments. It is shown that optimal cryptanalysis keys produced by BCABC are notably competitive and better than those produced by basic ABC for Vigenere cipher analysis

    Distinction of The Authors of Texts Using Multilayered Feedforward Neural Networks

    Get PDF
    This paper proposes a means of using a multilayered feedforward neural network to identify the author of a text. The network has to be trained where multilayer feedforward neural network as a  powerful scheme for learning complex input-output mapping have been used in learning of the average number of words and average characters of words in a paragraphs of an author. The resulting training information we get will be used to identify the texts written by authors. The computational complexity is solved by dividing it into a number of computationally simple tasks where the input space is divided into a set of subspaces and then combining the solutions to those tasks. By this, we have been able to successfully distinguish the books authored by Leo Tolstoy, from the ones authored by George Orwell and Boris Pasternak

    Breaking Japanese Diplomatic Codes: David Sissons and D Special Section during the Second World War

    Get PDF
    During the Second World War, Australia maintained a super-secret organisation, the Diplomatic (or `D’) Special Section, dedicated to breaking Japanese diplomatic codes. The Section has remained officially secret as successive Australian Governments have consistently refused to admit that Australia ever intercepted diplomatic communications, even in war-time. This book recounts the history of the Special Section and describes its code-breaking activities. It was a small but very select organisation, whose `technical

    International Conference on Computer Science

    Get PDF
    UBT Annual International Conference is the 11th international interdisciplinary peer reviewed conference which publishes works of the scientists as well as practitioners in the area where UBT is active in Education, Research and Development. The UBT aims to implement an integrated strategy to establish itself as an internationally competitive, research-intensive university, committed to the transfer of knowledge and the provision of a world-class education to the most talented students from all background. The main perspective of the conference is to connect the scientists and practitioners from different disciplines in the same place and make them be aware of the recent advancements in different research fields, and provide them with a unique forum to share their experiences. It is also the place to support the new academic staff for doing research and publish their work in international standard level. This conference consists of sub conferences in different fields like: Art and Digital Media Agriculture, Food Science and Technology Architecture and Spatial Planning Civil Engineering, Infrastructure and Environment Computer Science and Communication Engineering Dental Sciences Education and Development Energy Efficiency Engineering Integrated Design Information Systems and Security Journalism, Media and Communication Law Language and Culture Management, Business and Economics Modern Music, Digital Production and Management Medicine and Nursing Mechatronics, System Engineering and Robotics Pharmaceutical and Natural Sciences Political Science Psychology Sport, Health and Society Security Studies This conference is the major scientific event of the UBT. It is organizing annually and always in cooperation with the partner universities from the region and Europe. We have to thank all Authors, partners, sponsors and also the conference organizing team making this event a real international scientific event. Edmond Hajrizi, President of UBT UBT – Higher Education Institutio

    The Cryptographic Imagination

    Get PDF
    Originally published in 1996. In The Cryptographic Imagination, Shawn Rosenheim uses the writings of Edgar Allan Poe to pose a set of questions pertaining to literary genre, cultural modernity, and technology. Rosenheim argues that Poe's cryptographic writing—his essays on cryptography and the short stories that grew out of them—requires that we rethink the relation of poststructural criticism to Poe's texts and, more generally, reconsider the relation of literature to communication. Cryptography serves not only as a template for the language, character, and themes of much of Poe's late fiction (including his creation, the detective story) but also as a "secret history" of literary modernity itself. "Both postwar fiction and literary criticism," the author writes, "are deeply indebted to the rise of cryptography in World War II." Still more surprising, in Rosenheim's view, Poe is not merely a source for such literary instances of cryptography as the codes in Conan Doyle's "The Dancing-Men" or in Jules Verne, but, through his effect on real cryptographers, Poe's writing influenced the outcome of World War II and the development of the Cold War. However unlikely such ideas sound, The Cryptographic Imagination offers compelling evidence that Poe's cryptographic writing clarifies one important avenue by which the twentieth century called itself into being. "The strength of Rosenheim's work extends to a revisionistic understanding of the entirety of literary history (as a repression of cryptography) and then, in a breathtaking shift of register, interlinks Poe's exercises in cryptography with the hyperreality of the CIA, the Cold War, and the Internet. What enables this extensive range of applications is the stipulated tension Rosenheim discerns in the relationship between the forms of the literary imagination and the condition of its mode of production. Cryptography, in this account, names the technology of literary production—the diacritical relationship between decoding and encoding—that the literary imagination dissimulates as hieroglyphics—the hermeneutic relationship between a sign and its content."—Donald E. Pease, Dartmouth Colleg

    Compilation of Abstracts, June 2016

    Get PDF
    NPS Class of June 2016This quarter’s Compilation of Abstracts summarizes cutting-edge, security-related research conducted by NPS students and presented as theses, dissertations, and capstone reports. Each expands knowledge in its field.http://archive.org/details/compilationofabs109454990
    • …
    corecore