168 research outputs found

    Verbal allocutivity in a crosslinguistic perspective

    Get PDF
    International audienceAllocutivity is a term coined to describe a phenomenon in Basque whereby, in certain pragmatic (and syntactic) circumstances, an addressee who is not an argument of the verb is systematically encoded in all declarative main clause conjugated verb forms. Although the term has been exclusively applied to Basque, similar phenomena are found in other languages as well. Indeed, despite certain differences in the degree of grammaticalization and usage, allocutive verb forms are attested in at least PumĂŠ (isolate; Venezuela), Nambikwara (isolate; Brazil), Mandan (Siouan; North America), and Beja (Cushitic; Northeast Africa). The aim of this article is to propose a typology of verbal allocutivity in a crosslinguistic perspective, taking into consideration the locus of encoding, the manner in which it is encoded, the information concerning the addressee which is encoded, and the syntactic environments in which it can appear

    Attitudes towards privacy by design in e-government: Views from the trenches

    Get PDF
    Abstract. In light of increasing public pressure and strict regulation, issues of information security and privacy gain prominence in the e-government domain. A promising approach to ensure data protection is to embrace the Privacy by Design principles and practices in the public sector but this remains a major challenge for practitioners. This article leverages in-depth interviews with e-government stakeholders in Bulgaria to explore their opinions and preferences on data protection issues, thus outlining the main drivers and barriers for Privacy by Design implementations. The key insight is that increasing citizen demands and regulatory oversight engender a change in privacy thinking that defies the current status quo. Limited understanding, scarcity of best practices, legacy systems and insufficient financial and administrative capacity seem to be the main implementation obstacles.Keywords. Privacy by Design, e-government, data protection, personal data.JEL. C80, H10, H11

    TETRIS: Towards Exploring the Robustness of Interactive Segmentation

    Full text link
    Interactive segmentation methods rely on user inputs to iteratively update the selection mask. A click specifying the object of interest is arguably the most simple and intuitive interaction type, and thereby the most common choice for interactive segmentation. However, user clicking patterns in the interactive segmentation context remain unexplored. Accordingly, interactive segmentation evaluation strategies rely more on intuition and common sense rather than empirical studies (e.g., assuming that users tend to click in the center of the area with the largest error). In this work, we conduct a real user study to investigate real user clicking patterns. This study reveals that the intuitive assumption made in the common evaluation strategy may not hold. As a result, interactive segmentation models may show high scores in the standard benchmarks, but it does not imply that they would perform well in a real world scenario. To assess the applicability of interactive segmentation methods, we propose a novel evaluation strategy providing a more comprehensive analysis of a model's performance. To this end, we propose a methodology for finding extreme user inputs by a direct optimization in a white-box adversarial attack on the interactive segmentation model. Based on the performance with such adversarial user inputs, we assess the robustness of interactive segmentation models w.r.t click positions. Besides, we introduce a novel benchmark for measuring the robustness of interactive segmentation, and report the results of an extensive evaluation of dozens of models.Comment: Accepted by AAAI202

    Inverse and forward kinematics and workspace analysis of a novel 5-DOF (3T2R) parallel–serial (hybrid) manipulator:

    Get PDF
    The proposed study provides a solution of the inverse and forward kinematic problems and workspace analysis for a five-degree-of-freedom parallel–serial manipulator, in which the parallel kinematic chain is made in the form of a tripod and the serial kinematic chain is made in the form of two carriages displaced in perpendicular directions. The proposed manipulator allows to realize five independent movements—three translations and two rotations motion pattern (3T2R). Analytical relationships between the coordinates of the end-effector and five controlled movements provided by manipulator's drives (generalized coordinates) were determined. The approach of reachable workspace calculation was defined with respect to available design constraints of the manipulator based on the obtained algorithms of the inverse and forward kinematics. Case studies are considered based on the obtained algorithms of inverse and forward kinematics. For the inverse kinematic problem, the solution is obtained in accordance with the given laws of position and orientation change of the end-effector, corresponding to the motion along a spiral-helical trajectory. For the forward kinematic problem, various assemblies of the manipulator are obtained at the same given values of the generalized coordinates. An example of reachable workspace designing finalizes the proposed study. Dimensions and extreme values of the end-effector orientation angles are calculated

    Spin/orbit moment imbalance in the near-zero moment ferromagnetic semiconductor SmN

    Full text link
    SmN is ferromagnetic below 27 K, and its net magnetic moment of 0.03 Bohr magnetons per formula unit is one of the smallest magnetisations found in any ferromagnetic material. The near-zero moment is a result of the nearly equal and opposing spin and orbital moments in the 6H5/2 ground state of the Sm3+ ion, which leads finally to a nearly complete cancellation for an ion in the SmN ferromagnetic state. Here we explore the spin alignment in this compound with X-ray magnetic circular dichroism at the Sm L2,3 edges. The spectral shapes are in qualitative agreement with computed spectra based on an LSDA+U (local spin density approximation with Hubbard-U corrections) band structure, though there remain differences in detail which we associate with the anomalous branching ratio in rare-earth L edges. The sign of the spectra determine that in a magnetic field the Sm 4f spin moment aligns antiparallel to the field; the very small residual moment in ferromagnetic SmN aligns with the 4f orbital moment and antiparallel to the spin moment. Further measurements on very thin (1.5 nm) SmN layers embedded in GdN show the opposite alignment due to a strong Gd-Sm exchange, suggesting that the SmN moment might be further reduced by about 0.5 % Gd substitution

    Numerical Modelling of Tailings Dam Thermal-Seepage Regime Considering Phase Transitions

    Get PDF
    Statement of the Problem. The article describes the problem of combined thermal-seepage regime for earth dams and those operated in the permafrost conditions. This problem can be solved using the finite elements method based on the local variational formulation. Results. A thermal-seepage regime numerical model has been developed for the “dam-foundation” system in terms of the tailings dam. The effect of heat-and-mass transfer and liquid phase transition in soil interstices on the dam state is estimated. The study with subsequent consideration of these factors has been undertaken. Conclusions. The results of studying the temperature-filtration conditions of the structure based on the factors of heat-and-mass transfer and liquid phase transition have shown that the calculation results comply with the field data. Ignoring these factors or one of them distorts the real situation of the dam thermal-seepage conditions

    Sex Allocation in Relation to Host Races in the Brood-Parasitic Common Cuckoo (Cuculus canorus)

    Get PDF
    Sex allocation theory and empirical evidence both suggest that natural selection should favour maternal control of offspring sex ratio in relation to their ability to invest in the offspring. Generalist parasites constitute a particularly interesting group to test this theory as different females commonly utilize different host species showing large variation in provisioning ability. The common cuckoo (Cuculus canorus) is a generalist brood parasite that lays its eggs in the nest of many different passerine birds, but each female tends to specialize on one particular host species giving rise to highly specialized host races. The different host species show large variation in their ability to invest in the parasitic offspring, presenting an opportunity for female cuckoos to bias offspring sex ratio in relation to host species quality. Here, we investigate host-race specific sex allocation controlling for maternal identity in the common cuckoo. We found no evidence of any significant relationship between host race and sex ratio in one sympatric population harbouring three different host races, or in a total of five geographically separated populations. There was also no significant association between host quality, as determined by species-specific female host body mass, and cuckoo sex ratio. Finally, we found no significant relationship between individual cuckoo maternal quality, as determined by her egg volume, and sex ratio within each host race. We conclude that the generalist brood-parasitic common cuckoo show no significant sex-ratio bias in relation to host race and discuss this finding in light of gene flow and host adaptations

    A formalized representation of the target function of the impact of malicious software on the operating environment of a special-purpose automated control system

    Get PDF
    The article presents the main provisions of the theory of functional modeling in relation to solving an important and relevant problem for the methodology of information security managing – the development of mathematical models characterizing the dynamic capabilities of malware to implement destructive effects on critical information infrastructure objects. As a result of the analysis of the models that pose a threat to information security through the use of malicious codes, such as the "chain of cyber intrusions", the "unified chain of cyber intrusions", the basic and advanced models of Diamond intrusion analysis, the ATT&CK model, an up-to-date version of the functional model in the IDEF0 notation of the process of malware destructive impact on the operating environment of a special-purpose automated control system was built. The process of malware exposure is decomposed into individual stages, tactics, and techniques. The purpose of the research was to develop a variant of the malware impact on a special-purpose automated control system as a method of violating the state of information security and its processes of the system under consideration. The obtained results are a tool for the formalized presentation of the described processes in terms of the Markov processes and the development of analytical models, appropriate temporal and probabilistic characteristics for quantitative assessment of the intruder's ability to implement threats to the information security state in special-purpose automated control systems, through the malware impact
    • …
    corecore