3,527 research outputs found

    From Statistical to Geolinguistic Data: Mapping and Measuring Linguistic Diversity

    Get PDF
    The aim of this paper is describing a new methodology for mapping and measuring linguistic diversity in a territory. The three methods that have been created by the Centro di eccellenza della ricerca Osservatorio linguistico permanente dell’italiano diffuso fra stranieri e delle lingue immigrate in Italia at the Università per Stranieri di Siena are the following: - the Toscane favelle model, a procedural application which passes from quantitative statistical data to a demolinguistic paradigm; - the Monterotondo-Mentana model. The surveys of quantitative and qualitative data are carried out using traditional tools (questionnaires, audio and video recordings) as well as advanced technologies; - the Esquilino model. Digital maps are created which present the distribution of the immigrant languages through the presence of signs in linguistic landscape. The final objective is putting together the data surveyed by the three methods in order to have a “speaking” territory, in which each point surveyed identifies the languages spoken and the various linguistic manifestations.Language Contact, Linguistic Diversity, Immigrant Languages, Geolinguistic Data, New Methodologies in Sociolinguistic Research

    Binary Hypothesis Testing Game with Training Data

    Full text link
    We introduce a game-theoretic framework to study the hypothesis testing problem, in the presence of an adversary aiming at preventing a correct decision. Specifically, the paper considers a scenario in which an analyst has to decide whether a test sequence has been drawn according to a probability mass function (pmf) P_X or not. In turn, the goal of the adversary is to take a sequence generated according to a different pmf and modify it in such a way to induce a decision error. P_X is known only through one or more training sequences. We derive the asymptotic equilibrium of the game under the assumption that the analyst relies only on first order statistics of the test sequence, and compute the asymptotic payoff of the game when the length of the test sequence tends to infinity. We introduce the concept of indistinguishability region, as the set of pmf's that can not be distinguished reliably from P_X in the presence of attacks. Two different scenarios are considered: in the first one the analyst and the adversary share the same training sequence, in the second scenario, they rely on independent sequences. The obtained results are compared to a version of the game in which the pmf P_X is perfectly known to the analyst and the adversary

    A DESCRIPTIVE STUDY ON PREGNANCY AND CHILDBIRTH OF ONE STUDENT ONE CLIENT (OSOC) PATIENTS OF MIDWIFERY STUDENTS OF POLYTECHNIC BANJARNEGARA

    Get PDF
    Maternal Mortality Rate (MMR) and Infant Mortality Rate (MMR) are indicators of a country's welfare. In 2018 there were 421 maternal mortality cases in central java. This number was a decrease compared to the mortality case in 2017, as many as 475 cases.  This study aimed to identify health conditions during pregnancy and the childbirth period of the patients of One Student One Client (OSOC) in Polytechnic Banjarnegara. A descriptive study conducted at Basic Emergency Neonatal Obstetric Services (PONED) in Banjarnegara District in March - April 2019 to 26 pregnant women. The results showed that most of the respondents classified the low-risk age group as 21 respondents (81%). There are 15  respondents (58%) classified to low-risk pregnancy distance category, 24 respondents (92%) are classified to normal gestational age category, and average birth weight category. It is recommended to ensure maternal health during pregnancy and childbirth is always well monitored. Ensuring mothers can access quality services in health services. It is necessary to have continuous assistance from students in OSOC activities as an extended arm of health workers. Keywords: Pregnancy, Childbirth, Health Client

    A QUALITATIVE STUDY: THE MANAGEMENT OF DIARRHEA AMONG TODDLERS

    Get PDF
    Diarrhea is a prime cause of morbidity in infants. Early in 2018, There were 141 cases in Beji Village, Banjarmangu Sub-district. The government had an effort to prevent diarrhea, one of which is by conducting socialization to the community. Mothers' knowledge of diarrhea disease needs has a significant influence in suppressing diarrhea. This study aimed to identify community points of view about the classification, prevention, and treatment of diarrhea. This study used a qualitative study method. Data Collected by Depth interview with 13 people in Beji Village, Banjarmangu Sub-district, Banjarnegara District. The results showed that the community had a different classification between diarrhea and 'luganen'. Diarrhea considered a disease, and luganen is a sign of growth and development. Diarrhea prevents by maintaining a clean and healthy lifestyle. Diarrhea treats using a mixture of guava leaves and turmeric as first aid. The infant will be brought to health facilities when the symptoms appear and become severer.Keywords: Local knowledge, prevention, treatment, diarrhe

    A new Backdoor Attack in CNNs by training set corruption without label poisoning

    Full text link
    Backdoor attacks against CNNs represent a new threat against deep learning systems, due to the possibility of corrupting the training set so to induce an incorrect behaviour at test time. To avoid that the trainer recognises the presence of the corrupted samples, the corruption of the training set must be as stealthy as possible. Previous works have focused on the stealthiness of the perturbation injected into the training samples, however they all assume that the labels of the corrupted samples are also poisoned. This greatly reduces the stealthiness of the attack, since samples whose content does not agree with the label can be identified by visual inspection of the training set or by running a pre-classification step. In this paper we present a new backdoor attack without label poisoning Since the attack works by corrupting only samples of the target class, it has the additional advantage that it does not need to identify beforehand the class of the samples to be attacked at test time. Results obtained on the MNIST digits recognition task and the traffic signs classification task show that backdoor attacks without label poisoning are indeed possible, thus raising a new alarm regarding the use of deep learning in security-critical applications

    Privacy-Aware Processing of Biometric Templates by Means of Secure Two-Party Computation

    Get PDF
    The use of biometric data for person identification and access control is gaining more and more popularity. Handling biometric data, however, requires particular care, since biometric data is indissolubly tied to the identity of the owner hence raising important security and privacy issues. This chapter focuses on the latter, presenting an innovative approach that, by relying on tools borrowed from Secure Two Party Computation (STPC) theory, permits to process the biometric data in encrypted form, thus eliminating any risk that private biometric information is leaked during an identification process. The basic concepts behind STPC are reviewed together with the basic cryptographic primitives needed to achieve privacy-aware processing of biometric data in a STPC context. The two main approaches proposed so far, namely homomorphic encryption and garbled circuits, are discussed and the way such techniques can be used to develop a full biometric matching protocol described. Some general guidelines to be used in the design of a privacy-aware biometric system are given, so as to allow the reader to choose the most appropriate tools depending on the application at hand

    An Improved Statistic for the Pooled Triangle Test against PRNU-Copy Attack

    Full text link
    We propose a new statistic to improve the pooled version of the triangle test used to combat the fingerprint-copy counter-forensic attack against PRNU-based camera identification [1]. As opposed to the original version of the test, the new statistic exploits the one-tail nature of the test, weighting differently positive and negative deviations from the expected value of the correlation between the image under analysis and the candidate images, i.e., those image suspected to have been used during the attack. The experimental results confirm the superior performance of the new test, especially when the conditions of the test are challenging ones, that is when the number of images used for the fingerprint-copy attack is large and the size of the image under test is small.Comment: submitted to IEEE Signal Processing Letter

    Distance Measures for Reduced Ordering Based Vector Filters

    Full text link
    Reduced ordering based vector filters have proved successful in removing long-tailed noise from color images while preserving edges and fine image details. These filters commonly utilize variants of the Minkowski distance to order the color vectors with the aim of distinguishing between noisy and noise-free vectors. In this paper, we review various alternative distance measures and evaluate their performance on a large and diverse set of images using several effectiveness and efficiency criteria. The results demonstrate that there are in fact strong alternatives to the popular Minkowski metrics
    • …
    corecore