656 research outputs found

    Marital Power Plays

    Get PDF
    William Shakespeare’s Othello describes the deterioration of the jealous Moorish general Othello’s marriage with Venetian noblewoman Desdemona. This domestic crisis, ignited by conniving manservant Iago’s careful manipulations, hinges upon one handkerchief, its significance within Othello’s and Desdemona’s courtship, and its engineered discovery in the bedchambers of Michael Cassio. Just as this small handkerchief assumes an integral role, the actions of Emilia, Iago’s wife, enable the fruition of his plots but ultimately result in his exposure and downfall; thus, Othello documents the decline of not one, but two marriages. The largest contrast between these two relationships is division of power, for while Desdemona assumes a very passive role, Emilia desires more independence and equality in her marriage. Despite her similarities with and sense of duty towards Iago, Emilia’s strong personality makes her incompatible with her husband

    Differentiate Metasploit Framework Attacks From Others

    Get PDF
    Metasploit Framework is a very popular collection of penetration testing tools. From auxiliaries such as network scanners and mappers to exploits and payloads, Metasploit Framework offers a plethera of apparatuses to implement all the stages of a penetration test. There are two versions: both a free open-source community version and a commercial professional version called Metasploit Pro. The free version, Metasploit Framework, is heavily used by cyber crimininals to carry out illegal activities to gain unauthorized access to targets. In this paper, I conduct experiments in a virtual environment to discover whether attacks originated from Metasploit Framework are marked with unique patterns and features so that these special characteristics can help identify and block Metasploit Framework attacks. Inside this virtual environment, I will set up two virtual machines: one attacker and one victim. The victim machine is designed to have vulnerabilities for penetration testing. The attacker virtual machine will attack the victim machine by using Metasploit Frameowrk. Wireshark will be used to capture and analyze the packets. The conclusion reached from the experiment results is that, even though the attacks from Metaploit Framework share certain common patterns, these characteristics are not significant enough to be used to create scanners or alerts with to keep victim machines immune from the attacks. The Metasploit Framework attacks keep evolving and it is still a very lofty goal to block cyber attacks from Metasploit Framework. This paper shares the experiment process, data and insight with readers

    Asymmetric projections of the arcuate fasciculus to the temporal cortex underlie lateralized language function in the human brain

    Get PDF
    The arcuate fasciculus (AF) in the human brain has asymmetric structural properties. However, the topographic organization of the asymmetric AF projections to the cortex and its relevance to cortical function remain unclear. Here we mapped the posterior projections of the human AF in the inferior parietal and lateral temporal cortices using surface-based structural connectivity analysis based on diffusion MRI and investigated their hemispheric differences. We then performed the cross-modal comparison with functional connectivity based on resting-state functional MRI (fMRI) and task-related cortical activation based on fMRI using a semantic classification task of single words. Structural connectivity analysis showed that the left AF connecting to Broca's area predominantly projected in the lateral temporal cortex extending from the posterior superior temporal gyrus to the mid part of the superior temporal sulcus and the middle temporal gyrus, whereas the right AF connecting to the right homolog of Broca's area predominantly projected to the inferior parietal cortex extending from the mid part of the supramarginal gyrus to the anterior part of the angular gyrus. The left-lateralized projection regions of the AF in the left temporal cortex had asymmetric functional connectivity with Broca's area, indicating structure-function concordance through the AF. During the language task, left-lateralized cortical activation was observed. Among them, the brain responses in the temporal cortex and Broca's area that were connected through the left-lateralized AF pathway were specifically correlated across subjects. These results suggest that the human left AF, which structurally and functionally connects the mid temporal cortex and Broca's area in asymmetrical fashion, coordinates the cortical activity in these remote cortices during a semantic decision task. The unique feature of the left AF is discussed in the context of the human capacity for language.National Institutes of Health (U.S.) (Grant R01NS069696)National Institutes of Health (U.S.) (Grant P41EB015896)National Institutes of Health (U.S.) (Grant S10ODRR031599)National Institutes of Health (U.S.) (Grant S10RR021110)National Science Foundation (U.S.) (Grant NFS-DMS-1042134)Uehara Memorial Foundation (Fellowship)Society of Nuclear Medicine and Molecular Imaging (Wagner-Torizuka Fellowship)United States. Dept. of Energy (Grant DE-SC0008430

    Neural Chinese Word Segmentation with Lexicon and Unlabeled Data via Posterior Regularization

    Full text link
    Existing methods for CWS usually rely on a large number of labeled sentences to train word segmentation models, which are expensive and time-consuming to annotate. Luckily, the unlabeled data is usually easy to collect and many high-quality Chinese lexicons are off-the-shelf, both of which can provide useful information for CWS. In this paper, we propose a neural approach for Chinese word segmentation which can exploit both lexicon and unlabeled data. Our approach is based on a variant of posterior regularization algorithm, and the unlabeled data and lexicon are incorporated into model training as indirect supervision by regularizing the prediction space of CWS models. Extensive experiments on multiple benchmark datasets in both in-domain and cross-domain scenarios validate the effectiveness of our approach.Comment: 7 pages, 11 figures, accepted by the 2019 World Wide Web Conference (WWW '19

    Endometrial Cancer

    Get PDF
    This chapter in Cancer Concepts: A Guidebook for the Non-Oncologist is about cancers of the endometrium and uterus, including the epidemiology, risk factors, diagnosis, genetic risk, histology, grading and type categorization, management, and prognosis.https://escholarship.umassmed.edu/cancer_concepts/1013/thumbnail.jp

    The design, implementation, and impact of a collaborative responsive professional development (CRPD) model

    Get PDF
    It is important to design professional development (PD) around teachers’ professional thinking and needs. Researchers have explored how teachers center on and build upon students’ thinking in mathematics teaching, but few studies have investigated how to identify and be responsive to teachers’ ongoing needs while planning and enacting effective PD. As such, this study presents a Collaborative Responsive Professional Development (CRPD) model that arose from efforts to elicit and validate teachers’ voices to design PD experiences that were relevant and meaningful to them. We share the rationale of the model design, its implementation during a two-year PD project, and its impact on teachers’ instructional practice

    The Effects of Fair Value on the Matching of Revenues and Expenses: The Case of Asset Revaluations

    Get PDF
    Researchers and practitioners have expressed concern that matching has declined over time, as evidenced by a decreasing association between revenues and expenses. They attribute this decline to the shift in financial reporting from a revenue–expense view that emphasizes matching to an asset–liability view that emphasizes the measurement of economic resources that incorporates more fair values. When revenues rise with inflation but the expenses remain tied to historical costs, the two streams tend to diverge. We hypothesize that upwardly revaluing the long-lived fixed operating assets resets the expense stream; thus, changes in revenues will be more closely associated with changes in expenses for firms that revalue than firms that do not upwardly revalue. Based on a sample of United Kingdom firms, we find evidence supporting our expectations, particularly in those higher inflationary industries
    • …
    corecore