656 research outputs found
Marital Power Plays
William Shakespeare’s Othello describes the deterioration of the jealous Moorish general Othello’s marriage with Venetian noblewoman Desdemona. This domestic crisis, ignited by conniving manservant Iago’s careful manipulations, hinges upon one handkerchief, its significance within Othello’s and Desdemona’s courtship, and its engineered discovery in the bedchambers of Michael Cassio. Just as this small handkerchief assumes an integral role, the actions of Emilia, Iago’s wife, enable the fruition of his plots but ultimately result in his exposure and downfall; thus, Othello documents the decline of not one, but two marriages. The largest contrast between these two relationships is division of power, for while Desdemona assumes a very passive role, Emilia desires more independence and equality in her marriage. Despite her similarities with and sense of duty towards Iago, Emilia’s strong personality makes her incompatible with her husband
Differentiate Metasploit Framework Attacks From Others
Metasploit Framework is a very popular collection of penetration testing tools. From auxiliaries such as network scanners and mappers to exploits and payloads, Metasploit Framework offers a plethera of apparatuses to implement all the stages of a penetration test. There are two versions: both a free open-source community version and a commercial professional version called Metasploit Pro. The free version, Metasploit Framework, is heavily used by cyber crimininals to carry out illegal activities to gain unauthorized access to targets.
In this paper, I conduct experiments in a virtual environment to discover whether attacks originated from Metasploit Framework are marked with unique patterns and features so that these special characteristics can help identify and block Metasploit Framework attacks. Inside this virtual environment, I will set up two virtual machines: one attacker and one victim. The victim machine is designed to have vulnerabilities for penetration testing. The attacker virtual machine will attack the victim machine by using Metasploit Frameowrk. Wireshark will be used to capture and analyze the packets. The conclusion reached from the experiment results is that, even though the attacks from Metaploit Framework share certain common patterns, these characteristics are not significant enough to be used to create scanners or alerts with to keep victim machines immune from the attacks. The Metasploit Framework attacks keep evolving and it is still a very lofty goal to block cyber attacks from Metasploit Framework. This paper shares the experiment process, data and insight with readers
Asymmetric projections of the arcuate fasciculus to the temporal cortex underlie lateralized language function in the human brain
The arcuate fasciculus (AF) in the human brain has asymmetric structural properties. However, the topographic organization of the asymmetric AF projections to the cortex and its relevance to cortical function remain unclear. Here we mapped the posterior projections of the human AF in the inferior parietal and lateral temporal cortices using surface-based structural connectivity analysis based on diffusion MRI and investigated their hemispheric differences. We then performed the cross-modal comparison with functional connectivity based on resting-state functional MRI (fMRI) and task-related cortical activation based on fMRI using a semantic classification task of single words. Structural connectivity analysis showed that the left AF connecting to Broca's area predominantly projected in the lateral temporal cortex extending from the posterior superior temporal gyrus to the mid part of the superior temporal sulcus and the middle temporal gyrus, whereas the right AF connecting to the right homolog of Broca's area predominantly projected to the inferior parietal cortex extending from the mid part of the supramarginal gyrus to the anterior part of the angular gyrus. The left-lateralized projection regions of the AF in the left temporal cortex had asymmetric functional connectivity with Broca's area, indicating structure-function concordance through the AF. During the language task, left-lateralized cortical activation was observed. Among them, the brain responses in the temporal cortex and Broca's area that were connected through the left-lateralized AF pathway were specifically correlated across subjects. These results suggest that the human left AF, which structurally and functionally connects the mid temporal cortex and Broca's area in asymmetrical fashion, coordinates the cortical activity in these remote cortices during a semantic decision task. The unique feature of the left AF is discussed in the context of the human capacity for language.National Institutes of Health (U.S.) (Grant R01NS069696)National Institutes of Health (U.S.) (Grant P41EB015896)National Institutes of Health (U.S.) (Grant S10ODRR031599)National Institutes of Health (U.S.) (Grant S10RR021110)National Science Foundation (U.S.) (Grant NFS-DMS-1042134)Uehara Memorial Foundation (Fellowship)Society of Nuclear Medicine and Molecular Imaging (Wagner-Torizuka Fellowship)United States. Dept. of Energy (Grant DE-SC0008430
Neural Chinese Word Segmentation with Lexicon and Unlabeled Data via Posterior Regularization
Existing methods for CWS usually rely on a large number of labeled sentences
to train word segmentation models, which are expensive and time-consuming to
annotate. Luckily, the unlabeled data is usually easy to collect and many
high-quality Chinese lexicons are off-the-shelf, both of which can provide
useful information for CWS. In this paper, we propose a neural approach for
Chinese word segmentation which can exploit both lexicon and unlabeled data.
Our approach is based on a variant of posterior regularization algorithm, and
the unlabeled data and lexicon are incorporated into model training as indirect
supervision by regularizing the prediction space of CWS models. Extensive
experiments on multiple benchmark datasets in both in-domain and cross-domain
scenarios validate the effectiveness of our approach.Comment: 7 pages, 11 figures, accepted by the 2019 World Wide Web Conference
(WWW '19
Endometrial Cancer
This chapter in Cancer Concepts: A Guidebook for the Non-Oncologist is about cancers of the endometrium and uterus, including the epidemiology, risk factors, diagnosis, genetic risk, histology, grading and type categorization, management, and prognosis.https://escholarship.umassmed.edu/cancer_concepts/1013/thumbnail.jp
Recommended from our members
Government Access to Phone Calling Activity and Related Records: Legal Authorities
This report summarizes legal authorities regarding access by the government, for either foreign intelligence or law enforcement purposes, to information related to telephone calling patterns or practices. Where pertinent, it also discusses statutory prohibitions against accessing or disclosing such information, along with relevant exceptions to those prohibitions
Recommended from our members
Chronic IL-1β-induced inflammation regulates epithelial-to-mesenchymal transition memory phenotypes via epigenetic modifications in non-small cell lung cancer.
Chronic inflammation facilitates tumor progression. We discovered that a subset of non-small cell lung cancer cells underwent a gradually progressing epithelial-to-mesenchymal (EMT) phenotype following a 21-day exposure to IL-1β, an abundant proinflammatory cytokine in the at-risk for lung cancer pulmonary and the lung tumor microenvironments. Pathway analysis of the gene expression profile and in vitro functional studies revealed that the EMT and EMT-associated phenotypes, including enhanced cell invasion, PD-L1 upregulation, and chemoresistance, were sustained in the absence of continuous IL-1β exposure. We referred to this phenomenon as EMT memory. Utilizing a doxycycline-controlled SLUG expression system, we found that high expression of the transcription factor SLUG was indispensable for the establishment of EMT memory. High SLUG expression in tumors of lung cancer patients was associated with poor survival. Chemical or genetic inhibition of SLUG upregulation prevented EMT following the acute IL-1β exposure but did not reverse EMT memory. Chromatin immunoprecipitation and methylation-specific PCR further revealed a SLUG-mediated temporal regulation of epigenetic modifications, including accumulation of H3K27, H3K9, and DNA methylation, in the CDH1 (E-cadherin) promoter following the chronic IL-1β exposure. Chemical inhibition of DNA methylation not only restored E-cadherin expression in EMT memory, but also primed cells for chemotherapy-induced apoptosis
The design, implementation, and impact of a collaborative responsive professional development (CRPD) model
It is important to design professional development (PD) around teachers’ professional thinking and
needs. Researchers have explored how teachers center on and build upon students’ thinking in
mathematics teaching, but few studies have investigated how to identify and be responsive to
teachers’ ongoing needs while planning and enacting effective PD. As such, this study presents a
Collaborative Responsive Professional Development (CRPD) model that arose from efforts to elicit
and validate teachers’ voices to design PD experiences that were relevant and meaningful to them.
We share the rationale of the model design, its implementation during a two-year PD project, and its
impact on teachers’ instructional practice
The Effects of Fair Value on the Matching of Revenues and Expenses: The Case of Asset Revaluations
Researchers and practitioners have expressed concern that matching has declined over time, as evidenced by a decreasing association between revenues and expenses. They attribute this decline to the shift in financial reporting from a revenue–expense view that emphasizes matching to an asset–liability view that emphasizes the measurement of economic resources that incorporates more fair values. When revenues rise with inflation but the expenses remain tied to historical costs, the two streams tend to diverge. We hypothesize that upwardly revaluing the long-lived fixed operating assets resets the expense stream; thus, changes in revenues will be more closely associated with changes in expenses for firms that revalue than firms that do not upwardly revalue. Based on a sample of United Kingdom firms, we find evidence supporting our expectations, particularly in those higher inflationary industries
- …