7 research outputs found

    Refugee-Related Political Violence in Asia and Africa

    Get PDF
    This work focuses on the analysis of one of the most discussed phenomenon of recent years, the reception of refugees. The authors of this work examine refugee-related political violence, a phenomenon that has not been explored in the last twenty years. The aim is to describe the occurrence of this phenomenon in cases from Asia and Africa. The individual incidents are categorised into six categories of political violence. The authors describe the type of political violence involving refugees for the last 15 years. They also analyse which type of violence is most common. At the same time, they devote to the analysis and description of frequency, intensity and persistence. They compare their findings with similar work that was published in 1998, and they explain why and what changes have occurred in the field of refugee-related political violence over the last 15 years

    Scaling Recurrent Neural Network Language Models

    Full text link
    This paper investigates the scaling properties of Recurrent Neural Network Language Models (RNNLMs). We discuss how to train very large RNNs on GPUs and address the questions of how RNNLMs scale with respect to model size, training-set size, computational costs and memory. Our analysis shows that despite being more costly to train, RNNLMs obtain much lower perplexities on standard benchmarks than n-gram models. We train the largest known RNNs and present relative word error rates gains of 18% on an ASR task. We also present the new lowest perplexities on the recently released billion word language modelling benchmark, 1 BLEU point gain on machine translation and a 17% relative hit rate gain in word prediction

    Použití bezpilotních prostředků Islámským státem : Povaha hrozby

    Get PDF
    Proliferace bezpilotních prostředků na bojiště se nevyhýbá ani teroristickým aktérům. V několika posledních letech je vidět značný nárůst incidentů za použití těchto systémů tzv. Islámským státem. Tato práce se pokouší relativně nový fenomén popsat a předložit základní přehled typů možného užití bezpilotních prostředků tzv. Islámským státem v Evropě a tyto typy zhodnotit. Přestože užití UAV při teroristickém útoku pravděpodobně nebude mít samo o sobě strategický dopad, představuje další výzvu pro bezpečnostní složky státu.The proliferation of Unmanned Aerial Vehicles (UAVs) on the battlefield does not exclude terrorist actors. Recently, there is an evident increase in the number of incidents when the so called Islamic State has used UAVs. This article tries to describe this relatively new phenomenon and present an overview of main types of the potential Islamic State’s UAV employment in Europe. Despite the fact, that the UAV use by terrorist actors will probably not have strategic impact by itself, it constitutes a new challenge for state security agencies

    Combined analysis of 08/09 and 2010 experiments

    Get PDF
    At a meeting held in Canberra in July 2010, it was agreed to undertake a study to investigate whether a combined analysis of the 08/09 series of LMA experiments and the single 2010 experiment was feasible. The current protocol for classification of lines relies on obtaining information from two valid LMA screening experiments. The analysis of the 08/09 series of experiments represented the first attempt to undertake a combined analysis of LMA screening experiments. It is well known (see for example, Mrode [1995]) that the optimum methodology to evaluate genetic material for eventual selection is to use a multivariate or multi-trait analysis. This multi-trait analysis takes account of the relationships which exist between the different traits. In our example, each experiment is considered as a trait and so for these data we have three traits, one for each experiment

    Unsupervised language model adaptation for mandarin broadcast conversation transcription

    No full text
    1. Introduction This paper investigates language model adaptation in a speechrecognition setting with a mix of data of two mismatching styles
    corecore