85 research outputs found

    Context, content, and the occasional costs of implicature computation

    Get PDF
    The computation of scalar implicatures is sometimes costly relative to basic meanings. Among the costly computations are those that involve strengthening “some” to “not all” and strengthening inclusive disjunction to exclusive disjunction. The opposite is true for some other cases of strengthening, where the strengthened meaning is less costly than its corresponding basic meaning. These include conjunctive strengthenings of disjunctive sentences (e.g., free-choice inferences) and exactly-readings of numerals. Assuming that these are indeed all instances of strengthening via implicature/exhaustification, the puzzle is to explain why strengthening sometimes increases costs while at other times it decreases costs. I develop a theory of processing costs that makes no reference to the strengthening mechanism or to other aspects of the derivation of the sentence’s form/meaning. Instead, costs are determined by domain-general considerations of the grammar’s output, and in particular by aspects of the meanings of ambiguous sentences and particular ways they update the context. Specifically, I propose that when the hearer has to disambiguate between a sentence’s basic and strengthened meaning, the processing cost of any particular choice is a function of (i) a measure of the semantic complexity of the chosen meaning and (ii) a measure of how much relevant uncertainty it leaves behind in the context. I measure semantic complexity with Boolean Complexity in the propositional case and with semantic automata in the quantificational case, both of which give a domain-general measure of the minimal representational complexity needed to express the given meaning. I measure relevant uncertainty with the information-theoretic notion of entropy; this domain-general measure formalizes how ‘far’ the meaning is from giving a complete answer to the question under discussion, and hence gives an indication of how much representational complexity is yet to come. Processing costs thus follow from domain-general considerations of current and anticipated representational complexity. The results might also speak to functional motivations for having strengthening mechanisms in the first place. Specifically, exhaustification allows language users to use simpler forms than would be available without it to bot

    Effect of Altitudinal and Seasonal Factors on Diatomological Mapping of Waterbodies: Implication in Drowning Investigations

    Get PDF
    Diatoms are an essential part of forensic investigation in drowning cases. They are used to differentiate between ante-mortem and post-mortem drowning and to ascertain the site of drowning. However, to do so it is imperative to perform the diatomological mapping of water sources in different regions. The issue of localizing a drowning site may be resolved with the help of diatomological monitoring and mapping of the water sources, which generates substantial references for meeting the ‘criterion of concordance’. The present study has generated a database of diatom diversity in relation to different seasons and altitudes. Water sampling was made from low, mid and high altitudes during summer and autumn seasons. Important information was found after a microscopic examination of diatoms in water samples from different water bodies at different geographical altitudes. Twenty-seven diatom genera have been observed in the water samples from the selected localities. The findings of the current study have exposed the significant effect of seasonal changes and varied altitudes on occurrence of diatoms. A variety of commonly occurring site restricted diatoms were identified in the water samples. This useful information can be significant while investigating drowning cases from this particular region when the drowning site is either questioned or unknown

    Immobilization and stability studies of a lipase from thermophilic Bacillus sp: The effect of process parameters on immobilization of enzyme

    Get PDF
    A thermostable lipase was partially purified from the culture supernatant of a thermophilic Bacillus sp. The enzyme is optimally active at 60\ub0C and pH 8.0. The enzyme showed enhancement in activity in presence of benzene or hexane (30% v/v each). The activity (assayed by determining the release of pNP from pNP laurate) was stimulated up to 60% of these solvents in enzyme reaction mixture. The catalytic properties of this thermostable enzyme can be further improved via the use of different immobilization techniques and reaction conditions. Enzyme was immobilized on different solid supports and their enzyme activity and stability was compared. The enzyme was adsorbed on silica and HP-20 beads followed by cross-linking with gluteraldehyde on HP-20, which improved the thermostability of enzyme. The optimum pH (pH 8.5) was nearly same for aqueous and immobilized enzyme while optimum temperature was nearly 5\ub0C higher in case of immobilized enzyme. The immobilized/cross linked enzyme was more thermostable at 70 and 80\ub0C in comparison to aqueous and surface adsorbed lipase on silica and HP-20. The optimum temperature for esterification reactions was determined to be 60- 65\ub0C . Half-life of immobilized lipase was nearly 2.5 x higher than the aqueous enzyme at 70\ub0C . Esterification of methanol and oleic acid to methyl oleate by immobilized enzyme was studied in detail

    Molecular Depiction of Thirteen Indian Toxic Plants with ITS Markers

    Get PDF
    Plant identification is an overwhelming task due to different biological attributes and great diversity in plant species. In the absence of physical markers, molecular techniques have become useful for the identification of species of origin of medicinal plant seeds, pastes, and formulations of suspected plants. The ITS region of nuclear rRNA was amplified from thirteen different toxic plant species by using universal primer ITS 1 & 4. Nucleotide sequences of all selected plants were submitted in NCBI and accession numbers were acquired. The results of this study give accurate identification of thirteen plant species and proved the ITS region of 18s-26s nuclear ribosome to be an important tool for phylogenetic analysis and species identification of plants. The sequence was aligned with top matched reference sequence and presented in Clustal Omega software for making a phylogenetic neighbour tree. The significance of these findings is paramount in forensic toxicology scenarios especially when fragmentary plant material is found in the stomach/intestine and its morphological identification becomes impossible. In these circumstances, the PCR based molecular technique surely plays a significant role in solving complicated forensic cases

    Toward a Human-Centered AI-assisted Colonoscopy System

    Full text link
    AI-assisted colonoscopy has received lots of attention in the last decade. Several randomised clinical trials in the previous two years showed exciting results of the improving detection rate of polyps. However, current commercial AI-assisted colonoscopy systems focus on providing visual assistance for detecting polyps during colonoscopy. There is a lack of understanding of the needs of gastroenterologists and the usability issues of these systems. This paper aims to introduce the recent development and deployment of commercial AI-assisted colonoscopy systems to the HCI community, identify gaps between the expectation of the clinicians and the capabilities of the commercial systems, and highlight some unique challenges in Australia.Comment: 9 page

    FTIR Analysis of Some Pills of Forensic Interest

    Get PDF
    ABSTRACT This paper deals with the use of modern Fourier Transform Infrared (FTIR) spectroscopy with quick and easy Diamond Attenuated Total Reflectance (ATR) technique for generating a spectral library of some benzodiazepines of forensic interest. These types of drugs can be seized as bulk street drugs as well as traces found at the scene of crime. There can be legal queries regarding identification of these drugs which a forensic expert has to answer. In these cases, the standard reference database is required for comparison. The modern FTIR systems with diamond ATR proves to be a rapid, sensitive and non-destructive analysis of samples with very little effort. This spectral library can be used as a reference library when an unknown sample is suspected of being benzodiazepine

    Malignant Biliary Obstruction: Evidence for Best Practice

    Get PDF
    What should be done next? Is the stricture benign? Is it resectable? Should I place a stent? Which one? These are some of the questions one ponders when dealing with biliary strictures. In resectable cases, ongoing questions remain as to whether the biliary tree should be drained prior to surgery. In palliative cases, the relief of obstruction remains the main goal. Options for palliative therapy include surgical bypass, percutaneous drainage, and stenting or endoscopic stenting (transpapillary or via an endoscopic ultrasound approach). This review gathers scientific foundations behind these interventions. For operable cases, preoperative biliary drainage should not be performed unless there is evidence of cholangitis, there is delay in surgical intervention, or intense jaundice is present. For inoperable cases, transpapillary stenting after sphincterotomy is preferable over percutaneous drainage. The use of plastic stents (PS) has no benefit over Self-Expandable Metallic Stents (SEMS). In case transpapillary drainage is not possible, Endoscopic Ultrasonography- (EUS-) guided drainage is still an option over percutaneous means. There is no significant difference between the types of SEMS and its indication should be individualized

    Security source code analysis of applications in Android OS

    Get PDF
    It is a known fact that Android mobile phones' security has room for improvement. Many malicious app developers have targeted android mobile phones, mainly because android as an open operating system provides great flexibility to developers and there are many android phones which do not have the latest security updates. With the update of marshmallow in android, applications request permission only during runtime, but not all users have this update. This is important because user permission is required to perform certain actions. The permissions may be irrelevant to the features provided by an application. The purpose of this research is to investigate the use and security risk of seeming irrelevant permissions in applications available from Google store. Two different applications which seem to ask irrelevant permissions during installation were selected from Google store. To test these applications, static analysis, dynamic analysis and reverse engineering tools were used. Findings show potentially malicious behavior, demonstrating that downloading apps from Google play store do not guarantee security

    Few-Shot Anomaly Detection for Polyp Frames from Colonoscopy

    Full text link
    Anomaly detection methods generally target the learning of a normal image distribution (i.e., inliers showing healthy cases) and during testing, samples relatively far from the learned distribution are classified as anomalies (i.e., outliers showing disease cases). These approaches tend to be sensitive to outliers that lie relatively close to inliers (e.g., a colonoscopy image with a small polyp). In this paper, we address the inappropriate sensitivity to outliers by also learning from inliers. We propose a new few-shot anomaly detection method based on an encoder trained to maximise the mutual information between feature embeddings and normal images, followed by a few-shot score inference network, trained with a large set of inliers and a substantially smaller set of outliers. We evaluate our proposed method on the clinical problem of detecting frames containing polyps from colonoscopy video sequences, where the training set has 13350 normal images (i.e., without polyps) and less than 100 abnormal images (i.e., with polyps). The results of our proposed model on this data set reveal a state-of-the-art detection result, while the performance based on different number of anomaly samples is relatively stable after approximately 40 abnormal training images.Comment: Accept at MICCAI 202
    corecore