658 research outputs found

    Constrained structure of ancient Chinese poetry facilitates speech content grouping

    No full text
    Ancient Chinese poetry is constituted by structured language that deviates from ordinary language usage [1, 2]; its poetic genres impose unique combinatory constraints on linguistic elements [3]. How does the constrained poetic structure facilitate speech segmentation when common linguistic [4, 5, 6, 7, 8] and statistical cues [5, 9] are unreliable to listeners in poems? We generated artificial Jueju, which arguably has the most constrained structure in ancient Chinese poetry, and presented each poem twice as an isochronous sequence of syllables to native Mandarin speakers while conducting magnetoencephalography (MEG) recording. We found that listeners deployed their prior knowledge of Jueju to build the line structure and to establish the conceptual flow of Jueju. Unprecedentedly, we found a phase precession phenomenon indicating predictive processes of speech segmentation—the neural phase advanced faster after listeners acquired knowledge of incoming speech. The statistical co-occurrence of monosyllabic words in Jueju negatively correlated with speech segmentation, which provides an alternative perspective on how statistical cues facilitate speech segmentation. Our findings suggest that constrained poetic structures serve as a temporal map for listeners to group speech contents and to predict incoming speech signals. Listeners can parse speech streams by using not only grammatical and statistical cues but also their prior knowledge of the form of language

    From cyber-security deception to manipulation and gratification through gamification

    Get PDF
    Over the last two decades the field of cyber-security has experienced numerous changes associated with the evolution of other fields, such as networking, mobile communications, and recently the Internet of Things (IoT) [3]. Changes in mindsets have also been witnessed, a couple of years ago the cyber-security industry only blamed users for their mistakes often depicted as the number one reason behind security breaches. Nowadays, companies are empowering users, modifying their perception of being the weak link, into being the center-piece of the network design [4]. Users are by definition "in control" and therefore a cyber-security asset. Researchers have focused on the gamification of cyber- security elements, helping users to learn and understand the concepts of attacks and threats, allowing them to become the first line of defense to report anoma- lies [5]. However, over the past years numerous infrastructures have suffered from malicious intent, data breaches, and crypto-ransomeware, clearly showing the technical "know-how" of hackers and their ability to bypass any security in place, demonstrating that no infrastructure, software or device can be consid- ered secure. Researchers concentrated on the gamification, learning and teaching theory of cyber-security to end-users in numerous fields through various techniques and scenarios to raise cyber-situational awareness [2][1]. However, they overlooked the users’ ability to gather information on these attacks. In this paper, we argue that there is an endemic issue in the the understanding of hacking practices leading to vulnerable devices, software and architectures. We therefore propose a transparent gamification platform for hackers. The platform is designed with hacker user-interaction and deception in mind enabling researchers to gather data on the techniques and practices of hackers. To this end, we developed a fully extendable gamification architecture allowing researchers to deploy virtualised hosts on the internet. Each virtualised hosts contains a specific vulnerability (i.e. web application, software, etc). Each vulnerability is connected to a game engine, an interaction engine and a scoring engine

    Reading Poetry and Prose: Eye Movements and Acoustic Evidence

    Get PDF
    We examined genre-specific reading strategies for literary texts and hypothesized that text categorization (literary prose vs. poetry) modulates both how readers gather information from a text (eye movements) and how they realize its phonetic surface form (speech production). We recorded eye movements and speech while college students (N = 32) orally read identical texts that we categorized and formatted as either literary prose or poetry. We further varied the text position of critical regions (text-initial vs. text-medial) to compare how identical information is read and articulated with and without context; this allowed us to assess whether genre-specific reading strategies make differential use of identical context information. We observed genre-dependent differences in reading and speaking tempo that reflected several aspects of reading and articulation. Analyses of regions of interests revealed that word-skipping increased particularly while readers progressed through the texts in the prose condition; speech rhythm was more pronounced in the poetry condition irrespective of the text position. Our results characterize strategic poetry and prose reading, indicate that adjustments of reading behavior partly reflect differences in phonetic surface form, and shed light onto the dynamics of genre-specific literary reading. They generally support a theory of literary comprehension that assumes distinct literary processing modes and incorporates text categorization as an initial processing step

    Using Geospatial Data to Monitor and Optimize Face-to-Face Fieldwork

    Get PDF
    Interviewers occupy a key position in face-to-face interviews. Their behavior decisively contributes to the quality of surveys. However, monitoring interviewers in face-to-face surveys is much more challenging than in telephone surveys. It is often up to the interviewer when they conduct the interviews and which addresses they work on first. Nevertheless, homogeneous fieldwork, i.e. that which has a geographically similar processing status, is particularly essential for time- and eventdependent studies such as election studies. Irregular fieldwork combined with geographical differences can have substantial impacts on data quality. Using the example of the German Longitudinal Election Study (GLES), we propose and present a visual strategy by plotting key indicators of fieldwork onto a geographical map to monitor and optimize the fieldwork in face-toface interviews. The geographic visualization of fieldwork can be an additional tool not only for election studies, but also other studies

    A Corpus-Based Approach for the Induction of Ontology Lexica

    Full text link

    Activity and electron donor preference of two denitrifying bacterial strains identified by Raman gas spectroscopy

    Get PDF
    Human activities have greatly increased the input of reactive nitrogen species into the environment and disturbed the balance of the global N cycle. This imbalance may be offset by bacterial denitrification, an important process in maintaining the ecological balance of nitrogen. However, our understanding of the activity of mixotrophic denitrifying bacteria is not complete, as most research has focused on heterotrophic denitrification. The aim of this study was to investigate substrate preferences for two mixotrophic denitrifying bacterial strains, Acidovorax delafieldii and Hydrogenophaga taeniospiralis, under heterotrophic, autotrophic or mixotrophic conditions. This complex analysis was achieved by simultaneous identification and quantification of H(2), O(2), CO(2), (14)N(2), (15)N(2) and (15)N(2)O in course of the denitrification process with help of cavity-enhanced Raman spectroscopic (CERS) multi-gas analysis. To disentangle electron donor preferences for both bacterial strains, microcosm-based incubation experiments under varying substrate conditions were conducted. We found that Acidovorax delafieldii preferentially performed heterotrophic denitrification in the mixotrophic sub-experiments, while Hydrogenophaga taeniospiralis preferred autotrophic denitrification in the mixotrophic incubation. These observations were supported by stoichiometric calculations. The results demonstrate the prowess of advanced Raman multi-gas analysis to study substrate use and electron donor preferences in denitrification, based on the comprehensive quantification of complex microbial gas exchange processes. SUPPLEMENTARY INFORMATION: The online version contains supplementary material available at 10.1007/s00216-021-03541-y

    The in-process control of PVC sheath of a double core cable

    Get PDF
    In this work the possibility of the sheath hermiticity testing by measuring of the cable capacity per unit length variation during spark testing is considered. The research object is 2•0.75 HO3VVH2-F cable. According to the physical modelling it is proved that such defect of sheath as pinhole through the whole thickness of sheath can be registered for the test length 10 cm with test voltage frequencies 1kHz and 10kHz

    Morocco’s sustainable energy transition and the role of financing costs: a participatory electricity system modeling approach

    Get PDF
    Background Morocco is facing major challenges in terms of its future energy supply and demand. Specifically, the country is confronted with rising electricity demand, which in turn will lead to higher fossil fuel import dependency and carbon emissions. Recognizing these challenges, Morocco has set ambitious targets for the deployment of renewable energy sources for electricity generation (RES-E). The realization of these targets will lead to a fundamental transition of the Moroccan electricity sector and requires substantial public and private investment. However, different risks constitute barriers for private RES-E investments and lead to high financing costs, which may eventually discourage capital-intensive RES-E projects. Methodology While the existing literature has mainly focused on assessing the impact of financing costs on the economic competitiveness of individual technologies, the aim of this research is to assess the techno-economic feasibility of different electricity generation portfolios. To recognize the social dimension of the sustainable energy system transition, the electricity scenarios for Morocco have been jointly developed with stakeholders in a scenario building workshop in Rabat, employing a downscaled version of the open source electricity market model renpassG!S, augmented by a weighted average cost of capital (WACC) module. Results In the stakeholder workshop, four different electricity scenarios for Morocco were co-developed. Each of these scenarios describes a consensual and technologically feasible future development path for the Moroccan energy system up to 2050, and comprises conventional fossil fuel-based technologies, as well as RES-E technologies in varying shares. Employing the downscaled renpassG!S model, we find that total system costs, as well as average levelized costs of electricity (LCOE) can be reduced substantially with low-cost financing. Conclusions Our results indicate that de-risking RES-E investments can lead to cost competitiveness of a 100% RES-E-based electricity system with mixed-technology scenarios at marked financing costs. Therefore, we identify specific de-risking recommendations for Moroccan energy policymaking. In addition, we argue that participatory scenario modeling enables a better understanding of the risk perceptions of stakeholders, and can eventually contribute to increasing the political feasibility of sustainable energy transition pathways
    corecore