48 resultados para Language-based security
Resumo:
Der vorliegende Beitrag untersucht die Frage, in welchem Maße sich Institutionen, die niederdeutsche Kulturszene und individuelle Sprecher des Niederdeutschen moderne Kommunikationstechnologien wie das Internet zunutze machen und ob computervermittelte Kommunikation helfen kann, dem Rückgang des Niederdeutschen Einhalt zu gebieten. Die grundsätzliche Herangehensweise ist eine soziolinguistische, die das Internet als sozialen Handlungsraum versteht, in dem Individuen und Institutionen kommunizieren. Für eine derartige Perspektive stehen weniger das Medium oder das Genre im Mittelpunkt des Interesses als vielmehr das kommunizierende Individuum und die Sprachgemeinschaft, in diesem Fall die virtuelle Sprachgemeinschaft. Based on studies that analyse the potential of computer-mediated communication (cmc) to help fight language shift in lesser-used languages, this paper discusses the situation of Low German in Northern Germany. Over the last three decades, Low German has lost more than half of its active speakers. The article raises the question of whether and, if so, how Low German speakers make use of cmc to stem this tide. Following a sociolinguistic approach focussed on the individual speakers who use the Internet as a space for social interaction, it gives an overview of the discursive field of Low German on the internet and analyses in detail the most popular Low German discussion board. It shows that one of the main obstacles to a more successful use of cmc can be found in speakers' complex attitude toward written Low German. © Franz Steiner Verlag Stuttgart.
Resumo:
This hands-on, practical guide for ESL/EFL teachers and teacher educators outlines, for those who are new to doing action research, what it is and how it works. Straightforward and reader friendly, it introduces the concepts and offers a step-by-step guide to going through an action research process, including illustrations drawn widely from international contexts. Specifically, the text addresses: •action research and how it differs from other forms of research •the steps involved in developing an action research project •ways of developing a research focus •methods of data collection •approaches to data analysis •making sense of action research for further classroom action. Each chapter includes a variety of pedagogical activities: •Pre-Reading questions ask readers to consider what they already know about the topic •Reflection Points invite readers to think about/discuss what they have read •action points ask readers to carry out action-research tasks based on what they have read •Classroom Voices illustrate aspects of action research from teachers internationally •Summary Points provide a synopsis of the main points in the chapter
Resumo:
Basic literacy skills are fundamental building blocks of education, yet for a very large number of adults tasks such as understanding and using everyday items is a challenge. While research, industry, and policy-making is looking at improving access to textual information for low-literacy adults, the literacy-based demands of today's society are continually increasing. Although many community-based organizations offer resources and support to adults with limited literacy skills, current programs have difficulties reaching and retaining those that would benefit most from them. To address these challenges, the National Research Council of Canada is proposing a technological solution to support literacy programs and to assist low-literacy adults in today's information-centric society: ALEX© – Adult Literacy support application for EXperiential learning. ALEX© has been created together with low-literacy adults, following guidelines for inclusive design of mobile assistive tools. It is a mobile language assistant that is designed to be used both in the classroom and in daily life, in order to help low-literacy adults become increasingly literate and independent.
Resumo:
This paper proposes a novel framework of incorporating protein-protein interactions (PPI) ontology knowledge into PPI extraction from biomedical literature in order to address the emerging challenges of deep natural language understanding. It is built upon the existing work on relation extraction using the Hidden Vector State (HVS) model. The HVS model belongs to the category of statistical learning methods. It can be trained directly from un-annotated data in a constrained way whilst at the same time being able to capture the underlying named entity relationships. However, it is difficult to incorporate background knowledge or non-local information into the HVS model. This paper proposes to represent the HVS model as a conditionally trained undirected graphical model in which non-local features derived from PPI ontology through inference would be easily incorporated. The seamless fusion of ontology inference with statistical learning produces a new paradigm to information extraction.
Resumo:
Towards the end of the university stage, students residing in the United Arab Emirates and specialising in subjects other than English are expected- amongst other university requirements- to have acquired adequate communicative competence as well as a repertoire of critical thinking skills. Despite the efforts made within the field of teaching English to EFL university students in the country, the output gained in terms of acquired skills and competencies is still below expectations. The main concerns of the current thesis are, therefore, a) to investigate the factors which inhibit EFL university students’ progress in the areas of acquiring adequate communicative competence as well as critical thinking skills, and b) to propose a course book and pedagogic methods to improve students’ progress in the areas of acquiring adequate communicative competence as well as critical thinking skills. Believing in the essential role literature plays in enhancing critical thinking and promoting communicative competence on the part of EFL learners, the current study introduces a course, designed and implemented by the researcher: LEARN AND GAIN. The proposed course is fiction-based language teaching, adopting the view that literature is a resource rather than an object, thus advocating the use of literature as one of the main resources in foreign/second language acquisition. Investigating whether or not the proposed course was effective in promoting EFL university students’ communicative competence as well as enhancing their critical thinking skills, a study sample taken from the study population was selected. Adopting an experimental design, the research project involved two groups: experimental and control. The experimental group students were exposed to the proposed course whilst the control group students were exposed to a general English language course. To examine treatment effectiveness, the researcher set and administered a pre-post test. Divided into two main parts, communicative critical reading competence and communicative critical writing competence, the pre-post test measured subjects’ communicative critical reading competence and subjects’ communicative critical writing competence. In addition, a pre-post questionnaire was administered and a semi-structured interview was conducted involving the experimental group students, to gain an awareness of students’ attitudes towards learning literary texts in general, and the proposed course in particular. To examine issues of interest and relevance, gender differences: male vs. female, and university major: science vs. non-science, were also examined for enrichment purposes. For the purpose of gathering sufficient data about subjects’ achievements on the pre-post, the following statistical tests were conducted: Mann-Whitney test, and paired data t-test. Based on the statistical findings, the experimental group students’ performance on the communicative critical reading competence pre-post test and the communicative critical writing competence pre-post test was significantly better than their counterparts of the control group students. Speaking of gender differences in relation to language performance on the communicative critical reading competence pre-post test and the communicative critical writing competence pre-post test, no significant differences were cited. Neither did the researcher cite any significant performance differences between science/non-science students on the communicative critical reading competence pre-post test and the communicative critical writing competence pre-post test. As far as the questionnaire’s findings are concerned, the experimental group students’ responses to the post-questionnaire’s items were more positive than those of their responses to the pre-questionnaire’s, thus indicating some positive attitudes towards literature, which students possibly gained throughout the course of implementation. Relating the discussion to the interview’s results, students conveyed their satisfaction with the proposed course, emphasising that promoting English language skills through the use of literary texts was rewarding. In the light of findings and conclusions, a number of recommendations as well as implications have been proposed. The current study aimed to arrive at some appropriate suggestions to a number of enquiries, yet concluding with some areas of enquiry to be explored for further research.
Resumo:
This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based watermarking techniques. In this paper, the authors discuss a watermark-only attack scenario (the attacker has access to a single watermarked content only). In the literature it is an assumption that DM-QIM methods are secure to WOA. However, the authors show that the DM-QIM based embedding method is vulnerable against a guided key guessing attack by exploiting subtle statistical regularities in the feature space embeddings for time series and images. Using a distribution-free algorithm, this paper presents an analysis of the attack and numerical results for multiple examples of image and time series data.
Resumo:
This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based watermarking techniques. In this paper, the authors discuss a watermark-only attack scenario (the attacker has access to a single watermarked content only). In the literature it is an assumption that DM-QIM methods are secure to WOA. However, the authors show that the DM-QIM based embedding method is vulnerable against a guided key guessing attack by exploiting subtle statistical regularities in the feature space embeddings for time series and images. Using a distribution-free algorithm, this paper presents an analysis of the attack and numerical results for multiple examples of image and time series data.
Resumo:
Dynamically adaptive systems (DASs) are intended to monitor the execution environment and then dynamically adapt their behavior in response to changing environmental conditions. The uncertainty of the execution environment is a major motivation for dynamic adaptation; it is impossible to know at development time all of the possible combinations of environmental conditions that will be encountered. To date, the work performed in requirements engineering for a DAS includes requirements monitoring and reasoning about the correctness of adaptations, where the DAS requirements are assumed to exist. This paper introduces a goal-based modeling approach to develop the requirements for a DAS, while explicitly factoring uncertainty into the process and resulting requirements. We introduce a variation of threat modeling to identify sources of uncertainty and demonstrate how the RELAX specification language can be used to specify more flexible requirements within a goal model to handle the uncertainty. © 2009 Springer Berlin Heidelberg.
Resumo:
The recent explosive growth of voice over IP (VoIP) solutions calls for accurate modelling of VoIP traffic. This study presents measurements of ON and OFF periods of VoIP activity from a significantly large database of VoIP call recordings consisting of native speakers speaking in some of the world's most widely spoken languages. The impact of the languages and the varying dynamics of caller interaction on the ON and OFF period statistics are assessed. It is observed that speaker interactions dominate over language dependence which makes monologue-based data unreliable for traffic modelling. The authors derive a semi-Markov model which accurately reproduces the statistics of composite dialogue measurements. © The Institution of Engineering and Technology 2013.
Resumo:
Increasingly users are seen as the weak link in the chain, when it comes to the security of corporate information. Should the users of computer systems act in any inappropriate or insecure manner, then they may put their employers in danger of financial losses, information degradation or litigation, and themselves in danger of dismissal or prosecution. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of inappropriate behaviours, and in so doing, protecting corporate information, is through the formulation and application of a formal ‘acceptable use policy (AUP). Whilst the AUP has attracted some academic interest, it has tended to be prescriptive and overly focussed on the role of the Internet, and there is relatively little empirical material that explicitly addresses the purpose, positioning or content of real acceptable use policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and composition of a sample of authentic policies – taken from the higher education sector – rather than simply making general prescriptions about what they ought to contain. There are two important conclusions to be drawn from this study: (1) the primary role of the AUP appears to be as a mechanism for dealing with unacceptable behaviour, rather than proactively promoting desirable and effective security behaviours, and (2) the wide variation found in the coverage and positioning of the reviewed policies is unlikely to be fostering a coherent approach to security management, across the higher education sector.
Resumo:
Ensuring the security of corporate information, that is increasingly stored, processed and disseminated using information and communications technologies [ICTs], has become an extremely complex and challenging activity. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of security breaches, and in so doing, protecting corporate information, is through the formulation and application of a formal information security policy (InSPy). Whilst a great deal has now been written about the importance and role of the information security policy, and approaches to its formulation and dissemination, there is relatively little empirical material that explicitly addresses the structure or content of security policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and content of authentic information security policies, rather than simply making general prescriptions about what they ought to contain. Having established the structure and key features of the reviewed policies, the paper critically explores the underlying conceptualisation of information security embedded in the policies. There are two important conclusions to be drawn from this study: (1) the wide diversity of disparate policies and standards in use is unlikely to foster a coherent approach to security management; and (2) the range of specific issues explicitly covered in university policies is surprisingly low, and reflects a highly techno-centric view of information security management.
Resumo:
This paper seeks to advance research and practice related to the role of employers in all stages of the assessment process of work-based learning (WBL) within a tripartite relationship of higher education institution (HEI), student and employer. It proposes a research-informed quality enhancement framework to develop good practice in engaging employers as partners in assessment. The Enhancement Framework comprises three dimensions, each of which includes elements and questions generated by the experiences of WBL students, HEI staff and employers. The three dimensions of the Enhancement Framework are: 1. ‘premises of assessment’ encompassing issues of learning, inclusion, standards and value; 2. ‘practice’, encompassing stages of assessment made up of course design, assessment task, responsibilities, support, grading and feedback; 3. ‘communication of assessment’ with the emphasis on role clarity, language and pathways. With its prompt questions, the Enhancement Framework may be used as a capacity-building tool for promoting, sustaining, benchmarking and evaluating productive dialogue and critical reflection about assessment between WBL partners. The paper concludes by emphasising the need for professional development as well as policy and research development, so that assessment in WBL can more closely correspond to the potentially transformative nature of the learning experience.
Resumo:
In this paper, we present syllable-based duration modelling in the context of a prosody model for Standard Yorùbá (SY) text-to-speech (TTS) synthesis applications. Our prosody model is conceptualised around a modular holistic framework. This framework is implemented using the Relational Tree (R-Tree) techniques. An important feature of our R-Tree framework is its flexibility in that it facilitates the independent implementation of the different dimensions of prosody, i.e. duration, intonation, and intensity, using different techniques and their subsequent integration. We applied the Fuzzy Decision Tree (FDT) technique to model the duration dimension. In order to evaluate the effectiveness of FDT in duration modelling, we have also developed a Classification And Regression Tree (CART) based duration model using the same speech data. Each of these models was integrated into our R-Tree based prosody model. We performed both quantitative (i.e. Root Mean Square Error (RMSE) and Correlation (Corr)) and qualitative (i.e. intelligibility and naturalness) evaluations on the two duration models. The results show that CART models the training data more accurately than FDT. The FDT model, however, shows a better ability to extrapolate from the training data since it achieved a better accuracy for the test data set. Our qualitative evaluation results show that our FDT model produces synthesised speech that is perceived to be more natural than our CART model. In addition, we also observed that the expressiveness of FDT is much better than that of CART. That is because the representation in FDT is not restricted to a set of piece-wise or discrete constant approximation. We, therefore, conclude that the FDT approach is a practical approach for duration modelling in SY TTS applications. © 2006 Elsevier Ltd. All rights reserved.
Resumo:
This thesis examines the main aim of teaching pronunciation in second language acquisition in the Syrian context. In other words, it investigates the desirable end point, namely: whether it is native-like accent, or intelligible pronunciation. This thesis also investigates the factors that affect native-like pronunciation and intelligible accent. It also analyses English language teaching methods. The currently used English pronunciation course is examined in detail too. The aim is to find out the learners’ aim of pronunciation, the best teaching method for achieving that aim, and the most appropriate course book that fulfils the aim. In order to find out learners’ aim in pronunciation, a qualitative research is undertaken. The research takes advantage of some aspects of case study. It is also supported by a questionnaire to gather data. The result of this research can be regarded as an attempt to bring the Syrian context to the current trends in the teaching of English pronunciation. The results show that learners are satisfied with intelligible pronunciation. The currently used teaching method (grammar-translation method) may be better replaced by the (communicative approach) which is more appropriate than the currently used method. It is also more effective to change the currently used book to a new one that corresponds to that aim. The current theories and issues in teaching English pronunciation that support learners’ intelligibility will be taken into account in the newly proposed course book.
Resumo:
The behaviour of self adaptive systems can be emergent, which means that the system’s behaviour may be seen as unexpected by its customers and its developers. Therefore, a self-adaptive system needs to garner confidence in its customers and it also needs to resolve any surprise on the part of the developer during testing and maintenance. We believe that these two functions can only be achieved if a self-adaptive system is also capable of self-explanation. We argue a self-adaptive system’s behaviour needs to be explained in terms of satisfaction of its requirements. Since self-adaptive system requirements may themselves be emergent, we propose the use of goal-based requirements models at runtime to offer self-explanation of how a system is meeting its requirements. We demonstrate the analysis of run-time requirements models to yield a self-explanation codified in a domain specific language, and discuss possible future work.