944 resultados para crimes and sentences
Resumo:
How speech is separated perceptually from other speech remains poorly understood. In a series of experiments, perceptual organisation was probed by presenting three-formant (F1+F2+F3) analogues of target sentences dichotically, together with a competitor for F2 (F2C), or for F2+F3, which listeners must reject to optimise recognition. To control for energetic masking, the competitor was always presented in the opposite ear to the corresponding target formant(s). Sine-wave speech was used initially, and different versions of F2C were derived from F2 using separate manipulations of its amplitude and frequency contours. F2Cs with time-varying frequency contours were highly effective competitors, whatever their amplitude characteristics, whereas constant-frequency F2Cs were ineffective. Subsequent studies used synthetic-formant speech to explore the effects of manipulating the rate and depth of formant-frequency change in the competitor. Competitor efficacy was not tuned to the rate of formant-frequency variation in the target sentences; rather, the reduction in intelligibility increased with competitor rate relative to the rate for the target sentences. Therefore, differences in speech rate may not be a useful cue for separating the speech of concurrent talkers. Effects of competitors whose depth of formant-frequency variation was scaled by a range of factors were explored using competitors derived either by inverting the frequency contour of F2 about its geometric mean (plausibly speech-like pattern) or by using a regular and arbitrary frequency contour (triangle wave, not plausibly speech-like) matched to the average rate and depth of variation for the inverted F2C. Competitor efficacy depended on the overall depth of frequency variation, not depth relative to that for the other formants. Furthermore, the triangle-wave competitors were as effective as their more speech-like counterparts. Overall, the results suggest that formant-frequency variation is critical for the across-frequency grouping of formants but that this grouping does not depend on speech-specific constraints. © Springer Science+Business Media New York 2013.
Resumo:
False friends are pairs of words in two languages that are perceived as similar but have different meanings. We present an improved algorithm for acquiring false friends from sentence-level aligned parallel corpus based on statistical observations of words occurrences and co-occurrences in the parallel sentences. The results are compared with an entirely semantic measure for cross-lingual similarity between words based on using the Web as a corpus through analyzing the words’ local contexts extracted from the text snippets returned by searching in Google. The statistical and semantic measures are further combined into an improved algorithm for identification of false friends that achieves almost twice better results than previously known algorithms. The evaluation is performed for identifying cognates between Bulgarian and Russian but the proposed methods could be adopted for other language pairs for which parallel corpora and bilingual glossaries are available.
Resumo:
An important aspect of speech perception is the ability to group or select formants using cues in the acoustic source characteristics-for example, fundamental frequency (F0) differences between formants promote their segregation. This study explored the role of more radical differences in source characteristics. Three-formant (F1+F2+F3) synthetic speech analogues were derived from natural sentences. In Experiment 1, F1+F3 were generated by passing a harmonic glottal source (F0 = 140 Hz) through second-order resonators (H1+H3); in Experiment 2, F1+F3 were tonal (sine-wave) analogues (T1+T3). F2 could take either form (H2 or T2). In some conditions, the target formants were presented alone, either monaurally or dichotically (left ear = F1+F3; right ear = F2). In others, they were accompanied by a competitor for F2 (F1+F2C+F3; F2), which listeners must reject to optimize recognition. Competitors (H2C or T2C) were created using the time-reversed frequency and amplitude contours of F2. Dichotic presentation of F2 and F2C ensured that the impact of the competitor arose primarily through informational masking. In the absence of F2C, the effect of a source mismatch between F1+F3 and F2 was relatively modest. When F2C was present, intelligibility was lowest when F2 was tonal and F2C was harmonic, irrespective of which type matched F1+F3. This finding suggests that source type and context, rather than similarity, govern the phonetic contribution of a formant. It is proposed that wideband harmonic analogues are more effective informational maskers than narrowband tonal analogues, and so become dominant in across-frequency integration of phonetic information when placed in competition.
Resumo:
Purpose: Technological devices such as smartphones and tablets are widely available and increasingly used as visual aids. This study evaluated the use of a novel app for tablets (MD_evReader) developed as a reading aid for individuals with a central field loss resulting from macular degeneration. The MD_evReader app scrolls text as single lines (similar to a news ticker) and is intended to enhance reading performance using the eccentric viewing technique by both reducing the demands on the eye movement system and minimising the deleterious effects of perceptual crowding. Reading performance with scrolling text was compared with reading static sentences, also presented on a tablet computer. Methods: Twenty-six people with low vision (diagnosis of macular degeneration) read static or dynamic text (scrolled from right to left), presented as a single line at high contrast on a tablet device. Reading error rates and comprehension were recorded for both text formats, and the participant’s subjective experience of reading with the app was assessed using a simple questionnaire. Results: The average reading speed for static and dynamic text was not significantly different and equal to or greater than 85 words per minute. The comprehension scores for both text formats were also similar, equal to approximately 95% correct. However, reading error rates were significantly (p=0.02) less for dynamic text than for static text. The participants’ questionnaire ratings of their reading experience with the MD_evReader were highly positive and indicated a preference for reading with this app compared with their usual method. Conclusions: Our data show that reading performance with scrolling text is at least equal to that achieved with static text and in some respects (reading error rate) is better than static text. Bespoke apps informed by an understanding of the underlying sensorimotor processes involved in a cognitive task such as reading have excellent potential as aids for people with visual impairments.
Resumo:
The purpose of this study was to investigate the effects of direct instruction in story grammar on the reading and writing achievement of second graders. Three aspects of story grammar (character, setting, and plot) were taught with direct instruction using the concept development technique of deep processing. Deep processing which included (a) visualization (the drawing of pictures), (b) verbalization (the writing of sentences), (c) the attachment of physical sensations, and (d) the attachment of emotions to concepts was used to help students make mental connections necessary for recall and application of character, setting, and plot when constructing meaning in reading and writing.^ Four existing classrooms consisting of seventy-seven second-grade students were randomly assigned to two treatments, experimental and comparison. Both groups were pretested and posttested for reading achievement using the Gates-MacGinitie Reading Tests. Pretest and posttest writing samples were collected and evaluated. Writing achievement was measured using (a) a primary trait scoring scale (an adapted version of the Glazer Narrative Composition Scale) and (b) an holistic scoring scale by R. J. Pritchard. ANCOVAs were performed on the posttests adjusted for the pretests to determine whether or not the methods differed. There was no significant improvement in reading after the eleven-day experimental period for either group; nor did the two groups differ. There was significant improvement in writing for the experimental group over the comparison group. Pretreatment and posttreatment interviews were selectively collected to evaluate qualitatively if the students were able to identify and manipulate elements of story grammar and to determine patterns in metacognitive processing. Interviews provided evidence that most students in the experimental group gained while most students in the comparison group did not gain in their ability to manipulate, with understanding, the concepts of character, setting, and plot. ^
Resumo:
The Internet has become an integral part of our nation’s critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a ‘distance metric’. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.
Resumo:
The purpose of this research was to explore the differences in factors associated with girls' status and criminal arrests. This study used data from six juvenile justice programs in multiple states, which was derived from the Juvenile Assessment and Intervention System (JAIS). The sample of 908 adolescent girls (ages 13-19) was ethnically and racially diverse (41% African American, 32% white, 12% Hispanic, 11% Native American and 4% Other). A structural equation model (SEM) was analyzed which tested the potential effects of adolescent substance use, truancy, suicidal ideation/attempt, self-harm, peer legal trouble, parental criminal history and parental and non-parental abuse on type of offense (status and criminal) and whether any of these relationships varied as a function of race/ethnicity. ^ Complex relationships emerged regarding both status and more serious criminal arrests. One of the most important findings was that distinct and different patterns of factors were associated with status arrests compared to criminal arrests. For example, truancy and parental abuse were directly associated with status offenses, whereas parental criminal history was directly related to criminal arrests. However, both status and criminal arrests shared common associations, including substance use, which signifies that certain variables are influential regarding both non-criminal and more serious crimes. In addition, significant meditating influences were observed which help to explain some underlying mechanisms involved in girls' arrest patterns. Finally, race/ethnicity moderated a key relationship, which has serious implications for treatment. ^ In conclusion, the present study is an important contribution to research regarding girls' delinquency in that it overcomes limitations in the existing literature in four primary areas: (1) it utilizes a large, multi-state, ethnically and racially diverse sample of justice system-involved girls, (2) it examines numerous co-occurring factors influencing delinquency from multiple domains (family, school, peers, etc.) simultaneously, (3) it formally examines race/ethnicity as a moderator of these multivariate relationships, and (4) it looks at status and criminal arrests independently in order to highlight possible differences in the patterning of risk factors associated with each. These findings have important implications for prevention, treatment and interventions with girls involved in the juvenile justice system.^
Resumo:
With the explosive growth of the volume and complexity of document data (e.g., news, blogs, web pages), it has become a necessity to semantically understand documents and deliver meaningful information to users. Areas dealing with these problems are crossing data mining, information retrieval, and machine learning. For example, document clustering and summarization are two fundamental techniques for understanding document data and have attracted much attention in recent years. Given a collection of documents, document clustering aims to partition them into different groups to provide efficient document browsing and navigation mechanisms. One unrevealed area in document clustering is that how to generate meaningful interpretation for the each document cluster resulted from the clustering process. Document summarization is another effective technique for document understanding, which generates a summary by selecting sentences that deliver the major or topic-relevant information in the original documents. How to improve the automatic summarization performance and apply it to newly emerging problems are two valuable research directions. To assist people to capture the semantics of documents effectively and efficiently, the dissertation focuses on developing effective data mining and machine learning algorithms and systems for (1) integrating document clustering and summarization to obtain meaningful document clusters with summarized interpretation, (2) improving document summarization performance and building document understanding systems to solve real-world applications, and (3) summarizing the differences and evolution of multiple document sources.
Resumo:
Glass is a common form of trace evidence found at many scenes of crimes in the form of small fragments. These glass fragments can transfer to surrounding objects and/or persons and may provide forensic investigators valuable information to link a suspect to the scene of a crime. Since the elemental composition of different glass sources can be very similar, a highly discriminating technique is required to distinguish between fragments that have originated from different sources. ^ The research presented here demonstrates that Laser Induced Breakdown Spectroscopy (LIBS) is a viable analytical technique for the association and discrimination of glass fragments. The first part of this research describes the optimization of the LIBS experiments including the use of different laser wavelengths to investigate laser-material interaction. The use of a 266 nm excitation laser provided the best analytical figures of merit with minimal damage to the sample. The resulting analytical figures of merit are presented. The second part of this research evaluated the sensitivity of LIBS to associate or discriminate float glass samples originating from the same manufacturing plants and produced at approximately the same time period. Two different sample sets were analyzed ranging in manufacturing dates from days to years apart. Eighteen (18) atomic emission lines corresponding to the elements Sr, K, Fe, Ca, Al, Ba, Na, Mg and Ti, were chosen because of their detection above the method detection limits and for presenting differences between the samples. Ten elemental ratios producing the most discrimination were selected for each set. When all the ratios are combined in a comparison, 99% of the possible pairs were discriminated using the optimized LIBS method generating typical analytical precisions of ∼5% RSD. ^ The final study consisted of the development of a new approach for the use of LIBS as a quantitative analysis of ultra-low volume solution analysis using aerosols and microdrops. Laser induced breakdown spectroscopy demonstrated to be an effective technique for the analysis of as low as 90 pL for microdrop LIBS with 1 pg absolute LOD and 20 µL for aerosol LIBS with an absolute LOD of ∼100 fg.^
Resumo:
Debate concerning bilingual education effectiveness may focus around the definition of academic language. Two aspects of such-vocabulary and grammar-were examined in 4th and 8th grade textbooks. Results showed substantial increases in the number of abstract words and complex sentences, suggesting more daunting language demands for older non-English-speaking students.
Resumo:
Knowledge of crimes that have occurred in hotels has been scares. The authors explore the nature and causes of hotel crimes in a U.S. metropolitan area. Levels of crimes were directly related to size of the hotel, target market of business travelers, access to public transportation, and an unsafe image of the environment surrounding the hotel. Crime prevention programs based on the findings can be developed to protect the safety of guests and property.
Resumo:
Juvenile crime is a social problem of increasing concern to many citizens in the United States. In 2000, there were an estimated 2.4 million juvenile arrests for a variety of crimes ranging from misdemeanors to violent felony offenses. African American males are disproportionately represented among juvenile offenders in the United States. In 2000, black youth were approximately 16% of the U.S. population between the ages of 10–17; however, they accounted for 42% of juvenile arrests for violent crime. ^ This study explored putative factors associated with juvenile offending among a sample of African American adolescent males. The independent variables in this study were academic achievement, religiosity, parenting styles and discrimination. The dependent variables were delinquent behavior and arrest. The data used in this study were from a larger NIDA funded longitudinal study that included approximately 425 African American youths. The data collection method involved structured interviews and questionnaires. The participants for the original study were selected via random sampling from all students attending middle school in Miami-Dade County. The study examined the hypotheses that African American males retrospectively reporting (a) high academic achievement, (b) high religiosity, (c) authoritarian parenting and (d) low perceptions of discrimination are less likely to be involved in delinquent behavior and are also less likely to be arrested. ^ Results indicated that among African American adolescent males, delinquent behavior had a significant relationship (p < .05) with academic achievement, perceived discrimination and the interaction between perceived discrimination and experienced discrimination. Arrest was significantly related to academic achievement (p < .001), religious perception (p < .05), and church attendance (p < 05). Neither dependent variable was significantly related to parenting styles. ^ The findings indicated that experimental studies are needed to clarify cause and effect relationship among the variables associated with juvenile offending among African American males, which may differ from those associated with juvenile offending among other groups. ^
Resumo:
Research shows that plagiarism is a problem not only for English language learners but also for students whose first language is English. With the Internet and ease of copying and pasting information into a word document, plagiarism in on the rise (Maslen, 2003). Oftentimes, students are not aware they are doing something wrong. American students come into college with the cultural conditioning of knowing (perhaps not fully grasping) American academic standards (Gu & Brooks, 2007). International students have the additional disadvantage of not knowing the conventions, traditions, and values held in academic discourse (Gu & Brooks, 2007). Within American academic circles, plagiarism is considered “one of the worst crimes” a student can commit (Wheeler, 2008). However, outside the United States, plagiarism is culturally acceptable; in fact a moral transgression would be to not copy and paste the words of an expert (Wheeler, 2008). Most of the students in English for Academic Purposes (EAP) at Miami-Dade College are planning on continuing their education once they finish the EAP program so it is essential that they are exposed to the issue of plagiarism. A number of faculty who teach in subject areas have complained that incoming students do not have the skills needed to succeed; these skills include how to cite sources and reference material. As a result of this, the focus of this action research project was on incorporating and explaining plagiarism and providing a number of writing opportunities throughout the semester.
Resumo:
The Internet has become an integral part of our nation's critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a 'distance metric'. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.