985 resultados para names


Relevância:

10.00% 10.00%

Publicador:

Resumo:

As the virtual world grows more complex, finding a standard way for storing data becomes increasingly important. Ideally, each data item would be brought into the computer system only once. References for data items need to be cryptographically verifiable, so the data can maintain its identity while being passed around. This way there will be only one copy of the users family photo album, while the user can use multiple tools to show or manipulate the album. Copies of users data could be stored on some of his family members computer, some of his computers, but also at some online services which he uses. When all actors operate over one replicated copy of the data, the system automatically avoids a single point of failure. Thus the data will not disappear with one computer breaking, or one service provider going out of business. One shared copy also makes it possible to delete a piece of data from all systems at once, on users request. In our research we tried to find a model that would make data manageable to users, and make it possible to have the same data stored at various locations. We studied three systems, Persona, Freenet, and GNUnet, that suggest different models for protecting user data. The main application areas of the systems studied include securing online social networks, providing anonymous web, and preventing censorship in file-sharing. Each of the systems studied store user data on machines belonging to third parties. The systems differ in measures they take to protect their users from data loss, forged information, censorship, and being monitored. All of the systems use cryptography to secure names used for the content, and to protect the data from outsiders. Based on the gained knowledge, we built a prototype platform called Peerscape, which stores user data in a synchronized, protected database. Data items themselves are protected with cryptography against forgery, but not encrypted as the focus has been disseminating the data directly among family and friends instead of letting third parties store the information. We turned the synchronizing database into peer-to-peer web by revealing its contents through an integrated http server. The REST-like http API supports development of applications in javascript. To evaluate the platform’s suitability for application development we wrote some simple applications, including a public chat room, bittorrent site, and a flower growing game. During our early tests we came to the conclusion that using the platform for simple applications works well. As web standards develop further, writing applications for the platform should become easier. Any system this complex will have its problems, and we are not expecting our platform to replace the existing web, but are fairly impressed with the results and consider our work important from the perspective of managing user data.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As the virtual world grows more complex, finding a standard way for storing data becomes increasingly important. Ideally, each data item would be brought into the computer system only once. References for data items need to be cryptographically verifiable, so the data can maintain its identity while being passed around. This way there will be only one copy of the users family photo album, while the user can use multiple tools to show or manipulate the album. Copies of users data could be stored on some of his family members computer, some of his computers, but also at some online services which he uses. When all actors operate over one replicated copy of the data, the system automatically avoids a single point of failure. Thus the data will not disappear with one computer breaking, or one service provider going out of business. One shared copy also makes it possible to delete a piece of data from all systems at once, on users request. In our research we tried to find a model that would make data manageable to users, and make it possible to have the same data stored at various locations. We studied three systems, Persona, Freenet, and GNUnet, that suggest different models for protecting user data. The main application areas of the systems studied include securing online social networks, providing anonymous web, and preventing censorship in file-sharing. Each of the systems studied store user data on machines belonging to third parties. The systems differ in measures they take to protect their users from data loss, forged information, censorship, and being monitored. All of the systems use cryptography to secure names used for the content, and to protect the data from outsiders. Based on the gained knowledge, we built a prototype platform called Peerscape, which stores user data in a synchronized, protected database. Data items themselves are protected with cryptography against forgery, but not encrypted as the focus has been disseminating the data directly among family and friends instead of letting third parties store the information. We turned the synchronizing database into peer-to-peer web by revealing its contents through an integrated http server. The REST-like http API supports development of applications in javascript. To evaluate the platform s suitability for application development we wrote some simple applications, including a public chat room, bittorrent site, and a flower growing game. During our early tests we came to the conclusion that using the platform for simple applications works well. As web standards develop further, writing applications for the platform should become easier. Any system this complex will have its problems, and we are not expecting our platform to replace the existing web, but are fairly impressed with the results and consider our work important from the perspective of managing user data.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This dissertation is an onomastic study of variation in women s name phrases in official documents in Finland during the period 1780−1930. The aim is to discuss from a socio-onomastic perspective both the changeover from patronymics to inherited family names and the use of surnames after marriage (i.e. whether women adopted their husbands family names or retained their maiden names), before new laws in this area entered into force in Finland in the early 20th century. In 1920, a law on family names that required fixed names put an end to the use of the patronymic as a person s only surname. After 1929, it was no longer possible for a married woman to retain her maiden name. Methodologically, to explain this development from a socio-onomastic perspective, I have based my study on a syntactic-semantic analysis of the actual name phrases. To be able to demonstrate the extensive material, I have elaborated a scheme to divide the 115 different types of name phrases into 13 main categories. The analysis of the material for Helsinki is based on frequency calculations of the different types of name phrases every thirtieth year, as well as on describing variation in the structure and semantic content of the name phrases, e.g. social variation in the use of titles and epithets. In addition to this, by applying a biographic-genealogical method, I have conducted two case studies of the usage of women s name phrases in the two chosen families. The study is based on parish registers from the period 1780−1929, estate inventory documents from the period 1780−1928, registration forms for liberty of trade from the period 1880−1908, family announcements on newspapers from the period 1829−1888, gravestones from the period 1796−1929 and diaries from the periods 1799−1801 and 1818−1820 providing a corpus of 5 950 name phrases. The syntactic-semantic analysis has revealed the overall picture of various ways of denoting women in official documents. In Helsinki, towards the end of the 19th century, the use of inherited family names seems to be almost fully developed in official contexts. At the late 19th century, a patronymic still appears as the only surname of some working-class women whereas in the early 20th century patronymics were only entered in the parish register as a kind of middle name. In the beginning of the 19th century, most married women were still registered under their maiden names, with a few exceptions among the bourgeoisie and upper class. The comparative analysis of name phrases in diaries, however, indicates that the use of the husband s family name by married women was a much earlier phenomenon in private contexts than in official documents. Keywords: socio-onomastics, syntactic-semantic analysis, name phrase, patronymic, maiden name, husband s family name

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tsunami waves of the Sumatra-Andaman earthquake on 26 December 2004 claimed approximately 230 000 lives and started the biggest identification operation in Interpol's history. The aim of this study was to resolve methods of the identification and results received. The viewpoint is mainly that of forensic odontology, but also includes other means of identification and results of the medico-legal examination performed in Finland. Of the 5395 victims in Thailand, approximately 2 400 were foreigners from 36 nations including 177 Finnish nationals. Additionally, a Finnish woman perished in Sri Lanka and a severely injured man after the evacuation in a hospital. The final numbers of missing persons and dead bodies registered in the Information Management Centre in Phuket,Thailand, were 3 574 ante-mortem (AM) and 3 681 post-mortem (PM) files. The number of identifications by December 2006 was 3 271 or 89% of the victims registered. Of Finnish victims, 172 have been identified in Thailand and 163 repatriated to Finland. One adult and four children are still missing. For AM data, a list of Finnish missing persons including 178 names was published on 30 December 2004. By February 2005 all useful dental AM data were available. Five persons on the list living in Finland lacked records. Based on the AM database, for the children under age 18 years (n=60) dental identification could be established for 12 (20%). The estimated number for adults (n=112) was 96 (86%). The final identification rate, based on PM examinations in Finland, was 14 (25%) for children (n= 56) and 98 (90%) for adults (n= 109). The number of Finnish victims identified by dental methods, 112 (68%), was high compared to all examined in Thailand (43%). DNA was applied for 26 Finnish children and for 6 adults, fingerprints for 24 and 7, respectively. In 12 cases two methods were applied. Every victim (n=165) underwent in Finland a medico-legal investigation including an autopsy with sampling specimens for DNA, the toxicological and histological investigation. Digital radiographs and computed tomography were taken of the whole body to verify autopsy findings and bring out changes caused by trauma, autolysis, and sampling for DNA in Thailand. Data for identification purposes were also noted. Submersion was the cause of death for 101 of 109 adults (92.7%), and trauma for 8 (7.3%). Injuries were 33 times contributing factors for submersion and 3 times for trauma-based death. Submersion was the cause of death for 51 (92.7%) children and trauma for 4 (7.3%). Injuries were in 3 cases contributing factors in submersion and once in trauma-based death. The success of the dental identification of Finnish victims is mainly based on careful registration of dental records, and on an education program from 1999 in forensic odontology.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this master´s thesis is to analyze how NATO Secretary General Anders Fogh Rasmussen is trying to justify the existence of the military alliance through the use of security arguments. I am puzzled by the question: why does NATO still exist – what is NATO’s raison d'être. The New Strategic Concept (2010) forms the base for his argumentation. This thesis focuses on the security argumentation of NATO which is examined by analyzing the speeches the Secretary General. The theoretical framework of this study is based on constructivist approach to international security examining the linguistic process of securitization. Issues become securitized after Anders Fogh Rasmussen names them as threats. This thesis focuses on the securitization process relating to NATO and analyses what issues Rasmussen raises to the security agenda. Research data consists of the speeches by Anders Fogh Rasmussen. They are analyzed through J.L. Austin’s speech act taxonomy and Chaïm Perelman’s argumentation theories. The thesis will concentrate on the formulation and articulation of these threats which are considered and coined as “new threats” in contemporary international relations. I am conducting this research through the use of securitization theory. This study illustrates that the threats are constructed by NATO’s member-states in unison, but the resolutions are sounded through Rasmussen’s official speeches and transcripts. . Based on the analysis it can be concluded that Rasmussen is giving reasons for the existence of NATO. This takes place by making use of speech acts and different rhetorical techniques. The results of the analysis indicate that NATO remains an essential organization for the West and the rest of the world according to the Secretary General.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Madras triple helix’ was the name assigned by the scientific community in the West, to the molecular model proposed for the fibrous protein collagen, by G N Ramachandran’s group at the University of Madras. As mentioned jocularly in a recent retrospective of this work by Sasisekharan and Yathindra [1], the term was possibly coined due to the difficulty of Western scientists in pronouncing the Indian names of Ramachandran and his associates. The unravelling of the precise nature of collagen structure indeed makes for a fascinating story and as succinctly put by Dickerson [2]: “... to trace the evolution of the structure of collagen is to trace the evolution of fibrous protein crystallography in miniature”. This article is a brief review highlighting the pioneering contributions made by G N Ramachandran in elucidating the correct structure of this important molecule and is a sincere tribute by the author to her mentor, doctoral thesis supervisor and major source of inspiration for embarking on a career in biophysics

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Language software applications encounter new words, e.g., acronyms, technical terminology, names or compounds of such words. In order to add new words to a lexicon, we need to indicate their inflectional paradigm. We present a new generally applicable method for creating an entry generator, i.e. a paradigm guesser, for finite-state transducer lexicons. As a guesser tends to produce numerous suggestions, it is important that the correct suggestions be among the first few candidates. We prove some formal properties of the method and evaluate it on Finnish, English and Swedish full-scale transducer lexicons. We use the open-source Helsinki Finite-State Technology to create finitestate transducer lexicons from existing lexical resources and automatically derive guessers for unknown words. The method has a recall of 82-87 % and a precision of 71-76 % for the three test languages. The model needs no external corpus and can therefore serve as a baseline.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

To effectively support today’s global economy, database systems need to manage data in multiple languages simultaneously. While current database systems do support the storage and management of multilingual data, they are not capable of querying across different natural languages. To address this lacuna, we have recently proposed two cross-lingual functionalities, LexEQUAL[13] and SemEQUAL[14], for matching multilingual names and concepts, respectively. In this paper, we investigate the native implementation of these multilingual functionalities as first-class operators on relational engines. Specifically, we propose a new multilingual storage datatype, and an associated algebra of the multilingual operators on this datatype. These components have been successfully implemented in the PostgreSQL database system, including integration of the algebra with the query optimizer and inclusion of a metric index in the access layer. Our experiments demonstrate that the performance of the native implementation is up to two orders-of-magnitude faster than the corresponding outsidethe- server implementation. Further, these multilingual additions do not adversely impact the existing functionality and performance. To the best of our knowledge, our prototype represents the first practical implementation of a crosslingual database query engine.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Precision, sophistication and economic factors in many areas of scientific research that demand very high magnitude of compute power is the order of the day. Thus advance research in the area of high performance computing is getting inevitable. The basic principle of sharing and collaborative work by geographically separated computers is known by several names such as metacomputing, scalable computing, cluster computing, internet computing and this has today metamorphosed into a new term known as grid computing. This paper gives an overview of grid computing and compares various grid architectures. We show the role that patterns can play in architecting complex systems, and provide a very pragmatic reference to a set of well-engineered patterns that the practicing developer can apply to crafting his or her own specific applications. We are not aware of pattern-oriented approach being applied to develop and deploy a grid. There are many grid frameworks that are built or are in the process of being functional. All these grids differ in some functionality or the other, though the basic principle over which the grids are built is the same. Despite this there are no standard requirements listed for building a grid. The grid being a very complex system, it is mandatory to have a standard Software Architecture Specification (SAS). We attempt to develop the same for use by any grid user or developer. Specifically, we analyze the grid using an object oriented approach and presenting the architecture using UML. This paper will propose the usage of patterns at all levels (analysis. design and architectural) of the grid development.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A unique colour pictorial guide exclusively on frogs and toads of the Western Ghats of India. The guide illustrates 73 species with quality photographs, pointers to key features, pictograms, distribution maps, habitat photographs and with minimal text. Scientific and common names, museum record, actual and relative sizes, habitats and current IUCN status of each species are also provided. Species are grouped on their habitat preferences, making it easy to use in the field.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Long term forest research sites in India, going by different names including Linear Tree Increment Plots, Linear Increment Plots, Linear Sample Plots and Permanent Preservation Plots, cover diverse plant communities and environmental conditions. Presently, some of these long-term observational studies are functional, some are disturbed and others have almost been lost. The accumulated data will become increasingly important in the context of environmental modelling and climate change, especially if the plots and data can be maintained and/or revived. This contribution presents the history and current state of forest research plots in India, including details of locations and re-measurements. We provide a brief introduction of the National Forest Inventory (NFI), Preservation Plots in natural forests, the 50-ha Mudumalai Forest Dynamics Plot as part of the Centre for Tropical Forest Science and Smithsonian Institution Global Earth Observatories network (CTFS-SIGEO), and research plots established in plantations for tree growth studies and modelling. We also present some methodological details including assessment and analysis for two types of observational studies, the Tree Count Plots (TCP) and Tree Re-measurement Plots (TRP). Arguments are presented in favour of enumeration and analysis methods which are consistent with current approaches in forest ecological research. (c) 2013 Elsevier B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We carried out a large-scale phylogenetic analysis of fejervaryan (dicroglossid frogs with `Fejervaryan lines' on the ventral side of the body) frogs, distributed in South and SE Asia, using published and newly generated sequences of unidentified individuals from the northern Western Ghats. The results corroborate the presence of a larger fejervaryan clade with a sister relationship to a clade composed of Sphaerotheca. Two sister clades could be discerned within the lager fejervaryan clade. The unidentified individuals formed a monophyletic group and showed a strong support for a sister relationship with Minervarya sahyadris. The species was found to be highly divergent (16S rRNA-4% and tyr-1%) from its sister lineage Minervarya sahyadris, and the clade composed of these two lineages were found to be deeply nested within the larger clade of Fejervarya. Based on this, the genus Minervarya Dubois, Ohler and Biju, 2001 is synonymized under the genus Fejervarya Bolkay, 1915. The unidentified lineage is recognized, based on phylogenetic position, genetic divergence and morphological divergence, as a distinct species and named here as Fejervarya gomantaki sp. nov. The presence of rictal glands was observed to be a synapomorphic character shared by the nested clade members, Fejervarya sahyadris and Fejervarya gomantaki sp. nov. Based on the presence of rictal gland and small size, Minervarya chilapata, a species from a lowland region in the Eastern Himalayas, is synonymized under Fejervarya and evidence for morphological separation from the new species, Fejervarya gomantaki sp. nov. is provided. For the fejervaryan frogs, currently three generic names (Frost, 2015) are available for the two phylogenetic subclades; the genus Fejervarya Bolkay, 1915 for the species of fejervaryan frogs having distribution in the South East Asia; the genus Zakerana Howlader, 2011 for the species of fejervaryan frogs having distribution in the South Asia and the genus Minervarya Dubois, Ohler and Biju, 2001 nested within the `Zakerana clade'. In the phylogenetic analysis Minervarya sahyadris, the new species described herein as Fejervarya gomantaki sp. nov. are nested within the `Zakerana clade', if the `Zakerana clade' for the fejervaryan frogs having distribution in the South Asia is provided a generic status the nomen `Minervarya' should be considered as per the principle of priority of the ICZN Code. Taking into consideration the overlapping distribution ranges of members of the sister clades within the larger fejervaryan clade and the absence of distinct morphological characteristics, we also synonymize the genus Zakerana Howlader, 2011, a name assigned to one of the sister clades with members predominantly distributed in South Asia, under the genus Fejervarya Bolkay, 1915. We discuss the need for additional sampling to identify additional taxa and determine the geographical ranges of the members of the sister clades within Fejervarya to resolve taxonomy within this group.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resumen: El presente trabajo analiza la antroponimia de la aristocracia leonesa en los siglos X y XI, a fi n de contribuir a la comprensión de las estructuras de parentesco de los grupos aristocráticos, las manifestaciones de la memoria familiar y el papel del parentesco en la construcción del poder y el prestigio social. Se plantea que la aristocracia desarrolló una antroponimia específi ca basada en la reiteración de determinados nombres propios a lo largo de las generaciones, que constituyó un importante elemento de identifi cación de la parentela y que expresó en el plano simbólico la organización de los grupos de parentesco en función de la transmisión del poder y la afi rmación del prestigio familiar.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resumen: Este artículo considera la identificación de los reyes en los epitomes de la Dinastía XIII de Manetón, y su función en las tradiciones historiográficas del antiguo Egipto. A pesar del rechazo de larga data de la Dinastía XXIII de Manetón como ahistórica, aquí se argumenta que los nombres preservados en la Dinastía XIII son parte de una auténtica tradición historiografíca originada con el rey kushita Taharka. El artículo va aún más allá para sugerir razones específicas de por qué la Dinastía XIII fue integrada con otras tradiciones de listas reales, así como una reconstrucción histórica de tal proceso. Más aún, éste análisis identifica funciones específicas para los nombres que aún no han sido identificados, Psammus y Zet, en la versión de Julio Africano del epitome de Manetón. El argumento considera la perspectiva política y cultural de los reyes kushitas que eran responsables de una rama de la tradición de la lista de reyes y ofrece algunas interpretaciones de las prácticas reales kushitas a la luz de estas conclusiones.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The 30,000 km2 province of Luristan is situated in western Iran and encompasses the upper valleys of the Zagros Mountains. Even today, local tribesmen inhabit Luristan with their settlement patterns similar to ancient times. Several scientific excavations in the Luristan region have uncovered evidence that this particular region was a major attraction for human settlements from the Paleolithic era onwards. In Ancient Iran, the existence of rich mines together with discoveries made by innovative and inventive artisans spurred the growth of the metalworking culture as an art and a skill among early human communities in Ancient Iran. The art of Luristan can be described as the art of nomadic herdsmen and horsemen with an emphasis on the crafting of small, easily portable objects, among these a number of bronze daggers, swords and other weapons. Throughout its history, Luristan was never an ethnic or political entity because Luristan has been occupied by various tribes and races, throughout its history. Next to Elamites, other tribes who inhabited Luristan were the Hurrians, Lullubians, Kutians, and Kassites. As local tribesmen of Luristan were illiterate, information about their history can only be partially reconstructed from the literature of their southern neighbors: the Elamites and Babylonians. Luristan smiths made weapons for both civilizations. The region was later invaded by Assyrians and finally the Iranians settled the area and absorbed the local tribes. Following an accidental find by the local inhabitants in Luristan in 1928 CE, a number of unlawful diggings reveal a number of metal objects made of bronze and iron that showed a high level of craftsmanship. These objects were offered for sale on the art market with fancy names to hide their origin. The subsequent scientific excavations several decades after the initial discovery provided fascinating information about the culture of Luristan. The metalworking art of Luristan spans a time period from the third millennium BC to the Iron Age. The artifacts from Luristan seem to possess many unique and distinctive qualities, and are especially noteworthy for the apparently endless, intricate diversity and detail that they characteristically depict. The bronze artifacts found in or attributed to Luristan can be each be classed under five separate heads: a) arms and armor, including swords, dirks, daggers, axes, mace heads, spearheads, shields, quiver plaques, protective bronze girdles, helmets; b) implements related to horsemanship, including decorative or ornamental objects for horses as well as bits and snaffles; c) items for personal adornment and hygiene, including anklets, bangles, bracelets, finger rings, earrings and tweezers; d) ceremonial and ritual objects, including talismans, idols, pins, anthropomorphic and zoomorphic figurines; and e) utilitarian objects comprising various vessels and tools, including beakers, bowls and jugs. The scope of this article is limited to a discussion of the bronze and iron weapons made in Luristan. The techniques used for making bronze weapons in Luristan included: casting with open molds, casting with close molds, and casting with lost wax process. For metal sheets used for quiver plaques and bronze protective belts, the hammering technique was used. Edged weapons made in Luristan can be classified into: a) daggers, dirks, and swords with tangs; b) daggers, dirks, and swords with flanges; and c) daggers, dirks, and swords with cast-on hilts. Next to bronze, iron was also used for making weapons such as the characteristic weapon from this area, the iron mask sword.