1,949 results on '"Alias"'
Search Results
2. Introduction
- Author
-
Sarkar, Vivek, Rastello, Fabrice, Rastello, Fabrice, editor, and Bouchez Tichadou, Florent, editor
- Published
- 2022
- Full Text
- View/download PDF
3. The Fourier Transform
- Author
-
Özhan, Orhan and Özhan, Orhan
- Published
- 2022
- Full Text
- View/download PDF
4. Alias-Based Car Free-Form Surface Design
- Author
-
Huang, Yufei, Wei, Hegeng, Wang, Bo, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Abawajy, Jemal H., editor, Choo, Kim-Kwang Raymond, editor, Islam, Rafiqul, editor, Xu, Zheng, editor, and Atiquzzaman, Mohammed, editor
- Published
- 2020
- Full Text
- View/download PDF
5. Folk Onomastics Study of Anthroponymy Found in Babad Banjoemas Wirjaatmadjan
- Author
-
Chusni Hadiati
- Subjects
name ,alias ,culture ,history ,chronicle ,banyumas ,Language. Linguistic theory. Comparative grammar ,P101-410 - Abstract
Folk onomastics is a sub-category of socio-onomastics which deals with people’s beliefs and perceptions of names and name use. Interestingly, pragmatics also plays important role in the study of onomastics as names cannot be split up from the context where they are used. The phenomenon of anthroponymy that gradually advances relates to the development of human civilization. Personal name is very pivotal in human life due to the role of name bearers’ in history. Name is not only a name for it carries something along with it throughout the time particularly those who have power and position in history. Babad Banjoemas Wirjaatmadjan (BBW) was a chronicle of Banyumas regency from 1582 until 1932 which was written by Raden Wirjaatmadjan and continued by Raden Poerwasoepradja. As a chronicle of Banyumas regency, BBW displays historical names and aliases related to the cultural context of Banyumas. This article tries to dig out the phenomenon of anthroponymy of Banyumas’ regency leaders (bupati) in BBW as the names indicate the historical background of the bearers. Thus, the research spotlights the cultural values carried by alias or pseudonym of Banyumas leaders. Utilizing descriptive qualitative and library research, I found out that bupati’s names and aliases in BBW were classified based on five conditions: place of death, place of retirement, place of banishment, medal of appreciation, and lifelong action. The result highlights the traditional proverb that good men must die but death cannot kill their names.
- Published
- 2021
- Full Text
- View/download PDF
6. Comb-Based Decimator for Multiples-of-Five Decimation Factors
- Author
-
Jovanovic Dolecek, Gordana, Karabegovic, Isak, Kacprzyk, Janusz, Series Editor, and Karabegović, Isak, editor
- Published
- 2019
- Full Text
- View/download PDF
7. A multifuncionalidade de aliás: valores semânticos em perspectiva funcional
- Author
-
Nice da Silva Ramos
- Subjects
funcionalismo ,multifuncionalismo ,semântica ,oralidade ,aliás ,Philology. Linguistics ,P1-1091 - Abstract
Este artigo tem por objeto de estudo o elemento linguístico aliás, observado nos diferentes contextos de uso em que é recrutado. Segundo a Nomenclatura Gramatical Brasileira (NGB), aliás é classificado como palavra denotadora de retificação. Em gramáticas e dicionários de autores consagrados, esse item é classificado conforme a NGB e como advérbio. Durante a pesquisa, verificamos a flutuação categorial desse elemento, que também assume características de conjunção, conector reformulativo e operador argumentativo, além da mencionada classificação tradicional. Observamos sua frequência e usos, em textos de modalidade oral, do corpus Discurso & Gramática, sob a luz da Linguística Funcional Centrada no Uso. Os fatores analisados, calcados no aspecto semântico, são os seguintes: posições nos textos, frequência de uso, graus de escolaridade e gêneros textuais. A análise aponta que esse elemento, bastante utilizado no português do Brasil, serve às diversas funções discursivas, tais como: reformulação, retificação integral, retificação parcial, inclusão (de argumentos), dentre outras. Não obstante à classificação imposta pela NGB, os resultados apontam para uma versatilidade desse elemento linguístico, quando analisado nos contextos em que é instanciado.
- Published
- 2020
- Full Text
- View/download PDF
8. English, French, and Polish Aliases of Criminals: Diversity of Inspirations in their Creation and Typical Nicknaming Schemes.
- Author
-
GOLDA, PAWEŁ and MĘŻYK, JUDYTA
- Subjects
ENGLISH language education ,FRENCH language ,CRIMINALS ,ANONYMS & pseudonyms ,ONOMASTICS - Abstract
The present paper examines the topic of aliases of criminals, which seems to be understudied in linguistic research. Therefore, this article's primary goal is to describe how criminals' aliases are created and what are the differences and similarities in that process in English, French, and Polish. Firstly, the theoretical background concerning the topic of pseudonyms is presented. Then, the corpus gathered for this paper (available online: https://cutt. ly/1TRefrK), consisting of 206 pseudonyms (123 units in English, 42 in French, and 41 in Polish), is analyzed. In the analysis, four schemes are noted to be the most commonly used in creating pseudonyms of criminals. What is more, the inspirations behind the creation of criminals' pseudonyms are scrutinized, and nine typical inspirations are distinguished. The article constitutes not only a detailed linguistic analysis of a significant number of criminals' aliases but can also serve as an inspiration for other research on the topic. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
9. The Triumph of Trauma: Tarantino Style.
- Author
-
Van Zandt, Samantha
- Subjects
EMOTIONAL trauma ,SYMBOLISM ,FILM characters - Abstract
In Kill Bill Vol. 1 and 2, Quentin Tarantino uses thematic symbolism to demonstrate the evolution of the film's characters by assigning them code names. Each character's code name is a different species of snake or is related to snakes: Black Mamba, Copperhead, Cottonmouth, Sidewinder, California Kingsnake, and Snake Charmer. Their aliases are a few examples of Easter eggs concealed in the films. The code names portray aspects of their character and the story of their growth as individuals. The protagonist, Beatrix Kiddo undergoes numerous aliases and evolves throughout the film through her recovery from immense trauma. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
10. Frame Theory for Signal Processing in Psychoacoustics
- Author
-
Balazs, Peter, Holighaus, Nicki, Necciari, Thibaud, Stoeva, Diana, Benedetto, John J., Series editor, Balan, Radu, editor, Czaja, Wojciech, editor, Dellatorre, Matthew, editor, and Okoudjou, Kasso A., editor
- Published
- 2017
- Full Text
- View/download PDF
11. Improving a Street-Based Geocoding Algorithm Using Machine Learning Techniques.
- Author
-
Lee, Kangjae, Claridades, Alexis Richard C., and Lee, Jiyeong
- Subjects
MACHINE learning ,ALGORITHMS ,SPELLING errors ,TEST methods - Abstract
Address matching is a crucial step in geocoding; however, this step forms a bottleneck for geocoding accuracy, as precise input is the biggest challenge for establishing perfect matches. Matches still have to be established despite the inevitability of incorrect address inputs such as misspellings, abbreviations, informal and non-standard names, slangs, or coded terms. Thus, this study suggests an address geocoding system using machine learning to enhance the address matching implemented on street-based addresses. Three different kinds of machine learning methods are tested to find the best method showing the highest accuracy. The performance of address matching using machine learning models is compared to multiple text similarity metrics, which are generally used for the word matching. It was proved that extreme gradient boosting with the optimal hyper-parameters was the best machine learning method with the highest accuracy in the address matching process, and the accuracy of extreme gradient boosting outperformed similarity metrics when using training data or input data. The address matching process using machine learning achieved high accuracy and can be applied to any geocoding systems to precisely convert addresses into geographic coordinates for various research and applications, including car navigation. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
12. Underground testing: Name‐altering practices as probes in electronic music.
- Author
-
Formilan, Giovanni and Stark, David
- Subjects
- *
TESTING , *ELECTRONIC music , *ANONYMITY , *SUBCULTURES , *CULTURAL movements - Abstract
Name‐altering practices are common in many creative fields—pen names in literature, stage names in the performing arts, and aliases in music. More than just reflecting artistic habits or responding to the need for distinctive brands, these practices can also serve as test devices to probe, validate, and guide the artists' active participation in a cultural movement. At the same time, they constitute a powerful probe to negotiate the boundaries of a subculture, especially when its features are threatened by appropriation from the mass‐oriented culture. Drawing evidence from electronic music, a field where name‐altering practices proliferate, we outline dynamics of pseudonymity, polyonymy, and anonymity that surround the use of aliases. We argue that name‐altering practices are both a tool that artists use to probe the creative environment and a device to recursively put one's creative participation to the test. In the context of creative subcultures, name‐altering practices constitute a subtle but effective form of underground testing. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
13. Estandarización, reconfiguración y ampliación de la gestión de la identidad en las herramientas integradas actualmente con el SSO en una empresa en proceso de fusión
- Author
-
Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Tiendeo, Serral Gracià, René, Riosalido Vilagrasa, Marcos, Latif Martinez, Jabar, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Tiendeo, Serral Gracià, René, Riosalido Vilagrasa, Marcos, and Latif Martinez, Jabar
- Abstract
A raíz de la fusión de Tiendeo con Shopfully, nace la necesidad de crear una metodología de trabajo para poder definir las pautas y procedimientos para poder realizar una migración de dominio exitosa, unificando los dominios de Tiendeo y Shopfully. Para ello, se analizarán las aplicaciones que puedan verse afectadas por dicho cambio y se recreará el escenario que está en producción actualmente para realizar las pruebas pertinentes. Este sandbox está compuesto por Google Workspace, Slack, Jira y Onelogin. Para finalizar se crearán/modificarán los scripts de las aplicaciones necesarias para automatizar al máximo el proceso., As a result of the Tiendeo-Shopfully merger, the need arises to create a work methodology to be able to define the guidelines and procedures to carry out a successful domain migration, unifying the domains of both companies. To do this, the applications that may be affected by these changes will be analyzed and the scenario that is currently in production will be recreated to carry out the relevant tests. This sandbox is composed of Google Workspace, Slack, Jira and Onelogin. To finish, the scripts of the applications necessary to automate the process as much as possible will be created/modified.
- Published
- 2023
14. Alias Structures and Sequential Experimentation for Mixed-Level Designs
- Author
-
Armando Javier Ríos-Lira, Yaquelin Verenice Pantoja-Pacheco, José Antonio Vázquez-López, José Alfredo Jiménez-García, Martha Laura Asato-España, and Moisés Tapia-Esquivias
- Subjects
algorithm ,simulation ,alias ,structure ,mixed ,design ,Mathematics ,QA1-939 - Abstract
Alias structures for two-level fractional designs are commonly used to describe the correlations between different terms. The concept of alias structures can be extended to other types of designs such as fractional mixed-level designs. This paper proposes an algorithm that uses the Pearson’s correlation coefficient and the correlation matrix to construct alias structures for these designs, which can help experimenters to more easily visualize which terms are correlated (or confounded) in the mixed-level fraction and constitute the basis for efficient sequential experimentation.
- Published
- 2021
- Full Text
- View/download PDF
15. SPATM: A Social Period-Aware Topic Model for Personalized Venue Recommendation
- Author
-
Yujie Zhang, Xiangwu Meng, and Weiyu Ji
- Subjects
Topic model ,Information retrieval ,Computational Theory and Mathematics ,Alias ,Sampling efficiency ,Computer science ,Aperiodic graph ,Sampling (statistics) ,Social preferences ,Period (music) ,Bottleneck ,Computer Science Applications ,Information Systems - Abstract
Personalized venues recommendation is essential to help people find attractive venue to visit as growth of location-based social networks. Existing approaches never distinguish user individual interests from her social preferences, which leads to a bottleneck of modeling user check-in behaviors accurately. In this paper, we find the differences between user interests and her social preferences clearly and investigate the time law of user check-in behaviors in depth. Consequently, we propose a social-period-aware topic model (SPATM) to learn the influence weights of both user interests and her social preferences on making-decision for each check-in time automatically. Especially, we model latent topic by leveraging smaller size of dynamic activities instead of static categories, which can alleviate the data sparsity problem by using more co-occurrent activities information. Moreover, our approach can automatically judge whether a user's social preference is periodic or aperiodic and learn the periodicity of periodic one. Furthermore, the Alias Sampling based training approach is introduced to improve sampling efficiency. The results demonstrate our proposed model is effective and outperforms the state-of-the-art approaches in terms of effectiveness and efficiency. Besides, SPATM can learn semantically coherent latent topics and geographically dispersed latent social topics which are useful to explain recommendation.
- Published
- 2022
- Full Text
- View/download PDF
16. Alias Rejection in CT Delta-Sigma ADCs Using Virtual-Ground-Switched Resistor Feedback
- Author
-
Shanthi Pavan and Raviteja Theertham
- Subjects
Alias ,law ,Computer science ,Virtual ground ,Electronic engineering ,Resistive feedback ,Electrical and Electronic Engineering ,Resistor ,Delta-sigma modulation ,Cmos process ,law.invention ,Degradation (telecommunications) - Abstract
High-resolution continuous-time delta-sigma modulators use resistive feedback DACs for low-noise operation. Such DACs have conventionally been switched at the reference end. It turns out that reference-path resistance degrades the performance of these DACs. This problem can be addressed by the virtual-ground-switched resistor DAC. However, moving the switches to the virtual-ground-side degrades alias-rejection of the modulator. This brief analyzes the mechanism of degradation and develops a model to estimate alias rejection. Our theory is supported by simulations and measurements from a prototype modulator designed in a 180 nm CMOS process. We then describe a way to address this problem, and demonstrate its efficacy using layout-extracted simulations.
- Published
- 2022
- Full Text
- View/download PDF
17. Alias
- Author
-
Gressner, Axel M., editor and Arndt, Torsten, editor
- Published
- 2019
- Full Text
- View/download PDF
18. Estandarización, reconfiguración y ampliación de la gestión de la identidad en las herramientas integradas actualmente con el SSO en una empresa en proceso de fusión
- Author
-
Latif Martinez, Jabar, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Tiendeo, Serral Gracià, René, and Riosalido Vilagrasa, Marcos
- Subjects
alias ,slack ,tiendeo ,Adreces d'Internet ,Informàtica::Enginyeria del software [Àrees temàtiques de la UPC] ,domain ,shopfully ,domino ,google workspace ,onelogin ,Internet addresses ,doveconviene ,GAM - Abstract
A raíz de la fusión de Tiendeo con Shopfully, nace la necesidad de crear una metodología de trabajo para poder definir las pautas y procedimientos para poder realizar una migración de dominio exitosa, unificando los dominios de Tiendeo y Shopfully. Para ello, se analizarán las aplicaciones que puedan verse afectadas por dicho cambio y se recreará el escenario que está en producción actualmente para realizar las pruebas pertinentes. Este sandbox está compuesto por Google Workspace, Slack, Jira y Onelogin. Para finalizar se crearán/modificarán los scripts de las aplicaciones necesarias para automatizar al máximo el proceso. As a result of the Tiendeo-Shopfully merger, the need arises to create a work methodology to be able to define the guidelines and procedures to carry out a successful domain migration, unifying the domains of both companies. To do this, the applications that may be affected by these changes will be analyzed and the scenario that is currently in production will be recreated to carry out the relevant tests. This sandbox is composed of Google Workspace, Slack, Jira and Onelogin. To finish, the scripts of the applications necessary to automate the process as much as possible will be created/modified.
- Published
- 2023
19. Improving a Street-Based Geocoding Algorithm Using Machine Learning Techniques
- Author
-
Kangjae Lee, Alexis Richard C. Claridades, and Jiyeong Lee
- Subjects
geocoding ,machine learning ,address ,alias ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
Address matching is a crucial step in geocoding; however, this step forms a bottleneck for geocoding accuracy, as precise input is the biggest challenge for establishing perfect matches. Matches still have to be established despite the inevitability of incorrect address inputs such as misspellings, abbreviations, informal and non-standard names, slangs, or coded terms. Thus, this study suggests an address geocoding system using machine learning to enhance the address matching implemented on street-based addresses. Three different kinds of machine learning methods are tested to find the best method showing the highest accuracy. The performance of address matching using machine learning models is compared to multiple text similarity metrics, which are generally used for the word matching. It was proved that extreme gradient boosting with the optimal hyper-parameters was the best machine learning method with the highest accuracy in the address matching process, and the accuracy of extreme gradient boosting outperformed similarity metrics when using training data or input data. The address matching process using machine learning achieved high accuracy and can be applied to any geocoding systems to precisely convert addresses into geographic coordinates for various research and applications, including car navigation.
- Published
- 2020
- Full Text
- View/download PDF
20. Sabah State Election 2020: Victory of Alias Haji Sani (WARISAN) at DUN 53 Sekong
- Author
-
Mohd Naqib Lutfi bin Abdul Latif, Rashidin Idris, and Hamdan Mohd Salleh
- Subjects
Politics ,Alias ,State (polity) ,media_common.quotation_subject ,Law ,Political science ,State government ,Victory ,General Medicine ,CONTEST ,media_common - Abstract
The Sabah state assembly was dissolved on 30 July 2020 by the Chief Minister Shafie Apdal to prevent a coup by the previous Chief Minister Musa Aman through his “Group 33”. The 2020 Sabah State election was held on 26 September 2020 involved a record total of 447 candidates vying for 73 state seats. The main contest was between the WARISAN-PLUS of 5 political parties and a group of 9 political parties under the coalition of the newly minted Gabungan Rakyat Sabah (GRS). GRS managed to wrest the state government by comfortably winning 38 out of 73 seats with additional 3 seat came from pro-GRS independent candidates. Nevertheless, WARISAN managed to retain N53 Sekong even as the incumbent have been dropped after 26 months at the helm. This article studied on issues surrounding the victory of Alias Haji Sani during the election. The findings of this articles uses primary data, secondary data, online sources dan participative observation findings. The victory of Alias Haji Sani shows that the influence of people-centric and “Gentlemen Politics Budiman” identification is stronger than political affiliation.
- Published
- 2021
- Full Text
- View/download PDF
21. The Postmodern Multi-Layered Narrative of Existential Feminist Subjectivity: The Case of Margaret Atwood’s Alias Grace
- Author
-
Hazmah Ali AI-Harshan
- Subjects
Subjectivity ,Psychoanalysis ,Alias ,Philosophy ,Narrative ,Postmodernism ,Existentialism - Abstract
Postmodern fiction demonstrates a suspicion about the narrative status of history. Arguably, its project is to reveal the illusion of truth in history because of history's reliance on texts. There is no doubt that historical events occur, but their transmutation into “fact” and their transmission to posterity are limited by their narrativization and textualization. In the Afterword to her novel, Alias Grace (1996) – a fictionalized narrative centering on a real-life person embroiled in a double murder in 1843 – Margaret Atwood reveals her interest in this problem with “history”. She tells the reader, “I have of course fictionalized historical events … as did many commentators on this case who claimed to be writing history”. The purpose of this paper is thus to consider Margaret Atwood’s novel, Alias Grace as a postmodern fiction that seeks to reveal the illusion of truth in history through her use of innovatory narrative techniques. Mikhail Bakhtin’s notion of the “double-voiced” is used to examine the permitted, surface-level utterances – and the necessarily conflicting actual narratives – of the two narrators in Atwood’s novel. However, the term is also applied in the broader feminist/theoretical context of the silencing of the female subject more generally. Atwood establishes a fragmented, multiplicity narrative. This arises from the reported and somewhat self-aware observations of the eponymous Grace and a doctor named Simon Jordan. Seemingly, the author’s own authority does not exist. Atwood thus exploits the slippery nature of language that does not have some kind of “truth” imposed upon it. The historical “truth” about Grace Marks is never revealed, not because Atwood is “leaving it to the reader's imagination” but because Atwood plays with the problem of personality as a social construction. Almost invisible as “author”, Atwood nevertheless reveals just how language can be manipulated and made to conform to a certain version of ‘truth’ and ‘reality’. However, in Alias Grace, Atwood also recuperates the voice of a supposedly murderous woman by revising the myth of woman’s silence and subjugation. Because her speaking voices are required to practice “double-voicing” to be heard, through presenting the reader with both voices, Atwood recuperates the moments of existential liberation to be heard from emergent voices.
- Published
- 2021
- Full Text
- View/download PDF
22. Making pointer analysis more precise by unleashing the power of selective context sensitivity
- Author
-
Yue Li, Xiaoxing Ma, Chang Xu, Yannis Smaragdakis, and Tian Tan
- Subjects
Scheme (programming language) ,Alias ,Java ,Computer science ,Alias analysis ,Set (abstract data type) ,Computer engineering ,Pointer (computer programming) ,State (computer science) ,Safety, Risk, Reliability and Quality ,computer ,Pointer analysis ,Software ,computer.programming_language - Abstract
Traditional context-sensitive pointer analysis is hard to scale for large and complex Java programs. To address this issue, a series of selective context-sensitivity approaches have been proposed and exhibit promising results. In this work, we move one step further towards producing highly-precise pointer analyses for hard-to-analyze Java programs by presenting the Unity-Relay framework, which takes selective context sensitivity to the next level. Briefly, Unity-Relay is a one-two punch: given a set of different selective context-sensitivity approaches, say S = S1, . . . , Sn, Unity-Relay first provides a mechanism (called Unity)to combine and maximize the precision of all components of S. When Unity fails to scale, Unity-Relay offers a scheme (called Relay) to pass and accumulate the precision from one approach Si in S to the next, Si+1, leading to an analysis that is more precise than all approaches in S. As a proof-of-concept, we instantiate Unity-Relay into a tool called Baton and extensively evaluate it on a set of hard-to-analyze Java programs, using general precision metrics and popular clients. Compared with the state of the art, Baton achieves the best precision for all metrics and clients for all evaluated programs. The difference in precision is often dramatic — up to 71% of alias pairs reported by previously-best algorithms are found to be spurious and eliminated.
- Published
- 2021
- Full Text
- View/download PDF
23. Who was Onymacles the Athenian? (Alcaeus 130b V. = 130.16–39 LP).
- Author
-
Tsantsanoglou, Kyriakos
- Subjects
HERACLES (Greek mythological character) ,CONTENT analysis ,PALEOGRAPHY - Abstract
The author's aim is to shed light upon the first three stanzas of Alcaeus' fr. 130b, which describe the conditions faced by the poet while living in exile. Some parallel texts (POxy. 3711, Alc. fr. 401B) are helpful, but they, as well as POxy. 2165, the sole testimony of fr. 130b, must be read or interpreted in places differently than before. Among the new observations is the suggestion that the place of Alcaeus' first exile is the city of Aenos in Thrace. Also, Ὀνυμακλέης ὠθάναιος, like whom Alcaeus declares that he lives in exile, is but a name made up by the poet as his personal alias with wordplays, firstly on his familial and personal eminence, and secondly on the incident of his thrown away armour in the battle over Sigeion and its hanging in front of the Athena temple by the Athenians. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
24. Las instancias narrativas en El Lazarillo De Ciegos Caminantes: Alonso Carrió de la Vandera, alias Concolorcorvo
- Author
-
Virginia Paola Forace
- Subjects
Cultural Studies ,Linguistics and Language ,History ,Literature and Literary Theory ,Alias ,Subject (philosophy) ,Proper noun ,Context (language use) ,Plot (narrative) ,Humanities - Abstract
In 1771 and 1772 Alonso Carrió de la Vandera (1715?-1783) made an extensive trip to describe and evaluate the path of posts between Buenos Aires and Lima. His multifaceted journey was narrated in detail in El lazarillo de ciegos caminantes, a text that presents a scriptural awareness and an unusual plot development for its context. In this article we will deal in particular with the construction of an apocryphal author, Don Calixto Bustamante Carlos Inca, alias Concolorcorvo, to reflect on the problem of the attribution of the speeches and the proper name, and the condition of existence of the subject who signs and of the empirical author, since we affirm that Carrió de la Vandera becomes a paper being by entering the fictions he erects and interrelating on the same diegetic level with his creations.
- Published
- 2021
- Full Text
- View/download PDF
25. Increasing The Capacity of Headstega Based on Bitwise Operation
- Author
-
Hasmawati Hasmawati and Ari Moesriami Barmawi
- Subjects
Email address ,Steganography ,Cover (telecommunications) ,Alias ,business.industry ,Computer science ,Key (cryptography) ,Embedding ,Communication source ,business ,Bitwise operation ,Computer network - Abstract
Headstega (Head steganography) is a noiseless steganography that used email headers as a cover for concealing messages. However, it has less embedding capacity and it raises suspicion. For overcoming the problem, bitwise operation is proposed. In the proposed method, the message was embedded into the cover by converting the message and the cover into binary representation based on a mapping table that was already known by the sender and the receiver. Furthermore, XOR bitwise operations were applied to the secret message and cover bits based on random numbers that were generated using a modular function. Moreover, the result was converted into characters that represent the secret message bits. After embedding the message into the cover, an email alias was generated to camouflage the secret message characters. Finally, the sender sends the embedded cover and the email alias to the recipient. Using the proposed method, the embedding capacity is 89% larger than using the original Headstega. For reducing the adversary’s suspicion, the existing email address was used instead of creating a new email address.
- Published
- 2021
- Full Text
- View/download PDF
26. Efficient design of decimation filter using linear programming and its FPGA implementation
- Author
-
Supriya Aggarwal
- Subjects
Decimation ,Alias ,Linear programming ,Computer science ,020208 electrical & electronic engineering ,02 engineering and technology ,Sharpening ,020202 computer hardware & architecture ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Voltage droop ,Electrical and Electronic Engineering ,MATLAB ,Hamming code ,computer ,Algorithm ,Software ,Integer (computer science) ,computer.programming_language - Abstract
In this paper we present two-stage CIC (cascaded-integrator-comb) decimation filters with decimation factor M expressed as M = M1M2, where M 1 , M 2 ∈ Z + . The proposed decimator-I aims to minimize the pass-band droop using a cascade connection of Kaiser Hamming (KH) and Saramaki-Ritoniemi (SR) sharpening structures. The coefficients of second stage are determined using linear programming in MATLAB. The proposed CIC decimator-I when designed for various integer decimation factors on an average has a pass-band droop of −0.09 dB at the normalized frequency of 1/2 M and an average alias rejection of −44 dB at the normalized frequency of 3/2 M. Further, another decimator-II structure extends decimator-I to achieve an alias rejection of −87 dB and pass-band droop of −0.17 dB. The FPGA implementation of proposed designs has lower slice utilization and achieves higher maximum operating frequency than other existing competing designs. The performance of proposed decimation filters is confirmed using computer simulations in analog-to-digital converters (ADC) and sigma-delta (ΣΔ) modulators.
- Published
- 2021
- Full Text
- View/download PDF
27. An Emerging Devil, Mucormycosis alias Black Fungus : A Review
- Author
-
V. Bhanu Rekha and C. Vijayan V. J. Ajay Kumar
- Subjects
Alias ,biology ,Mucormycosis ,medicine ,Fungus ,biology.organism_classification ,medicine.disease ,Microbiology - Published
- 2021
- Full Text
- View/download PDF
28. Generalized Hsiung–Minkowski formulae on manifolds with density
- Author
-
Mohammed Abdelmalek
- Subjects
Symmetric function ,Pure mathematics ,Alias ,General Mathematics ,010102 general mathematics ,0103 physical sciences ,Minkowski space ,Sigma ,010307 mathematical physics ,0101 mathematics ,01 natural sciences ,Mathematics - Abstract
In this work, using the weighted symmetric functions $$\sigma _{k}^{\infty }$$ σ k ∞ and the weighted Newton transformations $$T_{k}^{\infty }$$ T k ∞ introduced by Case (Alias et al. Proc Edinb Math Soc 46(02):465–488, 2003), we derive some generalized integral formulae for close hypersurfaces in weighted manifolds. We also give some examples and applications of these formulae.
- Published
- 2021
- Full Text
- View/download PDF
29. Blockchain-Based Address Alias System
- Author
-
Paweł Jemioło, Norbert Bodziony, Marek R. Ogiela, and Krzysztof Kluza
- Subjects
blockchain ,Cryptocurrency ,Blockchain ,HF5001-6182 ,Alias ,business.operation ,Computer science ,media_common.quotation_subject ,02 engineering and technology ,Computer security ,computer.software_genre ,User experience design ,MasterCard ,0202 electrical engineering, electronic engineering, information engineering ,Business ,media_common ,business.industry ,Solana ,aliasing system ,020206 networking & telecommunications ,Payment ,General Business, Management and Accounting ,cryptocurrency ,Computer Science Applications ,wallet ,020201 artificial intelligence & image processing ,User interface ,Aliasing (computing) ,business ,computer - Abstract
In recent years, blockchains systems have seen massive adoption in retail and enterprise environments. Cryptocurrencies become more widely adopted, and many online businesses have decided to add the most popular ones, like Bitcoin or Ethereum, next to Visa or Mastercard payments. Due to the decentralized nature of blockchain-based systems, there is no possible way to revert confirmed transactions. It may result in losses caused by human error or poor design of the user interface. We created a cryptocurrency wallet with a full on-chain solution for aliasing accounts and tokens to improve user experience and avoid unnecessary errors. The aliasing system consists of a number of smart contracts deployed on top of the blockchain network that give the ability to register aliases to accounts and tokens and use them instead of opaque addresses. Our solution shows how performant modern blockchains are and presents a way of building fully decentralized applications that can compete with centralized ones in terms of performance.
- Published
- 2021
- Full Text
- View/download PDF
30. Trang: 'Prepared for Any Sacrifice or Risk'
- Author
-
Norland, Patricia D., author
- Published
- 2020
- Full Text
- View/download PDF
31. Complexity and Politics of Naming in Yoruba Tradition: A Dramatic Exploration of Once Upon an Elephant
- Author
-
Lekan Balogun and Sesan Fasanu
- Subjects
alias ,autogenesis ,culture ,naming ,oral genre ,socio-politics ,tragedy ,Social Sciences - Abstract
This paper examines the connection between naming and oral tradition, specifically àló and ìtàn, by discussing Bosede Ademilua-Afolayan’s Once Upon an Elephant (2015), and demonstrates the ways in which contemporary Nigerian playwrights appropriate the same to engage their political realities. The Yoruba are aware that names are not mere signs but the material nodes of the social network, hence the rites associated with naming underscore the people’s belief in birth, life, and living, as well as the totality of existence. The paper is in three parts: a background to the analysis, a discussion of Yoruba belief about naming that is linked with a discussion of oral tradition, and an analysis of the play with materials that are drawn from the previous discussion in order to show how the playwright has used the strategy of naming to engage a broader socio-political reality of her society.
- Published
- 2019
- Full Text
- View/download PDF
32. The quest for a successful book-to-series adaptation in the times of SVOD — using the examples of 'The Handmaid’s Tale and Alias Grace' by Margaret Atwood
- Author
-
Joanna Szydełko
- Subjects
Entertainment ,Politics ,History ,Mass culture ,Alias ,business.industry ,Social reality ,Media studies ,Adaptation (computer science) ,Film industry ,business ,Intertextuality - Abstract
A fascinating factor of so-called mass culture is the ability to adapt to society and its needs. The same pattern seems to be followed by the film industry, as it has been influenced by other branches of entertainment, television included. These are SVODs (Streaming Video on Demand platforms), which offer a growing number of screen adaptations of literary works. The following paper aims to analyse some criteria upon which book-to-series adaptations might be regarded as successful, using examples from The Handmaid’s Tale and Alias Grace.Produced respectively by Hulu and CBC, both based on books by the Canadian female writer Margaret Atwood, the analysed shows confirm that the audience is more inclined to watch (and read) an intertextual production that often reflects and comments on contemporary political and social reality.
- Published
- 2021
- Full Text
- View/download PDF
33. Context-Sensitive Data Race Detection for Concurrent Programs
- Author
-
Huan Liu, Yang Zhang, and Liu Qiao
- Subjects
Correctness ,General Computer Science ,Alias ,Computer science ,False positives and false negatives ,0211 other engineering and technologies ,Context (language use) ,02 engineering and technology ,Machine learning ,computer.software_genre ,data race ,Program analysis ,Escape analysis ,0202 electrical engineering, electronic engineering, information engineering ,alias analysis ,happens-before ,General Materials Science ,021103 operations research ,business.industry ,General Engineering ,nutritional and metabolic diseases ,Concurrent programs ,context-sensitive ,Alias analysis ,nervous system diseases ,020201 artificial intelligence & image processing ,Artificial intelligence ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,computer ,lcsh:TK1-9971 - Abstract
Data races have become one of the severe issues affecting the correctness of concurrent programs. Existing detection tools for data races have many false positives and false negatives. To improve the correctness, this paper proposes a context-sensitive approach to detect data races in concurrent programs. Several program analysis techniques are conducted to reduce false positives and false negatives. First, control-flow analysis is used to construct call graphs, in which escape analysis is employed to find escaped objects among threads. Second, context-sensitive alias analysis is employed to find alias objects. Finally, happens-before analysis is conducted to reduce false positives and false negatives. We develop a prototype tool ConRacer based on WALA and evaluate it on several benchmarks. We also compare ConRacer with existing static and dynamic tools. The experimental results show that ConRacer can effectively detect data races and reduce false positives and false negatives.
- Published
- 2021
34. English, French, and Polish Aliases of Criminals: Diversity of Inspirations in their Creation and Typical Nicknaming Schemes
- Subjects
alias ,nickname ,pseudonym ,serial killers ,onomastics ,criminals - Abstract
The present paper examines the topic of aliases of criminals, which seems to be understudied in linguistic research. Therefore, this article’s primary goal is to describe how criminals’ aliases are created and what are the differences and similarities in that process in English, French, and Polish. Firstly, the theoretical background concerning the topic of pseudonyms is presented. Then, the corpus gathered for this paper (available online: https://cutt.ly/1TRefrK), consisting of 206 pseudonyms (123 units in English, 42 in French, and 41 in Polish), is analyzed. In the analysis, four schemes are noted to be the most commonly used in creating pseudonyms of criminals. What ismore, the inspirations behind the creation of criminals’ pseudonyms are scrutinized, and nine typical inspirationsare distinguished. The article constitutes not only a detailed linguistic analysis of a significant number of criminals’aliases but can also serve as an inspiration for other research on the topic.
- Published
- 2021
35. Extended E-N-DIST Algorithm for Alias Detection
- Author
-
Mohammed Hadwan
- Subjects
dynamic programming ,Similarity (geometry) ,General Computer Science ,Alias ,Character (computing) ,Computer science ,Substitution (logic) ,General Engineering ,02 engineering and technology ,Extension (predicate logic) ,edit distance (ED) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Levenshtein distance (LD) ,E-N-DIST ,020201 artificial intelligence & image processing ,General Materials Science ,Alias detection ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Electrical and Electronic Engineering ,Algorithm ,lcsh:TK1-9971 - Abstract
Nowadays personal names are not the only way to refer to celebrities and experts from different fields, instead, they can be referred to by their aliases on the web. Associated aliases have remarkable importance in retrieving information about the personal name from the websites. Therefore, disclosing aliases can have an important role in overcoming many real-world challenges. In this research, the aim is to explore and propose a reliable algorithm that can detect aliases that occurred due to transliteration of Arabic names into English. An extension to the Enhanced N-gram distance algorithm (E-N-DIST) which was previously published is introduced in this paper. The proposed algorithm is called the Extended Enhanced N-gram distance algorithm (E-E-N-DIST). The differences between E-N-DIST and E-E-N-DIST are two main changes in calculating the cost of substitution and transposition. First, E-E-N-DIST is computed based on 2n+1 - 1 states. The second is the use of an edit operation called the 'Exchange of Vowels' to count the common spelling errors that happen due to the transliteration from one language to another. The idea of exchange of vowels is to search for vowels (viz. = a`, = e`, = i', = o`, and = u`) and the non-vowel character = y` that has a vowel sound or a part of it in other languages to estimate the operations cost of insertion and deletion. The proposed algorithm tested using a dataset for the literature; the results obtained are compared with other algorithms from the state of the art. The proposed algorithm outperforms other algorithms; it achieved a better average percentage of similarity than all other compared algorithms.
- Published
- 2021
36. Modelling and Control of Resource Allocation Systems within Discrete Event Systems by Means of Petri Nets -- Part 1: Invariants, Siphons and Traps in Deadlock Avoidance
- Author
-
František Čapkovič
- Subjects
Theoretical computer science ,Alias ,Computer science ,place/transition Petri nets ,Petri nets ,T-invariants ,resource allocation systems ,deadlock avoidance ,control synthesis ,P-invariants ,modelling ,68W15 ,Reachability ,Automated manufacturing systems ,deadlocks ,supervisor ,Supervisor ,Event (computing) ,General Engineering ,Petri net ,Deadlock ,discrete-event systems ,Tree (graph theory) ,Graph (abstract data type) ,siphons ,traps ,flexible manufacturing systems - Abstract
Solving the deadlocks avoidance problem in Resource Allocation Systems (RAS) in Discrete-Event Systems (DES) is a rife problem, especially in Flexible Manufacturing Systems (FMS), alias Automated Manufacturing Systems (AMS). Petri Nets (PN) are an effectual tool often used at this procedure. In principle, there are two basic approaches how to deal with deadlocks in RAS based on PN. They are listed and illustrated here. First of the approaches is realized by means of the supervisor based on P-invariants of PN, while the second one is realized by means of the supervisor based on PN siphons. While the first approach needs to know the reachability graph/tree (RG/RT) expressing the causality of the development of the PN model of RAS, in order to find (after its thorough analysis) the deadlocks, the second approach needs the thorough analysis of the PN model structure by means of finding siphons and traps. Next, both approaches will be applied on the same PN model of RAS and the effectiveness of the achievement of their results will be compared and evaluated. Several simple illustrative examples will be introduced. For the in-depth analysis of the problem of deadlock avoiding, next Part 2 of this paper is prepared, where the newest research will be introduced and illustrated on more complicated examples. If necessary (because of the limited length of particular papers), also the third part – Part 3, will be prepared.
- Published
- 2021
- Full Text
- View/download PDF
37. Don John Broadhook alias John Lydgate, 1424
- Author
-
Sebastian Sobecki and Research Centre for Historical Studies
- Subjects
History ,Literature and Literary Theory ,Alias ,Classics - Abstract
In a note published in this journal in 2019, Sebastian Sobecki drew attention to a new life-record for John Lydgate. The document, which dates to late January or early February 1425, is of significance because it offers the earliest surviving record of Lydgate's tenure as prior of Hatfield Regis. However, the record only refers to him as “John, prior of Hatfield Regis.” Here the author would like to present three new life-records from 1424, all of which mention Lydgate by name and identify him as prior of Hatfield Regis, therefore pushing back the evidence for his time as prior by a calendar year.
- Published
- 2021
38. 6GAN: IPv6 Multi-Pattern Target Generation via Generative Adversarial Nets with Reinforcement Learning
- Author
-
Tianyu Cui, Gaopeng Gou, Peipei Fu, Gang Xiong, Zhen Li, and Chang Liu
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Discriminator ,Alias ,Computer science ,business.industry ,Computer Science - Artificial Intelligence ,Process (computing) ,Machine learning ,computer.software_genre ,IPv6 ,Computer Science - Networking and Internet Architecture ,Artificial Intelligence (cs.AI) ,Reinforcement learning ,Artificial intelligence ,Algorithmic inference ,Set (psychology) ,business ,Host (network) ,computer - Abstract
Global IPv6 scanning has always been a challenge for researchers because of the limited network speed and computational power. Target generation algorithms are recently proposed to overcome the problem for Internet assessments by predicting a candidate set to scan. However, IPv6 custom address configuration emerges diverse addressing patterns discouraging algorithmic inference. Widespread IPv6 alias could also mislead the algorithm to discover aliased regions rather than valid host targets. In this paper, we introduce 6GAN, a novel architecture built with Generative Adversarial Net (GAN) and reinforcement learning for multi-pattern target generation. 6GAN forces multiple generators to train with a multi-class discriminator and an alias detector to generate non-aliased active targets with different addressing pattern types. The rewards from the discriminator and the alias detector help supervise the address sequence decision-making process. After adversarial training, 6GAN's generators could keep a strong imitating ability for each pattern and 6GAN's discriminator obtains outstanding pattern discrimination ability with a 0.966 accuracy. Experiments indicate that our work outperformed the state-of-the-art target generation algorithms by reaching a higher-quality candidate set., The paper has been accepted at the 2021 IEEE International Conference on Computer Communications (INFOCOM 2021). The source code has been published at https://github.com/CuiTianyu961030/6GAN
- Published
- 2022
39. Benefits and Fast Construction of Efficient Two-Level Foldover Designs.
- Author
-
Errore, Anna, Jones, Bradley, Li, William, and Nachtsheim, Christopher J.
- Subjects
- *
SIMULATED annealing , *EXPERIMENTAL design , *ORTHOGONAL functions , *STATISTICAL correlation , *ALGORITHMS - Abstract
Recent work in two-level screening experiments has demonstrated the advantages of using small foldover designs, even when such designs are not orthogonal for the estimation of main effects (MEs). In this article, we provide further support for this argument and develop a fast algorithm for constructing efficient two-level foldover (EFD) designs. We show that these designs have equal or greater efficiency for estimating the ME model versus competitive designs in the literature and that our algorithmic approach allows the fast construction of designs with many more factors and/or runs. Our compromise algorithm allows the practitioner to choose among many designs making a trade-off between efficiency of the main effect estimates and correlation of the two-factor interactions (2FIs). Using our compromise approach, practitioners can decide just how much efficiency they are willing to sacrifice to avoid confounded 2FIs as well as lowering an omnibus measure of correlation among the 2FIs. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
40. Miguel Servet en España (1506-1527)
- Author
-
Enrique González González
- Subjects
History ,Alias ,Philosophy ,media_common.quotation_subject ,Certainty ,Humanities ,Sentence ,Education ,media_common - Abstract
Regarding Michael Servetus alias Reves, Villanovanus, or de Villeneufve, it is known with certainty that he was burnt at the stake, under a sentence from the Calvinist Geneva Council, on 27 October...
- Published
- 2020
- Full Text
- View/download PDF
41. Improved Two-Stage Decimator Structure Using Kaiser Hamming Sharpening
- Author
-
Supriya Aggarwal
- Subjects
Discrete mathematics ,0209 industrial biotechnology ,Decimation ,Alias ,Applied Mathematics ,Zero (complex analysis) ,Order (ring theory) ,02 engineering and technology ,Sharpening ,020901 industrial engineering & automation ,Moving average ,Integrator ,Signal Processing ,Hamming code ,Mathematics - Abstract
In this paper, we propose an efficient two-stage decimator structure based on Kaiser Hamming sharpening (KHS) of moving average filter. The proposed KHS decimator divides the overall decimation factor $$M = M_1M_2$$ , such that both $$M_1, M_2 \in {\mathbb {Z}}^+$$ . The first stage uses KHS with first and second order of tangency at unity and zero, respectively. The second stage uses the simplest KHS sharpening, i.e. first-order tangency at both unity and zero. The architecture of the proposed structure is designed to match the existing decimator to have nearly equal number of integrator sections operating at high sampling frequency of $$f_\mathrm{s}$$ . The pass-band droop at the normalized pass-band cut-off frequency of 1/2M in the proposed design is $$13.8\%$$ less as compared to the existing KHS decimator, with a compromise of $$3\%$$ in alias rejection. Further, as the normalized pass-band cut-off frequency is reduced to 1/4M, the proposed design in comparison to existing decimator has $$34.5\%$$ less droop with only $$2.3\%$$ compromise in alias rejection.
- Published
- 2020
- Full Text
- View/download PDF
42. Resolving period aliases for TESS monotransits recovered during the extended mission
- Author
-
Benjamin F. Cooke, Samuel Gill, Monika Lendl, Stéphane Udry, Don Pollacco, Peter J. Wheatley, David R. Anderson, François Bouchy, Nolan Grieves, Daniel Bayliss, and Louise D. Nielsen
- Subjects
Earth and Planetary Astrophysics (astro-ph.EP) ,Physics ,education.field_of_study ,Alias ,010308 nuclear & particles physics ,Population ,FOS: Physical sciences ,Astronomy ,Astronomy and Astrophysics ,Planetary system ,Q1 ,01 natural sciences ,Exoplanet ,Photometry (astronomy) ,Upgrade ,Space and Planetary Science ,Planet ,QB460 ,0103 physical sciences ,Transit (astronomy) ,education ,010303 astronomy & astrophysics ,QC ,Astrophysics - Earth and Planetary Astrophysics ,QB - Abstract
We set out to explore how best to mitigate the number of period aliases for a transiting TESS system with two identified transits separated by a large time period on the order of years. We simulate a realistic population of doubly transiting planets based on the observing strategy of the TESS primary and extended missions. We next simulate additional observations using photometry (NGTS) and spectroscopy (HARPS and CORALIE) and assess its impact on the period aliases of systems with two TESS transits. We find that TESS will detect around 400 exoplanets that exhibit one transit in each of the primary and extended missions. Based on the temporal coverage, each of these systems will have an average of 38 period aliases. We find that, assuming a combination of NGTS and CORALIE over observing campaigns spanning 50 days, we can find the true alias, and thus solve the period, for up to 207 of these systems with even more being solved if the observing campaigns are extended or we upgrade to HARPS over CORALIE., 11 pages, 8 figures. Accepted for publication in MNRAS
- Published
- 2020
- Full Text
- View/download PDF
43. Automated metric profiling and comparison of Ancient Greek verse epics in Hexameter
- Author
-
Oliver Schoisswohl and Evangelos C. Papakitsos
- Subjects
Profiling (computer programming) ,Language. Linguistic theory. Comparative grammar ,P101-410 ,Alias ,Computer science ,business.industry ,Hexameter ,Ancient Greek ,computer.software_genre ,language.human_language ,Metric (mathematics) ,Computational linguistics. Natural language processing ,language ,Artificial intelligence ,P98-98.5 ,Computational linguistics ,Scansion ,business ,Value (semiotics) ,computer ,Natural language processing - Abstract
This article describes a software tool, named Dactylo, which is capable of performing metrical analysis, alias scansion, of epics written in hexameter. The automated scansion is based on well-known scanning rules of various theoretical works. The development methodology introduces the concept of computerized metric profiling and metric distance, which is a measurement value that reflects the degree of similarity or dissimilarity between different epics. For this purpose, eight renowned epics have been scanned, including Iliad and Odyssey, with plenty of statistical information. Based on these outcomes, these epics can be classified in groups that reflect very well the three periods of their creation, namely Classical, Hellenistic and Late Antiquity. Dactylo demonstrates its ability to produce statistics for hexameter’s metric patterns in a massive scale, easily and accurately, becoming so a contribution of Computational Linguistics to the diachronic comparative and quantitative language studies.
- Published
- 2020
- Full Text
- View/download PDF
44. Alias in women's literature: feminist aspects in a gender context
- Author
-
Iuliia Galytska
- Subjects
narrative ,Alias ,lcsh:Philosophy (General) ,Gender studies ,Context (language use) ,lcsh:Political science ,women’s experience ,culture ,interdisciplinary approach ,gender ,Sociology ,androgynous nature ,lcsh:B1-5802 ,identity ,lcsh:J - Abstract
The problem of the identity of the woman hiding her gender under a male pseudonym makes us recollect U. Eco’s arguments about the truth and the purpose of literature as well as A. F. Losev’s ideas about the name and the meaning, the theories of the feminist literary critics K. Millett, M. Ellman, T. Moi, E. Showalter, etc. who have presented "women`s writing" and "writing about women" in the feminist field. As one of the central principles of feminist criticism is that no scientific view can ever be neutral, the problem of pseudonyms occupies an important place in the contemporary gender studies, explicitly or implicitly highlighting the artificially constructed debate, which divides "serious male literature" and "superficial and secondary female writing". On the one hand, this is the problem of feminism itself, on the other, it is a question of the role and place of the woman in the world` culture and history. In this kind of the analysis we cannot ignore such an epiphenomenon of postmodernism as "label change" with the postmodern emphasis on the sociocultural role of the context, which is especially relevant in aspects of the gender "name problem". The last one, undoubtedly, is included in the problematization of postmodern culture on the whole, since all cultural narratives have always been gender "stories". Today an individual construct his or her gender-reflecting reality, still the modelling of the new gender system is far from being complete. The created sign systems are ambivalent, the meanings are very unstable and can easily be hermeneutically interpreted. However, the role of hermeneutics in analyzing the relationship between the author and the sociocultural context is in the core of the gender aspects of literature, in general, and in the problems of the pseudonym as a change of "name", in particular. The latter is by all means relevant and important. Undoubtedly, one of the main incentives for feminist scholars in their turn to women's literature is connected with the patriarchal demand for women's "silence", their "dumbness" in culture and, accordingly, in literature. Obviously, there are two main interpretations of the concept of "female literature" in feminist criticism. The first one is the representation of female subjectivity in its difference from the male one. The second approach is the representation of "non-essentialist" female subjectivity, which is understood as the logical structure of the difference. In general, in the patriarchal dichotomy of the femininity and masculinity "women who write" are always dangerous. "Three strange sisters" – Anne, Charlotte and Emily Bronte wrote their novels under disguise of male pen names, exactly specifying two conceptual motives: the "Other" concept and the image of "Veil". In this context the motive of androgyny is also important from the point of view of both analysis and literary criticism. In ХIXth century George Sand (Aurora Dupin), having most vividly represented this concept, became an example for many subsequent generations of feminists – writers, actresses and media representatives. However, in our era of gender plurality, the question of the pseudonym as a problem of "genders" is not so relevant; more likely it is still a question of the priorities in the feminist theory. In the contemporary discourse of literary criticism many of the author’s socially significant features are perceived as gender neutral. In the postmodern paradigm the question of the androgynous identity of the man/woman writer requires its further actualization as the androgynous is often replaced by the bisexuality (J. Irving` "In One Person"). In general, it should be recognized that postmodern approaches to gender identity, which paint a "picture of the world" today, transform the female experience of being as the "Other", secondary and insignificant with a conceptual orientation to a fundamental variety of postmodern cognitive perspectives.
- Published
- 2020
45. Serialized Co-Training-Based Recognition of Medicine Names for Patent Mining and Retrieval
- Author
-
Caiquan Xiong and Na Deng
- Subjects
Thesaurus (information retrieval) ,Co-training ,Alias ,Computer science ,business.industry ,02 engineering and technology ,Traditional Chinese medicine ,computer.software_genre ,Identification (information) ,Named-entity recognition ,Hardware and Architecture ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,020201 artificial intelligence & image processing ,Segmentation ,Artificial intelligence ,business ,computer ,Software ,Natural language processing - Abstract
In the retrieval and mining of traditional Chinese medicine (TCM) patents, a key step is Chinese word segmentation and named entity recognition. However, the alias phenomenon of traditional Chinese medicines causes great challenges to Chinese word segmentation and named entity recognition in TCM patents, which directly affects the effect of patent mining. Because of the lack of a comprehensive Chinese herbal medicine name thesaurus, traditional thesaurus-based Chinese word segmentation and named entity recognition are not suitable for medicine identification in TCM patents. In view of the present situation, using the language characteristics and structural characteristics of TCM patent texts, a modified and serialized co-training method to recognize medicine names from TCM patent abstract texts is proposed. Experiments show that this method can maintain high accuracy under relatively low time complexity. In addition, this method can also be expanded to the recognition of other named entities in TCM patents, such as disease names, preparation methods, and so on.
- Published
- 2020
- Full Text
- View/download PDF
46. Systemizing Interprocedural Static Analysis of Large-scale Systems Code with Graspan
- Author
-
Kai Wang, Xuandong Li, Wensheng Dou, Guoqing Harry Xu, Yiyu Zhang, Ardalan Amiri Sani, Zhiqiang Zuo, Linzhang Wang, Aftab Hussain, Chenxi Wang, and Shenming Lu
- Subjects
Speedup ,Source lines of code ,General Computer Science ,Alias ,Computer science ,Dataflow ,020207 software engineering ,Static program analysis ,02 engineering and technology ,Parallel computing ,Static analysis ,020204 information systems ,Pointer (computer programming) ,Scalability ,0202 electrical engineering, electronic engineering, information engineering - Abstract
There is more than a decade-long history of using static analysis to find bugs in systems such as Linux. Most of the existing static analyses developed for these systems are simple checkers that find bugs based on pattern matching. Despite the presence of many sophisticated interprocedural analyses, few of them have been employed to improve checkers for systems code due to their complex implementations and poor scalability. In this article, we revisit the scalability problem of interprocedural static analysis from a “Big Data” perspective. That is, we turn sophisticated code analysis into Big Data analytics and leverage novel data processing techniques to solve this traditional programming language problem. We propose Graspan , a disk-based parallel graph system that uses an edge-pair centric computation model to compute dynamic transitive closures on very large program graphs. We develop two backends for Graspan, namely, Graspan-C running on CPUs and Graspan-G on GPUs, and present their designs in the article. Graspan-C can analyze large-scale systems code on any commodity PC, while, if GPUs are available, Graspan-G can be readily used to achieve orders of magnitude speedup by harnessing a GPU’s massive parallelism. We have implemented fully context-sensitive pointer/alias and dataflow analyses on Graspan. An evaluation of these analyses on large codebases written in multiple languages such as Linux and Apache Hadoop demonstrates that their Graspan implementations are language-independent, scale to millions of lines of code, and are much simpler than their original implementations. Moreover, we show that these analyses can be used to uncover many real-world bugs in large-scale systems code.
- Published
- 2020
- Full Text
- View/download PDF
47. Harmless Interpolation of Noisy Data in Regression
- Author
-
Vignesh Subramanian, Vidya Muthukumar, Anant Sahai, and Kailas Vodrahalli
- Subjects
FOS: Computer and information sciences ,Computer Science - Machine Learning ,Alias ,Generalization ,Computer science ,Linear model ,Machine Learning (stat.ML) ,020206 networking & telecommunications ,02 engineering and technology ,Overfitting ,01 natural sciences ,Machine Learning (cs.LG) ,010104 statistics & probability ,Kernel (linear algebra) ,Noise ,Data point ,Statistics - Machine Learning ,0202 electrical engineering, electronic engineering, information engineering ,0101 mathematics ,Algorithm ,Interpolation - Abstract
A continuing mystery in understanding the empirical success of deep neural networks is their ability to achieve zero training error and generalize well, even when the training data is noisy and there are more parameters than data points. We investigate this overparameterized regime in linear regression, where all solutions that minimize training error interpolate the data, including noise. We characterize the fundamental generalization (mean-squared) error of any interpolating solution in the presence of noise, and show that this error decays to zero with the number of features. Thus, overparameterization can be explicitly beneficial in ensuring harmless interpolation of noise. We discuss two root causes for poor generalization that are complementary in nature -- signal "bleeding" into a large number of alias features, and overfitting of noise by parsimonious feature selectors. For the sparse linear model with noise, we provide a hybrid interpolating scheme that mitigates both these issues and achieves order-optimal MSE over all possible interpolating solutions., 52 pages, expanded version of the paper presented at ITA in San Diego in Feb 2019, ISIT in Paris in July 2019, at Simons in July, and as a plenary at ITW in Visby in August 2019
- Published
- 2020
- Full Text
- View/download PDF
48. Perancangan Sistem Transaksi Non-Tunai Berbasis QR Code di Platform Android
- Author
-
Rawlson Yoshua Limbong and Jay Idoan Sihotang
- Subjects
Database ,Alias ,Computer science ,media_common.quotation_subject ,Payment ,computer.software_genre ,System requirements ,Cash ,Financial transaction ,Information system ,Mobile programming ,Android (operating system) ,computer ,media_common - Abstract
Dewasa ini perkembangan teknologi mempengaruhi berbagai aspek dalam kehidupan, termasuk dalam melakukan transaksi finansial. Di kampus Universitas Advent Indonesia, pembayaran masih menggunakan cara konvensional alias menggunakan uang kertas untuk pembayaran. Sehingga memungkinkan terjadinya kesalahan dalam pembayaran, maupun pengguna tidak bisa melacak history pembayaran yang dilakukan. Aplikasi yang dibangun diharapkan dapat menjadi alternative pembayaran di kampus. Aplikasi yang dibangun berdasarkan Analisa kebutuhan terhadap sistem lama, dan dibangun menggunakan Android dengan backend berbasis PHP. Proses pembayaran menggunakan validasi QR Code, baik untuk melakukan transaksi antar penjual dengan pengguna, maupun sesama pengguna. Hasil dari penelitian adalah sebuah aplikasi pembayaran berbasis QR Code yang dapat berjalan dengan baik dan teruji secara fungsional dan tampilannya.
- Published
- 2020
- Full Text
- View/download PDF
49. Nebengin: Android-based Collaborative Transportation Application
- Author
-
I Putu Arya Dharmadi, I Kadek Teo Prayoga Kartika, and I Made Sukarsa
- Subjects
Transportasi ,transportation ,Online chat ,lcsh:T58.5-58.64 ,Database ,Alias ,lcsh:Information technology ,Computer science ,business.industry ,Information technology ,Response time ,google map api ,Cloud computing ,ridesharing ,Service provider ,computer.software_genre ,lcsh:TA168 ,Kolaboratif ,Route search ,lcsh:Systems engineering ,Android (operating system) ,android ,business ,computer ,collaborative - Abstract
Online transportation services are transportation services that take advantage of advances in information technology. In Indonesia, several online transportation service providers have grown, such as Gojek, Grab and several other startup startups. In addition to the many benefits and conveniences that have been provided, the service price factor is still felt expensive for the community, especially the lower classes. One solution is to build a Collaborative Transportation Application that utilizes the Collaborative Transportation Management (CTM) interaction method. The main features contained in the application, namely the feature of finding driver routes in the direction of the consumer route, online chat, and route management by utilizing the Android mobile application based on Google Map API and Firebase Cloud Messaging. Performance testing using JMeter from a total of 300 virtual users performs 6 HTTP requests resulting in an average response time of 0.852 alias tolerated according to Apdex standards. Based on the results of testing of 15 respondents obtained the results that this application is easy to use, supports traveling activities, fast response time when used, features provided are quite complete, an accurate position tracking system, unidirectional route search is very compatible with consumer routes, and the process of coordination and driver collaboration is very good so that the travel costs borne by consumers become more economical.., Jasa transportasi online merupakan jasa transportasi yang memanfaatkan kemajuan teknologi informasi. Di Indonesia, telah tumbuh beberapa penyedia jasa transportasi online seperti Gojek, Grab dan beberapa startup rintisan lainnya. Di samping banyak manfaat dan kemudahan yang telah diberikan, faktor harga layanan masih dirasakan mahal bagi masyarakat terutama kelas bawah. Salah satu solusinya adalah dengan membangun Aplikasi Transportasi Kolaboratif yang memanfaatkan metode interaksi Collaborative Transportation Management (CTM). Fitur utama yang terdapat pada aplikasi, yaitu fitur mencari rute pengemudi-pengemudi yang searah dengan rute konsumen, obrolan daring, dan manajemen rute dengan memanfaatkan aplikasi mobile Android berbasis Google Map API dan Firebase Cloud Messaging. Pengujian performance testing menggunakan JMeter dari total 300 virtual users melakukan 6 HTTP request menghasilkan waktu respon rata-rata 0.852 alias tolerated sesuai standar Apdex. Berdasarkan hasil pengujian terhadap 15 reponden diperoleh hasil bahwa aplikasi ini mudah digunakan, mendukung aktivitas bepergian, waktu respon yang cepat ketika digunakan, fitur yang disediakan cukup lengkap, sistem posisi pelacakan yang akurat, pencarian rute searah sangat cocok dengan rute konsumen, serta proses koordinasi dan kolaborasi pengemudi-pengemudi sangat baik sehingga tarif perjalanan yang ditanggung konsumen menjadi lebih ekonomis.
- Published
- 2020
- Full Text
- View/download PDF
50. Evaluation on alias relations between main effect and interaction in Plackett Burman design (N=20) and its application to guide assignments
- Author
-
Yoshiki Oishi and Shu Yamada
- Subjects
Mathematical optimization ,Plackett–Burman design ,Alias ,Main effect ,Allocation method ,Mathematics - Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.