WorldWideScience

Sample records for hoc semantic interference

  1. Interference in wireless ad hoc networks with smart antennas

    KAUST Repository

    Alabdulmohsin, Ibrahim

    2014-01-01

    In this paper, we show that the use of directional antennas in wireless ad hoc networks can actually increase interference due to limitations of virtual carrier sensing. We derive a simple mathematical expression for interference in both physical

  2. Interference in wireless ad hoc networks with smart antennas

    KAUST Repository

    Alabdulmohsin, Ibrahim

    2014-08-01

    In this paper, we show that the use of directional antennas in wireless ad hoc networks can actually increase interference due to limitations of virtual carrier sensing. We derive a simple mathematical expression for interference in both physical and virtual carrier sense networks, which reveals counter-intuitively that receivers in large dense networks with directional antennas can experience larger interference than in omnidirectional networks unless the beamwidth is sufficiently small. Validity of mathematical analysis is confirmed using simulations.

  3. Proposal of interference reduction routing for ad-hoc networks

    Directory of Open Access Journals (Sweden)

    Katsuhiro Naito

    2010-10-01

    Full Text Available In this paper, we propose an interference reduction routing protocol for ad-hoc networks. The interference is one of the degradation factors in wireless communications. In the ad-hoc network, some nodes communicate simultaneously. Therefore, these communications cause interference each other, and some packets are corrupted due to interference from another node. In the proposed protocol, each node estimates required transmission power according to hello messages. Therefore, the node can transmit a data packet with minimum required transmission power. Consequently, the interference against neighbor nodes can be reduced. From simulation results, we can find that the proposed protocol can reduce the number of control messages and can improve the throughput performance.

  4. Preserved cumulative semantic interference despite amnesia

    Directory of Open Access Journals (Sweden)

    Gary Michael Oppenheim

    2015-05-01

    As predicted by Oppenheim et al’s (2010 implicit incremental learning account, WRP’s BCN RTs demonstrated strong (and significant repetition priming and semantic blocking effects (Figure 1. Similar to typical results from neurally intact undergraduates, WRP took longer to name pictures presented in semantically homogeneous blocks than in heterogeneous blocks, an effect that increased with each cycle. This result challenges accounts that ascribe cumulative semantic interference in this task to explicit memory mechanisms, instead suggesting that the effect has the sort of implicit learning bases that are typically spared in hippocampal amnesia.

  5. Semantic category interference in overt picture naming

    NARCIS (Netherlands)

    Maess, B.; Friederici, A.D.; Damian, M.F.; Meyer, A.S.; Levelt, W.J.M.

    2002-01-01

    The study investigated the neuronal basis of the retrieval of words from the mental lexicon. The semantic category interference effect was used to locate lexical retrieval processes in time and space. This effect reflects the finding that, for overt naming, volunteers are slower when naming pictures

  6. Acoustic and semantic interference effects in words and pictures.

    Science.gov (United States)

    Dhawan, M; Pellegrino, J W

    1977-05-01

    Interference effects for pictures and words were investigated using a probe-recall task. Word stimuli showed acoustic interference effects for items at the end of the list and semantic interference effects for items at the beginning of the list, similar to results of Kintsch and Buschke (1969). Picture stimuli showed large semantic interference effects at all list positions with smaller acoustic interference effects. The results were related to latency data on picture-word processing and interpreted in terms of the differential order, probability, and/or speed of access to acoustic and semantic levels of processing. A levels of processing explanation of picture-word retention differences was related to dual coding theory. Both theoretical positions converge on an explanation of picture-word retention differences as a function of the relative capacity for semantic or associative processing.

  7. An accumulator model of semantic interference

    NARCIS (Netherlands)

    van Maanen, Leendert; van Rijn, Hedderik

    To explain latency effects in picture-word interference tasks, cognitive models need to account for both interference and stimulus onset asynchrony (SOA) effects. As opposed to most models of picture-word interference, which model the time course during the task in a ballistic manner, the RACE model

  8. Task choice and semantic interference in picture naming

    OpenAIRE

    Piai, V.; Roelofs, A.P.A.; Schriefers, H.J.

    2015-01-01

    Evidence from dual-task performance indicates that speakers prefer not to select simultaneous responses in picture naming and another unrelated task, suggesting a response selection bottleneck in naming. In particular, when participants respond to tones with a manual response and name pictures with superimposed semantically related or unrelated distractor words, semantic interference in naming tends to be constant across stimulus onset asynchronies (SOAs) between the tone stimulus and the pic...

  9. Resolving Semantic Interference during Word Production Requires Central Attention

    Science.gov (United States)

    Kleinman, Daniel

    2013-01-01

    The semantic picture-word interference task has been used to diagnose how speakers resolve competition while selecting words for production. The attentional demands of this resolution process were assessed in 2 dual-task experiments (tone classification followed by picture naming). In Experiment 1, when pictures and distractor words were presented…

  10. Different Loci of Semantic Interference in Picture Naming vs. Word-Picture Matching Tasks

    OpenAIRE

    Harvey, Denise Y.; Schnur, Tatiana T.

    2016-01-01

    Naming pictures and matching words to pictures belonging to the same semantic category impairs performance relative to when stimuli come from different semantic categories (i.e., semantic interference). Despite similar semantic interference phenomena in both picture naming and word-picture matching tasks, the locus of interference has been attributed to different levels of the language system – lexical in naming and semantic in word-picture matching. Although both tasks involve access to shar...

  11. Task choice and semantic interference in picture naming.

    Science.gov (United States)

    Piai, Vitória; Roelofs, Ardi; Schriefers, Herbert

    2015-05-01

    Evidence from dual-task performance indicates that speakers prefer not to select simultaneous responses in picture naming and another unrelated task, suggesting a response selection bottleneck in naming. In particular, when participants respond to tones with a manual response and name pictures with superimposed semantically related or unrelated distractor words, semantic interference in naming tends to be constant across stimulus onset asynchronies (SOAs) between the tone stimulus and the picture-word stimulus. In the present study, we examine whether semantic interference in picture naming depends on SOA in case of a task choice (naming the picture vs reading the word of a picture-word stimulus) based on tones. This situation requires concurrent processing of the tone stimulus and the picture-word stimulus, but not a manual response to the tones. On each trial, participants either named a picture or read aloud a word depending on the pitch of a tone, which was presented simultaneously with picture-word onset or 350 ms or 1000 ms before picture-word onset. Semantic interference was present with tone pre-exposure, but absent when tone and picture-word stimulus were presented simultaneously. Against the background of the available studies, these results support an account according to which speakers tend to avoid concurrent response selection, but can engage in other types of concurrent processing, such as task choices. Copyright © 2015 Elsevier B.V. All rights reserved.

  12. Ensuring Secure Non-interference of Programs by Game Semantics

    DEFF Research Database (Denmark)

    Dimovski, Aleksandar

    Non-interference is a security property which states that improper information leakages due to direct and indirect flows have not occurred through executing programs. In this paper we investigate a game semantics based formulation of non-interference that allows to perform a security analysis...... of closed and open procedural programs. We show that such formulation is amenable to automated verification techniques. The practicality of this method is illustrated by several examples, which also emphasize its advantage compared to known operational methods for reasoning about open programs....

  13. Different Loci of Semantic Interference in Picture Naming vs. Word-Picture Matching Tasks.

    Science.gov (United States)

    Harvey, Denise Y; Schnur, Tatiana T

    2016-01-01

    Naming pictures and matching words to pictures belonging to the same semantic category impairs performance relative to when stimuli come from different semantic categories (i.e., semantic interference). Despite similar semantic interference phenomena in both picture naming and word-picture matching tasks, the locus of interference has been attributed to different levels of the language system - lexical in naming and semantic in word-picture matching. Although both tasks involve access to shared semantic representations, the extent to which interference originates and/or has its locus at a shared level remains unclear, as these effects are often investigated in isolation. We manipulated semantic context in cyclical picture naming and word-picture matching tasks, and tested whether factors tapping semantic-level (generalization of interference to novel category items) and lexical-level processes (interactions with lexical frequency) affected the magnitude of interference, while also assessing whether interference occurs at a shared processing level(s) (transfer of interference across tasks). We found that semantic interference in naming was sensitive to both semantic- and lexical-level processes (i.e., larger interference for novel vs. old and low- vs. high-frequency stimuli), consistent with a semantically mediated lexical locus. Interference in word-picture matching exhibited stable interference for old and novel stimuli and did not interact with lexical frequency. Further, interference transferred from word-picture matching to naming. Together, these experiments provide evidence to suggest that semantic interference in both tasks originates at a shared processing stage (presumably at the semantic level), but that it exerts its effect at different loci when naming pictures vs. matching words to pictures.

  14. Long-term interference at the semantic level: Evidence from blocked-cyclic picture matching.

    Science.gov (United States)

    Wei, Tao; Schnur, Tatiana T

    2016-01-01

    Processing semantically related stimuli creates interference across various domains of cognition, including language and memory. In this study, we identify the locus and mechanism of interference when retrieving meanings associated with words and pictures. Subjects matched a probe stimulus (e.g., cat) to its associated target picture (e.g., yarn) from an array of unrelated pictures. Across trials, probes were either semantically related or unrelated. To test the locus of interference, we presented probes as either words or pictures. If semantic interference occurs at the stage common to both tasks, that is, access to semantic representations, then interference should occur in both probe presentation modalities. Results showed clear semantic interference effects independent of presentation modality and lexical frequency, confirming a semantic locus of interference in comprehension. To test the mechanism of interference, we repeated trials across 4 presentation cycles and manipulated the number of unrelated intervening trials (zero vs. two). We found that semantic interference was additive across cycles and survived 2 intervening trials, demonstrating interference to be long-lasting as opposed to short-lived. However, interference was smaller with zero versus 2 intervening trials, which we interpret to suggest that short-lived facilitation counteracted the long-lived interference. We propose that retrieving meanings associated with words/pictures from the same semantic category yields both interference due to long-lasting changes in connection strength between semantic representations (i.e., incremental learning) and facilitation caused by short-lived residual activation. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  15. Semantic Interference in Immediate and Delayed Naming and Reading: Attention and Task Decisions

    Science.gov (United States)

    Piai, Vitoria; Roelofs, Ardi; Schriefers, Herbert

    2011-01-01

    Disagreement exists about whether lexical selection in word production is a competitive process. Competition predicts semantic interference from distractor words in immediate but not in delayed picture naming. In contrast, Janssen, Schirm, Mahon, and Caramazza (2008) obtained semantic interference in delayed picture naming when participants had to…

  16. Type-specific proactive interference in patients with semantic and phonological STM deficits.

    Science.gov (United States)

    Harris, Lara; Olson, Andrew; Humphreys, Glyn

    2014-01-01

    Prior neuropsychological evidence suggests that semantic and phonological components of short-term memory (STM) are functionally and neurologically distinct. The current paper examines proactive interference (PI) from semantic and phonological information in two STM-impaired patients, DS (semantic STM deficit) and AK (phonological STM deficit). In Experiment 1 probe recognition tasks with open and closed sets of stimuli were used. Phonological PI was assessed using nonword items, and semantic and phonological PI was assessed using words. In Experiment 2 phonological and semantic PI was elicited by an item recognition probe test with stimuli that bore phonological and semantic relations to the probes. The data suggested heightened phonological PI for the semantic STM patient, and exaggerated effects of semantic PI in the phonological STM case. The findings are consistent with an account of extremely rapid decay of activated type-specific representations in cases of severely impaired phonological and semantic STM.

  17. ERP evidence of distinct processes underlying semantic facilitation and interference in word production.

    Science.gov (United States)

    Python, Grégoire; Fargier, Raphaël; Laganaro, Marina

    2018-02-01

    In everyday conversations, we take advantage of lexical-semantic contexts to facilitate speech production, but at the same time, we also have to reduce interference and inhibit semantic competitors. The blocked cyclic naming paradigm (BCNP) has been used to investigate such context effects. Typical results on production latencies showed semantic facilitation (or no effect) during the first presentation cycle, and interference emerging in subsequent cycles. Even if semantic contexts might be just as facilitative as interfering, previous BCNP studies focused on interference, which was interpreted as reflecting lemma selection and self-monitoring processes. Facilitation in the first cycle was rarely considered/analysed, although it potentially informs on word production to the same extent as interference. Here we contrasted the event-related potential (ERP) signatures of both semantic facilitation and interference in a BCNP. ERPs differed between homogeneous and heterogeneous blocks from about 365 msec post picture onset in the first cycle (facilitation) and in an earlier time-window (270 msec post picture onset) in the third cycle (interference). Three different analyses of the ERPs converge towards distinct processes underlying semantic facilitation and interference (post-lexical vs lexical respectively). The loci of semantic facilitation and interference are interpreted in the context of different theoretical frameworks of language production: the post-lexical locus of semantic facilitation involves interactive phonological-semantic processes and/or self-monitoring, whereas the lexical locus of semantic interference is in line with selection through increased lexical competition. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. Semantic interference in picture naming during dual-task performance does not vary with reading ability.

    Science.gov (United States)

    Piai, Vitória; Roelofs, Ardi; Roete, Ingeborg

    2015-01-01

    Previous dual-task studies examining the locus of semantic interference of distractor words in picture naming have obtained diverging results. In these studies, participants manually responded to tones and named pictures while ignoring distractor words (picture-word interference, PWI) with varying stimulus onset asynchrony (SOA) between tone and PWI stimulus. Whereas some studies observed no semantic interference at short SOAs, other studies observed effects of similar magnitude at short and long SOAs. The absence of semantic interference in some studies may perhaps be due to better reading skill of participants in these than in the other studies. According to such a reading-ability account, participants' reading skill should be predictive of the magnitude of their interference effect at short SOAs. To test this account, we conducted a dual-task study with tone discrimination and PWI tasks and measured participants' reading ability. The semantic interference effect was of similar magnitude at both short and long SOAs. Participants' reading ability was predictive of their naming speed but not of their semantic interference effect, contrary to the reading ability account. We conclude that the magnitude of semantic interference in picture naming during dual-task performance does not depend on reading skill.

  19. Localizing semantic interference from distractor sounds in picture naming: A dual-task study.

    Science.gov (United States)

    Mädebach, Andreas; Kieseler, Marie-Luise; Jescheniak, Jörg D

    2017-10-13

    In this study we explored the locus of semantic interference in a novel picture-sound interference task in which participants name pictures while ignoring environmental distractor sounds. In a previous study using this task (Mädebach, Wöhner, Kieseler, & Jescheniak, in Journal of Experimental Psychology: Human Perception and Performance, 43, 1629-1646, 2017), we showed that semantically related distractor sounds (e.g., BARKING dog ) interfere with a picture-naming response (e.g., "horse") more strongly than unrelated distractor sounds do (e.g., DRUMMING drum ). In the experiment reported here, we employed the psychological refractory period (PRP) approach to explore the locus of this effect. We combined a geometric form classification task (square vs. circle; Task 1) with the picture-sound interference task (Task 2). The stimulus onset asynchrony (SOA) between the tasks was systematically varied (0 vs. 500 ms). There were three central findings. First, the semantic interference effect from distractor sounds was replicated. Second, picture naming (in Task 2) was slower with the short than with the long task SOA. Third, both effects were additive-that is, the semantic interference effects were of similar magnitude at both task SOAs. This suggests that the interference arises during response selection or later stages, not during early perceptual processing. This finding corroborates the theory that semantic interference from distractor sounds reflects a competitive selection mechanism in word production.

  20. Modulation of alpha oscillations is required for the suppression of semantic interference.

    Science.gov (United States)

    Melnik, Natalia; Mapelli, Igor; Özkurt, Tolga Esat

    2017-10-01

    Recent findings on alpha band oscillations suggest their important role in memory consolidation and suppression of external distractors such as environmental noise. However, less attention was given to the phenomenon of internal distracting information being solely inherent to the stimuli content. Human memory may be prone to internal distractions caused by semantic relatedness between the meaning of words (e.g., atom, neutron, nucleus, etc.) to be encoded, i.e., semantic interference. Our study investigates the brain oscillatory dynamics behind the semantic interference phenomenon, whose possible outcome is known as false memories. In this direction, Deese-Roediger-McDermott word lists were appropriated for a modified Sternberg paradigm in auditory modality. Participants received semantically related and unrelated word lists via headphones while EEG data were acquired. Semantic interference triggered the false memory rates to be higher than those of other types of memory errors. Analysis demonstrated that the upper part of alpha band (∼10-12Hz) power decreases on parieto-occipital channels in the retention interval, prior to the probe item for semantically related condition. Our study elucidates the oscillatory mechanisms behind semantic interference by relying on alpha functional inhibition theory. Copyright © 2017 Elsevier Inc. All rights reserved.

  1. Semantic interference in picture naming during dual-task performance does not vary with reading ability

    NARCIS (Netherlands)

    Piai, V.; Roelofs, A.P.A.; Roete, I.E.C.

    2015-01-01

    Previous dual-task studies examining the locus of semantic interference of distractor words in picture naming have obtained diverging results. In these studies, participants manually responded to tones and named pictures while ignoring distractor words (picture-word interference, PWI) with varying

  2. Long-Term Interference at the Semantic Level: Evidence from Blocked-Cyclic Picture Matching

    Science.gov (United States)

    Wei, Tao; Schnur, Tatiana T.

    2016-01-01

    Processing semantically related stimuli creates interference across various domains of cognition, including language and memory. In this study, we identify the locus and mechanism of interference when retrieving meanings associated with words and pictures. Subjects matched a probe stimulus (e.g., cat) to its associated target picture (e.g., yarn)…

  3. Stroop Interference in a Delayed Match-to-Sample Task: Evidence for Semantic Competition

    Directory of Open Access Journals (Sweden)

    Bradley R. Sturz

    2013-11-01

    Full Text Available Discussions of the source of the Stroop interference effect continue to pervade the literature. Semantic competition posits that interference results from competing semantic activation of word and color dimensions of the stimulus prior to response selection. Response competition posits that interference results from competing responses for articulating the word dimension versus the color dimension at the time of response selection. We embedded Stroop stimuli into a delayed match-to-sample task in an attempt to test semantic and response competition accounts of the interference effect. Participants viewed a sample color word in black or colored fonts that were congruent or incongruent with respect to the color word itself. After a 5s delay, participants were presented with two targets (i.e., a match and a foil and were instructed to select the correct match. We probed each dimension independently during target presentations via color targets (i.e., two colors or word targets (i.e., two words and manipulated whether the semantic content of the foil was related to the semantic content of the irrelevant sample dimension (e.g., word sample red in blue font with the word red as the match and the word blue as the foil. We provide evidence for Stroop interference such that response times increased for incongruent trials even in the presence of a response option with semantic content unrelated to the semantic content of the irrelevant sample dimension. Accuracy also deteriorated during the related foil trials. A follow-up experiment with a 10s delay between sample and targets replicated the results. Results appear to provide converging evidence for Stroop interference in a delayed match-to-sample task in a manner that is consistent with an explanation based upon semantic competition and inconsistent with an explanation based upon response competition.

  4. Semantic interference from distractor pictures in single-picture naming: evidence for competitive lexical selection.

    Science.gov (United States)

    Jescheniak, Jörg D; Matushanskaya, Asya; Mädebach, Andreas; Müller, Matthias M

    2014-10-01

    Picture-naming studies have demonstrated interference from semantic-categorically related distractor words, but not from corresponding distractor pictures, and the lack of generality of the interference effect has been argued to challenge theories viewing lexical selection in speech production as a competitive process. Here, we demonstrate that semantic interference from context pictures does become visible, if sufficient attention is allocated to them. We combined picture naming with a spatial-cuing procedure. When participants' attention was shifted to the distractor, semantically related distractor pictures interfered with the response, as compared with unrelated distractor pictures. This finding supports models conceiving lexical retrieval as competitive (Levelt, Roelofs, & Meyer, 1999) but is difficult to reconcile with the response exclusion hypothesis (Finkbeiner & Caramazza, 2006b) proposed as an alternative.

  5. Interference by Process, Not Content, Determines Semantic Auditory Distraction

    Science.gov (United States)

    Marsh, John E.; Hughes, Robert W.; Jones, Dylan M.

    2009-01-01

    Distraction by irrelevant background sound of visually-based cognitive tasks illustrates the vulnerability of attentional selectivity across modalities. Four experiments centred on auditory distraction during tests of memory for visually-presented semantic information. Meaningful irrelevant speech disrupted the free recall of semantic…

  6. The paca that roared: Immediate cumulative semantic interference among newly acquired words.

    Science.gov (United States)

    Oppenheim, Gary M

    2018-08-01

    With 40,000 words in the average vocabulary, how can speakers find the specific words that they want so quickly and easily? Cumulative semantic interference in language production provides a clue: when naming a large series of pictures, with a few mammals sprinkled about, naming each subsequent mammal becomes slower and more error-prone. Such interference mirrors predictions from an incremental learning algorithm applied to meaning-driven retrieval from an established vocabulary, suggesting retrieval benefits from a constant, implicit, re-optimization process (Oppenheim et al., 2010). But how quickly would a new mammal (e.g. paca) engage in this re-optimization? In this experiment, 18 participants studied 3 novel and 3 familiar exemplars from each of six semantic categories, and immediately performed a timed picture-naming task. Consistent with the learning model's predictions, naming latencies revealed immediate cumulative semantic interference in all directions: from new words to new words, from new words to old words, from old words to new words, and from old words to old words. Repeating the procedure several days later produced similar-magnitude effects, demonstrating that newly acquired words can be immediately semantically integrated, at least to the extent necessary to produce typical cumulative semantic interference. These findings extend the Dark Side model's scope to include novel word production, and are considered in terms of mechanisms for lexical selection. Copyright © 2018 Elsevier B.V. All rights reserved.

  7. The modulating effect of education on semantic interference during healthy aging.

    Directory of Open Access Journals (Sweden)

    Daniela Paolieri

    Full Text Available Aging has traditionally been related to impairments in name retrieval. These impairments have usually been explained by a phonological transmission deficit hypothesis or by an inhibitory deficit hypothesis. This decline can, however, be modulated by the educational level of the sample. This study analyzed the possible role of these approaches in explaining both object and face naming impairments during aging. Older adults with low and high educational level and young adults with high educational level were asked to repeatedly name objects or famous people using the semantic-blocking paradigm. We compared naming when exemplars were presented in a semantically homogeneous or in a semantically heterogeneous context. Results revealed significantly slower rates of both face and object naming in the homogeneous context (i.e., semantic interference, with a stronger effect for face naming. Interestingly, the group of older adults with a lower educational level showed an increased semantic interference effect during face naming. These findings suggest the joint work of the two mechanisms proposed to explain age-related naming difficulties, i.e., the inhibitory deficit and the transmission deficit hypothesis. Therefore, the stronger vulnerability to semantic interference in the lower educated older adult sample would possibly point to a failure in the inhibitory mechanisms in charge of interference resolution, as proposed by the inhibitory deficit hypothesis. In addition, the fact that this interference effect was mainly restricted to face naming and not to object naming would be consistent with the increased age-related difficulties during proper name retrieval, as suggested by the transmission deficit hypothesis.

  8. The modulating effect of education on semantic interference during healthy aging.

    Science.gov (United States)

    Paolieri, Daniela; Marful, Alejandra; Morales, Luis; Bajo, María Teresa

    2018-01-01

    Aging has traditionally been related to impairments in name retrieval. These impairments have usually been explained by a phonological transmission deficit hypothesis or by an inhibitory deficit hypothesis. This decline can, however, be modulated by the educational level of the sample. This study analyzed the possible role of these approaches in explaining both object and face naming impairments during aging. Older adults with low and high educational level and young adults with high educational level were asked to repeatedly name objects or famous people using the semantic-blocking paradigm. We compared naming when exemplars were presented in a semantically homogeneous or in a semantically heterogeneous context. Results revealed significantly slower rates of both face and object naming in the homogeneous context (i.e., semantic interference), with a stronger effect for face naming. Interestingly, the group of older adults with a lower educational level showed an increased semantic interference effect during face naming. These findings suggest the joint work of the two mechanisms proposed to explain age-related naming difficulties, i.e., the inhibitory deficit and the transmission deficit hypothesis. Therefore, the stronger vulnerability to semantic interference in the lower educated older adult sample would possibly point to a failure in the inhibitory mechanisms in charge of interference resolution, as proposed by the inhibitory deficit hypothesis. In addition, the fact that this interference effect was mainly restricted to face naming and not to object naming would be consistent with the increased age-related difficulties during proper name retrieval, as suggested by the transmission deficit hypothesis.

  9. Activation of semantic information at the sublexical level during handwriting production: Evidence from inhibition effects of Chinese semantic radicals in the picture-word interference paradigm.

    Science.gov (United States)

    Chen, Xuqian; Liao, Yuanlan; Chen, Xianzhe

    2017-08-01

    Using a non-alphabetic language (e.g., Chinese), the present study tested a novel view that semantic information at the sublexical level should be activated during handwriting production. Over 80% of Chinese characters are phonograms, in which semantic radicals represent category information (e.g., 'chair,' 'peach,' 'orange' are related to plants) while phonetic radicals represent phonetic information (e.g., 'wolf,' 'brightness,' 'male,' are all pronounced /lang/). Under different semantic category conditions at the lexical level (semantically related in Experiment 1; semantically unrelated in Experiment 2), the orthographic relatedness and semantic relatedness of semantic radicals in the picture name and its distractor were manipulated under different SOAs (i.e., stimulus onset asynchrony, the interval between the onset of the picture and the onset of the interference word). Two questions were addressed: (1) Is it possible that semantic information could be activated in the sublexical level conditions? (2) How are semantic and orthographic information dynamically accessed in word production? Results showed that both orthographic and semantic information were activated under the present picture-word interference paradigm, dynamically under different SOAs, which supported our view that discussions on semantic processes in the writing modality should be extended to the sublexical level. The current findings provide possibility for building new orthography-phonology-semantics models in writing. © 2017 Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  10. Semantic category interference in overt picture naming: Sharpening current density localization by PCA

    NARCIS (Netherlands)

    Maess, B.; Friederici, A.D.; Damian, M.F.; Meyer, A.S.; Levelt, W.J.M.

    2002-01-01

    The study investigated the neuronal basis of the retrieval of words from the mental lexicon. The semantic category interference effect was used to locate lexical retrieval processes in time and space. This effect reflects the finding that, for overt naming, volunteers are slower when naming pictures

  11. Locus of Semantic Interference in Picture Naming: Evidence from Dual-Task Performance

    Science.gov (United States)

    Piai, Vitória; Roelofs, Ardi; Schriefers, Herbert

    2014-01-01

    Disagreement exists regarding the functional locus of semantic interference of distractor words in picture naming. This effect is a cornerstone of modern psycholinguistic models of word production, which assume that it arises in lexical response-selection. However, recent evidence from studies of dual-task performance suggests a locus in…

  12. Single-Word Predictions of Upcoming Language During Comprehension: Evidence from the Cumulative Semantic Interference Task

    Science.gov (United States)

    Kleinman, Daniel; Runnqvist, Elin; Ferreira, Victor S.

    2015-01-01

    Comprehenders predict upcoming speech and text on the basis of linguistic input. How many predictions do comprehenders make for an upcoming word? If a listener strongly expects to hear the word “sock”, is the word “shirt” partially expected as well, is it actively inhibited, or is it ignored? The present research addressed these questions by measuring the “downstream” effects of prediction on the processing of subsequently presented stimuli using the cumulative semantic interference paradigm. In three experiments, subjects named pictures (sock) that were presented either in isolation or after strongly constraining sentence frames (“After doing his laundry, Mark always seemed to be missing one…”). Naming sock slowed the subsequent naming of the picture shirt – the standard cumulative semantic interference effect. However, although picture naming was much faster after sentence frames, the interference effect was not modulated by the context (bare vs. sentence) in which either picture was presented. According to the only model of cumulative semantic interference that can account for such a pattern of data, this indicates that comprehenders pre-activated and maintained the pre-activation of best sentence completions (sock) but did not maintain the pre-activation of less likely completions (shirt). Thus, comprehenders predicted only the most probable completion for each sentence. PMID:25917550

  13. Resolving semantic and proactive interference in memory over the short-term.

    Science.gov (United States)

    Atkins, Alexandra S; Berman, Marc G; Reuter-Lorenz, Patricia A; Lewis, Richard L; Jonides, John

    2011-07-01

    Interference is a major source of short-term errors of memory. The present investigation explores the relationship between two important forms of interference: proactive interference (PI), induced by the need to reject recently studied items no longer relevant to task performance, and semantic interference (SI), induced by the need to reject lures sharing a meaningful relationship with current memoranda. We explore the possibility that shared cognitive control processes are recruited to resolve both forms of interference. In Experiment 1, we find that the requirement to engage in articulatory suppression during the retention interval of tasks that induce either PI or SI increases both forms of interference similarly and selectively. In Experiment 2, we develop a task to examine PI and SI within the same experimental context. The results show interactive effects between factors that lead to the two forms of interference. Taken together, these findings support contextual-cuing models of short-term remembering (Nairne, Annual Review of Psychology, 53, 53-81 2002), where the context in which retrieval occurs can influence susceptibility to interference. Lastly, we discuss several theoretical hypotheses concerning the cognitive control processes that are recruited to resolve SI and PI in short-term remembering.

  14. Semantic category interference in overt picture naming: sharpening current density localization by PCA.

    Science.gov (United States)

    Maess, Burkhard; Friederici, Angela D; Damian, Markus; Meyer, Antje S; Levelt, Willem J M

    2002-04-01

    The study investigated the neuronal basis of the retrieval of words from the mental lexicon. The semantic category interference effect was used to locate lexical retrieval processes in time and space. This effect reflects the finding that, for overt naming, volunteers are slower when naming pictures out of a sequence of items from the same semantic category than from different categories. Participants named pictures blockwise either in the context of same- or mixed-category items while the brain response was registered using magnetoencephalography (MEG). Fifteen out of 20 participants showed longer response latencies in the same-category compared to the mixed-category condition. Event-related MEG signals for the participants demonstrating the interference effect were submitted to a current source density (CSD) analysis. As a new approach, a principal component analysis was applied to decompose the grand average CSD distribution into spatial subcomponents (factors). The spatial factor indicating left temporal activity revealed significantly different activation for the same-category compared to the mixed-category condition in the time window between 150 and 225 msec post picture onset. These findings indicate a major involvement of the left temporal cortex in the semantic interference effect. As this effect has been shown to take place at the level of lexical selection, the data suggest that the left temporal cortex supports processes of lexical retrieval during production.

  15. Selective Inhibition and Naming Performance in Semantic Blocking, Picture-Word Interference, and Color-Word Stroop Tasks

    Science.gov (United States)

    Shao, Zeshu; Roelofs, Ardi; Martin, Randi C.; Meyer, Antje S.

    2015-01-01

    In 2 studies, we examined whether explicit distractors are necessary and sufficient to evoke selective inhibition in 3 naming tasks: the semantic blocking, picture-word interference, and color-word Stroop task. Delta plots were used to quantify the size of the interference effects as a function of reaction time (RT). Selective inhibition was…

  16. Language production in a shared task: Cumulative semantic interference from self- and other-produced context words

    OpenAIRE

    Hoedemaker, R.; Ernst, J.; Meyer, A.; Belke, E.

    2017-01-01

    This study assessed the effects of semantic context in the form of self-produced and other-produced words on subsequent language production. Pairs of participants performed a joint picture naming task, taking turns while naming a continuous series of pictures. In the single-speaker version of this paradigm, naming latencies have been found to increase for successive presentations of exemplars from the same category, a phenomenon known as Cumulative Semantic Interference (CSI). As expected, th...

  17. Facial and semantic emotional interference: A pilot study on the behavioral and cortical responses to the dual valence association task

    Directory of Open Access Journals (Sweden)

    Petroni Agustín

    2011-04-01

    Full Text Available Abstract Background Integration of compatible or incompatible emotional valence and semantic information is an essential aspect of complex social interactions. A modified version of the Implicit Association Test (IAT called Dual Valence Association Task (DVAT was designed in order to measure conflict resolution processing from compatibility/incompatibly of semantic and facial valence. The DVAT involves two emotional valence evaluative tasks which elicits two forms of emotional compatible/incompatible associations (facial and semantic. Methods Behavioural measures and Event Related Potentials were recorded while participants performed the DVAT. Results Behavioural data showed a robust effect that distinguished compatible/incompatible tasks. The effects of valence and contextual association (between facial and semantic stimuli showed early discrimination in N170 of faces. The LPP component was modulated by the compatibility of the DVAT. Conclusions Results suggest that DVAT is a robust paradigm for studying the emotional interference effect in the processing of simultaneous information from semantic and facial stimuli.

  18. Naming and categorizing objects: task differences modulate the polarity of semantic effects in the picture-word interference paradigm.

    Science.gov (United States)

    Hantsch, Ansgar; Jescheniak, Jörg D; Mädebach, Andreas

    2012-07-01

    The picture-word interference paradigm is a prominent tool for studying lexical retrieval during speech production. When participants name the pictures, interference from semantically related distractor words has regularly been shown. By contrast, when participants categorize the pictures, facilitation from semantically related distractors has typically been found. In the extant studies, however, differences in the task instructions (naming vs. categorizing) were confounded with the response level: While responses in naming were typically located at the basic level (e.g., "dog"), responses were located at the superordinate level in categorization (e.g., "animal"). The present study avoided this confound by having participants respond at the basic level in both naming and categorization, using the same pictures, distractors, and verbal responses. Our findings confirm the polarity reversal of the semantic effects--that is, semantic interference in naming, and semantic facilitation in categorization. These findings show that the polarity reversal of the semantic effect is indeed due to the different tasks and is not an artifact of the different response levels used in previous studies. Implications for current models of language production are discussed.

  19. Brain circuitries involved in semantic interference by demands of emotional and non-emotional distractors.

    Directory of Open Access Journals (Sweden)

    Natalia Chechko

    Full Text Available BACKGROUND: Previous studies have indicated that the processes leading to the resolution of emotional and non-emotional interference conflicts are unrelated, involving separate networks. It is also known that conflict resolution itself suggests a considerable overlap of the networks. Our study is an attempt to examine how these findings may be related. METHODOLOGY/PRINCIPAL FINDINGS: We used functional magnetic resonance imaging (fMRI to study neural responses of 24 healthy subjects to emotional and non-emotional conflict paradigms involving the presentation of congruent and incongruent word-face pairs based on semantic incompatibility between targets and distractors. In the emotional task, the behavioral interference conflict was greater (compared to the non-emotional task and was paralleled by involvement of the extrastriate visual and posterodorsal medial frontal cortices. In both tasks, we also observed a common network including the dorsal anterior cingulate, the supplemental motor area, the anterior insula and the inferior prefrontal cortex, indicating that these brain structures are markers of experienced conflict. However, the emotional task involved conflict-triggered networks to a considerably higher degree. CONCLUSIONS/SIGNIFICANCE: Our findings indicate that responses to emotional and non-emotional distractors involve the same systems, which are capable of flexible adjustments based on conflict demands. The function of systems related to conflict resolution is likely to be adjusted on the basis of an evaluation process that primarily involves the extrastriate visual cortex, with target playing a significant role.

  20. Modulation of Task Demands Suggests That Semantic Processing Interferes with the Formation of Episodic Associations

    Science.gov (United States)

    Long, Nicole M.; Kahana, Michael J.

    2017-01-01

    Although episodic and semantic memory share overlapping neural mechanisms, it remains unclear how our pre-existing semantic associations modulate the formation of new, episodic associations. When freely recalling recently studied words, people rely on both episodic and semantic associations, shown through temporal and semantic clustering of…

  1. The Dynamic Microstructure of Speech Production: Semantic Interference Built on the Fly

    Science.gov (United States)

    Abdel Rahman, Rasha; Melinger, Alissa

    2011-01-01

    We present 4 experiments investigating dynamic and flexible aspects of semantic activation spread during speech planning. In a semantic blocking paradigm, pictures of objects were presented in categorically homogeneous blocks consisting of semantic category members (e.g., foods), in blocks consisting of seemingly unrelated objects that could…

  2. An evaluation of deficits in semantic cueing and proactive and retroactive interference as early features of Alzheimer's disease.

    Science.gov (United States)

    Crocco, Elizabeth; Curiel, Rosie E; Acevedo, Amarilis; Czaja, Sara J; Loewenstein, David A

    2014-09-01

    To determine the degree to which susceptibility to different types of semantic interference may reflect the initial manifestations of early Alzheimer's disease (AD) beyond the effects of global memory impairment. Normal elderly (NE) subjects (n = 47), subjects with amnestic mild cognitive impairment (aMCI; n = 34), and subjects with probable AD (n = 40) were evaluated by using a unique cued recall paradigm that allowed for evaluation of both proactive and retroactive interference effects while controlling for global memory impairment (i.e., Loewenstein-Acevedo Scales of Semantic Interference and Learning [LASSI-L] procedure). Controlling for overall memory impairment, aMCI subjects had much greater proactive and retroactive interference effects than NE subjects. LASSI-L indices of learning by using cued recall revealed high levels of sensitivity and specificity, with an overall correct classification rate of 90%. These measures provided better discrimination than traditional neuropsychological measures of memory function. The LASSI-L paradigm is unique and unlike other assessments of memory in that items posed for cued recall are explicitly presented, and semantic interference and cueing effects can be assessed while controlling for initial level of memory impairment. This is a powerful procedure that allows the participant to serve as his or her own control. The high levels of discrimination between subjects with aMCI and normal cognition that exceeded traditional neuropsychological measures makes the LASSI-L worthy of further research in the detection of early AD. Copyright © 2014 American Association for Geriatric Psychiatry. Published by Elsevier Inc. All rights reserved.

  3. An Evaluation of Deficits in Semantic Cuing, Proactive and Retroactive Interference as Early Features of Alzheimer’s disease

    Science.gov (United States)

    Crocco, Elizabeth; Curiel, Rosie E.; Acevedo, Amarilis; Czaja, Sara J.; Loewenstein, David A.

    2015-01-01

    OBJECTIVE To determine the degree to which susceptibility to different types of semantic interference may reflect the earliest manifestations of early Alzheimer disease (AD) beyond the effects of global memory impairment. METHODS Normal elderly (NE) subjects (n= 47), subjects with amnestic mild cognitive impairment (aMCI: n=34) and 40 subjects with probable AD were evaluated using a unique cued recall paradigm that allowed for an evaluation of both proactive and retroactive interference effects while controlling for global memory impairment (LASSI-L procedure). RESULTS Controlling for overall memory impairment, aMCI subjects had much greater proactive and retroactive interference effects than NE subjects. LASSI-L indices of learning using cued recall evidenced high levels of sensitivity and specificity with an overall correct classification rate of 90%. These provided better discrimination than traditional neuropsychological measures of memory function. CONCLUSION The LASSI-L paradigm is unique and unlike other assessments of memory in that items presented for cued recall are explicitly presented, and semantic interference and cuing effects can be assessed while controlling for initial level of memory impairment. This represents a powerful procedure allowing the participant to serve as his or her own control. The high levels of discrimination between subjects with aMCI and normal cognition that exceeded traditional neuropsychological measures makes the LASSI-L worthy of further research in the detection of early AD. PMID:23768680

  4. Does a pear growl? Interference from semantic properties of orthographic neighbors.

    Science.gov (United States)

    Pecher, Diane; de Rooij, Jimmy; Zeelenberg, René

    2009-07-01

    In this study, we investigated whether semantic properties of a word's orthographic neighbors are activated during visual word recognition. In two experiments, words were presented with a property that was not true for the word itself. We manipulated whether the property was true for an orthographic neighbor of the word. Our results showed that rejection of the property was slower and less accurate when the property was true for a neighbor than when the property was not true for a neighbor. These findings indicate that semantic information is activated before orthographic processing is finished. The present results are problematic for the links model (Forster, 2006; Forster & Hector, 2002) that was recently proposed in order to bring form-first models of visual word recognition into line with previously reported findings (Forster & Hector, 2002; Pecher, Zeelenberg, & Wagenmakers, 2005; Rodd, 2004).

  5. Confabulation in healthy aging is related to interference of overlearned, semantically similar information on episodic memory recall.

    Science.gov (United States)

    Dalla Barba, Gianfranco; Attali, Eve; La Corte, Valentina

    2010-07-01

    Normal aging is characterized by reduced performance on tasks of long-term memory. Older adults (OA) not only show reduced performance on tasks of recall and recognition memory, but also, compared to young adults (YA), are more vulnerable to memory distortions. In this study we describe the performance of a group of OA and a group of YA on the recall of three different types of story: a previously unknown story, a well-known fairy tale (Sleeping Beauty), and a modified well-known fairy tale (Little Red Riding Hood is not eaten by the wolf). The aim of our study was to test the hypothesis that in OA strongly represented, overlearned information interferes with episodic recall-that is, the retrieval of specific, unique past episodes. OA produced significantly more confabulations than YA and in particular in the recall of the modified fairy tale. Our findings indicate that the interference of strongly represented, overlearned information in episodic memory recall is implicated in the production of confabulations in OA. This effect is particularly prominent when the to-be remembered episodic information shows strong semantic similarities with preexisting, overlearned information.

  6. The role of domain-general frontal systems in language comprehension: evidence from dual-task interference and semantic ambiguity.

    Science.gov (United States)

    Rodd, Jennifer M; Johnsrude, Ingrid S; Davis, Matthew H

    2010-12-01

    Neuroimaging studies have shown that the left inferior frontal gyrus (LIFG) plays a critical role in semantic and syntactic aspects of speech comprehension. It appears to be recruited when listeners are required to select the appropriate meaning or syntactic role for words within a sentence. However, this region is also recruited during tasks not involving sentence materials, suggesting that the systems involved in processing ambiguous words within sentences are also recruited for more domain-general tasks that involve the selection of task-relevant information. We use a novel dual-task methodology to assess whether the cognitive system(s) that are engaged in selecting word meanings are also involved in non-sentential tasks. In Experiment 1, listeners were slower to decide whether a visually presented letter is in upper or lower case when the sentence that they are simultaneously listening to contains words with multiple meanings (homophones), compared to closely matched sentences without homophones. Experiment 2 indicates that this interference effect is not tied to the occurrence of the homophone itself, but rather occurs when listeners must reinterpret a sentence that was initially misparsed. These results suggest some overlap between the cognitive system involved in semantic disambiguation and the domain-general process of response selection required for the case-judgement task. This cognitive overlap may reflect neural overlap in the networks supporting these processes, and is consistent with the proposal that domain-general selection processes in inferior frontal regions are critical for language comprehension. Copyright © 2010 Elsevier Inc. All rights reserved.

  7. Language production in a shared task: Cumulative Semantic Interference from self- and other-produced context words.

    Science.gov (United States)

    Hoedemaker, Renske S; Ernst, Jessica; Meyer, Antje S; Belke, Eva

    2017-01-01

    This study assessed the effects of semantic context in the form of self-produced and other-produced words on subsequent language production. Pairs of participants performed a joint picture naming task, taking turns while naming a continuous series of pictures. In the single-speaker version of this paradigm, naming latencies have been found to increase for successive presentations of exemplars from the same category, a phenomenon known as Cumulative Semantic Interference (CSI). As expected, the joint-naming task showed a within-speaker CSI effect, such that naming latencies increased as a function of the number of category exemplars named previously by the participant (self-produced items). Crucially, we also observed an across-speaker CSI effect, such that naming latencies slowed as a function of the number of category members named by the participant's task partner (other-produced items). The magnitude of the across-speaker CSI effect did not vary as a function of whether or not the listening participant could see the pictures their partner was naming. The observation of across-speaker CSI suggests that the effect originates at the conceptual level of the language system, as proposed by Belke's (2013) Conceptual Accumulation account. Whereas self-produced and other-produced words both resulted in a CSI effect on naming latencies, post-experiment free recall rates were higher for self-produced than other-produced items. Together, these results suggest that both speaking and listening result in implicit learning at the conceptual level of the language system but that these effects are independent of explicit learning as indicated by item recall. Copyright © 2016 Elsevier B.V. All rights reserved.

  8. Failure to Recover from Proactive Semantic Interference and Abnormal Limbic Connectivity in Asymptomatic, Middle-Aged Offspring of Patients with Late-Onset Alzheimer's Disease.

    Science.gov (United States)

    Sánchez, Stella M; Abulafia, Carolina; Duarte-Abritta, Barbara; de Guevara, M Soledad Ladrón; Castro, Mariana N; Drucaroff, Lucas; Sevlever, Gustavo; Nemeroff, Charles B; Vigo, Daniel E; Loewenstein, David A; Villarreal, Mirta F; Guinjoan, Salvador M

    2017-01-01

    We have obtained previous evidence of limbic dysfunction in middle-aged, asymptomatic offspring of late-onset Alzheimer's disease (LOAD) patients, and failure to recover from proactive semantic interference has been shown to be a sensitive cognitive test in other groups at risk for LOAD. To assess the effects of specific proactive semantic interference deficits as they relate to functional magnetic resonance imaging (fMRI) neocortical and limbic functional connectivity in middle aged offspring of individuals with LOAD (O-LOAD) and age-equivalent controls. We examined 21 O-LOAD and 20 controls without family history of neurodegenerative disorders (CS) on traditional measures of cognitive functioning and the LASSI-L, a novel semantic interference test uniquely sensitive to the failure to recover from proactive interference (frPSI). Cognitive tests then were correlated to fMRI connectivity of seeds located in entorhinal cortex and anterodorsal thalamic nuclei among O-LOAD and CS participants. Relative to CS, O-LOAD participants evidenced lower connectivity between entorhinal cortex and orbitofrontal, anterior cingulate, and anterior temporal cortex. In the offspring of LOAD patients, LASSI-L measures of frPSI were inversely associated with connectivity between anterodorsal thalamus and contralateral posterior cingulate. Intrusions on the task related to frPSI were inversely correlated with a widespread connectivity network involving hippocampal, insular, posterior cingulate, and dorsolateral prefrontal cortices, along with precunei and anterior thalamus in this group. Different patterns of connectivity associated with frPSI were observed among controls. The present results suggest that both semantic interference deficits and connectivity abnormalities might reflect limbic circuit dysfunction as a very early clinical signature of LOAD pathology, as previously demonstrated for other limbic phenotypes, such as sleep and circadian alterations.

  9. Recovery from Proactive Semantic Interference and MRI Volume: A Replication and Extension Study.

    Science.gov (United States)

    Loewenstein, David A; Curiel, Rosie E; DeKosky, Steven; Rosselli, Monica; Bauer, Russell; Grieg-Custo, Maria; Penate, Ailyn; Li, Chunfei; Lizagarra, Gabriel; Golde, Todd; Adjouadi, Malek; Duara, Ranjan

    2017-01-01

    The rise in incidence of Alzheimer's disease (AD) has led to efforts to advance early detection of the disease during its preclinical stages. To achieve this, the field needs to develop more sensitive cognitive tests that relate to biological markers of disease pathology. Failure to recover from proactive interference (frPSI) is one such cognitive marker that is associated with volumetric reductions in the hippocampus, precuneus, and other AD-prone regions, and to amyloid load in the brain. The current study attempted to replicate and extend our previous findings that frPSI is a sensitive marker of early AD, and related to a unique pattern of volumetric loss in AD prone areas. Three different memory measures were examined relative to volumetric loss and cortical thickness among 45 participants with amnestic mild cognitive impairment. frPSI was uniquely associated with reduced volumes in the hippocampus (r = 0.50) precuneus (r = 0.41), and other AD prone regions, replicating previous findings. Strong associations between frPSI and lower entorhinal cortex volumes and cortical thickness (r≥0.60) and precuneus (r = 0.50) were also observed. Unique and strong associations between volumetric reductions and frPSI as observed by Loewenstein and colleagues were replicated. Together with cortical thickness findings, these results indicate that frPSI is worthy of further study as a sensitive and early cognitive marker of AD.

  10. Proactive Semantic Interference is Associated with Total and Regional Abnormal Amyloid Load in Non-Demented Community-Dwelling Elders: A Preliminary Study.

    Science.gov (United States)

    Loewenstein, David A; Greig, Maria T; Curiel, Rosie; Rodriguez, Rosemarie; Wicklund, Meredith; Barker, Warren W; Hidalgo, Jacqueline; Rosado, Marian; Duara, Ranjan

    2015-12-01

    To evaluate the relationship between susceptibility to proactive semantic interference (PSI) and retroactive semantic interference (RSI) and brain amyloid load in non-demented elders. 27 participants (11 cognitively normal [CN] with subjective memory complaints, 8 CN without memory complaints, and 8 with mild cognitive impairment [MCI]) underwent complete neurological and neuropsychological evaluations. Participants also received the Semantic Interference Test (SIT) and AV-45 amyloid PET imaging. High levels of association were present between total amyloid load, regional amyloid levels, and the PSI measure (in the entire sample and a subsample excluding MCI subjects). RSI and other memory measures showed much weaker associations or no associations with total and regional amyloid load. No associations between amyloid levels and non-memory performance were observed. In non-demented individuals, vulnerability to PSI was highly associated with total and regional beta-amyloid load and may be an early cognitive marker of brain pathology. Copyright © 2015 American Association for Geriatric Psychiatry. Published by Elsevier Inc. All rights reserved.

  11. Model checking mobile ad hoc networks

    NARCIS (Netherlands)

    Ghassemi, Fatemeh; Fokkink, Wan

    2016-01-01

    Modeling arbitrary connectivity changes within mobile ad hoc networks (MANETs) makes application of automated formal verification challenging. We use constrained labeled transition systems as a semantic model to represent mobility. To model check MANET protocols with respect to the underlying

  12. What Klein’s semantic gradient does and does not really show: decomposing Stroop interference into task and informational conflict components

    Directory of Open Access Journals (Sweden)

    Yulia eLevin

    2016-02-01

    Full Text Available The present study suggests that the idea that Stroop interference originates from multiple components may gain theoretically from integrating two independent frameworks. The first framework is represented by the well-known notion of semantic gradient of interference and the second one is the distinction between two types of conflict – the task and the informational conflict – giving rise to the interference (Goldfarb & Henik, 2007; McLeod & MacDonald, 2000. The proposed integration led to the conclusion that two (i.e., orthographic and lexical components of the four theoretically distinct components represent task conflict, and the other two (i.e., indirect and direct informational conflict components represent informational conflict. The four components were independently estimated in a series of experiments. The results confirmed the contribution of task conflict (estimated by a robust orthographic component and of informational conflict (estimated by a strong direct informational conflict component to Stroop interference. However, the performed critical review of the relevant literature (see General Discussion, as well as the results of the experiments reported, showed that the other two components expressing each type of conflict (i.e., the lexical component of task conflict and the indirect informational conflict were small, and unstable. The present analysis refines our knowledge of the origins of Stroop interference by providing evidence that each type of conflict has its major and minor contributions. The implications for cognitive control of an automatic reading process are also discussed.

  13. The Categorical Structure of Semantic Memory for Famous People: A New Approach Using Release from Proactive Interference

    Science.gov (United States)

    Darling, S.; Valentine, T.

    2005-01-01

    Memory for familiar people is essential to understand their identity and guide social interaction. Nevertheless, we know surprisingly little about the structure of such memory. Previous research has assumed that semantic memory for people has a categorical structure, but recently it was proposed that memory for people consists only of associations…

  14. Language production in a shared task: Cumulative semantic interference from self- and other-produced context words

    NARCIS (Netherlands)

    Hoedemaker, R.S.; Ernst, J.; Meyer, A.S.; Belke, E.

    2017-01-01

    This study assessed the effects of semantic context in the form of self-produced and other-produced words on subsequent language production. Pairs of participants performed a joint picture naming task, taking turns while naming a continuous series of pictures. In the single-speaker version of this

  15. Long-term repetition priming and semantic interference in a lexical-semantic matching task: tapping the links between object names and colors.

    Science.gov (United States)

    Lloyd-Jones, Toby J; Nakabayashi, Kazuyo

    2014-01-01

    Using a novel paradigm to engage the long-term mappings between object names and the prototypical colors for objects, we investigated the retrieval of object-color knowledge as indexed by long-term priming (the benefit in performance from a prior encounter with the same or a similar stimulus); a process about which little is known. We examined priming from object naming on a lexical-semantic matching task. In the matching task participants encountered a visually presented object name (Experiment 1) or object shape (Experiment 2) paired with either a color patch or color name. The pairings could either match whereby both were consistent with a familiar object (e.g., strawberry and red) or mismatch (strawberry and blue). We used the matching task to probe knowledge about familiar objects and their colors pre-activated during object naming. In particular, we examined whether the retrieval of object-color information was modality-specific and whether this influenced priming. Priming varied with the nature of the retrieval process: object-color priming arose for object names but not object shapes and beneficial effects of priming were observed for color patches whereas inhibitory priming arose with color names. These findings have implications for understanding how object knowledge is retrieved from memory and modified by learning.

  16. Long-term repetition priming and semantic interference in a lexical-semantic matching task: Tapping the links between object names and colours

    Directory of Open Access Journals (Sweden)

    Toby Jonathan Lloyd-Jones

    2014-06-01

    Full Text Available Using a novel paradigm to engage the long-term mappings between object names and the prototypical colours for objects, we investigated the retrieval of object-colour knowledge as indexed by long-term priming (the benefit in performance from a prior encounter with the same or a similar stimulus; a process about which little is known. We examined priming from object naming on a lexical-semantic matching task. In the matching task participants encountered a visually presented object name (Experiment 1 or object shape (Experiment 2 paired with either a colour patch or colour name. The pairings could either match whereby both were consistent with a familiar object (e.g., strawberry and red or mismatch (strawberry and blue. We used the matching task to probe knowledge about familiar objects and their colours pre-activated during object naming. In particular, we examined whether the retrieval of object-colour information was modality-specific and whether this influenced priming. Priming varied with the nature of the retrieval process: object-colour priming arose for object names but not object shapes and beneficial effects of priming were observed for colour patches whereas inhibitory priming arose with colour names. These findings have implications for understanding how object knowledge is retrieved from memory and modified by learning.

  17. Event-related potentials and oscillatory brain responses associated with semantic and Stroop-like interference effects in overt naming

    NARCIS (Netherlands)

    Piai, V.; Roelofs, A.P.A.; Meij, R. van der

    2012-01-01

    Picture–word interference is a widely employed paradigm to investigate lexical access in word production: Speakers name pictures while trying to ignore superimposed distractor words. The distractor can be congruent to the picture (pictured cat, word cat), categorically related (pictured cat, word

  18. Recovery from Proactive Semantic Interference in Mild Cognitive Impairment and Normal Aging: Relationship to Atrophy in Brain Regions Vulnerable to Alzheimer's Disease.

    Science.gov (United States)

    Loewenstein, David A; Curiel, Rosie E; Wright, Clinton; Sun, Xiaoyan; Alperin, Noam; Crocco, Elzabeth; Czaja, Sara J; Raffo, Arlene; Penate, Ailyn; Melo, Jose; Capp, Kimberly; Gamez, Monica; Duara, Ranjan

    2017-01-01

    There is growing evidence that proactive semantic interference (PSI) and failure to recover from PSI may represent early features of Alzheimer's disease (AD). This study investigated the association between PSI, recovery from PSI, and reduced MRI volumes in AD signature regions among cognitively impaired and unimpaired older adults. Performance on the LASSI-L (a novel test of PSI and recovery from PSI) and regional brain volumetric measures were compared between 38 cognitively normal (CN) elders and 29 older participants with amnestic mild cognitive impairment (MCI). The relationship between MRI measures and performance on the LASSI-L as well as traditional memory and non-memory cognitive measures was also evaluated in both diagnostic groups. Relative to traditional neuropsychological measures, MCI patients' failure to recover from PSI was associated with reduced volumes in the hippocampus (rs = 0.48), precuneus (rs = 0.50); rostral middle frontal lobules (rs = 0.54); inferior temporal lobules (rs = 0.49), superior parietal lobules (rs = 0.47), temporal pole (rs = 0.44), and increased dilatation of the inferior lateral ventricle (rs = -0.49). For CN elders, only increased inferior lateral ventricular size was associated with vulnerability to PSI (rs = -0.49), the failure to recover from PSI (rs = -0.57), and delayed recall on the Hopkins Verbal Learning Test-Revised (rs = -0.48). LASSI-L indices eliciting failure to recover from PSI were more highly associated with more MRI regional biomarkers of AD than other traditional cognitive measures. These results as well as recent amyloid imaging studies with otherwise cognitively normal subjects, suggest that recovery from PSI may be a sensitive marker of preclinical AD and deserves further investigation.

  19. A generalized notion of semantic independence

    DEFF Research Database (Denmark)

    Fränzle, Martin; Stengel, Bernhard von; Wittmüss, Arne

    1995-01-01

    For programs represented semantically as relations, a concept of semantic independence is defined that is more general than previously stated notions. It allows for shared input variables and irrelevant interference due to nondeterminism.......For programs represented semantically as relations, a concept of semantic independence is defined that is more general than previously stated notions. It allows for shared input variables and irrelevant interference due to nondeterminism....

  20. TMS interferes with lexical-semantic retrieval in left inferior frontal gyrus and posterior middle temporal gyrus: Evidence from cyclical picture naming.

    Science.gov (United States)

    Krieger-Redwood, Katya; Jefferies, Elizabeth

    2014-11-01

    We used TMS to investigate the contribution of left inferior frontal gyrus (LIFG) and posterior middle temporal gyrus (pMTG) to lexical/semantic selection and retrieval processes using a cyclical naming paradigm. Participants named pictures that were presented repeatedly across six cycles, either in semantically related or unrelated sets. Previous research has suggested that selection demands are higher for related sets, especially after repetition, since participants experience competition from the activation of semantic neighbours. In contrast, retrieval demands are greater for unrelated sets in the absence of semantic priming, particularly on the first cycle when the target names have not been previously activated. Therefore, this paradigm can reveal independent effects of (i) retrieval demands (i.e., the ease of accessing picture names from visual input) and (ii) selection/competition. We found that rTMS to LIFG and pMTG produced similar behavioural effects: stimulation of both sites disrupted picture naming performance on early cycles (when participants were less practised at producing the picture names) and for semantically-related sets (when there was the potential for increased competition and yet also facilitation from semantic neighbours). There were no effects of TMS when either retrieval or selection requirements were maximal on their own. The data therefore support the view that both LIFG and pMTG contribute to picture name retrieval, with both sites playing a critical role in mediating the semantic facilitation of naming when retrieval demands are high. Copyright © 2014 Elsevier Ltd. All rights reserved.

  1. Mobile ad hoc networking

    CERN Document Server

    John Wiley & Sons

    2004-01-01

    "Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.

  2. The Ex hoc Architecture

    DEFF Research Database (Denmark)

    2006-01-01

    Developed in the LIWAS project which develops technology for measuring road surfaces and communicating this data in an ad hoc environment. The communication part is built upon OOVM Resilient technology....

  3. Les Interferences Semantiques Dans Les Oeuvres D'ahmadou Kourouma et De Mongo Beti: Essai D'etude Comparative [Semantic Interference in the Works of Ahmadou Kourouma and Mongo Beti: Test Comparative Study

    Science.gov (United States)

    Tadoum, Jean Paul

    2012-01-01

    This dissertation focuses on the works of two well-known African Francophone novelists, Ahmadou Kourouma from the Ivory Coast and Mongo Beti from Cameroon. The objective of this study is to look at the influences of African oral traditions and analyze the literary transposition of semantic structures from African languages and cultures into the…

  4. Semantic Advertising

    OpenAIRE

    Zamanzadeh, Ben; Ashish, Naveen; Ramakrishnan, Cartic; Zimmerman, John

    2013-01-01

    We present the concept of Semantic Advertising which we see as the future of online advertising. Semantic Advertising is online advertising powered by semantic technology which essentially enables us to represent and reason with concepts and the meaning of things. This paper aims to 1) Define semantic advertising, 2) Place it in the context of broader and more widely used concepts such as the Semantic Web and Semantic Search, 3) Provide a survey of work in related areas such as context matchi...

  5. Verification of mobile ad hoc networks : an algebraic approach

    NARCIS (Netherlands)

    Ghassemi, F.; Fokkink, W.J.; Movaghar, A.

    2011-01-01

    We introduced Computed Network Process Theory to reason about protocols for mobile ad hoc networks (MANETs). Here we explore the applicability of our framework in two regards: model checking and equational reasoning. The operational semantics of our framework is based on constrained labeled

  6. Dynamic ad hoc networks

    CERN Document Server

    Rashvand, Habib

    2013-01-01

    Motivated by the exciting new application paradigm of using amalgamated technologies of the Internet and wireless, the next generation communication networks (also called 'ubiquitous', 'complex' and 'unstructured' networking) are changing the way we develop and apply our future systems and services at home and on local, national and global scales. Whatever the interconnection - a WiMAX enabled networked mobile vehicle, MEMS or nanotechnology enabled distributed sensor systems, Vehicular Ad hoc Networking (VANET) or Mobile Ad hoc Networking (MANET) - all can be classified under new networking s

  7. Semantic Multimedia

    NARCIS (Netherlands)

    S. Staab; A. Scherp; R. Arndt; R. Troncy (Raphael); M. Grzegorzek; C. Saathoff; S. Schenk; L. Hardman (Lynda)

    2008-01-01

    htmlabstractMultimedia constitutes an interesting field of application for Semantic Web and Semantic Web reasoning, as the access and management of multimedia content and context depends strongly on the semantic descriptions of both. At the same time, multimedia resources constitute complex objects,

  8. Generative Semantics.

    Science.gov (United States)

    King, Margaret

    The first section of this paper deals with the attempts within the framework of transformational grammar to make semantics a systematic part of linguistic description, and outlines the characteristics of the generative semantics position. The second section takes a critical look at generative semantics in its later manifestations, and makes a case…

  9. Semantic metrics

    OpenAIRE

    Hu, Bo; Kalfoglou, Yannis; Dupplaw, David; Alani, Harith; Lewis, Paul; Shadbolt, Nigel

    2006-01-01

    In the context of the Semantic Web, many ontology-related operations, e.g. ontology ranking, segmentation, alignment, articulation, reuse, evaluation, can be boiled down to one fundamental operation: computing the similarity and/or dissimilarity among ontological entities, and in some cases among ontologies themselves. In this paper, we review standard metrics for computing distance measures and we propose a series of semantic metrics. We give a formal account of semantic metrics drawn from a...

  10. Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Hong-Chuan Yang

    2007-01-01

    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  11. Montague semantics

    NARCIS (Netherlands)

    Janssen, T.M.V.

    2012-01-01

    Montague semantics is a theory of natural language semantics and of its relation with syntax. It was originally developed by the logician Richard Montague (1930-1971) and subsequently modified and extended by linguists, philosophers, and logicians. The most important features of the theory are its

  12. Resolving Business Process Interference via Dynamic Reconfiguration

    NARCIS (Netherlands)

    van Beest, Nick R. T. P.; Bulanov, Pavel; Wortmann, Hans; Lazovik, Alexander; Maglio, PP; Weske, M; Yang, J; Fantinato, M

    2010-01-01

    For business processes supported by service-oriented information systems, concurrent execution of business processes still may yield undesired business outcomes as a result of process interference. For instance, concurrent processes may partially depend on a semantically identical process variable,

  13. Facilitation and interference in naming: A consequence of the same learning process?

    Science.gov (United States)

    Hughes, Julie W; Schnur, Tatiana T

    2017-08-01

    Our success with naming depends on what we have named previously, a phenomenon thought to reflect learning processes. Repeatedly producing the same name facilitates language production (i.e., repetition priming), whereas producing semantically related names hinders subsequent performance (i.e., semantic interference). Semantic interference is found whether naming categorically related items once (continuous naming) or multiple times (blocked cyclic naming). A computational model suggests that the same learning mechanism responsible for facilitation in repetition creates semantic interference in categorical naming (Oppenheim, Dell, & Schwartz, 2010). Accordingly, we tested the predictions that variability in semantic interference is correlated across categorical naming tasks and is caused by learning, as measured by two repetition priming tasks (picture-picture repetition priming, Exp. 1; definition-picture repetition priming, Exp. 2, e.g., Wheeldon & Monsell, 1992). In Experiment 1 (77 subjects) semantic interference and repetition priming effects were robust, but the results revealed no relationship between semantic interference effects across contexts. Critically, learning (picture-picture repetition priming) did not predict semantic interference effects in either task. We replicated these results in Experiment 2 (81 subjects), finding no relationship between semantic interference effects across tasks or between semantic interference effects and learning (definition-picture repetition priming). We conclude that the changes underlying facilitatory and interfering effects inherent to lexical access are the result of distinct learning processes where multiple mechanisms contribute to semantic interference in naming. Copyright © 2017 Elsevier B.V. All rights reserved.

  14. Semantic Desktop

    Science.gov (United States)

    Sauermann, Leo; Kiesel, Malte; Schumacher, Kinga; Bernardi, Ansgar

    In diesem Beitrag wird gezeigt, wie der Arbeitsplatz der Zukunft aussehen könnte und wo das Semantic Web neue Möglichkeiten eröffnet. Dazu werden Ansätze aus dem Bereich Semantic Web, Knowledge Representation, Desktop-Anwendungen und Visualisierung vorgestellt, die es uns ermöglichen, die bestehenden Daten eines Benutzers neu zu interpretieren und zu verwenden. Dabei bringt die Kombination von Semantic Web und Desktop Computern besondere Vorteile - ein Paradigma, das unter dem Titel Semantic Desktop bekannt ist. Die beschriebenen Möglichkeiten der Applikationsintegration sind aber nicht auf den Desktop beschränkt, sondern können genauso in Web-Anwendungen Verwendung finden.

  15. Coupled interference based rate adaptation in ad hoc networks

    CSIR Research Space (South Africa)

    Awuor, F

    2011-09-01

    Full Text Available of learning and adjustment rules converge to it, e.g., optimal (best) response dynamics). Assume (I; (p); (ui)) is a super modular game. Then Bi(p i) in (7) has a greatest and least element, denoted by Bi(p i) and Bi(p i), and if p0 i p i then Bi(p 0 i...) Bi(p i) and B i(p0 i) B i(p i) [15], [16] This implies that each player?s best response is increasing in the actions of other players. The set of strategies that survive iterated strict dominance (i.e. iterated elimination of strictly dominated...

  16. Correctness-by-construction and post-hoc verification : a marriage of convenience?

    NARCIS (Netherlands)

    Watson, B.W.; Kourie, D.G.; Schaefer, I.; Cleophas, L.G.W.A.; Margaria, T.; Steffen, B.

    2016-01-01

    Correctness-by-construction (CbC), traditionally based on weakest precondition semantics, and post-hoc verification (PhV) aspire to ensure functional correctness. We argue for a lightweight approach to CbC where lack of formal rigour increases productivity. In order to mitigate the risk of

  17. Power control algorithms for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Nuraj L. Pradhan

    2011-07-01

    We will also focus on an adaptive distributed power management (DISPOW algorithm as an example of the multi-parameter optimization approach which manages the transmit power of nodes in a wireless ad hoc network to preserve network connectivity and cooperatively reduce interference. We will show that the algorithm in a distributed manner builds a unique stable network topology tailored to its surrounding node density and propagation environment over random topologies in a dynamic mobile wireless channel.

  18. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    Science.gov (United States)

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  19. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Omar Elizarraras

    2014-01-01

    Full Text Available The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15% compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput.

  20. Generative Semantics

    Science.gov (United States)

    Bagha, Karim Nazari

    2011-01-01

    Generative semantics is (or perhaps was) a research program within linguistics, initiated by the work of George Lakoff, John R. Ross, Paul Postal and later McCawley. The approach developed out of transformational generative grammar in the mid 1960s, but stood largely in opposition to work by Noam Chomsky and his students. The nature and genesis of…

  1. Inferentializing Semantics

    Czech Academy of Sciences Publication Activity Database

    Peregrin, Jaroslav

    2010-01-01

    Roč. 39, č. 3 (2010), s. 255-274 ISSN 0022-3611 R&D Projects: GA ČR(CZ) GA401/07/0904 Institutional research plan: CEZ:AV0Z90090514 Keywords : inference * proof theory * model theory * inferentialism * semantics Subject RIV: AA - Philosophy ; Religion

  2. agradecimento aos consultores ad hoc

    Directory of Open Access Journals (Sweden)

    REA Editor

    2012-02-01

    Full Text Available Agradecemos aos professores Nildo Viana (UFG e Flavio Sofiati (UFG, organizadores do DOSSIÊ JUVENTUDE & SOCIEDADE, e aos Consultores Ad hoc pela leitura e apreciação crítica dos artigos submetidos e publicados nesta edição.

  3. Semantic Blogging : Spreading the Semantic Web Meme

    OpenAIRE

    Cayzer, Steve

    2004-01-01

    This paper is about semantic blogging, an application of the semantic web to blogging. The semantic web promises to make the web more useful by endowing metadata with machine processable semantics. Blogging is a lightweight web publishing paradigm which provides a very low barrier to entry, useful syndication and aggregation behaviour, a simple to understand structure and decentralized construction of a rich information network. Semantic blogging builds upon the success and clear network valu...

  4. Jigsaw Semantics

    Directory of Open Access Journals (Sweden)

    Paul J. E. Dekker

    2010-12-01

    Full Text Available In the last decade the enterprise of formal semantics has been under attack from several philosophical and linguistic perspectives, and it has certainly suffered from its own scattered state, which hosts quite a variety of paradigms which may seem to be incompatible. It will not do to try and answer the arguments of the critics, because the arguments are often well-taken. The negative conclusions, however, I believe are not. The only adequate reply seems to be a constructive one, which puts several pieces of formal semantics, in particular dynamic semantics, together again. In this paper I will try and sketch an overview of tasks, techniques, and results, which serves to at least suggest that it is possible to develop a coherent overall picture of undeniably important and structural phenomena in the interpretation of natural language. The idea is that the concept of meanings as truth conditions after all provides an excellent start for an integrated study of the meaning and use of natural language, and that an extended notion of goal directed pragmatics naturally complements this picture. None of the results reported here are really new, but we think it is important to re-collect them.ReferencesAsher, Nicholas & Lascarides, Alex. 1998. ‘Questions in Dialogue’. Linguistics and Philosophy 23: 237–309.http://dx.doi.org/10.1023/A:1005364332007Borg, Emma. 2007. ‘Minimalism versus contextualism in semantics’. In Gerhard Preyer & Georg Peter (eds. ‘Context-Sensitivity and Semantic Minimalism’, pp. 339–359. Oxford: Oxford University Press.Cappelen, Herman & Lepore, Ernest. 1997. ‘On an Alleged Connection between Indirect Quotation and Semantic Theory’. Mind and Language 12: pp. 278–296.Cappelen, Herman & Lepore, Ernie. 2005. Insensitive Semantics. Oxford: Blackwell.http://dx.doi.org/10.1002/9780470755792Dekker, Paul. 2002. ‘Meaning and Use of Indefinite Expressions’. Journal of Logic, Language and Information 11: pp. 141–194

  5. Ad-hoc networking towards seamless communications

    CERN Document Server

    Gavrilovska, Liljana

    2006-01-01

    Ad-Hoc Networking Towards Seamless Communications is dedicated to an area that attracts growing interest in academia and industry and concentrates on wireless ad hoc networking paradigm. The persistent efforts to acquire the ability to establish dynamic wireless connections from anywhere to anyone with any device without prerequisite imbedded infrastructure move the communications boundaries towards ad-hoc networks. Recently, ad hoc networking has attracted growing interest due to advances in wireless communications, and developed framework for running IP based protocols. The expected degree of penetration of these networks will depend on the successful resolution of the key features. Ad-hoc networks pose many complex and open problems for researchers. Ad-Hoc Networking Towards Seamless Communications reveals the state-of-the-art in wireless ad-hoc networking and discusses some of the key research topics that are expected to promote and accelerate the commercial applications of these networks (e.g., MAC, rout...

  6. Distinct loci of lexical and semantic access deficits in aphasia: Evidence from voxel-based lesion-symptom mapping and diffusion tensor imaging.

    Science.gov (United States)

    Harvey, Denise Y; Schnur, Tatiana T

    2015-06-01

    Naming pictures and matching words to pictures belonging to the same semantic category negatively affects language production and comprehension. By most accounts, semantic interference arises when accessing lexical representations in naming (e.g., Damian, Vigliocco, & Levelt, 2001) and semantic representations in comprehension (e.g., Forde & Humphreys, 1997). Further, damage to the left inferior frontal gyrus (LIFG), a region implicated in cognitive control, results in increasing semantic interference when items repeat across cycles in both language production and comprehension (Jefferies, Baker, Doran, & Lambon Ralph, 2007). This generates the prediction that the LIFG via white matter connections supports resolution of semantic interference arising from different loci (lexical vs semantic) in the temporal lobe. However, it remains unclear whether the cognitive and neural mechanisms that resolve semantic interference are the same across tasks. Thus, we examined which gray matter structures [using whole brain and region of interest (ROI) approaches] and white matter connections (using deterministic tractography) when damaged impact semantic interference and its increase across cycles when repeatedly producing and understanding words in 15 speakers with varying lexical-semantic deficits from left hemisphere stroke. We found that damage to distinct brain regions, the posterior versus anterior temporal lobe, was associated with semantic interference (collapsed across cycles) in naming and comprehension, respectively. Further, those with LIFG damage compared to those without exhibited marginally larger increases in semantic interference across cycles in naming but not comprehension. Lastly, the inferior fronto-occipital fasciculus, connecting the LIFG with posterior temporal lobe, related to semantic interference in naming, whereas the inferior longitudinal fasciculus (ILF), connecting posterior with anterior temporal regions related to semantic interference in

  7. Varieties of semantic 'access' deficit in Wernicke's aphasia and semantic aphasia.

    Science.gov (United States)

    Thompson, Hannah E; Robson, Holly; Lambon Ralph, Matthew A; Jefferies, Elizabeth

    2015-12-01

    Comprehension deficits are common in stroke aphasia, including in cases with (i) semantic aphasia, characterized by poor executive control of semantic processing across verbal and non-verbal modalities; and (ii) Wernicke's aphasia, associated with poor auditory-verbal comprehension and repetition, plus fluent speech with jargon. However, the varieties of these comprehension problems, and their underlying causes, are not well understood. Both patient groups exhibit some type of semantic 'access' deficit, as opposed to the 'storage' deficits observed in semantic dementia. Nevertheless, existing descriptions suggest that these patients might have different varieties of 'access' impairment-related to difficulty resolving competition (in semantic aphasia) versus initial activation of concepts from sensory inputs (in Wernicke's aphasia). We used a case series design to compare patients with Wernicke's aphasia and those with semantic aphasia on Warrington's paradigmatic assessment of semantic 'access' deficits. In these verbal and non-verbal matching tasks, a small set of semantically-related items are repeatedly presented over several cycles so that the target on one trial becomes a distractor on another (building up interference and eliciting semantic 'blocking' effects). Patients with Wernicke's aphasia and semantic aphasia were distinguished according to lesion location in the temporal cortex, but in each group, some individuals had additional prefrontal damage. Both of these aspects of lesion variability-one that mapped onto classical 'syndromes' and one that did not-predicted aspects of the semantic 'access' deficit. Both semantic aphasia and Wernicke's aphasia cases showed multimodal semantic impairment, although as expected, the Wernicke's aphasia group showed greater deficits on auditory-verbal than picture judgements. Distribution of damage in the temporal lobe was crucial for predicting the initially 'beneficial' effects of stimulus repetition: cases with

  8. Varieties of semantic ‘access’ deficit in Wernicke’s aphasia and semantic aphasia

    Science.gov (United States)

    Robson, Holly; Lambon Ralph, Matthew A.; Jefferies, Elizabeth

    2015-01-01

    Comprehension deficits are common in stroke aphasia, including in cases with (i) semantic aphasia, characterized by poor executive control of semantic processing across verbal and non-verbal modalities; and (ii) Wernicke’s aphasia, associated with poor auditory–verbal comprehension and repetition, plus fluent speech with jargon. However, the varieties of these comprehension problems, and their underlying causes, are not well understood. Both patient groups exhibit some type of semantic ‘access’ deficit, as opposed to the ‘storage’ deficits observed in semantic dementia. Nevertheless, existing descriptions suggest that these patients might have different varieties of ‘access’ impairment—related to difficulty resolving competition (in semantic aphasia) versus initial activation of concepts from sensory inputs (in Wernicke’s aphasia). We used a case series design to compare patients with Wernicke’s aphasia and those with semantic aphasia on Warrington’s paradigmatic assessment of semantic ‘access’ deficits. In these verbal and non-verbal matching tasks, a small set of semantically-related items are repeatedly presented over several cycles so that the target on one trial becomes a distractor on another (building up interference and eliciting semantic ‘blocking’ effects). Patients with Wernicke’s aphasia and semantic aphasia were distinguished according to lesion location in the temporal cortex, but in each group, some individuals had additional prefrontal damage. Both of these aspects of lesion variability—one that mapped onto classical ‘syndromes’ and one that did not—predicted aspects of the semantic ‘access’ deficit. Both semantic aphasia and Wernicke’s aphasia cases showed multimodal semantic impairment, although as expected, the Wernicke’s aphasia group showed greater deficits on auditory-verbal than picture judgements. Distribution of damage in the temporal lobe was crucial for predicting the initially

  9. Preserved musical semantic memory in semantic dementia.

    Science.gov (United States)

    Weinstein, Jessica; Koenig, Phyllis; Gunawardena, Delani; McMillan, Corey; Bonner, Michael; Grossman, Murray

    2011-02-01

    To understand the scope of semantic impairment in semantic dementia. Case study. Academic medical center. A man with semantic dementia, as demonstrated by clinical, neuropsychological, and imaging studies. Music performance and magnetic resonance imaging results. Despite profoundly impaired semantic memory for words and objects due to left temporal lobe atrophy, this semiprofessional musician was creative and expressive in demonstrating preserved musical knowledge. Long-term representations of words and objects in semantic memory may be dissociated from meaningful knowledge in other domains, such as music.

  10. Inquisitive semantics and pragmatics

    NARCIS (Netherlands)

    Groenendijk, J.; Roelofsen, F.; Larrazabal, J.M.; Zubeldia, L.

    2009-01-01

    This paper starts with an informal introduction to inquisitive semantics. After that, we present a formal definition of the semantics, and introduce the basic semantic notions of inquisitiveness and informativeness, in terms of wich we define the semantic categories of questions, assertions, and

  11. Semantic Web

    Directory of Open Access Journals (Sweden)

    Anna Lamandini

    2011-06-01

    Full Text Available The semantic Web is a technology at the service of knowledge which is aimed at accessibility and the sharing of content; facilitating interoperability between different systems and as such is one of the nine key technological pillars of TIC (technologies for information and communication within the third theme, programme specific cooperation of the seventh programme framework for research and development (7°PQRS, 2007-2013. As a system it seeks to overcome overload or excess of irrelevant information in Internet, in order to facilitate specific or pertinent research. It is an extension of the existing Web in which the aim is for cooperation between and the computer and people (the dream of Sir Tim Berners –Lee where machines can give more support to people when integrating and elaborating data in order to obtain inferences and a global sharing of data. It is a technology that is able to favour the development of a “data web” in other words the creation of a space in both sets of interconnected and shared data (Linked Data which allows users to link different types of data coming from different sources. It is a technology that will have great effect on everyday life since it will permit the planning of “intelligent applications” in various sectors such as education and training, research, the business world, public information, tourism, health, and e-government. It is an innovative technology that activates a social transformation (socio-semantic Web on a world level since it redefines the cognitive universe of users and enables the sharing not only of information but of significance (collective and connected intelligence.

  12. Geospatial semantic web

    CERN Document Server

    Zhang, Chuanrong; Li, Weidong

    2015-01-01

    This book covers key issues related to Geospatial Semantic Web, including geospatial web services for spatial data interoperability; geospatial ontology for semantic interoperability; ontology creation, sharing, and integration; querying knowledge and information from heterogeneous data source; interfaces for Geospatial Semantic Web, VGI (Volunteered Geographic Information) and Geospatial Semantic Web; challenges of Geospatial Semantic Web; and development of Geospatial Semantic Web applications. This book also describes state-of-the-art technologies that attempt to solve these problems such as WFS, WMS, RDF, OWL, and GeoSPARQL, and demonstrates how to use the Geospatial Semantic Web technologies to solve practical real-world problems such as spatial data interoperability.

  13. System optimization for peer-to-peer multi hop video broadcasting in wireless ad hoc networks

    NARCIS (Netherlands)

    Dedeoglu, V.; Atici, C.; Salman, F.S.; Sunay, M.O.

    2008-01-01

    We consider peer-to-peer video broadcasting using cooperation among peers in an ad hoc wireless network. As opposed to the traditional single hop broadcasting, multiple hops cause an increase in broadcast video quality while creating interference and increasing transmission delay. We develop

  14. Taxonomic and ad hoc categorization within the two cerebral hemispheres.

    Science.gov (United States)

    Shen, Yeshayahu; Aharoni, Bat-El; Mashal, Nira

    2015-01-01

    A typicality effect refers to categorization which is performed more quickly or more accurately for typical than for atypical members of a given category. Previous studies reported a typicality effect for category members presented in the left visual field/right hemisphere (RH), suggesting that the RH applies a similarity-based categorization strategy. However, findings regarding the typicality effect within the left hemisphere (LH) are less conclusive. The current study tested the pattern of typicality effects within each hemisphere for both taxonomic and ad hoc categories, using words presented to the left or right visual fields. Experiment 1 tested typical and atypical members of taxonomic categories as well as non-members, and Experiment 2 tested typical and atypical members of ad hoc categories as well as non-members. The results revealed a typicality effect in both hemispheres and in both types of categories. Furthermore, the RH categorized atypical stimuli more accurately than did the LH. Our findings suggest that both hemispheres rely on a similarity-based categorization strategy, but the coarse semantic coding of the RH seems to facilitate the categorization of atypical members.

  15. Programming the semantic web

    CERN Document Server

    Segaran, Toby; Taylor, Jamie

    2009-01-01

    With this book, the promise of the Semantic Web -- in which machines can find, share, and combine data on the Web -- is not just a technical possibility, but a practical reality Programming the Semantic Web demonstrates several ways to implement semantic web applications, using current and emerging standards and technologies. You'll learn how to incorporate existing data sources into semantically aware applications and publish rich semantic data. Each chapter walks you through a single piece of semantic technology and explains how you can use it to solve real problems. Whether you're writing

  16. Preserved Proactive Interference in Autism Spectrum Disorder

    Science.gov (United States)

    Carmo, Joana C.; Duarte, Elsa; Pinho, Sandra; Filipe, Carlos N.; Marques, J. Frederico

    2016-01-01

    In this study, we aimed to evaluate further the functioning and structuring of the semantic system in autism spectrum disorders (ASD). We analyzed the performance of 19 high-functioning young adults with ASD and a group of 20 age-, verbal IQ- and education-matched individuals with the Proactive Interference (PI) Paradigm to evaluate semantic…

  17. Queueing Models for Mobile Ad Hoc Networks

    NARCIS (Netherlands)

    de Haan, Roland

    2009-01-01

    This thesis presents models for the performance analysis of a recent communication paradigm: \\emph{mobile ad hoc networking}. The objective of mobile ad hoc networking is to provide wireless connectivity between stations in a highly dynamic environment. These dynamics are driven by the mobility of

  18. Context discovery in ad-hoc networks

    NARCIS (Netherlands)

    Liu, F.

    2011-01-01

    With the rapid development of wireless technology and portable devices, mobile ad-hoc networks (MANETs) are more and more present in our daily life. Ad-hoc networks are often composed of mobile and battery-supplied devices, like laptops, mobile phones, and PDAs. With no requirement for

  19. Snapshots for Semantic Maps

    National Research Council Canada - National Science Library

    Nielsen, Curtis W; Ricks, Bob; Goodrich, Michael A; Bruemmer, David; Few, Doug; Walton, Miles

    2004-01-01

    .... Semantic maps are a relatively new approach to information presentation. Semantic maps provide more detail about an environment than typical maps because they are augmented by icons or symbols that provide meaning for places or objects of interest...

  20. Retrieval from semantic memory.

    NARCIS (Netherlands)

    Noordman-Vonk, Wietske

    1977-01-01

    The present study has been concerned with the retrieval of semantic information. Retrieving semantic information is a fundamental process in almost any kind of cognitive behavior. The introduction presented the main experimental paradigms and results found in the literature on semantic memory as

  1. Towards Universal Semantic Tagging

    NARCIS (Netherlands)

    Abzianidze, Lasha; Bos, Johan

    2017-01-01

    The paper proposes the task of universal semantic tagging---tagging word tokens with language-neutral, semantically informative tags. We argue that the task, with its independent nature, contributes to better semantic analysis for wide-coverage multilingual text. We present the initial version of

  2. PSG: Peer-to-Peer semantic grid framework architecture

    Directory of Open Access Journals (Sweden)

    Amira Soliman

    2011-07-01

    Full Text Available The grid vision, of sharing diverse resources in a flexible, coordinated and secure manner, strongly depends on metadata. Currently, grid metadata is generated and used in an ad-hoc fashion, much of it buried in the grid middleware code libraries and database schemas. This ad-hoc expression and use of metadata causes chronic dependency on human intervention during the operation of grid machinery. Therefore, the Semantic Grid is emerged as an extension of the grid in which rich resource metadata is exposed and handled explicitly, and shared and managed via grid protocols. The layering of an explicit semantic infrastructure over the grid infrastructure potentially leads to increase interoperability and flexibility. In this paper, we present PSG framework architecture that offers semantic-based grid services. PSG architecture allows the explicit use of semantics and defining the associated grid services. PSG architecture is originated from the integration of Peer-to-Peer (P2P computing with semantics and agents. Ontologies are used in annotating each grid component, developing users/nodes profiles and organizing framework agents. While, P2P is responsible for organizing and coordinating the grid nodes and resources.

  3. BUILDUP OF PROACTIVE INTERFERENCE IN JAPANESE KANJI LEARNING

    OpenAIRE

    FUJITA, Tadashi

    1995-01-01

    The discriminative assumption on buildup of proactive interference in short-term memory predicts that when intertrial similarity of items is high, the proactive interference is built up while interlist similarity of items is low, the proactive interference is not built up. To test the discriminative assumption in Japanese Kanji learning, intertrial similarity was changed by the acoustic, the radical (as one of the figurative properties), and the radical plus semantic properties in Kanji. For ...

  4. Biomedical semantics in the Semantic Web.

    Science.gov (United States)

    Splendiani, Andrea; Burger, Albert; Paschke, Adrian; Romano, Paolo; Marshall, M Scott

    2011-03-07

    The Semantic Web offers an ideal platform for representing and linking biomedical information, which is a prerequisite for the development and application of analytical tools to address problems in data-intensive areas such as systems biology and translational medicine. As for any new paradigm, the adoption of the Semantic Web offers opportunities and poses questions and challenges to the life sciences scientific community: which technologies in the Semantic Web stack will be more beneficial for the life sciences? Is biomedical information too complex to benefit from simple interlinked representations? What are the implications of adopting a new paradigm for knowledge representation? What are the incentives for the adoption of the Semantic Web, and who are the facilitators? Is there going to be a Semantic Web revolution in the life sciences?We report here a few reflections on these questions, following discussions at the SWAT4LS (Semantic Web Applications and Tools for Life Sciences) workshop series, of which this Journal of Biomedical Semantics special issue presents selected papers from the 2009 edition, held in Amsterdam on November 20th.

  5. Semantically Interoperable XML Data.

    Science.gov (United States)

    Vergara-Niedermayr, Cristobal; Wang, Fusheng; Pan, Tony; Kurc, Tahsin; Saltz, Joel

    2013-09-01

    XML is ubiquitously used as an information exchange platform for web-based applications in healthcare, life sciences, and many other domains. Proliferating XML data are now managed through latest native XML database technologies. XML data sources conforming to common XML schemas could be shared and integrated with syntactic interoperability. Semantic interoperability can be achieved through semantic annotations of data models using common data elements linked to concepts from ontologies. In this paper, we present a framework and software system to support the development of semantic interoperable XML based data sources that can be shared through a Grid infrastructure. We also present our work on supporting semantic validated XML data through semantic annotations for XML Schema, semantic validation and semantic authoring of XML data. We demonstrate the use of the system for a biomedical database of medical image annotations and markups.

  6. Semantically Interoperable XML Data

    Science.gov (United States)

    Vergara-Niedermayr, Cristobal; Wang, Fusheng; Pan, Tony; Kurc, Tahsin; Saltz, Joel

    2013-01-01

    XML is ubiquitously used as an information exchange platform for web-based applications in healthcare, life sciences, and many other domains. Proliferating XML data are now managed through latest native XML database technologies. XML data sources conforming to common XML schemas could be shared and integrated with syntactic interoperability. Semantic interoperability can be achieved through semantic annotations of data models using common data elements linked to concepts from ontologies. In this paper, we present a framework and software system to support the development of semantic interoperable XML based data sources that can be shared through a Grid infrastructure. We also present our work on supporting semantic validated XML data through semantic annotations for XML Schema, semantic validation and semantic authoring of XML data. We demonstrate the use of the system for a biomedical database of medical image annotations and markups. PMID:25298789

  7. The use of web ontology languages and other semantic web tools in drug discovery.

    Science.gov (United States)

    Chen, Huajun; Xie, Guotong

    2010-05-01

    To optimize drug development processes, pharmaceutical companies require principled approaches to integrate disparate data on a unified infrastructure, such as the web. The semantic web, developed on the web technology, provides a common, open framework capable of harmonizing diversified resources to enable networked and collaborative drug discovery. We survey the state of art of utilizing web ontologies and other semantic web technologies to interlink both data and people to support integrated drug discovery across domains and multiple disciplines. Particularly, the survey covers three major application categories including: i) semantic integration and open data linking; ii) semantic web service and scientific collaboration and iii) semantic data mining and integrative network analysis. The reader will gain: i) basic knowledge of the semantic web technologies; ii) an overview of the web ontology landscape for drug discovery and iii) a basic understanding of the values and benefits of utilizing the web ontologies in drug discovery. i) The semantic web enables a network effect for linking open data for integrated drug discovery; ii) The semantic web service technology can support instant ad hoc collaboration to improve pipeline productivity and iii) The semantic web encourages publishing data in a semantic way such as resource description framework attributes and thus helps move away from a reliance on pure textual content analysis toward more efficient semantic data mining.

  8. Research of Ad Hoc Networks Access Algorithm

    Science.gov (United States)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  9. Distributed optimization of a multisubchannel Ad Hoc cognitive radio network

    KAUST Repository

    Leith, Alex

    2012-05-01

    In this paper, we study the distributed-duality-based optimization of a multisubchannel ad hoc cognitive radio network (CRN) that coexists with a multicell primary radio network (PRN). For radio resource allocation in multiuser orthogonal frequency-division multiplexing (MU-OFDM) systems, the orthogonal-access-based exclusive subchannel assignment (ESA) technique has been a popular method, but it is suboptimal in ad hoc networks, because nonorthogonal access between multiple secondary-user links by using shared subchannel assignment (SSA) can bring a higher weighted sum rate. We utilize the Lagrangian dual composition tool and design low-complexity near-optimal SSA resource allocation methods, assuming practical discrete-rate modulation and that the CRN-to-PRN interference constraint has to strictly be satisfied. However, available SSA methods for CRNs are either suboptimal or involve high complexity and suffer from slow convergence. To address this problem, we design fast-convergence SSA duality schemes and introduce several novel methods to increase the speed of convergence and to satisfy various system constraints with low complexity. For practical implementation in ad hoc CRNs, we design distributed-duality schemes that involve only a small number of CRN local information exchanges for dual update. The effects of many system parameters are presented through simulation results, which show that the near-optimal SSA duality scheme can perform significantly better than the suboptimal ESA duality and SSA-iterative waterfilling schemes and that the performance loss of the distributed schemes is small, compared with their centralized counterparts. © 2012 IEEE.

  10. Geospatial Semantics and the Semantic Web

    CERN Document Server

    Ashish, Naveen

    2011-01-01

    The availability of geographic and geospatial information and services, especially on the open Web has become abundant in the last several years with the proliferation of online maps, geo-coding services, geospatial Web services and geospatially enabled applications. The need for geospatial reasoning has significantly increased in many everyday applications including personal digital assistants, Web search applications, local aware mobile services, specialized systems for emergency response, medical triaging, intelligence analysis and more. Geospatial Semantics and the Semantic Web: Foundation

  11. Meinongian Semantics and Artificial Intelligence

    Directory of Open Access Journals (Sweden)

    William J. Rapaport

    2013-12-01

    Full Text Available This essay describes computational semantic networks for a philosophical audience and surveys several approaches to semantic-network semantics. In particular, propositional semantic networks (exemplified by SNePS are discussed; it is argued that only a fully intensional, Meinongian semantics is appropriate for them; and several Meinongian systems are presented.

  12. The Semantic Web Revisited

    OpenAIRE

    Shadbolt, Nigel; Berners-Lee, Tim; Hall, Wendy

    2006-01-01

    The original Scientific American article on the Semantic Web appeared in 2001. It described the evolution of a Web that consisted largely of documents for humans to read to one that included data and information for computers to manipulate. The Semantic Web is a Web of actionable information--information derived from data through a semantic theory for interpreting the symbols.This simple idea, however, remains largely unrealized. Shopbots and auction bots abound on the Web, but these are esse...

  13. Semantically Induced Distortions of Visual Awareness in a Patient with Balint's Syndrome

    Science.gov (United States)

    Soto, David; Humphreys, Glyn W.

    2009-01-01

    We present data indicating that visual awareness for a basic perceptual feature (colour) can be influenced by the relation between the feature and the semantic properties of the stimulus. We examined semantic interference from the meaning of a colour word ("RED") on simple colour (ink related) detection responses in a patient with simultagnosia…

  14. Applied Semantic Web Technologies

    CERN Document Server

    Sugumaran, Vijayan

    2011-01-01

    The rapid advancement of semantic web technologies, along with the fact that they are at various levels of maturity, has left many practitioners confused about the current state of these technologies. Focusing on the most mature technologies, Applied Semantic Web Technologies integrates theory with case studies to illustrate the history, current state, and future direction of the semantic web. It maintains an emphasis on real-world applications and examines the technical and practical issues related to the use of semantic technologies in intelligent information management. The book starts with

  15. Semantic web for dummies

    CERN Document Server

    Pollock, Jeffrey T

    2009-01-01

    Semantic Web technology is already changing how we interact with data on the Web. By connecting random information on the Internet in new ways, Web 3.0, as it is sometimes called, represents an exciting online evolution. Whether you're a consumer doing research online, a business owner who wants to offer your customers the most useful Web site, or an IT manager eager to understand Semantic Web solutions, Semantic Web For Dummies is the place to start! It will help you:Know how the typical Internet user will recognize the effects of the Semantic WebExplore all the benefits the data Web offers t

  16. Semantic Role Labeling

    CERN Document Server

    Palmer, Martha; Xue, Nianwen

    2011-01-01

    This book is aimed at providing an overview of several aspects of semantic role labeling. Chapter 1 begins with linguistic background on the definition of semantic roles and the controversies surrounding them. Chapter 2 describes how the theories have led to structured lexicons such as FrameNet, VerbNet and the PropBank Frame Files that in turn provide the basis for large scale semantic annotation of corpora. This data has facilitated the development of automatic semantic role labeling systems based on supervised machine learning techniques. Chapter 3 presents the general principles of applyin

  17. A Partitioned Approach to Signal Separation with Microphone Ad Hoc Arrays

    DEFF Research Database (Denmark)

    Tavakoli, Vincent Mohammad; Jensen, Jesper Rindom; Benesty, Jacob

    2016-01-01

    In this paper, a blind algorithm is proposed for speech enhancement in multi-speaker scenarios, in which interference rejection is the main objective. Here, the ad hoc array is broken into microphone duples which are used to partition the array into local sub-arrays. The core algorithm takes...... advantage of differences in signal structure in each duple. A geometric mean filter is then used to merge the output signals obtained with different duples, and to form a global broadband maximum signal-to-interference ratio (SIR) enhancement apparatus. The resulting filter outputs are enhanced acoustic...

  18. Ad Hoc Access Gateway Selection Algorithm

    Science.gov (United States)

    Jie, Liu

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. For mobile nodes in Ad Hoc network to internet, internet communications in the peer nodes must be achieved through the gateway. Therefore, the key Ad Hoc Access Networks will focus on the discovery gateway, as well as gateway selection in the case of multi-gateway and handover problems between different gateways. This paper considers the mobile node and the gateway, based on the average number of hops from an average access time and the stability of routes, improved gateway selection algorithm were proposed. An improved gateway selection algorithm, which mainly considers the algorithm can improve the access time of Ad Hoc nodes and the continuity of communication between the gateways, were proposed. This can improve the quality of communication across the network.

  19. Semantic representations in the temporal pole predict false memories

    Science.gov (United States)

    Chadwick, Martin J.; Anjum, Raeesa S.; Kumaran, Dharshan; Schacter, Daniel L.; Spiers, Hugo J.; Hassabis, Demis

    2016-01-01

    Recent advances in neuroscience have given us unprecedented insight into the neural mechanisms of false memory, showing that artificial memories can be inserted into the memory cells of the hippocampus in a way that is indistinguishable from true memories. However, this alone is not enough to explain how false memories can arise naturally in the course of our daily lives. Cognitive psychology has demonstrated that many instances of false memory, both in the laboratory and the real world, can be attributed to semantic interference. Whereas previous studies have found that a diverse set of regions show some involvement in semantic false memory, none have revealed the nature of the semantic representations underpinning the phenomenon. Here we use fMRI with representational similarity analysis to search for a neural code consistent with semantic false memory. We find clear evidence that false memories emerge from a similarity-based neural code in the temporal pole, a region that has been called the “semantic hub” of the brain. We further show that each individual has a partially unique semantic code within the temporal pole, and this unique code can predict idiosyncratic patterns of memory errors. Finally, we show that the same neural code can also predict variation in true-memory performance, consistent with an adaptive perspective on false memory. Taken together, our findings reveal the underlying structure of neural representations of semantic knowledge, and how this semantic structure can both enhance and distort our memories. PMID:27551087

  20. Semantic representations in the temporal pole predict false memories.

    Science.gov (United States)

    Chadwick, Martin J; Anjum, Raeesa S; Kumaran, Dharshan; Schacter, Daniel L; Spiers, Hugo J; Hassabis, Demis

    2016-09-06

    Recent advances in neuroscience have given us unprecedented insight into the neural mechanisms of false memory, showing that artificial memories can be inserted into the memory cells of the hippocampus in a way that is indistinguishable from true memories. However, this alone is not enough to explain how false memories can arise naturally in the course of our daily lives. Cognitive psychology has demonstrated that many instances of false memory, both in the laboratory and the real world, can be attributed to semantic interference. Whereas previous studies have found that a diverse set of regions show some involvement in semantic false memory, none have revealed the nature of the semantic representations underpinning the phenomenon. Here we use fMRI with representational similarity analysis to search for a neural code consistent with semantic false memory. We find clear evidence that false memories emerge from a similarity-based neural code in the temporal pole, a region that has been called the "semantic hub" of the brain. We further show that each individual has a partially unique semantic code within the temporal pole, and this unique code can predict idiosyncratic patterns of memory errors. Finally, we show that the same neural code can also predict variation in true-memory performance, consistent with an adaptive perspective on false memory. Taken together, our findings reveal the underlying structure of neural representations of semantic knowledge, and how this semantic structure can both enhance and distort our memories.

  1. The 11th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2012)

    NARCIS (Netherlands)

    Pitsillides, A.; Douligeris, C.; Vassiliou, V.; Heijenk, Geert; Cavalcante de Oliveira, J.

    Message from the General Chairs Welcome to the 2012 Mediterranean Ad Hoc Networking Workshop in Ayia Napa, Cyprus. We are excited to host Med-Hoc-Net. As a major annual international workshop, following recent successful workshops in Sicily (2006), Corfu (2007), Palma de Mallorca (2008), Haifa

  2. Morphological Cues for Lexical Semantics

    National Research Council Canada - National Science Library

    Light, Marc

    1996-01-01

    Most natural language processing tasks require lexical semantic information such as verbal argument structure and selectional restrictions, corresponding nominal semantic class, verbal aspectual class...

  3. Ad hoc networks telecommunications and game theory

    CERN Document Server

    Benslama, Malek; Batatia, Hadj

    2015-01-01

    Random SALOHA and CSMA protocols that are used to access MAC in ad hoc networks are very small compared to the multiple and spontaneous use of the transmission channel. So they have low immunity to the problems of packet collisions. Indeed, the transmission time is the critical factor in the operation of such networks. The simulations demonstrate the positive impact of erasure codes on the throughput of the transmission in ad hoc networks. However, the network still suffers from the intermittency and volatility of its efficiency throughout its operation, and it switches quickly to the satura

  4. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  5. Quality of semantic standards

    NARCIS (Netherlands)

    Folmer, Erwin Johan Albert

    2012-01-01

    Little scientific literature addresses the issue of quality of semantic standards, albeit a problem with high economic and social impact. Our problem survey, including 34 semantic Standard Setting Organizations (SSOs), gives evidence that quality of standards can be improved, but for improvement a

  6. Semantic Business Process Modeling

    OpenAIRE

    Markovic, Ivan

    2010-01-01

    This book presents a process-oriented business modeling framework based on semantic technologies. The framework consists of modeling languages, methods, and tools that allow for semantic modeling of business motivation, business policies and rules, and business processes. Quality of the proposed modeling framework is evaluated based on the modeling content of SAP Solution Composer and several real-world business scenarios.

  7. Semantic Web Primer

    NARCIS (Netherlands)

    Antoniou, Grigoris; Harmelen, Frank van

    2004-01-01

    The development of the Semantic Web, with machine-readable content, has the potential to revolutionize the World Wide Web and its use. A Semantic Web Primer provides an introduction and guide to this still emerging field, describing its key ideas, languages, and technologies. Suitable for use as a

  8. Pragmatics for formal semantics

    DEFF Research Database (Denmark)

    Danvy, Olivier

    2011-01-01

    This tech talk describes how to write and how to inter-derive formal semantics for sequential programming languages. The progress reported here is (1) concrete guidelines to write each formal semantics to alleviate their proof obligations, and (2) simple calculational tools to obtain a formal...

  9. A reasonable Semantic Web

    NARCIS (Netherlands)

    Hitzler, Pascal; Van Harmelen, Frank

    2010-01-01

    The realization of Semantic Web reasoning is central to substantiating the Semantic Web vision. However, current mainstream research on this topic faces serious challenges, which forces us to question established lines of research and to rethink the underlying approaches. We argue that reasoning for

  10. Semantic Web status model

    CSIR Research Space (South Africa)

    Gerber, AJ

    2006-06-01

    Full Text Available Semantic Web application areas are experiencing intensified interest due to the rapid growth in the use of the Web, together with the innovation and renovation of information content technologies. The Semantic Web is regarded as an integrator across...

  11. The Role of Executive Function in the Semantic Comprehension Deficits of Stroke Aphasia and Semantic Dementia

    Directory of Open Access Journals (Sweden)

    Curtiss Chapman

    2015-05-01

    Results from 5 SD patients and 4 SA patients in our ongoing study suggest similar patterns of impairment on both semantic and executive function tasks for both patient groups. Both showed multi-modal semantic deficits via poor performance on at least 3 out of 5 semantic tasks tapping different modalities. Also, SA and SD patients showed no difference in consistency across semantic tasks (see Fig. 1a & b. Both groups also showed consistently poor performance on trail-making and verbal Stroop tasks compared to controls (see Figs. 1c & 1d. SD patients seem to be less impaired on both span measures (word span range: 2.17 – 4.43; digit span: 3.17 – 5.5 than SA patients (word span range: 1.63 – 3.75; digit span: 1.17 – 4.17, and performance was variable for both groups on non-verbal Stroop and picture-word interference. SD patients found many executive tasks too difficult to understand, which may be the reason for limited prior data for them on EF tasks.. These findings suggest that the use of syndrome categories like semantic dementia and comprehension-impaired stroke aphasia are not useful in distinguishing between storage and access deficits. Patients classified as having SD seem as likely as SA patients to have certain kinds of executive deficits and SA patients may be as likely as SD patients to show consistency across semantic tasks. The results imply that some other behavioral or neuroanatomical basis rather than syndrome classification should be used to address the hypothesized separation of storage vs. control aspects of semantic memory.

  12. A Defense of Semantic Minimalism

    Science.gov (United States)

    Kim, Su

    2012-01-01

    Semantic Minimalism is a position about the semantic content of declarative sentences, i.e., the content that is determined entirely by syntax. It is defined by the following two points: "Point 1": The semantic content is a complete/truth-conditional proposition. "Point 2": The semantic content is useful to a theory of…

  13. Basic semantics of product sounds

    NARCIS (Netherlands)

    Özcan Vieira, E.; Van Egmond, R.

    2012-01-01

    Product experience is a result of sensory and semantic experiences with product properties. In this paper, we focus on the semantic attributes of product sounds and explore the basic components for product sound related semantics using a semantic differential paradigmand factor analysis. With two

  14. Benchmarking semantic web technology

    CERN Document Server

    García-Castro, R

    2009-01-01

    This book addresses the problem of benchmarking Semantic Web Technologies; first, from a methodological point of view, proposing a general methodology to follow in benchmarking activities over Semantic Web Technologies and, second, from a practical point of view, presenting two international benchmarking activities that involved benchmarking the interoperability of Semantic Web technologies using RDF(S) as the interchange language in one activity and OWL in the other.The book presents in detail how the different resources needed for these interoperability benchmarking activities were defined:

  15. Reactive Kripke semantics

    CERN Document Server

    Gabbay, Dov M

    2013-01-01

    This text offers an extension to the traditional Kripke semantics for non-classical logics by adding the notion of reactivity. Reactive Kripke models change their accessibility relation as we progress in the evaluation process of formulas in the model. This feature makes the reactive Kripke semantics strictly stronger and more applicable than the traditional one. Here we investigate the properties and axiomatisations of this new and most effective semantics, and we offer a wide landscape of applications of the idea of reactivity. Applied topics include reactive automata, reactive grammars, rea

  16. UML 2 Semantics and Applications

    CERN Document Server

    Lano, Kevin

    2009-01-01

    A coherent and integrated account of the leading UML 2 semantics work and the practical applications of UML semantics development With contributions from leading experts in the field, the book begins with an introduction to UML and goes on to offer in-depth and up-to-date coverage of: The role of semantics Considerations and rationale for a UML system model Definition of the UML system model UML descriptive semantics Axiomatic semantics of UML class diagrams The object constraint language Axiomatic semantics of state machines A coalgebraic semantic framework for reasoning about interaction des

  17. Lexical selection in the semantically blocked cyclic naming task: The role of cognitive control and learning

    Directory of Open Access Journals (Sweden)

    Jason E. Crowther

    2014-01-01

    Full Text Available Studies of semantic interference in language production have provided evidence for a role of cognitive control mechanisms in regulating the activation of semantic competitors during naming. The present study investigated the relationship between individual differences in cognitive control abilities, for both younger and older adults, and the degree of semantic interference in a blocked cyclic naming task. We predicted that individuals with lower working memory capacity (as measured by word span, lesser ability to inhibit distracting responses (as measured by Stroop interference, and a lesser ability to resolve proactive interference (as measured by a recent negatives task would show a greater increase in semantic interference in naming, with effects being larger for older adults. Instead, measures of cognitive control were found to relate to specific indices of semantic interference in the naming task, rather than overall degree of semantic interference, and few interactions with age were found, with younger and older adults performing similarly. The increase in naming latencies across naming trials within a cycle were negatively correlated with word span for both related and unrelated conditions, suggesting a strategy of narrowing response alternatives based upon memory for the set of item names. Evidence for a role of inhibition in response selection was obtained, as Stroop interference correlated positively with the change in naming latencies across cycles for the related, but not unrelated, condition. In contrast, recent negatives interference correlated negatively with the change in naming latencies across unrelated cycles, suggesting that individual differences in this tap the degree of strengthening of links in a lexical network based upon prior exposure. Results are discussed in terms of current models of lexical selection and consequences for word retrieval in more naturalistic production.

  18. Algebraic Semantics for Narrative

    Science.gov (United States)

    Kahn, E.

    1974-01-01

    This paper uses discussion of Edmund Spenser's "The Faerie Queene" to present a theoretical framework for explaining the semantics of narrative discourse. The algebraic theory of finite automata is used. (CK)

  19. Semantic Web Development

    National Research Council Canada - National Science Library

    Berners-Lee, Tim; Swick, Ralph

    2006-01-01

    ...) project between 2002 and 2005 provided key steps in the research in the Semantic Web technology, and also played an essential role in delivering the technology to industry and government in the form...

  20. Supporting Dynamic Ad hoc Collaboration Capabilities

    CERN Document Server

    Agarwal, D

    2003-01-01

    Modern HENP experiments such as CMS and Atlas involve as many as 2000 collaborators around the world. Collaborations this large will be unable to meet often enough to support working closely together. Many of the tools currently available for collaboration focus on heavy-weight applications such as videoconferencing tools. While these are important, there is a more basic need for tools that support connecting physicists to work together on an ad hoc or continuous basis. Tools that support the day-to-day connectivity and underlying needs of a group of collaborators are important for providing light-weight, non-intrusive, and flexible ways to work collaboratively. Some example tools include messaging, file-sharing, and shared plot viewers. An important component of the environment is a scalable underlying communication framework. In this paper we will describe our current progress on building a dynamic and ad hoc collaboration environment and our vision for its evolution into a HENP collaboration environment.

  1. Evolutionary algorithms for mobile ad hoc networks

    CERN Document Server

    Dorronsoro, Bernabé; Danoy, Grégoire; Pigné, Yoann; Bouvry, Pascal

    2014-01-01

    Describes how evolutionary algorithms (EAs) can be used to identify, model, and minimize day-to-day problems that arise for researchers in optimization and mobile networking. Mobile ad hoc networks (MANETs), vehicular networks (VANETs), sensor networks (SNs), and hybrid networks—each of these require a designer’s keen sense and knowledge of evolutionary algorithms in order to help with the common issues that plague professionals involved in optimization and mobile networking. This book introduces readers to both mobile ad hoc networks and evolutionary algorithms, presenting basic concepts as well as detailed descriptions of each. It demonstrates how metaheuristics and evolutionary algorithms (EAs) can be used to help provide low-cost operations in the optimization process—allowing designers to put some “intelligence” or sophistication into the design. It also offers efficient and accurate information on dissemination algorithms topology management, and mobility models to address challenges in the ...

  2. Quantum load balancing in ad hoc networks

    Science.gov (United States)

    Hasanpour, M.; Shariat, S.; Barnaghi, P.; Hoseinitabatabaei, S. A.; Vahid, S.; Tafazolli, R.

    2017-06-01

    This paper presents a novel approach in targeting load balancing in ad hoc networks utilizing the properties of quantum game theory. This approach benefits from the instantaneous and information-less capability of entangled particles to synchronize the load balancing strategies in ad hoc networks. The quantum load balancing (QLB) algorithm proposed by this work is implemented on top of OLSR as the baseline routing protocol; its performance is analyzed against the baseline OLSR, and considerable gain is reported regarding some of the main QoS metrics such as delay and jitter. Furthermore, it is shown that QLB algorithm supports a solid stability gain in terms of throughput which stands a proof of concept for the load balancing properties of the proposed theory.

  3. Supporting Dynamic Ad hoc Collaboration Capabilities

    International Nuclear Information System (INIS)

    Agarwal, Deborah A.; Berket, Karlo

    2003-01-01

    Modern HENP experiments such as CMS and Atlas involve as many as 2000 collaborators around the world. Collaborations this large will be unable to meet often enough to support working closely together. Many of the tools currently available for collaboration focus on heavy-weight applications such as videoconferencing tools. While these are important, there is a more basic need for tools that support connecting physicists to work together on an ad hoc or continuous basis. Tools that support the day-to-day connectivity and underlying needs of a group of collaborators are important for providing light-weight, non-intrusive, and flexible ways to work collaboratively. Some example tools include messaging, file-sharing, and shared plot viewers. An important component of the environment is a scalable underlying communication framework. In this paper we will describe our current progress on building a dynamic and ad hoc collaboration environment and our vision for its evolution into a HENP collaboration environment

  4. The locus of semantic interference in picture naming

    Directory of Open Access Journals (Sweden)

    Pedro Macizo

    2003-01-01

    Full Text Available El locus del efecto de interferencia semántica en la denominación de dibujos. En los experimentos que se presentan se utilizó el procedimiento de priming enmascarado para explorar el locus del efecto de interferencia semántica. Para ello se manipuló la naturaleza de la tarea (denominación y decisión de género, el tipo de relación entre el prime y el target (semántica y fonológica y el tiempo de presentación del prime. Los resultados indicaron que el efecto de interferencia semántica aparece en las tareas de denominación (Experimento 1 y de decisión de género (Experimento 2, con tiempos de presentación del prime de 100 ms. Este resultado replica el efecto encontrado por otros investigadores y lo extiende a la tarea de decisión de género. Por otro lado, el efecto de facilitación fonológica no apareció en la tarea de decisión de género (Experimento 3. Este patrón de resultados sugiere que el efecto de interferencia semántica es consecuencia de procesos que ocurren en el nivel de representación del lemma, y que la tarea de decisión de género no está influenciada por la activación fonológica.

  5. Task choice and semantic interference in picture naming

    NARCIS (Netherlands)

    Piai, V.; Roelofs, A.P.A.; Schriefers, H.J.

    2015-01-01

    Evidence from dual-task performance indicates that speakers prefer not to select simultaneous responses in picture naming and another unrelated task, suggesting a response selection bottleneck in naming. In particular, when participants respond to tones with a manual response and name pictures with

  6. AD HOC Networks for the Autonomous Car

    Science.gov (United States)

    Ron, Davidescu; Negrus, Eugen

    2017-10-01

    The future of the vehicle is made of cars, roads and infrastructures connected in a two way automated communication in a holistic system. It is a mandatory to use Encryption to maintain Confidentiality, Integrity and Availability in an ad hoc vehicle network. Vehicle to Vehicle communication, requires multichannel interaction between mobile, moving and changing parties to insure the full benefit from data sharing and real time decision making, a network of such users referred as mobile ad hoc network (MANET), however as ad hoc networks were not implemented in such a scale, it is not clear what is the best method and protocol to apply. Furthermore the visibility of secure preferred asymmetric encrypted ad hoc networks in a real time environment of dense moving autonomous vehicles has to be demonstrated, In order to evaluate the performance of Ad Hoc networks in changing conditions a simulation of multiple protocols was performed on large number of mobile nodes. The following common routing protocols were tested, DSDV is a proactive protocol, every mobile station maintains a routing table with all available destinations, DSR is a reactive routing protocol which allows nodes in the MANET to dynamically discover a source route across multiple network hops, AODV is a reactive routing protocol Instead of being proactive. It minimizes the number of broadcasts by creating routes based on demand, SAODV is a secure version of AODV, requires heavyweight asymmetric cryptographic, ARIANDE is a routing protocol that relies on highly efficient symmetric cryptography the concept is primarily based on DSR. A methodical evolution was performed in a various density of transportation, based on known communication bench mark parameters including, Throughput Vs. time, Routing Load per packets and bytes. Out of the none encrypted protocols, It is clear that in terms of performance of throughput and routing load DSR protocol has a clear advantage the high node number mode. The encrypted

  7. Foundations of semantic web technologies

    CERN Document Server

    Hitzler, Pascal; Rudolph, Sebastian

    2009-01-01

    The Quest for Semantics Building Models Calculating with Knowledge Exchanging Information Semanic Web Technologies RESOURCE DESCRIPTION LANGUAGE (RDF)Simple Ontologies in RDF and RDF SchemaIntroduction to RDF Syntax for RDF Advanced Features Simple Ontologies in RDF Schema Encoding of Special Data Structures An ExampleRDF Formal Semantics Why Semantics? Model-Theoretic Semantics for RDF(S) Syntactic Reasoning with Deduction Rules The Semantic Limits of RDF(S)WEB ONTOLOGY LANGUAGE (OWL) Ontologies in OWL OWL Syntax and Intuitive Semantics OWL Species The Forthcoming OWL 2 StandardOWL Formal Sem

  8. Comparing Refinements for Failure and Bisimulation Semantics

    NARCIS (Netherlands)

    Eshuis, H.; Fokkinga, M.M.

    2002-01-01

    Refinement in bisimulation semantics is defined differently from refinement in failure semantics: in bisimulation semantics refinement is based on simulations between labelled transition systems, whereas in failure semantics refinement is based on inclusions between failure systems. There exist

  9. IETS and quantum interference

    DEFF Research Database (Denmark)

    Jørgensen, Jacob Lykkebo; Gagliardi, Alessio; Pecchia, Alessandro

    2014-01-01

    Destructive quantum interference in single molecule electronics is an intriguing phenomenon; however, distinguishing quantum interference effects from generically low transmission is not trivial. In this paper, we discuss how quantum interference effects in the transmission lead to either low...... suppressed when quantum interference effects dominate. That is, we expand the understanding of propensity rules in inelastic electron tunneling spectroscopy to molecules with destructive quantum interference....

  10. Streamlining geospatial metadata in the Semantic Web

    Science.gov (United States)

    Fugazza, Cristiano; Pepe, Monica; Oggioni, Alessandro; Tagliolato, Paolo; Carrara, Paola

    2016-04-01

    In the geospatial realm, data annotation and discovery rely on a number of ad-hoc formats and protocols. These have been created to enable domain-specific use cases generalized search is not feasible for. Metadata are at the heart of the discovery process and nevertheless they are often neglected or encoded in formats that either are not aimed at efficient retrieval of resources or are plainly outdated. Particularly, the quantum leap represented by the Linked Open Data (LOD) movement did not induce so far a consistent, interlinked baseline in the geospatial domain. In a nutshell, datasets, scientific literature related to them, and ultimately the researchers behind these products are only loosely connected; the corresponding metadata intelligible only to humans, duplicated on different systems, seldom consistently. Instead, our workflow for metadata management envisages i) editing via customizable web- based forms, ii) encoding of records in any XML application profile, iii) translation into RDF (involving the semantic lift of metadata records), and finally iv) storage of the metadata as RDF and back-translation into the original XML format with added semantics-aware features. Phase iii) hinges on relating resource metadata to RDF data structures that represent keywords from code lists and controlled vocabularies, toponyms, researchers, institutes, and virtually any description one can retrieve (or directly publish) in the LOD Cloud. In the context of a distributed Spatial Data Infrastructure (SDI) built on free and open-source software, we detail phases iii) and iv) of our workflow for the semantics-aware management of geospatial metadata.

  11. Semantic Learning Service Personalized

    Directory of Open Access Journals (Sweden)

    Yibo Chen

    2012-02-01

    Full Text Available To provide users with more suitable and personalized service, personalization is widely used in various fields. Current e-Learning systems search for learning resources using information search technology, based on the keywords that selected or inputted by the user. Due to lack of semantic analysis for keywords and exploring the user contexts, the system cannot provide a good learning experiment. In this paper, we defined the concept and characteristic of the personalized learning service, and proposed a semantic learning service personalized framework. Moreover, we made full use of semantic technology, using ontologies to represent the learning contents and user profile, mining and utilizing the friendship and membership of the social relationship to construct the user social relationship profile, and improved the collaboration filtering algorithm to recommend personalized learning resources for users. The results of the empirical evaluation show that the approach is effectiveness in augmenting recommendation.

  12. Semantic Observation Integration

    Directory of Open Access Journals (Sweden)

    Werner Kuhn

    2012-09-01

    Full Text Available Although the integration of sensor-based information into analysis and decision making has been a research topic for many years, semantic interoperability has not yet been reached. The advent of user-generated content for the geospatial domain, Volunteered Geographic Information (VGI, makes it even more difficult to establish semantic integration. This paper proposes a novel approach to integrating conventional sensor information and VGI, which is exploited in the context of detecting forest fires. In contrast to common logic-based semantic descriptions, we present a formal system using algebraic specifications to unambiguously describe the processing steps from natural phenomena to value-added information. A generic ontology of observations is extended and profiled for forest fire detection in order to illustrate how the sensing process, and transformations between heterogeneous sensing systems, can be represented as mathematical functions and grouped into abstract data types. We discuss the required ontological commitments and a possible generalization.

  13. The Semantics of "Violence"

    DEFF Research Database (Denmark)

    Levisen, Carsten

    This paper presents a semantic analysis of “violence” – a word around which Anglo-internationaldiscourses revolve. Many ethnolinguistic communities around the world are currently adapting thisEnglish lexical concept into their linguistic systems, and, presumably also, the view of the worldembodied...... by the “violence” concept.Based on semantic fieldwork in Port Vila, the creolophone capital of Vanuatu in the SouthPacific, the paper investigates the discursive introduction of “violence” into a community which,until recently, lived by other concepts. I compare and contrast the traditional Bislama concepts...... kilimand faetem with the newly imported English word vaeolens (violence). My study provides newevidence for how cognitive and semantic change co-occur in the context of postcolonial linguisticcommunities, and my paper addresses an important, ongoing controversy related to the notion of“Anglocentric bias...

  14. Semantic Keys and Reading

    Directory of Open Access Journals (Sweden)

    Zev bar-Lev

    2016-12-01

    Full Text Available Semantic Keys are elements (word-parts of written language that give an iconic, general representation of the whole word’s meaning. In written Sino-Japanese the “radical” or semantic components play this role. For example, the character meaning ‘woman, female’ is the Semantic Key of the character for Ma ‘Mama’ (alongside the phonetic component Ma, which means ‘horse’ as a separate character. The theory of semantic Keys in both graphic and phonemic aspects is called qTheory or nanosemantics. The most innovative aspect of the present article is the hypothesis that, in languages using alphabetic writing systems, the role of Semantic Key is played by consonants, more specifically the first consonant. Thus, L meaning ‘LIFT’ is the Semantic Key of English Lift, Ladle, Lofty, aLps, eLevator, oLympus; Spanish Leva, Lecantarse, aLto, Lengua; Arabic aLLah, and Hebrew① ªeL-ºaL ‘upto-above’ (the Israeli airline, Polish Lot ‘flight’ (the Polish airline; Hebrew ªeL, ªeLohim ‘God’, and haLLeluyah ‘praise-ye God’ (using Parallels, ‘Lift up God’. Evidence for the universality of the theory is shown by many examples drawn from various languages, including Indo-European Semitic, Chinese and Japanese. The theory reveals hundreds of relationships within and between languages, related and unrelated, that have been “Hiding in Plain Sight”, to mention just one example: the Parallel between Spanish Pan ‘bread’ and Mandarin Fan ‘rice’.

  15. Temporal Representation in Semantic Graphs

    Energy Technology Data Exchange (ETDEWEB)

    Levandoski, J J; Abdulla, G M

    2007-08-07

    A wide range of knowledge discovery and analysis applications, ranging from business to biological, make use of semantic graphs when modeling relationships and concepts. Most of the semantic graphs used in these applications are assumed to be static pieces of information, meaning temporal evolution of concepts and relationships are not taken into account. Guided by the need for more advanced semantic graph queries involving temporal concepts, this paper surveys the existing work involving temporal representations in semantic graphs.

  16. Semantic Versus Syntactic Cutting Planes

    OpenAIRE

    Filmus, Yuval; Hrubeš, Pavel; Lauria, Massimo

    2016-01-01

    In this paper, we compare the strength of the semantic and syntactic version of the cutting planes proof system. First, we show that the lower bound technique of Pudlák applies also to semantic cutting planes: the proof system has feasible interpolation via monotone real circuits, which gives an exponential lower bound on lengths of semantic cutting planes refutations. Second, we show that semantic refutations are stronger than syntactic ones. In particular, we give a formula for whic...

  17. Flow Logics and Operational Semantics

    DEFF Research Database (Denmark)

    Nielson, Flemming; Nielson, Hanne Riis

    1998-01-01

    Flow logic is a “fast prototyping” approach to program analysis that shows great promise of being able to deal with a wide variety of languages and calculi for computation. However, seemingly innocent choices in the flow logic as well as in the operational semantics may inhibit proving the analys...... correct. Our main conclusion is that environment based semantics is more flexible than either substitution based semantics or semantics making use of structural congruences (like alpha-renaming)....

  18. Evolution of semantic systems

    CERN Document Server

    Küppers, Bernd-Olaf; Artmann, Stefan

    2013-01-01

    Complex systems in nature and society make use of information for the development of their internal organization and the control of their functional mechanisms. Alongside technical aspects of storing, transmitting and processing information, the various semantic aspects of information, such as meaning, sense, reference and function, play a decisive part in the analysis of such systems.With the aim of fostering a better understanding of semantic systems from an evolutionary and multidisciplinary perspective, this volume collects contributions by philosophers and natural scientists, linguists, i

  19. A time-based admission control mechanism for IEEE 802.11 ad Hoc networks

    OpenAIRE

    Costa, Luís Henrique M. K.; Cerveira, Carlos Rodrigo

    2006-01-01

    This paper presents a time-based admission control mechanism (TAC) for IEEE 802.11 ad hoc networks. The proposed mechanism was adapted to the QoS AODV routing protocol, which takes the quality of service requirements of the data flow into account in the route discovery process. TAC-AODV estimates the idle time of the physical medium based on the frames listened. The incoming traffic is admitted according to the offered load as well as the intra-flow interference, calculated based on the numbe...

  20. Semantic Search of Web Services

    Science.gov (United States)

    Hao, Ke

    2013-01-01

    This dissertation addresses semantic search of Web services using natural language processing. We first survey various existing approaches, focusing on the fact that the expensive costs of current semantic annotation frameworks result in limited use of semantic search for large scale applications. We then propose a vector space model based service…

  1. Semantic memory in object use.

    Science.gov (United States)

    Silveri, Maria Caterina; Ciccarelli, Nicoletta

    2009-10-01

    We studied five patients with semantic memory disorders, four with semantic dementia and one with herpes simplex virus encephalitis, to investigate the involvement of semantic conceptual knowledge in object use. Comparisons between patients who had semantic deficits of different severity, as well as the follow-up, showed that the ability to use objects was largely preserved when the deficit was mild but progressively decayed as the deficit became more severe. Naming was generally more impaired than object use. Production tasks (pantomime execution and actual object use) and comprehension tasks (pantomime recognition and action recognition) as well as functional knowledge about objects were impaired when the semantic deficit was severe. Semantic and unrelated errors were produced during object use, but actions were always fluent and patients performed normally on a novel tools task in which the semantic demand was minimal. Patients with severe semantic deficits scored borderline on ideational apraxia tasks. Our data indicate that functional semantic knowledge is crucial for using objects in a conventional way and suggest that non-semantic factors, mainly non-declarative components of memory, might compensate to some extent for semantic disorders and guarantee some residual ability to use very common objects independently of semantic knowledge.

  2. Semantator: annotating clinical narratives with semantic web ontologies.

    Science.gov (United States)

    Song, Dezhao; Chute, Christopher G; Tao, Cui

    2012-01-01

    To facilitate clinical research, clinical data needs to be stored in a machine processable and understandable way. Manual annotating clinical data is time consuming. Automatic approaches (e.g., Natural Language Processing systems) have been adopted to convert such data into structured formats; however, the quality of such automatically extracted data may not always be satisfying. In this paper, we propose Semantator, a semi-automatic tool for document annotation with Semantic Web ontologies. With a loaded free text document and an ontology, Semantator supports the creation/deletion of ontology instances for any document fragment, linking/disconnecting instances with the properties in the ontology, and also enables automatic annotation by connecting to the NCBO annotator and cTAKES. By representing annotations in Semantic Web standards, Semantator supports reasoning based upon the underlying semantics of the owl:disjointWith and owl:equivalentClass predicates. We present discussions based on user experiences of using Semantator.

  3. Non-Interference and Erasure Policies for Java Card Bytecode

    DEFF Research Database (Denmark)

    Hansen, René Rydhof; Probst, Christian W.

    2006-01-01

    Non-interference is the property of a program not to leak any secret information. In this paper we propose a notion of non-interference for an abstract version of the Java Card bytecode language. Furthermore an information-flow analysis for verifying non-interference is developed and proved sound...... that confidential information is unavailable after a certain point---and that this unavailability is enforced by the system. This is a crucial requirement for systems like e-commerce or e-voting....... and correct with respect to the formal semantics of the language. The information-flow analysis can automatically verify the absence of leaks in a program, thus proving non-interference. Based on the definition of non-interference we propose a notion of simple erasure policies. These allow to statically check...

  4. Semantic Barbs and Biorthogonality

    OpenAIRE

    Rathke, J.; Sassone, V.; Sobocinski, P.

    2007-01-01

    We use the framework of biorthogonality to introduce a novel semantic definition of the concept of barb (basic observable) for process calculi. We develop a uniform basic theory of barbs and demonstrate its robustness by showing that it gives rise to the correct observables in specific process calculi which model synchronous, asynchronous and broadcast communication regimes.

  5. Semantic data bank

    International Nuclear Information System (INIS)

    Anoreewsky, Evelyne; Nicolas, P.; Grillo, J.P.

    1977-01-01

    A system is proposed for determining semantic relations between lexical items. To do this, a descriptor is associated with each lexical item; two types of algorithms are used to calculate the relationships between descriptors ('similarity' or 'predicativity' relations). This system makes it possible to simulate linguistic experiences. Some results have been predicted and verified experimentally. [fr

  6. The semantic similarity ensemble

    Directory of Open Access Journals (Sweden)

    Andrea Ballatore

    2013-12-01

    Full Text Available Computational measures of semantic similarity between geographic terms provide valuable support across geographic information retrieval, data mining, and information integration. To date, a wide variety of approaches to geo-semantic similarity have been devised. A judgment of similarity is not intrinsically right or wrong, but obtains a certain degree of cognitive plausibility, depending on how closely it mimics human behavior. Thus selecting the most appropriate measure for a specific task is a significant challenge. To address this issue, we make an analogy between computational similarity measures and soliciting domain expert opinions, which incorporate a subjective set of beliefs, perceptions, hypotheses, and epistemic biases. Following this analogy, we define the semantic similarity ensemble (SSE as a composition of different similarity measures, acting as a panel of experts having to reach a decision on the semantic similarity of a set of geographic terms. The approach is evaluated in comparison to human judgments, and results indicate that an SSE performs better than the average of its parts. Although the best member tends to outperform the ensemble, all ensembles outperform the average performance of each ensemble's member. Hence, in contexts where the best measure is unknown, the ensemble provides a more cognitively plausible approach.

  7. Learning semantic query suggestions

    NARCIS (Netherlands)

    Meij, E.; Bron, M.; Hollink, L.; Huurnink, B.; de Rijke, M.

    2009-01-01

    An important application of semantic web technology is recognizing human-defined concepts in text. Query transformation is a strategy often used in search engines to derive queries that are able to return more useful search results than the original query and most popular search engines provide

  8. A semantic web framework to integrate cancer omics data with biological knowledge.

    Science.gov (United States)

    Holford, Matthew E; McCusker, James P; Cheung, Kei-Hoi; Krauthammer, Michael

    2012-01-25

    The RDF triple provides a simple linguistic means of describing limitless types of information. Triples can be flexibly combined into a unified data source we call a semantic model. Semantic models open new possibilities for the integration of variegated biological data. We use Semantic Web technology to explicate high throughput clinical data in the context of fundamental biological knowledge. We have extended Corvus, a data warehouse which provides a uniform interface to various forms of Omics data, by providing a SPARQL endpoint. With the querying and reasoning tools made possible by the Semantic Web, we were able to explore quantitative semantic models retrieved from Corvus in the light of systematic biological knowledge. For this paper, we merged semantic models containing genomic, transcriptomic and epigenomic data from melanoma samples with two semantic models of functional data - one containing Gene Ontology (GO) data, the other, regulatory networks constructed from transcription factor binding information. These two semantic models were created in an ad hoc manner but support a common interface for integration with the quantitative semantic models. Such combined semantic models allow us to pose significant translational medicine questions. Here, we study the interplay between a cell's molecular state and its response to anti-cancer therapy by exploring the resistance of cancer cells to Decitabine, a demethylating agent. We were able to generate a testable hypothesis to explain how Decitabine fights cancer - namely, that it targets apoptosis-related gene promoters predominantly in Decitabine-sensitive cell lines, thus conveying its cytotoxic effect by activating the apoptosis pathway. Our research provides a framework whereby similar hypotheses can be developed easily.

  9. Game Theory in Wireless Ad-Hoc Opportunistic Radios

    OpenAIRE

    Mumtaz, Shahid; Gameiro, Atilio

    2010-01-01

    Emerging research in game theory based power control applied to ad hoc opportunist networks shows much promise to help understand the complex interactions between OR nodes in this highly dynamic and distributed environment. Also, the employment of game theory in modeling dynamic situations for opportunist ad hoc networks where OR nodes have incomplete information has led to the application of largely unexplored games such as games of imperfect monitoring. Ad hoc security using game theory is ...

  10. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  11. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  12. Worm epidemics in wireless ad hoc networks

    Energy Technology Data Exchange (ETDEWEB)

    Nekovee, Maziar [BT Research, Polaris 134, Adastral Park, Martlesham, Suffolk IP5 3RE (United Kingdom); Centre for Computational Science, University College London, 20 Gordon Street, London WC1H 0AJ (United Kingdom)

    2007-06-15

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  13. Worm epidemics in wireless ad hoc networks

    Science.gov (United States)

    Nekovee, Maziar

    2007-06-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  14. Worm epidemics in wireless ad hoc networks

    International Nuclear Information System (INIS)

    Nekovee, Maziar

    2007-01-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet

  15. ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS – A SURVEY

    Directory of Open Access Journals (Sweden)

    K. Sankar

    2012-06-01

    Full Text Available Reducing energy consumption, primarily with the goal of extending the lifetime of battery-powered devices, has emerged as a fundamental challenge in wireless communication. The performance of the medium access control (MAC scheme not only has a fairly significant end-result on the behaviour of the routing approach employed, but also on the energy consumption of the wireless network interface card (NIC. We investigate the inadequacies of the MAC schemes designed for ad hoc wireless networks in the context of power awareness herein. The topology changes due to uncontrollable factors such as node mobility, weather, interference, noise, as well as on controllable parameters such as transmission power and antenna direction results in significant amount of energy loss. Controlling rapid topology changes by minimizing the maximum transmission power used in ad hoc wireless networks, while still maintaining networks connectivity can prolong battery life and hence network lifetime considerably. In addition, we systematically explore the potential energy consumption pitfalls of non–power-based and power based routing schemes. We suggest a thorough energy-based performance survey of energy aware routing protocols for wireless mobile ad-hoc networks. We also present the statistical performance metrics measured by our simulations.

  16. Effect of hearing loss on semantic access by auditory and audiovisual speech in children.

    Science.gov (United States)

    Jerger, Susan; Tye-Murray, Nancy; Damian, Markus F; Abdi, Hervé

    2013-01-01

    This research studied whether the mode of input (auditory versus audiovisual) influenced semantic access by speech in children with sensorineural hearing impairment (HI). Participants, 31 children with HI and 62 children with normal hearing (NH), were tested with the authors' new multimodal picture word task. Children were instructed to name pictures displayed on a monitor and ignore auditory or audiovisual speech distractors. The semantic content of the distractors was varied to be related versus unrelated to the pictures (e.g., picture distractor of dog-bear versus dog-cheese, respectively). In children with NH, picture-naming times were slower in the presence of semantically related distractors. This slowing, called semantic interference, is attributed to the meaning-related picture-distractor entries competing for selection and control of the response (the lexical selection by competition hypothesis). Recently, a modification of the lexical selection by competition hypothesis, called the competition threshold (CT) hypothesis, proposed that (1) the competition between the picture-distractor entries is determined by a threshold, and (2) distractors with experimentally reduced fidelity cannot reach the CT. Thus, semantically related distractors with reduced fidelity do not produce the normal interference effect, but instead no effect or semantic facilitation (faster picture naming times for semantically related versus unrelated distractors). Facilitation occurs because the activation level of the semantically related distractor with reduced fidelity (1) is not sufficient to exceed the CT and produce interference but (2) is sufficient to activate its concept, which then strengthens the activation of the picture and facilitates naming. This research investigated whether the proposals of the CT hypothesis generalize to the auditory domain, to the natural degradation of speech due to HI, and to participants who are children. Our multimodal picture word task allowed us

  17. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  18. Escaping the recent past: which stimulus dimensions influence proactive interference?

    Science.gov (United States)

    Craig, Kimberly S; Berman, Marc G; Jonides, John; Lustig, Cindy

    2013-07-01

    Proactive interference occurs when information from the past disrupts current processing and is a major source of confusion and errors in short-term memory (STM; Wickens, Born, & Allen, Journal of Verbal Learning and Verbal Behavior, 2:440-445, 1963). The present investigation examines potential boundary conditions for interference, testing the hypothesis that potential competitors must be similar along task-relevant dimensions to influence proactive interference effects. We manipulated both the type of task being completed (Experiments 1, 2, and 3) and dimensions of similarity irrelevant to the current task (Experiments 4 and 5) to determine how the recent presentation of a probe item would affect the speed with which participants could reject that item. Experiments 1, 2, and 3 contrasted STM judgments, which require temporal information, with semantic and perceptual judgments, for which temporal information is irrelevant. In Experiments 4 and 5, task-irrelevant information (perceptual similarity) was manipulated within the recent probes task. We found that interference from past items affected STM task performance but did not affect performance in semantic or perceptual judgment tasks. Conversely, similarity along a nominally irrelevant perceptual dimension did not affect the magnitude of interference in STM tasks. Results are consistent with the view that items in STM are represented by noisy codes consisting of multiple dimensions and that interference occurs when items are similar to each other and, thus, compete along the dimensions relevant to target selection.

  19. From Data to Semantic Information

    Directory of Open Access Journals (Sweden)

    Luciano Floridi

    2003-06-01

    Full Text Available Abstract: There is no consensus yet on the definition of semantic information. This paper contributes to the current debate by criticising and revising the Standard Definition of semantic Information (SDI as meaningful data, in favour of the Dretske-Grice approach: meaningful and well-formed data constitute semantic information only if they also qualify as contingently truthful. After a brief introduction, SDI is criticised for providing necessary but insufficient conditions for the definition of semantic information. SDI is incorrect because truth-values do not supervene on semantic information, and misinformation (that is, false semantic information is not a type of semantic information, but pseudo-information, that is not semantic information at all. This is shown by arguing that none of the reasons for interpreting misinformation as a type of semantic information is convincing, whilst there are compelling reasons to treat it as pseudo-information. As a consequence, SDI is revised to include a necessary truth-condition. The last section summarises the main results of the paper and indicates the important implications of the revised definition for the analysis of the deflationary theories of truth, the standard definition of knowledge and the classic, quantitative theory of semantic information.

  20. Topology Control with Anisotropic and Sector Turning Antennas in Ad-hoc and Sensor Networks

    Directory of Open Access Journals (Sweden)

    V. Černý

    2011-01-01

    Full Text Available During the last several years, technological advances have allowed the development of small, cheap, embedded, independent and rather powerful radio devices that can self-organise into data networks. Such networks are usually called ad-hoc networks or, sometimes, depending on the application field, sensor networks. One of the first standards for ad-hoc networks to impose itself as a fully industrial framework for data gathering and control over such devices is IEEE 802.15.4 and, on top of it, its pair network architecture: ZigBee. In the case of multiple radio devices clamped into a small geographical area, the lack of radio bandwidth becomes a major problem, leading to multiple data losses and unnecessary power drain from the batteries of these small devices. This problem is usually perceived as interference. The deployment of appropriate topology control mechanisms (TC can solve interference. All of these algorithms calculate TC on the basis of isotropic antenna radiation patterns in the horizontal plane.

  1. Analysis of interference performance of tactical radio network

    Science.gov (United States)

    Nie, Hao; Cai, Xiaoxia; Chen, Hong

    2017-08-01

    Mobile Ad hoc network has a strong military background for its development as the core technology of the backbone network of US tactical Internet. And which tactical radio network, is the war in today's tactical use of the Internet more mature form of networking, mainly used in brigade and brigade following forces. This paper analyzes the typical protocol AODV in the tactical radio network, and then carries on the networking. By adding the interference device to the whole network, the battlefield environment is simulated, and then the throughput, delay and packet loss rate are analyzed, and the performance of the whole network and the single node before and after the interference is obtained.

  2. SEMANTIC DERIVATION OF BORROWINGS

    Directory of Open Access Journals (Sweden)

    Shigapova, F.F.

    2017-09-01

    Full Text Available The author carried out the contrastive analysis of the word спикер borrowed into Russian from English and the English word speaker. The findings of the analysis include confirm (1 different derivational abilities and functions of the borrowed word and the native word; (2 distinctive features in the definitions, i.e. semantic structures, registered in monolingual non-abridged dictionaries; (3 heterogeneous parameters of frequencies recorded in the National Corpus of the Russian language and the British National Corpus; (4 absence of bilingual equivalent collocations with words спикер and speaker. The collocations with words studied revealed new lexical and connotative senses in the meaning of the word. Relevance of the study conducted is justified by the new facts revealed about the semantic adaptation of the borrowed word in the system of the Russian language and its paradigmatic and syntagmatic connections in the system of the recipient language.

  3. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  4. Semantic Activity Recognition

    OpenAIRE

    Thonnat , Monique

    2008-01-01

    International audience; Extracting automatically the semantics from visual data is a real challenge. We describe in this paper how recent work in cognitive vision leads to significative results in activity recognition for visualsurveillance and video monitoring. In particular we present work performed in the domain of video understanding in our PULSAR team at INRIA in Sophia Antipolis. Our main objective is to analyse in real-time video streams captured by static video cameras and to recogniz...

  5. Semantically Enhanced Recommender Systems

    Science.gov (United States)

    Ruiz-Montiel, Manuela; Aldana-Montes, José F.

    Recommender Systems have become a significant area in the context of web personalization, given the large amount of available data. Ontologies can be widely taken advantage of in recommender systems, since they provide a means of classifying and discovering of new information about the items to recommend, about user profiles and even about their context. We have developed a semantically enhanced recommender system based on this kind of ontologies. In this paper we present a description of the proposed system.

  6. Insensitive Enough Semantics

    Directory of Open Access Journals (Sweden)

    Richard Vallée

    2006-06-01

    Full Text Available According to some philosophers, sentences like (1 “It is raining” and (2 “John is ready” are context sensitive sentences even if they do not contain indexicals or demonstratives. That view initiated a context sensitivity frenzy. Cappelen and Lepore (2005 summarize the frenzy by the slogan “Every sentence is context sensitive” (Insensitive Semantics, p. 6, note 5. They suggest a view they call Minimalism according to which the truth conditions of utterances of sentences like (1/(2 are exactly what Convention T gives you. I will distinguish different propositions, and refocus semantics on sentences. As distinct from what the protagonists in the ongoing debate think, I argue that the content or truth conditions of utterances of both context sensitive sentences and sentences like (1/(2 are not interesting from a semantic point of view, and that the problem sentences like (1/(2 raises is not about context sensitivity or context insensitivity of sentences, but relevance of the content of utterances.

  7. Causality in the semantics of Esterel : revisited

    NARCIS (Netherlands)

    Mousavi, M.R.; Klin, B.; Sobocinski, P.

    2010-01-01

    We re-examine the challenges concerning causality in the semantics of Esterel and show that they pertain to the known issues in the semantics of Structured Operational Semantics with negative premises. We show that the solutions offered for the semantics of SOS also provide answers to the semantic

  8. Minimum Interference Planar Geometric Topology in Wireless Sensor Networks

    Science.gov (United States)

    Nguyen, Trac N.; Huynh, Dung T.

    The approach of using topology control to reduce interference in wireless sensor networks has attracted attention of several researchers. There are at least two definitions of interference in the literature. In a wireless sensor network the interference at a node may be caused by an edge that is transmitting data [15], or it occurs because the node itself is within the transmission range of another [3], [1], [6]. In this paper we show that the problem of assigning power to nodes in the plane to yield a planar geometric graph whose nodes have bounded interference is NP-complete under both interference definitions. Our results provide a rigorous proof for a theorem in [15] whose proof is unconvincing. They also address one of the open issues raised in [6] where Halldórsson and Tokuyama were concerned with the receiver model of node interference, and derived an O(sqrt {Δ}) upper bound for the maximum node interference of a wireless ad hoc network in the plane (Δ is the maximum interference of the so-called uniform radius network). The question as to whether this problem is NP-complete in the 2-dimensional case was left open.

  9. Subliminal semantic priming in speech.

    Directory of Open Access Journals (Sweden)

    Jérôme Daltrozzo

    Full Text Available Numerous studies have reported subliminal repetition and semantic priming in the visual modality. We transferred this paradigm to the auditory modality. Prime awareness was manipulated by a reduction of sound intensity level. Uncategorized prime words (according to a post-test were followed by semantically related, unrelated, or repeated target words (presented without intensity reduction and participants performed a lexical decision task (LDT. Participants with slower reaction times in the LDT showed semantic priming (faster reaction times for semantically related compared to unrelated targets and negative repetition priming (slower reaction times for repeated compared to semantically related targets. This is the first report of semantic priming in the auditory modality without conscious categorization of the prime.

  10. Hierarchical Semantic Model of Geovideo

    Directory of Open Access Journals (Sweden)

    XIE Xiao

    2015-05-01

    Full Text Available The public security incidents were getting increasingly challenging with regard to their new features, including multi-scale mobility, multistage dynamic evolution, as well as spatiotemporal concurrency and uncertainty in the complex urban environment. However, the existing video models, which were used/designed for independent archive or local analysis of surveillance video, have seriously inhibited emergency response to the urgent requirements.Aiming at the explicit representation of change mechanism in video, the paper proposed a novel hierarchical geovideo semantic model using UML. This model was characterized by the hierarchical representation of both data structure and semantics based on the change-oriented three domains (feature domain, process domain and event domain instead of overall semantic description of video streaming; combining both geographical semantics and video content semantics, in support of global semantic association between multiple geovideo data. The public security incidents by video surveillance are inspected as an example to illustrate the validity of this model.

  11. Decentralized position verification in geographic ad hoc routing

    NARCIS (Netherlands)

    Leinmüller, Tim; Schoch, Elmar; Kargl, Frank; Maihöfer, Christian

    Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to MANETs or wireless sensor networks (WSNs), these so-called vehicular ad hoc networks (VANETs) have unique requirements on network protocols. The requirements result mainly from

  12. Assured Resource Sharing in Ad-Hoc Collaboration

    Energy Technology Data Exchange (ETDEWEB)

    Ahn, Gail-Joon [Arizona State Univ., Tempe, AZ (United States)

    2015-12-19

    The project seeks an innovative framework to enable users to access and selectively share resources in distributed environments, enhancing the scalability of information sharing. We have investigated secure sharing & assurance approaches for ad-hoc collaboration, focused on Grids, Clouds, and ad-hoc network environments.

  13. Is one enough? The case for non-additive influences of visual features on crossmodal Stroop interference

    Directory of Open Access Journals (Sweden)

    Lawrence Gregory Appelbaum

    2013-10-01

    Full Text Available When different perceptual signals arising from the same physical entity are integrated, they form a more reliable sensory estimate. When such repetitive sensory signals are pitted against other competing stimuli, such as in a Stroop Task, this redundancy may lead to stronger processing that biases behavior towards reporting the redundant stimuli. This bias would therefore be expected to evoke greater incongruency effects than if these stimuli did not contain redundant sensory features. In the present paper we report that this is not the case for a set of three crossmodal, auditory-visual Stroop tasks. In these tasks participants attended to, and reported, either the visual or the auditory stimulus (in separate blocks while ignoring the other, unattended modality. The visual component of these stimuli could be purely semantic (words, purely perceptual (colors, or the combination of both. Based on previous work showing enhanced crossmodal integration and visual search gains for redundantly coded stimuli, we had expected that relative to the single features, redundant visual features would have induced both greater visual distracter incongruency effects for attended auditory targets, and been less influenced by auditory distracters for attended visual targets. Overall, reaction time were faster for visual targets and were dominated by behavioral facilitation for the cross-modal interactions (relative to interference, but showed surprisingly little influence of visual feature redundancy. Post hoc analyses revealed modest and trending evidence for possible increases in behavioral interference for redundant visual distracters on auditory targets, however, these effects were substantially smaller than anticipated and were not accompanied by redundancy effect for behavioral facilitation or for attended visual targets.

  14. Survey of semantic modeling techniques

    Energy Technology Data Exchange (ETDEWEB)

    Smith, C.L.

    1975-07-01

    The analysis of the semantics of programing languages was attempted with numerous modeling techniques. By providing a brief survey of these techniques together with an analysis of their applicability for answering semantic issues, this report attempts to illuminate the state-of-the-art in this area. The intent is to be illustrative rather than thorough in the coverage of semantic models. A bibliography is included for the reader who is interested in pursuing this area of research in more detail.

  15. Semantic multimedia analysis and processing

    CERN Document Server

    Spyrou, Evaggelos; Mylonas, Phivos

    2014-01-01

    Broad in scope, Semantic Multimedia Analysis and Processing provides a complete reference of techniques, algorithms, and solutions for the design and the implementation of contemporary multimedia systems. Offering a balanced, global look at the latest advances in semantic indexing, retrieval, analysis, and processing of multimedia, the book features the contributions of renowned researchers from around the world. Its contents are based on four fundamental thematic pillars: 1) information and content retrieval, 2) semantic knowledge exploitation paradigms, 3) multimedia personalization, and 4)

  16. AD HOC TEAMWORK BEHAVIORS FOR INFLUENCING A FLOCK

    Directory of Open Access Journals (Sweden)

    Katie Genter

    2016-02-01

    Full Text Available Ad hoc teamwork refers to the challenge of designing agents that can influence the behavior of a team, without prior coordination with its teammates. This paper considers influencing a flock of simple robotic agents to adopt a desired behavior within the context of ad hoc teamwork. Specifically, we examine how the ad hoc agents should behave in order to orient a flock towards a target heading as quickly as possible when given knowledge of, but no direct control over, the behavior of the flock. We introduce three algorithms which the ad hoc agents can use to influence the flock, and we examine the relative importance of coordinating the ad hoc agents versus planning farther ahead when given fixed computational resources. We present detailed experimental results for each of these algorithms, concluding that in this setting, inter-agent coordination and deeper lookahead planning are no more beneficial than short-term lookahead planning.

  17. Ad hoc committee on reactor physics benchmarks

    International Nuclear Information System (INIS)

    Diamond, D.J.; Mosteller, R.D.; Gehin, J.C.

    1996-01-01

    In the spring of 1994, an ad hoc committee on reactor physics benchmarks was formed under the leadership of two American Nuclear Society (ANS) organizations. The ANS-19 Standards Subcommittee of the Reactor Physics Division and the Computational Benchmark Problem Committee of the Mathematics and Computation Division had both seen a need for additional benchmarks to help validate computer codes used for light water reactor (LWR) neutronics calculations. Although individual organizations had employed various means to validate the reactor physics methods that they used for fuel management, operations, and safety, additional work in code development and refinement is under way, and to increase accuracy, there is a need for a corresponding increase in validation. Both organizations thought that there was a need to promulgate benchmarks based on measured data to supplement the LWR computational benchmarks that have been published in the past. By having an organized benchmark activity, the participants also gain by being able to discuss their problems and achievements with others traveling the same route

  18. Spontaneous ad hoc mobile cloud computing network.

    Science.gov (United States)

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  19. Semantic Representatives of the Concept

    Directory of Open Access Journals (Sweden)

    Elena N. Tsay

    2013-01-01

    Full Text Available In the article concept as one of the principle notions of cognitive linguistics is investigated. Considering concept as culture phenomenon, having language realization and ethnocultural peculiarities, the description of the concept “happiness” is presented. Lexical and semantic paradigm of the concept of happiness correlates with a great number of lexical and semantic variants. In the work semantic representatives of the concept of happiness, covering supreme spiritual values are revealed and semantic interpretation of their functioning in the Biblical discourse is given.

  20. System semantics of explanatory dictionaries

    Directory of Open Access Journals (Sweden)

    Volodymyr Shyrokov

    2015-11-01

    Full Text Available System semantics of explanatory dictionaries Some semantic properties of the language to be followed from the structure of lexicographical systems of big explanatory dictionaries are considered. The hyperchains and hypercycles are determined as the definite kind of automorphisms of the lexicographical system of explanatory dictionary. Some semantic consequencies following from the principles of lexicographic closure and lexicographic completeness are investigated using the hyperchains and hypercycles formalism. The connection between the hypercyle properties of the lexicographical system semantics and Goedel’s incompleteness theorem is discussed.

  1. INTERFERENCE IN THE SHORT TEXT OF BESAKIH TEMPLE

    Directory of Open Access Journals (Sweden)

    Ni Made Kajeng Martha Puspita

    2016-05-01

    Full Text Available The aim of this study is to analyze the four types of interferences; syntax, semantics, copula, and redundant found in “Besakih Temple” short text. The data were collected through library research with the necessary note-taking and documentation. The method used in analyzing this study is qualitative method. The result showed that interferences found in the text are covering linguistic aspects. It is furthermore called the negative transfer due to the result of contact with another language. The most common source of errors is lack of knowledge of the speaker about the language being used.

  2. Discovering biomedical semantic relations in PubMed queries for information retrieval and database curation.

    Science.gov (United States)

    Huang, Chung-Chi; Lu, Zhiyong

    2016-01-01

    covering diverse bio-entity relations. To assess the potential utility of our automated top-ranked patterns of a given relation in semantic search, we performed a pilot study on frequently sought semantic relations in PubMed and observed improved literature retrieval effectiveness based on post-hoc human relevance evaluation. Further investigation in larger tests and in real-world scenarios is warranted. Published by Oxford University Press 2016. This work is written by US Government employees and is in the public domain in the US.

  3. Semantic content-based recommendations using semantic graphs.

    Science.gov (United States)

    Guo, Weisen; Kraines, Steven B

    2010-01-01

    Recommender systems (RSs) can be useful for suggesting items that might be of interest to specific users. Most existing content-based recommendation (CBR) systems are designed to recommend items based on text content, and the items in these systems are usually described with keywords. However, similarity evaluations based on keywords suffer from the ambiguity of natural languages. We present a semantic CBR method that uses Semantic Web technologies to recommend items that are more similar semantically with the items that the user prefers. We use semantic graphs to represent the items and we calculate the similarity scores for each pair of semantic graphs using an inverse graph frequency algorithm. The items having higher similarity scores to the items that are known to be preferred by the user are recommended.

  4. Personal semantics: at the crossroads of semantic and episodic memory.

    Science.gov (United States)

    Renoult, Louis; Davidson, Patrick S R; Palombo, Daniela J; Moscovitch, Morris; Levine, Brian

    2012-11-01

    Declarative memory is usually described as consisting of two systems: semantic and episodic memory. Between these two poles, however, may lie a third entity: personal semantics (PS). PS concerns knowledge of one's past. Although typically assumed to be an aspect of semantic memory, it is essentially absent from existing models of knowledge. Furthermore, like episodic memory (EM), PS is idiosyncratically personal (i.e., not culturally-shared). We show that, depending on how it is operationalized, the neural correlates of PS can look more similar to semantic memory, more similar to EM, or dissimilar to both. We consider three different perspectives to better integrate PS into existing models of declarative memory and suggest experimental strategies for disentangling PS from semantic and episodic memory. Copyright © 2012 Elsevier Ltd. All rights reserved.

  5. Connectionism and Compositional Semantics

    Science.gov (United States)

    1989-05-01

    can use their hidden layers to learn difficult discriminations. such as panty or the Penzias two clumps/three clumps problem, where the output is...sauce." For novel sentences that are similar to the training sentences (e.g., train on "the girl hit the boy," test on -the boy hit the girl "), the...overridden by semantic considerations. as in this example from Wendy Lehnert (personal communicanon): (5) John saw the girl with the telescope in a red

  6. A Semantics of Synchronization.

    Science.gov (United States)

    1980-09-01

    suggestion of having very hungry philosophers. One can easily imagine the complexity of the equivalent implementation using semaphores . Synchronization types...Edinburgh, July 1978. [STAR79] Stark, E.W., " Semaphore Primitives and Fair Mutual Exclusion," TM-158, Laboratory for Computer Science, M.I.T., Cambridge...AD-AQ91 015 MASSACHUSETTS INST OF TECH CAMBRIDGE LAB FOR COMPUTE--ETC F/S 9/2 A SEMANTICS OF SYNCHRONIZATION .(U) .C SEP 80 C A SEAQUIST N00015-75

  7. Semantics, Conceptual Role

    OpenAIRE

    Block, Ned

    1997-01-01

    According to Conceptual Role Semantics ("CRS"), the meaning of a representation is the role of that representation in the cognitive life of the agent, e.g. in perception, thought and decision-making. It is an extension of the well known "use" theory of meaning, according to which the meaning of a word is its use in communication and more generally, in social interaction. CRS supplements external use by including the role of a symbol inside a computer or a brain. The uses appealed to are not j...

  8. A Generalization of Inquisitive Semantics

    Czech Academy of Sciences Publication Activity Database

    Punčochář, Vít

    2016-01-01

    Roč. 45, č. 4 (2016), s. 399-428 ISSN 0022-3611 R&D Projects: GA ČR(CZ) GA13-21076S Institutional support: RVO:67985955 Keywords : Intuitionistic logic * Superintuitionistic logics * Inquisitive logic * Topological semantics * Kripke semantics * Disjunction Subject RIV: AA - Philosophy ; Religion

  9. The Problem of Naturalizing Semantics.

    Science.gov (United States)

    Sullivan, Arthur

    2000-01-01

    Investigates conceptual barriers prevalent in the works of both proponents and opponents of semantic naturalism. Searches for a tenable definition of naturalism according to which one can be a realist, a non-reductionist, and a naturalist about semantic content. (Author/VWL)

  10. On the Semantics of Focus

    Science.gov (United States)

    Kess, Joseph F.

    1975-01-01

    This article discusses the semantics of the notion of focus, insofar as it relates to Filipino languages. The evolution of this notion is reviewed, and an alternative explanation of it is given, stressing the fact that grammar and semantics should be kept separate in a discussion of focus. (CLK)

  11. Broadcast design in cognitive radio ad hoc networks

    CERN Document Server

    Song, Yi

    2014-01-01

    This SpringerBrief investigates the special challenges of broadcast design in cognitive radio (CR) ad hoc networks. It introduces two broadcast protocols in CR ad hoc networks: a quality-of-service based broadcast protocol under blind information and a fully-distributed broadcast protocol with collision avoidance. A novel unified analytical model is also presented to analyze the performance of the broadcast protocols. This is the first book dedicated to the unique broadcast design challenges in CR ad hoc networks. The authors also discuss the recent research on the performance analysis of broa

  12. Ad hoc laser networks component technology for modular spacecraft

    Science.gov (United States)

    Huang, Xiujun; Shi, Dele; Shen, Jingshi

    2017-10-01

    Distributed reconfigurable satellite is a new kind of spacecraft system, which is based on a flexible platform of modularization and standardization. Based on the module data flow analysis of the spacecraft, this paper proposes a network component of ad hoc Laser networks architecture. Low speed control network with high speed load network of Microwave-Laser communication mode, no mesh network mode, to improve the flexibility of the network. Ad hoc Laser networks component technology was developed, and carried out the related performance testing and experiment. The results showed that ad hoc Laser networks components can meet the demand of future networking between the module of spacecraft.

  13. Dark Matter Interference

    DEFF Research Database (Denmark)

    Del Nobile, Eugenio; Kouvaris, Christoforos; Sannino, Francesco

    2012-01-01

    We study different patterns of interference in WIMP-nuclei elastic scattering that can accommodate the DAMA and CoGeNT experiments via an isospin violating ratio $f_n/f_p=-0.71$. We study interference between the following pairs of mediators: Z and Z', Z' and Higgs, and two Higgs fields. We show ...

  14. Semantic Coherence Facilitates Distributional Learning.

    Science.gov (United States)

    Ouyang, Long; Boroditsky, Lera; Frank, Michael C

    2017-04-01

    Computational models have shown that purely statistical knowledge about words' linguistic contexts is sufficient to learn many properties of words, including syntactic and semantic category. For example, models can infer that "postman" and "mailman" are semantically similar because they have quantitatively similar patterns of association with other words (e.g., they both tend to occur with words like "deliver," "truck," "package"). In contrast to these computational results, artificial language learning experiments suggest that distributional statistics alone do not facilitate learning of linguistic categories. However, experiments in this paradigm expose participants to entirely novel words, whereas real language learners encounter input that contains some known words that are semantically organized. In three experiments, we show that (a) the presence of familiar semantic reference points facilitates distributional learning and (b) this effect crucially depends both on the presence of known words and the adherence of these known words to some semantic organization. Copyright © 2016 Cognitive Science Society, Inc.

  15. Polish Semantic Parser

    Directory of Open Access Journals (Sweden)

    Agnieszka Grudzinska

    2000-01-01

    Full Text Available Amount of information transferred by computers grows very rapidly thus outgrowing the average man's capability of reception. It implies computer programs increase in the demand for which would be able to perform an introductory classitication or even selection of information directed to a particular receiver. Due to the complexity of the problem, we restricted it to understanding short newspaper notes. Among many conceptions formulated so far, the conceptual dependency worked out by Roger Schank has been chosen. It is a formal language of description of the semantics of pronouncement integrated with a text understanding algorithm. Substantial part of each text transformation system is a semantic parser of the Polish language. It is a module, which as the first and the only one has an access to the text in the Polish language. lt plays the role of an element, which finds relations between words of the Polish language and the formal registration. It translates sentences written in the language used by people into the language theory. The presented structure of knowledge units and the shape of understanding process algorithms are universal by virtue of the theory. On the other hand the defined knowledge units and the rules used in the algorithms ure only examples because they are constructed in order to understand short newspaper notes.

  16. Latent semantic analysis.

    Science.gov (United States)

    Evangelopoulos, Nicholas E

    2013-11-01

    This article reviews latent semantic analysis (LSA), a theory of meaning as well as a method for extracting that meaning from passages of text, based on statistical computations over a collection of documents. LSA as a theory of meaning defines a latent semantic space where documents and individual words are represented as vectors. LSA as a computational technique uses linear algebra to extract dimensions that represent that space. This representation enables the computation of similarity among terms and documents, categorization of terms and documents, and summarization of large collections of documents using automated procedures that mimic the way humans perform similar cognitive tasks. We present some technical details, various illustrative examples, and discuss a number of applications from linguistics, psychology, cognitive science, education, information science, and analysis of textual data in general. WIREs Cogn Sci 2013, 4:683-692. doi: 10.1002/wcs.1254 CONFLICT OF INTEREST: The author has declared no conflicts of interest for this article. For further resources related to this article, please visit the WIREs website. © 2013 John Wiley & Sons, Ltd.

  17. Semantics and pragmatics.

    Science.gov (United States)

    McNally, Louise

    2013-05-01

    The fields of semantics and pragmatics are devoted to the study of conventionalized and context- or use-dependent aspects of natural language meaning, respectively. The complexity of human language as a semiotic system has led to considerable debate about how the semantics/pragmatics distinction should be drawn, if at all. This debate largely reflects contrasting views of meaning as a property of linguistic expressions versus something that speakers do. The fact that both views of meaning are essential to a complete understanding of language has led to a variety of efforts over the last 40 years to develop better integrated and more comprehensive theories of language use and interpretation. The most important advances have included the adaptation of propositional analyses of declarative sentences to interrogative, imperative and exclamative forms; the emergence of dynamic, game theoretic, and multi-dimensional theories of meaning; and the development of various techniques for incorporating context-dependent aspects of content into representations of context-invariant content with the goal of handling phenomena such as vagueness resolution, metaphor, and metonymy. WIREs Cogn Sci 2013, 4:285-297. doi: 10.1002/wcs.1227 For further resources related to this article, please visit the WIREs website. The authors declare no conflict of interest. Copyright © 2013 John Wiley & Sons, Ltd.

  18. Trust estimation of the semantic web using semantic web clustering

    Science.gov (United States)

    Shirgahi, Hossein; Mohsenzadeh, Mehran; Haj Seyyed Javadi, Hamid

    2017-05-01

    Development of semantic web and social network is undeniable in the Internet world these days. Widespread nature of semantic web has been very challenging to assess the trust in this field. In recent years, extensive researches have been done to estimate the trust of semantic web. Since trust of semantic web is a multidimensional problem, in this paper, we used parameters of social network authority, the value of pages links authority and semantic authority to assess the trust. Due to the large space of semantic network, we considered the problem scope to the clusters of semantic subnetworks and obtained the trust of each cluster elements as local and calculated the trust of outside resources according to their local trusts and trust of clusters to each other. According to the experimental result, the proposed method shows more than 79% Fscore that is about 11.9% in average more than Eigen, Tidal and centralised trust methods. Mean of error in this proposed method is 12.936, that is 9.75% in average less than Eigen and Tidal trust methods.

  19. Source Authentication for Multicast in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Ramachandran, Prabha

    2003-01-01

    Recent emergence and popularity of mobile ad hoc networks in a host of current-day applications has instigated a suite of research challenges, primarily in routing and security issues for such networks...

  20. Internet-Based Mobile Ad Hoc Networking (Preprint)

    National Research Council Canada - National Science Library

    Corson, M. S; Macker, Joseph P; Cirincione, Gregory H

    1999-01-01

    Internet-based Mobile Ad Hoc Networking is an emerging technology that supports self-organizing, mobile networking infrastructures, and is one which appears well-suited for use in future commercial...

  1. Ad Hoc Human Information Nets for Asymmetric Threat Surveillance

    National Research Council Canada - National Science Library

    Thiruvathukal, George

    2003-01-01

    ...: Hybrid-Hierarchical Micro-Databases, Query Optimization, and XML for Embedded Systems. After meeting with the program manager, Tom Armour, in Washington, DC, we were able to get a better perspective on the ad hoc nature of the solicitation...

  2. A New Hybrid Channel Access Scheme for Ad Hoc Networks

    National Research Council Canada - National Science Library

    Wang, Yu; Garcia-Luna-Aceves, J. J

    2002-01-01

    Many contention-based channel access schemes have been proposed for multi-hop ad hoc networks in the recent past, and they can be divided into two categories, sender-initiated and receiver-initiated...

  3. Sensor and ad-hoc networks theoretical and algorithmic aspects

    CERN Document Server

    Makki, S Kami; Pissinou, Niki; Makki, Shamila; Karimi, Masoumeh; Makki, Kia

    2008-01-01

    This book brings together leading researchers and developers in the field of wireless sensor networks to explain the special problems and challenges of the algorithmic aspects of sensor and ad-hoc networks. The book also fosters communication not only between the different sensor and ad-hoc communities, but also between those communities and the distributed systems and information systems communities. The topics addressed pertain to the sensors and mobile environment.

  4. Optimal channel choice for collaborative ad-hoc dissemination

    DEFF Research Database (Denmark)

    Hu, Liang; Boudec, J-Y. L.; Vojnovic, M.

    2010-01-01

    Collaborative ad-hoc dissemination of information has been proposed as an efficient means to disseminate information among devices in a wireless ad-hoc network. Devices help in forwarding the information channels to the entire network, by disseminating the channels they subscribe to, plus others...... by a Metropolis-Hastings sampling algorithm. We also give a variant that accounts for battery level. This leads to a practical channel selection and re-selection algorithm that can be implemented without any central control....

  5. Semantic attributes based texture generation

    Science.gov (United States)

    Chi, Huifang; Gan, Yanhai; Qi, Lin; Dong, Junyu; Madessa, Amanuel Hirpa

    2018-04-01

    Semantic attributes are commonly used for texture description. They can be used to describe the information of a texture, such as patterns, textons, distributions, brightness, and so on. Generally speaking, semantic attributes are more concrete descriptors than perceptual features. Therefore, it is practical to generate texture images from semantic attributes. In this paper, we propose to generate high-quality texture images from semantic attributes. Over the last two decades, several works have been done on texture synthesis and generation. Most of them focusing on example-based texture synthesis and procedural texture generation. Semantic attributes based texture generation still deserves more devotion. Gan et al. proposed a useful joint model for perception driven texture generation. However, perceptual features are nonobjective spatial statistics used by humans to distinguish different textures in pre-attentive situations. To give more describing information about texture appearance, semantic attributes which are more in line with human description habits are desired. In this paper, we use sigmoid cross entropy loss in an auxiliary model to provide enough information for a generator. Consequently, the discriminator is released from the relatively intractable mission of figuring out the joint distribution of condition vectors and samples. To demonstrate the validity of our method, we compare our method to Gan et al.'s method on generating textures by designing experiments on PTD and DTD. All experimental results show that our model can generate textures from semantic attributes.

  6. Mapping the Structure of Semantic Memory

    Science.gov (United States)

    Morais, Ana Sofia; Olsson, Henrik; Schooler, Lael J.

    2013-01-01

    Aggregating snippets from the semantic memories of many individuals may not yield a good map of an individual's semantic memory. The authors analyze the structure of semantic networks that they sampled from individuals through a new snowball sampling paradigm during approximately 6 weeks of 1-hr daily sessions. The semantic networks of individuals…

  7. Rendezvous Protocols and Dynamic Frequency Hopping Interference Design for Anti-Jamming Satellite Communication

    Science.gov (United States)

    2013-11-25

    previously considered this proactive approach to combat unintentional, persistent (non- reactive) interference . In this project, we plan on extending our...channel” (or code ) by chance, through public knowledge of the underlying protocol semantics , or by compromising one of the network devices. An alternative...AFRL-RV-PS- AFRL-RV-PS- TR-2013-0142 TR-2013-0142 RENDEZVOUS PROTOCOLS AND DYNAMIC FREQUENCY HOPPING INTERFERENCE DESIGN FOR ANTI-JAMMING

  8. Adaptive semantics visualization

    CERN Document Server

    Nazemi, Kawa

    2016-01-01

    This book introduces a novel approach for intelligent visualizations that adapts the different visual variables and data processing to human’s behavior and given tasks. Thereby a number of new algorithms and methods are introduced to satisfy the human need of information and knowledge and enable a usable and attractive way of information acquisition. Each method and algorithm is illustrated in a replicable way to enable the reproduction of the entire “SemaVis” system or parts of it. The introduced evaluation is scientifically well-designed and performed with more than enough participants to validate the benefits of the methods. Beside the introduced new approaches and algorithms, readers may find a sophisticated literature review in Information Visualization and Visual Analytics, Semantics and information extraction, and intelligent and adaptive systems. This book is based on an awarded and distinguished doctoral thesis in computer science.

  9. Communication of Semantic Properties

    DEFF Research Database (Denmark)

    Lenau, Torben Anker; Boelskifte, Per

    2004-01-01

    The selection of materials and planning for production play a key role for the design of physical products. Product function, appearance and expression are influenced by the chosen materials and how they are shaped. However these properties are not carried by the material itself, but by the speci......The selection of materials and planning for production play a key role for the design of physical products. Product function, appearance and expression are influenced by the chosen materials and how they are shaped. However these properties are not carried by the material itself...... processes. This working paper argues for the need for a commonly accepted terminology used to communicate semantic product properties. Designers and others involved in design processes are dependent of a sharp and clear verbal communication. Search facilities in computer programs for product and material...

  10. Workspaces in the Semantic Web

    Science.gov (United States)

    Wolfe, Shawn R.; Keller, RIchard M.

    2005-01-01

    Due to the recency and relatively limited adoption of Semantic Web technologies. practical issues related to technology scaling have received less attention than foundational issues. Nonetheless, these issues must be addressed if the Semantic Web is to realize its full potential. In particular, we concentrate on the lack of scoping methods that reduce the size of semantic information spaces so they are more efficient to work with and more relevant to an agent's needs. We provide some intuition to motivate the need for such reduced information spaces, called workspaces, give a formal definition, and suggest possible methods of deriving them.

  11. Semantic acquisition games harnessing manpower for creating semantics

    CERN Document Server

    Šimko, Jakub

    2014-01-01

    A comprehensive and extensive review of state-of-the-art in semantics acquisition game (SAG) design A set of design patterns for SAG designers A set of case studies (real SAG projects) demonstrating the use of SAG design patterns

  12. High Performance Descriptive Semantic Analysis of Semantic Graph Databases

    Energy Technology Data Exchange (ETDEWEB)

    Joslyn, Cliff A.; Adolf, Robert D.; al-Saffar, Sinan; Feo, John T.; Haglin, David J.; Mackey, Greg E.; Mizell, David W.

    2011-06-02

    As semantic graph database technology grows to address components ranging from extant large triple stores to SPARQL endpoints over SQL-structured relational databases, it will become increasingly important to be able to understand their inherent semantic structure, whether codified in explicit ontologies or not. Our group is researching novel methods for what we call descriptive semantic analysis of RDF triplestores, to serve purposes of analysis, interpretation, visualization, and optimization. But data size and computational complexity makes it increasingly necessary to bring high performance computational resources to bear on this task. Our research group built a novel high performance hybrid system comprising computational capability for semantic graph database processing utilizing the large multi-threaded architecture of the Cray XMT platform, conventional servers, and large data stores. In this paper we describe that architecture and our methods, and present the results of our analyses of basic properties, connected components, namespace interaction, and typed paths such for the Billion Triple Challenge 2010 dataset.

  13. Cognitive radio network in vehicular ad-hoc network (VANET: A survey

    Directory of Open Access Journals (Sweden)

    Joanne Mun-Yee Lim

    2016-05-01

    Full Text Available Cognitive radio network and Vehicular Ad hoc Network (VANET are recent emerging concepts in wireless networking. Cognitive radio network obtains knowledge of its operational geographical environment to manage sharing of spectrum between primary and secondary users, while VANET shares emergency safety messages among vehicles to ensure safety of users on the road. Cognitive radio network is employed in VANET to ensure the efficient use of spectrum, as well as to support VANET’s deployment. Random increase and decrease of spectrum users, unpredictable nature of VANET, high mobility, varying interference, security, packet scheduling and priority assignment are the challenges encountered in a typical cognitive VANET environment. This paper provides survey and critical analysis on different challenges of cognitive radio VANET, with discussion on the open issues, challenges and performance metrics, for different cognitive radio VANET applications.

  14. Cross-Layer QoS Control for Video Communications over Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Pei Yong

    2005-01-01

    Full Text Available Assuming a wireless ad hoc network consisting of homogeneous video users with each of them also serving as a possible relay node for other users, we propose a cross-layer rate-control scheme based on an analytical study of how the effective video transmission rate is affected by the prevailing operating parameters, such as the interference environment, the number of transmission hops to a destination, and the packet loss rate. Furthermore, in order to provide error-resilient video delivery over such wireless ad hoc networks, a cross-layer joint source-channel coding (JSCC approach, to be used in conjunction with rate-control, is proposed and investigated. This approach attempts to optimally apply the appropriate channel coding rate given the constraints imposed by the effective transmission rate obtained from the proposed rate-control scheme, the allowable real-time video play-out delay, and the prevailing channel conditions. Simulation results are provided which demonstrate the effectiveness of the proposed cross-layer combined rate-control and JSCC approach.

  15. Semantic Knowledge Representation (SKR) API

    Data.gov (United States)

    U.S. Department of Health & Human Services — The SKR Project was initiated at NLM in order to develop programs to provide usable semantic representation of biomedical free text by building on resources...

  16. Problem Solving with General Semantics.

    Science.gov (United States)

    Hewson, David

    1996-01-01

    Discusses how to use general semantics formulations to improve problem solving at home or at work--methods come from the areas of artificial intelligence/computer science, engineering, operations research, and psychology. (PA)

  17. NASA and The Semantic Web

    Science.gov (United States)

    Ashish, Naveen

    2005-01-01

    We provide an overview of several ongoing NASA endeavors based on concepts, systems, and technology from the Semantic Web arena. Indeed NASA has been one of the early adopters of Semantic Web Technology and we describe ongoing and completed R&D efforts for several applications ranging from collaborative systems to airspace information management to enterprise search to scientific information gathering and discovery systems at NASA.

  18. Are Some Semantic Changes Predictable?

    DEFF Research Database (Denmark)

    Schousboe, Steen

    2010-01-01

      Historical linguistics is traditionally concerned with phonology and syntax. With the exception of grammaticalization - the development of auxiliary verbs, the syntactic rather than localistic use of prepositions, etc. - semantic change has usually not been described as a result of regular...... developments, but only as specific meaning changes in individual words. This paper will suggest some regularities in semantic change, regularities which, like sound laws, have predictive power and can be tested against recorded languages....

  19. Efficient computation of argumentation semantics

    CERN Document Server

    Liao, Beishui

    2013-01-01

    Efficient Computation of Argumentation Semantics addresses argumentation semantics and systems, introducing readers to cutting-edge decomposition methods that drive increasingly efficient logic computation in AI and intelligent systems. Such complex and distributed systems are increasingly used in the automation and transportation systems field, and particularly autonomous systems, as well as more generic intelligent computation research. The Series in Intelligent Systems publishes titles that cover state-of-the-art knowledge and the latest advances in research and development in intelligen

  20. Graph-based Operational Semantics of a Lazy Functional Languages

    DEFF Research Database (Denmark)

    Rose, Kristoffer Høgsbro

    1992-01-01

    Presents Graph Operational Semantics (GOS): a semantic specification formalism based on structural operational semantics and term graph rewriting. Demonstrates the method by specifying the dynamic ...

  1. COTARD SYNDROME IN SEMANTIC DEMENTIA

    Science.gov (United States)

    Mendez, Mario F.; Ramírez-Bermúdez, Jesús

    2011-01-01

    Background Semantic dementia is a neurodegenerative disorder characterized by the loss of meaning of words or concepts. semantic dementia can offer potential insights into the mechanisms of content-specific delusions. Objective The authors present a rare case of semantic dementia with Cotard syndrome, a delusion characterized by nihilism or self-negation. Method The semantic deficits and other features of semantic dementia were evaluated in relation to the patient's Cotard syndrome. Results Mrs. A developed the delusional belief that she was wasting and dying. This occurred after she lost knowledge for her somatic discomforts and sensations and for the organs that were the source of these sensations. Her nihilistic beliefs appeared to emerge from her misunderstanding of her somatic sensations. Conclusion This unique patient suggests that a mechanism for Cotard syndrome is difficulty interpreting the nature and source of internal pains and sensations. We propose that loss of semantic knowledge about one's own body may lead to the delusion of nihilism or death. PMID:22054629

  2. Innovative research of AD HOC network mobility model

    Science.gov (United States)

    Chen, Xin

    2017-08-01

    It is difficult for researchers of AD HOC network to conduct actual deployment during experimental stage as the network topology is changeable and location of nodes is unfixed. Thus simulation still remains the main research method of the network. Mobility model is an important component of AD HOC network simulation. It is used to describe the movement pattern of nodes in AD HOC network (including location and velocity, etc.) and decides the movement trail of nodes, playing as the abstraction of the movement modes of nodes. Therefore, mobility model which simulates node movement is an important foundation for simulation research. In AD HOC network research, mobility model shall reflect the movement law of nodes as truly as possible. In this paper, node generally refers to the wireless equipment people carry. The main research contents include how nodes avoid obstacles during movement process and the impacts of obstacles on the mutual relation among nodes, based on which a Node Self Avoiding Obstacle, i.e. NASO model is established in AD HOC network.

  3. Routing Protocol for Mobile Ad-hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    I. M. B. Nogales

    2007-09-01

    Full Text Available Bluetooth is a cutting-edge technology used for implementing wireless ad hoc networks. In order to provide an overall scheme for mobile ad hoc networks, this paper deals with scatternet topology formation and routing algorithm to form larger ad hoc wireless Networks. Scatternet topology starts by forming a robust network, which is less susceptible to the problems posed by node mobility. Mobile topology relies on the presence of free nodes that create multiple connections with the network and on their subsequently rejoining the network. Our routing protocol is a proactive routing protocol, which is tailor made for the Bluetooth ad hoc network. The connection establishment connects nodes in a structure that simplifies packet routing and scheduling. The design allows nodes to arrive and leave arbitrarily, incrementally building the topology and healing partitions when they occur. We present simulation results that show that the algorithm presents low formation latency and also generates an efficient topology for forwarding packets along ad-hoc wireless networks.

  4. Interference and Sensitivity Analysis.

    Science.gov (United States)

    VanderWeele, Tyler J; Tchetgen Tchetgen, Eric J; Halloran, M Elizabeth

    2014-11-01

    Causal inference with interference is a rapidly growing area. The literature has begun to relax the "no-interference" assumption that the treatment received by one individual does not affect the outcomes of other individuals. In this paper we briefly review the literature on causal inference in the presence of interference when treatments have been randomized. We then consider settings in which causal effects in the presence of interference are not identified, either because randomization alone does not suffice for identification, or because treatment is not randomized and there may be unmeasured confounders of the treatment-outcome relationship. We develop sensitivity analysis techniques for these settings. We describe several sensitivity analysis techniques for the infectiousness effect which, in a vaccine trial, captures the effect of the vaccine of one person on protecting a second person from infection even if the first is infected. We also develop two sensitivity analysis techniques for causal effects in the presence of unmeasured confounding which generalize analogous techniques when interference is absent. These two techniques for unmeasured confounding are compared and contrasted.

  5. Binaural Interference: Quo Vadis?

    Science.gov (United States)

    Jerger, James; Silman, Shlomo; Silverman, Carol; Emmer, Michele

    2017-04-01

    The reality of the phenomenon of binaural interference with speech recognition has been debated for two decades. Research has taken one of two avenues; group studies or case reports. In group studies, a sample of the elderly population is tested on speech recognition under three conditions; binaural, monaural right and monaural left. The aim is to determine the percent of the sample in which the expected outcome (binaural score-better-than-either-monaural score) is reversed (i.e., one of the monaural scores is better than the binaural score). This outcome has been commonly used to define binaural interference. The object of group studies is to answer the "how many" question, what is the prevalence of binaural interference in the sample. In case reports the binaural interference conclusion suggested by the speech recognition tests is not accepted until it has been corroborated by other independent diagnostic audiological measures. The aim is to attempt to determine the basis for the findings, to answer the "why" question. This article is at once tutorial, editorial and a case report. We argue that it is time to accept the reality of the phenomenon of binaural interference, to eschew group statistical approaches in search of an answer to the "how many" question, and to focus on individual case reports in search of an answer to the "why" question. American Academy of Audiology.

  6. A Framework for Speech Enhancement with Ad Hoc Microphone Arrays

    DEFF Research Database (Denmark)

    Tavakoli, Vincent Mohammad; Jensen, Jesper Rindom; Christensen, Mads Græsbøll

    2016-01-01

    Speech enhancement is vital for improved listening practices. Ad hoc microphone arrays are promising assets for this purpose. Most well-established enhancement techniques with conventional arrays can be adapted into ad hoc scenarios. Despite recent efforts to introduce various ad hoc speech...... enhancement apparatus, a common framework for integration of conventional methods into this new scheme is still missing. This paper establishes such an abstraction based on inter and intra sub-array speech coherencies. Along with measures for signal quality at the input of sub-arrays, a measure of coherency...... is proposed both for sub-array selection in local enhancement approaches, and also for selecting a proper global reference when more than one sub-array are used. Proposed methods within this framework are evaluated with regard to quantitative and qualitative measures, including array gains, the speech...

  7. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  8. Multiagent Based Information Dissemination in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S.S. Manvi

    2009-01-01

    Full Text Available Vehicular Ad hoc Networks (VANETs are a compelling application of ad hoc networks, because of the potential to access specific context information (e.g. traffic conditions, service updates, route planning and deliver multimedia services (Voice over IP, in-car entertainment, instant messaging, etc.. This paper proposes an agent based information dissemination model for VANETs. A two-tier agent architecture is employed comprising of the following: 1 'lightweight', network-facing, mobile agents; 2 'heavyweight', application-facing, norm-aware agents. The limitations of VANETs lead us to consider a hybrid wireless network architecture that includes Wireless LAN/Cellular and ad hoc networking for analyzing the proposed model. The proposed model provides flexibility, adaptability and maintainability for traffic information dissemination in VANETs as well as supports robust and agile network management. The proposed model has been simulated in various network scenarios to evaluate the effectiveness of the approach.

  9. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  10. Effects of Data Replication on Data Exfiltration in Mobile Ad Hoc Networks Utilizing Reactive Protocols

    Science.gov (United States)

    2015-03-01

    aerial vehicle VANET vehicular ad hoc network VoIP Voice over Internet Protocol VRR Virtual Ring Routing xiii EFFECTS OF DATA REPLICATION ON DATA...ad hoc networks in mobile ad hoc networks (MANETs), vehicular ad hoc networks (VANETs), and flying ad hoc net- works (FANETs). Much of the research...metric, such as capacity, congestion , power, or combinations thereof. Caro refers to two different types of ants, FANTs and BANTs which are analogous to

  11. Process-oriented semantic web search

    CERN Document Server

    Tran, DT

    2011-01-01

    The book is composed of two main parts. The first part is a general study of Semantic Web Search. The second part specifically focuses on the use of semantics throughout the search process, compiling a big picture of Process-oriented Semantic Web Search from different pieces of work that target specific aspects of the process.In particular, this book provides a rigorous account of the concepts and technologies proposed for searching resources and semantic data on the Semantic Web. To collate the various approaches and to better understand what the notion of Semantic Web Search entails, this bo

  12. CASL The Common Algebraic Specification Language Semantics

    DEFF Research Database (Denmark)

    Haxthausen, Anne

    1998-01-01

    This is version 1.0 of the CASL Language Summary, annotated by the CoFI Semantics Task Group with the semantics of constructs. This is the first complete but possibly imperfect version of the semantics. It was compiled prior to the CoFI workshop at Cachan in November 1998.......This is version 1.0 of the CASL Language Summary, annotated by the CoFI Semantics Task Group with the semantics of constructs. This is the first complete but possibly imperfect version of the semantics. It was compiled prior to the CoFI workshop at Cachan in November 1998....

  13. THE ANALYSIS OF INTERFERENCE ON WRITING ASSIGNMENTS OF THE MIDWIFERY STUDENTS

    Directory of Open Access Journals (Sweden)

    I G. A. Agung Sintha Satwika

    2013-11-01

    Full Text Available This research aims at investigating and analyzing the interference which occurred in English text made by the students of Akademi Kebidanan Bali Wisnu Dharma. The data of this writing were collected from the writing assignment of the students at Akademi Kebidanan Bali Wisnu Dharma, which was divided into six groups. The data were obtained by reading intensively those texts and followed by applying the note taking technique. The result of this study indicates that the interference occurred on those writing assignments in terms of semantics level, spelling, copula, syntax, literal translation, redundancy, over generalization, and interference in terms of English pronoun.

  14. Generalized Multiphoton Quantum Interference

    Directory of Open Access Journals (Sweden)

    Max Tillmann

    2015-10-01

    Full Text Available Nonclassical interference of photons lies at the heart of optical quantum information processing. Here, we exploit tunable distinguishability to reveal the full spectrum of multiphoton nonclassical interference. We investigate this in theory and experiment by controlling the delay times of three photons injected into an integrated interferometric network. We derive the entire coincidence landscape and identify transition matrix immanants as ideally suited functions to describe the generalized case of input photons with arbitrary distinguishability. We introduce a compact description by utilizing a natural basis that decouples the input state from the interferometric network, thereby providing a useful tool for even larger photon numbers.

  15. Interference in immunoassay

    International Nuclear Information System (INIS)

    Chapman, R.S.

    1998-01-01

    Interfering factors are evident in both limited reagent (radioimmunoassay) and excess reagent (immunometric assay) technologies and should be suspected whenever there is a discrepancy between analytical results and clinical findings in the investigation of particular diseases. The overall effect of interference in immunoassay is analytical bias in result, either positive or negative of variable magnitude. The interference maybe caused by a wide spectrum of factors from poor sample collection and handling to physiological factors e.g. lipaemia, heparin treatment, binding protein abnormalities, autoimmunity and drug treatments. The range of interfering factors is extensive and difficult to discuss effectively in a short review

  16. Multichannel MAC Layer In Mobile Ad—Hoc Network

    Science.gov (United States)

    Logesh, K.; Rao, Samba Siva

    2010-11-01

    This paper we presented the design objectives and technical challenges in Multichannel MAC protocols in Mobile Ad-hoc Network. In IEEE 802.11 a/b/g standards allow use of multiple channels, only a single channel is popularly used, due to the lack of efficient protocols that enable use of Multiple Channels. Even though complex environments in ad hoc networks require a combined control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. And also we discuss the characteristics of cross-layer frame and give a multichannel MAC approach.

  17. Mandarin-Speaking Children’s Speech Recognition: Developmental Changes in the Influences of Semantic Context and F0 Contours

    Directory of Open Access Journals (Sweden)

    Hong Zhou

    2017-06-01

    Full Text Available The goal of this developmental speech perception study was to assess whether and how age group modulated the influences of high-level semantic context and low-level fundamental frequency (F0 contours on the recognition of Mandarin speech by elementary and middle-school-aged children in quiet and interference backgrounds. The results revealed different patterns for semantic and F0 information. One the one hand, age group modulated significantly the use of F0 contours, indicating that elementary school children relied more on natural F0 contours than middle school children during Mandarin speech recognition. On the other hand, there was no significant modulation effect of age group on semantic context, indicating that children of both age groups used semantic context to assist speech recognition to a similar extent. Furthermore, the significant modulation effect of age group on the interaction between F0 contours and semantic context revealed that younger children could not make better use of semantic context in recognizing speech with flat F0 contours compared with natural F0 contours, while older children could benefit from semantic context even when natural F0 contours were altered, thus confirming the important role of F0 contours in Mandarin speech recognition by elementary school children. The developmental changes in the effects of high-level semantic and low-level F0 information on speech recognition might reflect the differences in auditory and cognitive resources associated with processing of the two types of information in speech perception.

  18. The role of sleep spindles and slow-wave activity in integrating new information in semantic memory.

    Science.gov (United States)

    Tamminen, Jakke; Lambon Ralph, Matthew A; Lewis, Penelope A

    2013-09-25

    Assimilating new information into existing knowledge is a fundamental part of consolidating new memories and allowing them to guide behavior optimally and is vital for conceptual knowledge (semantic memory), which is accrued over many years. Sleep is important for memory consolidation, but its impact upon assimilation of new information into existing semantic knowledge has received minimal examination. Here, we examined the integration process by training human participants on novel words with meanings that fell into densely or sparsely populated areas of semantic memory in two separate sessions. Overnight sleep was polysomnographically monitored after each training session and recall was tested immediately after training, after a night of sleep, and 1 week later. Results showed that participants learned equal numbers of both word types, thus equating amount and difficulty of learning across the conditions. Measures of word recognition speed showed a disadvantage for novel words in dense semantic neighborhoods, presumably due to interference from many semantically related concepts, suggesting that the novel words had been successfully integrated into semantic memory. Most critically, semantic neighborhood density influenced sleep architecture, with participants exhibiting more sleep spindles and slow-wave activity after learning the sparse compared with the dense neighborhood words. These findings provide the first evidence that spindles and slow-wave activity mediate integration of new information into existing semantic networks.

  19. Concurrent Transmission Based on Channel Quality in Ad Hoc Networks: A Game Theoretic Approach

    Science.gov (United States)

    Chen, Chen; Gao, Xinbo; Li, Xiaoji; Pei, Qingqi

    In this paper, a decentralized concurrent transmission strategy in shared channel in Ad Hoc networks is proposed based on game theory. Firstly, a static concurrent transmissions game is used to determine the candidates for transmitting by channel quality threshold and to maximize the overall throughput with consideration of channel quality variation. To achieve NES (Nash Equilibrium Solution), the selfish behaviors of node to attempt to improve the channel gain unilaterally are evaluated. Therefore, this game allows each node to be distributed and to decide whether to transmit concurrently with others or not depending on NES. Secondly, as there are always some nodes with lower channel gain than NES, which are defined as hunger nodes in this paper, a hunger suppression scheme is proposed by adjusting the price function with interferences reservation and forward relay, to fairly give hunger nodes transmission opportunities. Finally, inspired by stock trading, a dynamic concurrent transmission threshold determination scheme is implemented to make the static game practical. Numerical results show that the proposed scheme is feasible to increase concurrent transmission opportunities for active nodes, and at the same time, the number of hunger nodes is greatly reduced with the least increase of threshold by interferences reservation. Also, the good performance on network goodput of the proposed model can be seen from the results.

  20. Semantic transference for enriching multilingual biomedical knowledge resources.

    Science.gov (United States)

    Pérez, María; Berlanga, Rafael

    2015-12-01

    Biomedical knowledge resources (KRs) are mainly expressed in English, and many applications using them suffer from the scarcity of knowledge in non-English languages. The goal of the present work is to take maximum profit from existing multilingual biomedical KRs lexicons to enrich their non-English counterparts. We propose to combine different automatic methods to generate pair-wise language alignments. More specifically, we use two well-known translation methods (GIZA++ and Moses), and we propose a new ad hoc method specially devised for multilingual KRs. Then, resulting alignments are used to transfer semantics between KRs across their languages. Transference quality is ensured by checking the semantic coherence of the generated alignments. Experiments have been carried out over the Spanish, French and German UMLS Metathesaurus counterparts. As a result, the enriched Spanish KR can grow up to 1,514,217 concepts (originally 286,659), the French KR up to 1,104,968 concepts (originally 83,119), and the German KR up to 1,136,020 concepts (originally 86,842). Copyright © 2015 Elsevier Inc. All rights reserved.

  1. Psychologizing the Semantics of Fiction

    Directory of Open Access Journals (Sweden)

    John Woods

    2010-04-01

    Full Text Available Psychologiser la sémantique de la fictionLes théoriciens sémantistes de la fiction cherchent typiquement à expliquer nos relations sémantiques au fictionnel dans le contexte plus général des théories de la référence, privilégiant une explication de la sémantique sur le psychologique. Dans cet article, nous défendons une dépendance inverse. Par l’éclaircissement de nos relations psychologiques au fictionnel, nous trouverons un guide pour savoir comment développer une sémantique de la fiction. S’ensuivra une esquisse de la sémantique.Semantic theorists of fiction typically look for an account of our semantic relations to the fictional within general-purpose theories of reference, privileging an explanation of the semantic over the psychological. In this paper, we counsel a reverse dependency. In sorting out our psychological relations to the fictional, there is useful guidance about how to proceed with the semantics of fiction. A sketch of the semantics follows.

  2. Semantic graphs and associative memories

    Science.gov (United States)

    Pomi, Andrés; Mizraji, Eduardo

    2004-12-01

    Graphs have been increasingly utilized in the characterization of complex networks from diverse origins, including different kinds of semantic networks. Human memories are associative and are known to support complex semantic nets; these nets are represented by graphs. However, it is not known how the brain can sustain these semantic graphs. The vision of cognitive brain activities, shown by modern functional imaging techniques, assigns renewed value to classical distributed associative memory models. Here we show that these neural network models, also known as correlation matrix memories, naturally support a graph representation of the stored semantic structure. We demonstrate that the adjacency matrix of this graph of associations is just the memory coded with the standard basis of the concept vector space, and that the spectrum of the graph is a code invariant of the memory. As long as the assumptions of the model remain valid this result provides a practical method to predict and modify the evolution of the cognitive dynamics. Also, it could provide us with a way to comprehend how individual brains that map the external reality, almost surely with different particular vector representations, are nevertheless able to communicate and share a common knowledge of the world. We finish presenting adaptive association graphs, an extension of the model that makes use of the tensor product, which provides a solution to the known problem of branching in semantic nets.

  3. ERPs, semantic processing and age.

    Science.gov (United States)

    Miyamoto, T; Katayama, J; Koyama, T

    1998-06-01

    ERPs (N400, LPC and CNV) were elicited in two sets of subjects grouped according to age (young vs. elderly) using a word-pair category matching paradigm. Each prime consisted of a Japanese noun (constructed from two to four characters of the Hiragana) followed by one Chinese character (Kanji) as the target, this latter representing one of five semantic categories. There were two equally probable target conditions: match or mismatch. Each target was preceded by a prime, either belonging to, or not belonging to, the same semantic category. The subjects were required to respond with a specified button press to the given target according to the condition. We found RTs to be longer in the elderly subjects and under the mismatch condition. N400 amplitude was reduced in the elderly subjects under the mismatch condition and there was no difference between match and mismatch response, which were similar in amplitude to that under match condition for the young subjects. In addition, the CNV amplitudes were larger in the elderly subjects. These results suggested that functional changes in semantic processing through aging (larger semantic networks and diffuse semantic activation) were the cause of this N400 reduction, attributing a subsidiary role to attentional disturbance. We also discuss the importance of taking age-related changes into consideration in clinical studies.

  4. Laser Interference Lithography

    NARCIS (Netherlands)

    van Wolferen, Hendricus A.G.M.; Abelmann, Leon; Hennessy, Theodore C.

    In this chapter we explain how submicron gratings can be prepared by Laser Interference Lithography (LIL). In this maskless lithography technique, the standing wave pattern that exists at the intersection of two coherent laser beams is used to expose a photosensitive layer. We show how to build the

  5. Kvantová interference

    Czech Academy of Sciences Publication Activity Database

    Peřina, Jan

    2003-01-01

    Roč. 48, č. 4 (2003), s. 99-103 ISSN 0447-6441 R&D Projects: GA MŠk LN00A015 Institutional research plan: CEZ:AV0Z1010921 Keywords : interference * quantum cryptography * quantum computing * quantum teleportation Subject RIV: BH - Optics, Masers, Lasers

  6. Ad Hoc Transient Groups: Instruments for Awareness in Learning Networks

    NARCIS (Netherlands)

    Fetter, Sibren; Rajagopal, Kamakshi; Berlanga, Adriana; Sloep, Peter

    2011-01-01

    Fetter, S., Rajagopal, K., Berlanga, A. J., & Sloep, P. B. (2011). Ad Hoc Transient Groups: Instruments for Awareness in Learning Networks. In W. Reinhardt, T. D. Ullmann, P. Scott, V. Pammer, O. Conlan, & A. J. Berlanga (Eds.), Proceedings of the 1st European Workshop on Awareness and Reflection in

  7. What Is the Problem of Ad Hoc Hypotheses?

    Science.gov (United States)

    Bamford, Greg

    1999-01-01

    Philosophers' attempts to convincingly explicate the received view of an ad hoc hypothesis--that it accounts for only the observations it was designed to account for--have been unsuccessful. Familiar and firmer criteria for evaluating the hypotheses or modified theories so classified are characteristically available. Contains 41 references.…

  8. Securing DSR with mobile agents in wireless ad hoc networks

    Directory of Open Access Journals (Sweden)

    Ahmed Abosamra

    2011-03-01

    Full Text Available Ad hoc wireless network consists of a set of wireless nodes communicating with each other without a pre-defined infrastructure. They communicate by forwarding packets which can reach wireless nodes that do not exist in the range of the direct radio transmission. Designing ad hoc network routing protocols is a challenging task because of its decentralized infrastructure which makes securing ad hoc networks more and more challenging. Dynamic Source Routing (DSR protocol is a popular routing protocol designed for use in wireless ad hoc networks. Mobile agent is a promising technology used in diverse fields of network applications. In this paper, we try to implement DSR using mobile agents for securing this type of wireless network. Hybrid encryption technique (symmetric key encryption/public key encryption is used to improve performance; where symmetric keys are used to encrypt routing data to authenticate and authorize node sending data, while, public keys are used for the exchange of symmetric keys between nodes. We found that DSR may be secured using mobile agents with competitive performance.

  9. ON SECURE FULL DUPLEX COMMUNICATION IN MOBILE AD HOC NETWORK

    OpenAIRE

    S. C. Dutta; Sudha Singh; D. K. Singh

    2013-01-01

    This paper is to establish Ad Hoc network in mobile phones and start fully secured full duplex communication in any situation. This type of communication will be cost effective and it will be fastest way of communication in case of any server failure or server error.

  10. The accuracy of interpreting key psychiatric terms by ad hoc ...

    African Journals Online (AJOL)

    MacFarlane et al.15 note that a greater number of people have a preference for working with ad hoc interpreters in comparison to professional interpreters ... As part of a larger study, a cross-sectional qualitative interview design was used to ..... obstacle they would face if they would receive training. They had concerns over ...

  11. Authentication and consensus overhead in vehicular ad hoc networks

    NARCIS (Netherlands)

    Petit, Jonathan; Mammeri, Zoubir

    Vehicular ad hoc networks aim at increasing passenger safety by exchanging warning messages between vehicles wirelessly. A main challenge is to resist to various malicious abuses and security attacks. However, any security mechanism comes with overhead. We analyze how the authentication algorithm

  12. Challenges of evidence acquisition in wireless ad-hoc networks

    CSIR Research Space (South Africa)

    Mutanga, MB

    2010-05-01

    Full Text Available a big challenge. Thus, the aim of this paper is to explore the challenges of acquiring live evidence in wireless ad-hoc networks. We also give some legal requirements of evidence admissibility as outlined in the Communications and Transactions Act...

  13. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    Science.gov (United States)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  14. Collaboration Layer for Robots in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Borch, Ole; Madsen, Per Printz; Broberg, Jacob Honor´e

    2009-01-01

    In many applications multiple robots in Mobile Ad-hoc Networks are required to collaborate in order to solve a task. This paper shows by proof of concept that a Collaboration Layer can be modelled and designed to handle the collaborative communication, which enables robots in small to medium size...

  15. VMQL: A Visual Language for Ad-Hoc Model Querying

    DEFF Research Database (Denmark)

    Störrle, Harald

    2011-01-01

    In large scale model based development, analysis level models are more like knowledge bases than engineering artifacts. Their effectiveness depends, to a large degree, on the ability of domain experts to retrieve information from them ad hoc. For large scale models, however, existing query...

  16. Ad Hoc Physical Hilbert Spaces in Quantum Mechanics

    Czech Academy of Sciences Publication Activity Database

    Fernandez, F. M.; Garcia, J.; Semorádová, Iveta; Znojil, Miloslav

    2015-01-01

    Roč. 54, č. 12 (2015), s. 4187-4203 ISSN 0020-7748 Institutional support: RVO:61389005 Keywords : quantum mechanics * physical Hilbert spaces * ad hoc inner product * singular potentials regularized * low lying energies Subject RIV: BE - Theoretical Physics Impact factor: 1.041, year: 2015

  17. TMAP ad hoc Working Group Fish Progress report 2007

    NARCIS (Netherlands)

    Bolle, L.J.; Damm, U.; Diederichs, B.; Jager, Z.; Overzee, van H.M.J.

    2007-01-01

    Building on previous work done by the TMAP ad hoc Working Group Fish, a meeting and a workshop were held in Hamburg in June and October 2007. The most important aim of both was to come to an agreement on how to proceed with the data preparations and analyses, and to facilitate the exchange of data

  18. Node counting in wireless ad-hoc networks

    NARCIS (Netherlands)

    Evers, J.H.M.; Kiss, D.; Kowalczyk, W.; Navilarekallu, T.; Renger, D.R.M.; Sella, L.; Timperio, V.; Viorel, A.; Wijk, van A.C.C.; Yzelman, A.J.; Planqué, B.; Bhulai, S.; Hulshof, J.; Kager, W.; Rot, T.

    2012-01-01

    We study wireless ad-hoc networks consisting of small microprocessors with limited memory, where the wireless communication between the processors can be highly unreliable. For this setting, we propose a number of algorithms to estimate the number of nodes in the network, and the number of direct

  19. Capacity, delay and mobility in wireless ad-hoc networks

    NARCIS (Netherlands)

    Bansal, N.; Liu, Z.

    2003-01-01

    Network throughput and packet delay are two important parameters in the design and the evaluation of routing protocols for ad-hoc networks. While mobility has been shown to increase the capacity of a network, it is not clear whether the delay can be kept low without trading off the throughput. We

  20. Access Point Security Service for wireless ad-hoc communication

    NARCIS (Netherlands)

    Scholten, Johan; Nijdam, M.

    2006-01-01

    This paper describes the design and implementation of a security solution for ad-hoc peer-to-peer communication. The security solution is based on a scenario where two wireless devices require secure communication, but share no security relationship a priori. The necessary requirements for the

  1. Modelling Mobility in Mobile AD-HOC Network Environments ...

    African Journals Online (AJOL)

    In the simulation of mobile ad-hoc networks (MANETs), the probability distribution governing the movement of nodes typically varies over time and converges to a steady state distribution, known as the stationary distribution. This paper presents and evaluates the stationary distribution for location, speed and pause time of a ...

  2. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  3. Compiling Dictionaries Using Semantic Domains*

    Directory of Open Access Journals (Sweden)

    Ronald Moe

    2011-10-01

    Full Text Available

    Abstract: The task of providing dictionaries for all the world's languages is prodigious, re-quiring efficient techniques. The text corpus method cannot be used for minority languages lacking texts. To meet the need, the author has constructed a list of 1 600 semantic domains, which he has successfully used to collect words. In a workshop setting, a group of speakers can collect as many as 17 000 words in ten days. This method results in a classified word list that can be efficiently expanded into a full dictionary. The method works because the mental lexicon is a giant web or-ganized around key concepts. A semantic domain can be defined as an important concept together with the words directly related to it by lexical relations. A person can utilize the mental web to quickly jump from word to word within a domain. The author is developing a template for each domain to aid in collecting words and in de-scribing their semantics. Investigating semantics within the context of a domain yields many in-sights. The method permits the production of both alphabetically and semantically organized dic-tionaries. The list of domains is intended to be universal in scope and applicability. Perhaps due to universals of human experience and universals of linguistic competence, there are striking simi-larities in various lists of semantic domains developed for languages around the world. Using a standardized list of domains to classify multiple dictionaries opens up possibilities for cross-lin-guistic research into semantic and lexical universals.

    Keywords: SEMANTIC DOMAINS, SEMANTIC FIELDS, SEMANTIC CATEGORIES, LEX-ICAL RELATIONS, SEMANTIC PRIMITIVES, DOMAIN TEMPLATES, MENTAL LEXICON, SEMANTIC UNIVERSALS, MINORITY LANGUAGES, LEXICOGRAPHY

    Opsomming: Samestelling van woordeboeke deur gebruikmaking van se-mantiese domeine. Die taak van die voorsiening van woordeboeke aan al die tale van die wêreld is geweldig en vereis doeltreffende tegnieke. Die

  4. Ontology Matching with Semantic Verification.

    Science.gov (United States)

    Jean-Mary, Yves R; Shironoshita, E Patrick; Kabuka, Mansur R

    2009-09-01

    ASMOV (Automated Semantic Matching of Ontologies with Verification) is a novel algorithm that uses lexical and structural characteristics of two ontologies to iteratively calculate a similarity measure between them, derives an alignment, and then verifies it to ensure that it does not contain semantic inconsistencies. In this paper, we describe the ASMOV algorithm, and then present experimental results that measure its accuracy using the OAEI 2008 tests, and that evaluate its use with two different thesauri: WordNet, and the Unified Medical Language System (UMLS). These results show the increased accuracy obtained by combining lexical, structural and extensional matchers with semantic verification, and demonstrate the advantage of using a domain-specific thesaurus for the alignment of specialized ontologies.

  5. The surplus value of semantic annotations

    NARCIS (Netherlands)

    Marx, M.

    2010-01-01

    We compare the costs of semantic annotation of textual documents to its benefits for information processing tasks. Semantic annotation can improve the performance of retrieval tasks and facilitates an improved search experience through faceted search, focused retrieval, better document summaries,

  6. Behavior Modification Through Covert Semantic Desensitization

    Science.gov (United States)

    Hekmat, Hamid; Vanian, Daniel

    1971-01-01

    Results support the hypothesized relationship between meaning and phobia. Semantic desensitization techniques based on counter conditioning of meaning were significantly effective in altering the semantic value of the word from unpleasantness to neutrality. (Author)

  7. Relaxation as a Factor in Semantic Desensitization

    Science.gov (United States)

    Bechtel, James E.; McNamara, J. Regis

    1975-01-01

    Relaxation and semantic desensitization were used to alleviate the fear of phobic females. Results showed that semantic desensitization, alone or in combination with relaxation, failed to modify the evaluative meanings evoked by the feared object. (SE)

  8. The semantic structure of gratitude

    Directory of Open Access Journals (Sweden)

    Smirnov, Alexander V.

    2016-06-01

    Full Text Available In the modern social and economic environment of Russia, gratitude might be considered an ambiguous phenomenon. It can have different meaning for a person in different contexts and can manifest itself differently as well (that is, as an expression of sincere feelings or as an element of corruption. In this respect it is topical to investigate the system of meanings and relationships that define the semantic space of gratitude. The goal of the study was the investigation and description of the content and structure of the semantic space of the gratitude phenomenon as well as the determination of male, female, age, and ethnic peculiarities of the expression of gratitude. The objective was achieved by using the semantic differential designed by the authors to investigate attitudes toward gratitude. This investigation was carried out with the participation of 184 respondents (Russians, Tatars, Ukrainians, Jews living in the Russian Federation, Belarus, Kazakhstan, Tajikistan, Israel, Australia, Canada, and the United Kingdom and identifying themselves as representatives of one of these nationalities. The structural components of gratitude were singled out by means of exploratory factor analysis of the empirical data from the designed semantic differential. Gender, age, and ethnic differences were differentiated by means of Student’s t-test. Gratitude can be represented by material and nonmaterial forms as well as by actions in response to help given. The empirical data allowed us to design the ethnically nonspecified semantic structure of gratitude. During the elaboration of the differential, semantic universals of gratitude, which constitute its psychosemantic content, were distinguished. Peculiarities of attitudes toward gratitude by those in different age and gender groups were revealed. Differences in the degree of manifestation of components of the psychosemantic structure of gratitude related to ethnic characteristics were not discovered

  9. Developing A Web-based User Interface for Semantic Information Retrieval

    Science.gov (United States)

    Berrios, Daniel C.; Keller, Richard M.

    2003-01-01

    While there are now a number of languages and frameworks that enable computer-based systems to search stored data semantically, the optimal design for effective user interfaces for such systems is still uncle ar. Such interfaces should mask unnecessary query detail from users, yet still allow them to build queries of arbitrary complexity without significant restrictions. We developed a user interface supporting s emantic query generation for Semanticorganizer, a tool used by scient ists and engineers at NASA to construct networks of knowledge and dat a. Through this interface users can select node types, node attribute s and node links to build ad-hoc semantic queries for searching the S emanticOrganizer network.

  10. Using architectures for semantic interoperability to create journal clubs for emergency response

    Energy Technology Data Exchange (ETDEWEB)

    Powell, James E [Los Alamos National Laboratory; Collins, Linn M [Los Alamos National Laboratory; Martinez, Mark L B [Los Alamos National Laboratory

    2009-01-01

    In certain types of 'slow burn' emergencies, careful accumulation and evaluation of information can offer a crucial advantage. The SARS outbreak in the first decade of the 21st century was such an event, and ad hoc journal clubs played a critical role in assisting scientific and technical responders in identifying and developing various strategies for halting what could have become a dangerous pandemic. This research-in-progress paper describes a process for leveraging emerging semantic web and digital library architectures and standards to (1) create a focused collection of bibliographic metadata, (2) extract semantic information, (3) convert it to the Resource Description Framework /Extensible Markup Language (RDF/XML), and (4) integrate it so that scientific and technical responders can share and explore critical information in the collections.

  11. Codebook-based interference alignment for uplink MIMO interference channels

    KAUST Repository

    Lee, Hyun Ho; Park, Kihong; Ko, Youngchai; Alouini, Mohamed-Slim

    2014-01-01

    In this paper, we propose a codebook-based interference alignment (IA) scheme in the constant multiple-input multipleoutput (MIMO) interference channel especially for the uplink scenario. In our proposed scheme, we assume cooperation among base

  12. Semantic Query Processing : Estimating Relational Purity

    NARCIS (Netherlands)

    Kalo, Jan-Christoph; Lofi, C.; Maseli, René Pascal; Balke, Wolf-Tilo; Leyer, M.

    2017-01-01

    The use of semantic information found in structured knowledge bases has become an integral part of the processing pipeline of modern intelligent in-
    formation systems. However, such semantic information is frequently insuffi-cient to capture the rich semantics demanded by the applications, and

  13. A Model for Semantic IS Standards

    NARCIS (Netherlands)

    Folmer, Erwin Johan Albert; Oude Luttighuis, Paul; van Hillegersberg, Jos

    2011-01-01

    We argue that, in order to suggest improvements of any kind to semantic information system (IS) standards, better understanding of the conceptual structure of semantic IS standard is required. This study develops a model for semantic IS standard, based on literature and expert knowledge. The model

  14. Semantic heterogeneity: comparing new semantic web approaches with those of digital libraries

    OpenAIRE

    Krause, Jürgen

    2008-01-01

    To demonstrate that newer developments in the semantic web community, particularly those based on ontologies (simple knowledge organization system and others) mitigate common arguments from the digital library (DL) community against participation in the Semantic web. The approach is a semantic web discussion focusing on the weak structure of the Web and the lack of consideration given to the semantic content during indexing. The points criticised by the semantic web and ontology approaches ar...

  15. Cognition and speech-in-noise recognition: the role of proactive interference.

    Science.gov (United States)

    Ellis, Rachel J; Rönnberg, Jerker

    2014-01-01

    Complex working memory (WM) span tasks have been shown to predict speech-in-noise (SIN) recognition. Studies of complex WM span tasks suggest that, rather than indexing a single cognitive process, performance on such tasks may be governed by separate cognitive subprocesses embedded within WM. Previous research has suggested that one such subprocess indexed by WM tasks is proactive interference (PI), which refers to difficulties memorizing current information because of interference from previously stored long-term memory representations for similar information. The aim of the present study was to investigate phonological PI and to examine the relationship between PI (semantic and phonological) and SIN perception. A within-subjects experimental design was used. An opportunity sample of 24 young listeners with normal hearing was recruited. Measures of resistance to, and release from, semantic and phonological PI were calculated alongside the signal-to-noise ratio required to identify 50% of keywords correctly in a SIN recognition task. The data were analyzed using t-tests and correlations. Evidence of release from and resistance to semantic interference was observed. These measures correlated significantly with SIN recognition. Limited evidence of phonological PI was observed. The results show that capacity to resist semantic PI can be used to predict SIN recognition scores in young listeners with normal hearing. On the basis of these findings, future research will focus on investigating whether tests of PI can be used in the treatment and/or rehabilitation of hearing loss. American Academy of Audiology.

  16. Between- and within-Ear Congruency and Laterality Effects in an Auditory Semantic/Emotional Prosody Conflict Task

    Science.gov (United States)

    Techentin, Cheryl; Voyer, Daniel; Klein, Raymond M.

    2009-01-01

    The present study investigated the influence of within- and between-ear congruency on interference and laterality effects in an auditory semantic/prosodic conflict task. Participants were presented dichotically with words (e.g., mad, sad, glad) pronounced in either congruent or incongruent emotional tones (e.g., angry, happy, or sad) and…

  17. Electromagnetic interference: a radiant future!

    NARCIS (Netherlands)

    Leferink, Frank Bernardus Johannes

    2015-01-01

    Although Electromagnetic Interference and Electromagnetic Compatibility are well established domains, the introduction of new technologies results in new challenges. Changes in both measurement techniques, and technological trends resulting in new types of interference are described. These are the

  18. Towards semantic software engineering enviroments

    NARCIS (Netherlands)

    Falbo, R.A.; Guizzardi, G.; Natali, A.; Bertollo, G.; Ruy, F.; Mian, P.; Tortora, G.; Chang, S.K.

    2002-01-01

    Software tools processing partially common set of data should share an understanding of what these data mean. Since ontologies have been used to express formally a shared understanding of information, we argue that they are a way towards Semantic SEEs. In this paper we discuss an ontology-based

  19. The Semantic Web in Education

    Science.gov (United States)

    Ohler, Jason

    2008-01-01

    The semantic web or Web 3.0 makes information more meaningful to people by making it more understandable to machines. In this article, the author examines the implications of Web 3.0 for education. The author considers three areas of impact: knowledge construction, personal learning network maintenance, and personal educational administration.…

  20. Quest for a Computerised Semantics.

    Science.gov (United States)

    Leslie, Adrian R.

    The objective of this thesis was to colligate the various strands of research in the literature of computational linguistics that have to do with the computational treatment of semantic content so as to encode it into a computerized dictionary. In chapter 1 the course of mechanical translation (1947-1960) and quantitative linguistics is traced to…

  1. Russian nominal semantics and morphology

    DEFF Research Database (Denmark)

    Nørgård-Sørensen, Jens

    The principal idea behind this book is that lexis and grammar make up a single coherent structure. It is shown that the grammatical patterns of the different classes of Russian nominals are closely interconnected. They can be described as reflecting a limited set of semantic distinctions which ar...... or weaker, of Russian. Students will see a pattern in what is traditionally described as disparate subsystems, and linguists may be inspired to consider the theoretical points concerning language as a coherent system, determining usage.......The principal idea behind this book is that lexis and grammar make up a single coherent structure. It is shown that the grammatical patterns of the different classes of Russian nominals are closely interconnected. They can be described as reflecting a limited set of semantic distinctions which...... are also rooted in the lexical-semantic classification of Russian nouns. The presentation focuses on semantics, both lexical and grammatical, and not least the connection between these two levels of content. The principal theoretical impact is the insight that grammar and lexis should not be seen...

  2. Semantic Reasoning for Scene Interpretation

    DEFF Research Database (Denmark)

    Jensen, Lars Baunegaard With; Baseski, Emre; Pugeault, Nicolas

    2008-01-01

    In this paper, we propose a hierarchical architecture for representing scenes, covering 2D and 3D aspects of visual scenes as well as the semantic relations between the different aspects. We argue that labeled graphs are a suitable representational framework for this representation and demonstrat...

  3. Semantic Enrichment of GPS Trajectories

    NARCIS (Netherlands)

    de Graaff, V.; van Keulen, Maurice; de By, R.A.

    2012-01-01

    Semantic annotation of GPS trajectories helps us to recognize the interests of the creator of the GPS trajectories. Automating this trajectory annotation circumvents the requirement of additional user input. To annotate the GPS traces automatically, two types of automated input are required: 1) a

  4. Semantic Preview Benefit during Reading

    Science.gov (United States)

    Hohenstein, Sven; Kliegl, Reinhold

    2014-01-01

    Word features in parafoveal vision influence eye movements during reading. The question of whether readers extract semantic information from parafoveal words was studied in 3 experiments by using a gaze-contingent display change technique. Subjects read German sentences containing 1 of several preview words that were replaced by a target word…

  5. Semantic search during divergent thinking.

    Science.gov (United States)

    Hass, Richard W

    2017-09-01

    Divergent thinking, as a method of examining creative cognition, has not been adequately analyzed in the context of modern cognitive theories. This article casts divergent thinking responding in the context of theories of memory search. First, it was argued that divergent thinking tasks are similar to semantic fluency tasks, but are more constrained, and less well structured. Next, response time distributions from 54 participants were analyzed for temporal and semantic clustering. Participants responded to two prompts from the alternative uses test: uses for a brick and uses for a bottle, for two minutes each. Participants' cumulative response curves were negatively accelerating, in line with theories of search of associative memory. However, results of analyses of semantic and temporal clustering suggested that clustering is less evident in alternative uses responding compared to semantic fluency tasks. This suggests either that divergent thinking responding does not involve an exhaustive search through a clustered memory trace, but rather that the process is more exploratory, yielding fewer overall responses that tend to drift away from close associates of the divergent thinking prompt. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. SEMSIN SEMANTIC AND SYNTACTIC PARSER

    Directory of Open Access Journals (Sweden)

    K. K. Boyarsky

    2015-09-01

    Full Text Available The paper deals with the principle of operation for SemSin semantic and syntactic parser creating a dependency tree for the Russian language sentences. The parser consists of 4 blocks: a dictionary, morphological analyzer, production rules and lexical analyzer. An important logical part of the parser is pre-syntactical module, which harmonizes and complements morphological analysis results, separates the text paragraphs into individual sentences, and also carries out predisambiguation. Characteristic feature of the presented parser is an open type of control – it is done by means of a set of production rules. A varied set of commands provides the ability to both morphological and semantic-syntactic analysis of the sentence. The paper presents the sequence of rules usage and examples of their work. Specific feature of the rules is the decision making on establishment of syntactic links with simultaneous removal of the morphological and semantic ambiguity. The lexical analyzer provides the execution of commands and rules, and manages the parser in manual or automatic modes of the text analysis. In the first case, the analysis is performed interactively with the possibility of step-by-step execution of the rules and scanning the resulting parse tree. In the second case, analysis results are filed in an xml-file. Active usage of syntactic and semantic dictionary information gives the possibility to reduce significantly the ambiguity of parsing. In addition to marking the text, the parser is also usable as a tool for information extraction from natural language texts.

  7. Clustering semantics for hypermedia presentation

    NARCIS (Netherlands)

    Alberink, M.J.; Rutledge, L.W.; Hardman, H.L.; Veenstra, M.J.A.

    2004-01-01

    Semantic annotations of media repositories make relationships among the stored media and relevant concepts explicit. However, these relationships and the media they join are not directly presentable as hypermedia. Previous work shows how clustering over the annotations in the repositories can

  8. Bare coordination: the semantic shift

    NARCIS (Netherlands)

    de Swart, Henriette; Le Bruyn, Bert

    2014-01-01

    This paper develops an analysis of the syntax-semantics interface of two types of split coordination structures. In the first type, two bare singular count nouns appear as arguments in a coordinated structure, as in bride and groom were happy. We call this the N&N construction. In the second type,

  9. The Role of Shape in Semantic Memory Organization of Objects: An Experimental Study Using PI-Release.

    Science.gov (United States)

    van Weelden, Lisanne; Schilperoord, Joost; Swerts, Marc; Pecher, Diane

    2015-01-01

    Visual information contributes fundamentally to the process of object categorization. The present study investigated whether the degree of activation of visual information in this process is dependent on the contextual relevance of this information. We used the Proactive Interference (PI-release) paradigm. In four experiments, we manipulated the information by which objects could be categorized and subsequently be retrieved from memory. The pattern of PI-release showed that if objects could be stored and retrieved both by (non-perceptual) semantic and (perceptual) shape information, then shape information was overruled by semantic information. If, however, semantic information could not be (satisfactorily) used to store and retrieve objects, then objects were stored in memory in terms of their shape. The latter effect was found to be strongest for objects from identical semantic categories.

  10. Action representation: crosstalk between semantics and pragmatics.

    Science.gov (United States)

    Prinz, Wolfgang

    2014-03-01

    Marc Jeannerod pioneered a representational approach to movement and action. In his approach, motor representations provide both, declarative knowledge about action and procedural knowledge for action (action semantics and action pragmatics, respectively). Recent evidence from language comprehension and action simulation supports the claim that action pragmatics and action semantics draw on common representational resources, thus challenging the traditional divide between declarative and procedural action knowledge. To account for these observations, three kinds of theoretical frameworks are discussed: (i) semantics is grounded in pragmatics, (ii) pragmatics is anchored in semantics, and (iii) pragmatics is part and parcel of semantics. © 2013 Elsevier Ltd. All rights reserved.

  11. Phonological learning in semantic dementia.

    Science.gov (United States)

    Jefferies, Elizabeth; Bott, Samantha; Ehsan, Sheeba; Lambon Ralph, Matthew A

    2011-04-01

    Patients with semantic dementia (SD) have anterior temporal lobe (ATL) atrophy that gives rise to a highly selective deterioration of semantic knowledge. Despite pronounced anomia and poor comprehension of words and pictures, SD patients have well-formed, fluent speech and normal digit span. Given the intimate connection between phonological STM and word learning revealed by both neuropsychological and developmental studies, SD patients might be expected to show good acquisition of new phonological forms, even though their ability to map these onto meanings is impaired. In contradiction of these predictions, a limited amount of previous research has found poor learning of new phonological forms in SD. In a series of experiments, we examined whether SD patient, GE, could learn novel phonological sequences and, if so, under which circumstances. GE showed normal benefits of phonological knowledge in STM (i.e., normal phonotactic frequency and phonological similarity effects) but reduced support from semantic memory (i.e., poor immediate serial recall for semantically degraded words, characterised by frequent item errors). Next, we demonstrated normal learning of serial order information for repeated lists of single-digit number words using the Hebb paradigm: these items were well-understood allowing them to be repeated without frequent item errors. In contrast, patient GE showed little learning of nonsense syllable sequences using the same Hebb paradigm. Detailed analysis revealed that both GE and the controls showed a tendency to learn their own errors as opposed to the target items. Finally, we showed normal learning of phonological sequences for GE when he was prevented from repeating his errors. These findings confirm that the ATL atrophy in SD disrupts phonological processing for semantically degraded words but leaves the phonological architecture intact. Consequently, when item errors are minimised, phonological STM can support the acquisition of new phoneme

  12. A Denotational Semantics for Communicating Unstructured Code

    Directory of Open Access Journals (Sweden)

    Nils Jähnig

    2015-03-01

    Full Text Available An important property of programming language semantics is that they should be compositional. However, unstructured low-level code contains goto-like commands making it hard to define a semantics that is compositional. In this paper, we follow the ideas of Saabas and Uustalu to structure low-level code. This gives us the possibility to define a compositional denotational semantics based on least fixed points to allow for the use of inductive verification methods. We capture the semantics of communication using finite traces similar to the denotations of CSP. In addition, we examine properties of this semantics and give an example that demonstrates reasoning about communication and jumps. With this semantics, we lay the foundations for a proof calculus that captures both, the semantics of unstructured low-level code and communication.

  13. A Semantics for Distributed Execution of Statemate

    DEFF Research Database (Denmark)

    Fränzle, Martin; Niehaus, Jürgen; Metzner, Alexander

    2003-01-01

    We present a semantics for the statechart variant implemented in the Statemate product of i-Logix. Our semantics enables distributed code generation for Statemate models in the context of rapid prototyping for embedded control applications. We argue that it seems impossible to efficiently generate......, the changes made regarding the interaction of distributed model parts are similar to the interaction between the model and its environment in the original semantics, thus giving designers a familiar execution model. The semantics has been implemented in Grace, a framework for rapid prototyping code generation...... distributed code using the original Statemate semantics. The new, distributed semantics has the advantages that, first, it enables the generation of efficient distributed code, second, it preserves many aspects of the original semantics for those parts of a model that are not distributed, and third...

  14. Information Sharing Modalities for Mobile Ad-Hoc Networks

    Science.gov (United States)

    de Spindler, Alexandre; Grossniklaus, Michael; Lins, Christoph; Norrie, Moira C.

    Current mobile phone technologies have fostered the emergence of a new generation of mobile applications. Such applications allow users to interact and share information opportunistically when their mobile devices are in physical proximity or close to fixed installations. It has been shown how mobile applications such as collaborative filtering and location-based services can take advantage of ad-hoc connectivity to use physical proximity as a filter mechanism inherent to the application logic. We discuss the different modes of information sharing that arise in such settings based on the models of persistence and synchronisation. We present a platform that supports the development of applications that can exploit these modes of ad-hoc information sharing and, by means of an example, show how such an application can be realised based on the supported event model.

  15. Energy management in wireless cellular and ad-hoc networks

    CERN Document Server

    Imran, Muhammad; Qaraqe, Khalid; Alouini, Mohamed-Slim; Vasilakos, Athanasios

    2016-01-01

    This book investigates energy management approaches for energy efficient or energy-centric system design and architecture and presents end-to-end energy management in the recent heterogeneous-type wireless network medium. It also considers energy management in wireless sensor and mesh networks by exploiting energy efficient transmission techniques and protocols. and explores energy management in emerging applications, services and engineering to be facilitated with 5G networks such as WBANs, VANETS and Cognitive networks. A special focus of the book is on the examination of the energy management practices in emerging wireless cellular and ad hoc networks. Considering the broad scope of energy management in wireless cellular and ad hoc networks, this book is organized into six sections covering range of Energy efficient systems and architectures; Energy efficient transmission and techniques; Energy efficient applications and services. .

  16. Secure Geographic Routing in Ad Hoc and Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zahariadis Theodore

    2010-01-01

    Full Text Available Security in sensor networks is one of the most relevant research topics in resource constrained wireless devices and networks. Several attacks can be suffered in ad hoc and wireless sensor networks (WSN, which are highly susceptible to attacks, due to the limited resources of the nodes. In this paper, we propose innovative and lightweight localization techniques that allow for intrusion identification and isolation schemes and provide accurate location information. This information is used by our routing protocol which additionally incorporates a distributed trust model to prevent several routing attacks to the network. We finally evaluate our algorithms for accurate localization and for secure routing which have been implemented and tested in real ad hoc and wireless sensor networks.

  17. Capacity of Wireless Ad Hoc Networks with Opportunistic Collaborative Communications

    Directory of Open Access Journals (Sweden)

    Simeone O

    2007-01-01

    Full Text Available Optimal multihop routing in ad hoc networks requires the exchange of control messages at the MAC and network layer in order to set up the (centralized optimization problem. Distributed opportunistic space-time collaboration (OST is a valid alternative that avoids this drawback by enabling opportunistic cooperation with the source at the physical layer. In this paper, the performance of OST is investigated. It is shown analytically that opportunistic collaboration outperforms (centralized optimal multihop in case spatial reuse (i.e., the simultaneous transmission of more than one data stream is not allowed by the transmission protocol. Conversely, in case spatial reuse is possible, the relative performance between the two protocols has to be studied case by case in terms of the corresponding capacity regions, given the topology and the physical parameters of network at hand. Simulation results confirm that opportunistic collaborative communication is a promising paradigm for wireless ad hoc networks that deserves further investigation.

  18. Capacity of Wireless Ad Hoc Networks with Opportunistic Collaborative Communications

    Directory of Open Access Journals (Sweden)

    O. Simeone

    2007-03-01

    Full Text Available Optimal multihop routing in ad hoc networks requires the exchange of control messages at the MAC and network layer in order to set up the (centralized optimization problem. Distributed opportunistic space-time collaboration (OST is a valid alternative that avoids this drawback by enabling opportunistic cooperation with the source at the physical layer. In this paper, the performance of OST is investigated. It is shown analytically that opportunistic collaboration outperforms (centralized optimal multihop in case spatial reuse (i.e., the simultaneous transmission of more than one data stream is not allowed by the transmission protocol. Conversely, in case spatial reuse is possible, the relative performance between the two protocols has to be studied case by case in terms of the corresponding capacity regions, given the topology and the physical parameters of network at hand. Simulation results confirm that opportunistic collaborative communication is a promising paradigm for wireless ad hoc networks that deserves further investigation.

  19. Cognitive radio application for vehicular ad hoc networks (VANETS

    Directory of Open Access Journals (Sweden)

    Miladić Suzana D.

    2016-01-01

    Full Text Available This paper presents the application of cognitive radio technology in vehicular ad-hoc networks aimed to improve the communications between vehicles themselves as well as between vehicles and roadside infrastructure. Due to dynamic approach of spectrum access, cognitive radio is a technology that enables more efficient usage of radio-frequency spectrum. We review actual approaches and discuss research challenges related to the use of cognitive radio technology in vehicular ad hoc networks with emphasis on architecture, spectrum management as well as QoS optimization. The researching on cognitive radio application in vehicular networks is still developing and there are not many experimental platforms due to their complex setups. Some related research projects and cognitive radio realizations are provided in this paper.

  20. Selection Demands and Working Memory Mediate Interference during Naming

    Directory of Open Access Journals (Sweden)

    Julie W Hughes

    2015-05-01

    Analyzing RTs, we replicated previous SI effects in BCN in healthy subjects and patients (reported effects’ p’s < .05. Subjects responded more slowly to items in semantically related vs. unrelated groups, and this interference increased across cycles (evidence of increasing selection demands; Figures 1a/c. Indicative of WM, healthy subjects were faster to name items as the number of unrelated items to be named (i.e., remembered decreased. However, this was attenuated by selection demand, as there was no decrease in RTs across repeated related items (Figure 1b. Converging evidence from patients demonstrated more impaired selection capacity produced increasingly slower RTs across item positions within the related condition (high selection demand (Figure 1d. Larger WM capacity (rhyme probe but not category probe, p = .54 produced increasingly faster RTs across items positions in the unrelated condition (low selection demand (Figure 1e. Together, these findings suggest that both selection demand and phonological WM processes mediate interference during naming.

  1. A framework for reactive optimization in mobile ad hoc networks

    DEFF Research Database (Denmark)

    McClary, Dan; Syrotiuk, Violet; Kulahci, Murat

    2008-01-01

    We present a framework to optimize the performance of a mobile ad hoc network over a wide range of operating conditions. It includes screening experiments to quantify the parameters and interactions among parameters influential to throughput. Profile-driven regression is applied to obtain a model....... The predictive accuracy of the model is monitored and used to update the model dynamically. The results indicate the framework may be useful for the optimization of dynamic systems of high dimension....

  2. A Survey on Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2011-11-01

    expects, trust is dangerous implying the possible betrayal of trust. In his comments on Lagerspetz’s book titled Trust: The Tacit Demand, Lahno [24...AODV Zouridaki et al. (2005 ) [79] (2006) [80] Secure routing Direct observation [79][80] Reputation by secondhand information [80] Packet dropping...areas of signal processing, wireless communications, sensor and mobile ad hoc networks. He is co-editor of the book Wireless Sensor Networks: Signal

  3. Decentralized session initiation protocol solution in ad hoc networks

    Science.gov (United States)

    Han, Lu; Jin, Zhigang; Shu, Yantai; Dong, Linfang

    2006-10-01

    With the fast development of ad hoc networks, SIP has attracted more and more attention in multimedia service. This paper proposes a new architecture to provide SIP service for ad hoc users, although there is no centralized SIP server deployed. In this solution, we provide the SIP service by the introduction of two nodes: Designated SIP Server (DS) and its Backup Server (BDS). The nodes of ad hoc network designate DS and BDS when they join the session nodes set and when some pre-defined events occur. A new sip message type called REGISTRAR is presented so nodes can send others REGISTRAR message to declare they want to be DS. According to the IP information taken in the message, an algorithm works like the election of DR and BDR in OSPF protocol is used to vote DS and BDS SIP servers. Naturally, the DS will be replaced by BDS when the DS is down for predicable or unpredictable reasons. To facilitate this, the DS should register to the BDS and transfer a backup of the SIP users' database. Considering the possibility DS or BDS may abruptly go down, a special policy is given. When there is no DS and BDS, a new election procedure is triggered just like the startup phase. The paper also describes how SIP works normally in the decentralized model as well as the evaluation of its performance. All sessions based on SIP in ad hoc such as DS voting have been tested in the real experiments within a 500m*500m square area where about 30 random nodes are placed.

  4. Ad hoc Sensor Networks to Support Maritime Interdiction Operations

    OpenAIRE

    Osmundson, John; Bordetsky, Alex

    2014-01-01

    Networking sensors, decision centers, and boarding parties supports success in Maritime Interdiction Operations. Led by a team from Naval Post-graduate School (NPS), experiments were conducted in 2012 to test the use of ad-hoc, self-forming communication networks to link sensors, people, and decision centers. The experiments involved international participants and successfully shared valuable biometric and radiological sensor data between boarding parties and decis...

  5. Report of the Ad Hoc Committee on SSC physics

    International Nuclear Information System (INIS)

    1990-04-01

    The Ad Hoc Committee on SSC Physics has reexamined the relationship between beam energy, machine luminosity, and physics capability. In the next section, the physics motivation for the SSC is reviewed in general terms. This is followed by a discussion of the ability to detect a number of specific processes as a function of the SSC energy and luminosity. The viability of various detector technologies is then assessed as a function of luminosity. The report ends with a brief summary and some conclusions

  6. A Machine Learning Based Analytical Framework for Semantic Annotation Requirements

    OpenAIRE

    Hamed Hassanzadeh; MohammadReza Keyvanpour

    2011-01-01

    The Semantic Web is an extension of the current web in which information is given well-defined meaning. The perspective of Semantic Web is to promote the quality and intelligence of the current web by changing its contents into machine understandable form. Therefore, semantic level information is one of the cornerstones of the Semantic Web. The process of adding semantic metadata to web resources is called Semantic Annotation. There are many obstacles against the Semantic Annotation, such as ...

  7. Recent development in wireless sensor and ad-hoc networks

    CERN Document Server

    Li, Xiaolong; Yang, Yeon-Mo

    2015-01-01

    Wireless Sensor Network (WSN) consists of numerous physically distributed autonomous devices used for sensing and monitoring the physical and/or environmental conditions. A WSN uses a gateway that provides wireless connectivity to the wired world as well as distributed networks. There are many open problems related to Ad-Hoc networks and its applications. Looking at the expansion of the cellular infrastructure, Ad-Hoc network may be acting as the basis of the 4th generation wireless technology with the new paradigm of ‘anytime, anywhere communications’. To realize this, the real challenge would be the security, authorization and management issues of the large scale WSNs. This book is an edited volume in the broad area of WSNs. The book covers various chapters like Multi-Channel Wireless Sensor Networks, its Coverage, Connectivity as well as Deployment. It covers comparison of various communication protocols and algorithms such as MANNET, ODMRP and ADMR Protocols for Ad hoc Multicasting, Location Based C...

  8. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  9. MWAHCA: a multimedia wireless ad hoc cluster architecture.

    Science.gov (United States)

    Diaz, Juan R; Lloret, Jaime; Jimenez, Jose M; Sendra, Sandra

    2014-01-01

    Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node's capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss). The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal.

  10. MWAHCA: A Multimedia Wireless Ad Hoc Cluster Architecture

    Directory of Open Access Journals (Sweden)

    Juan R. Diaz

    2014-01-01

    Full Text Available Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node’s capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss. The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal.

  11. Leakage radiation interference microscopy.

    Science.gov (United States)

    Descrovi, Emiliano; Barakat, Elsie; Angelini, Angelo; Munzert, Peter; De Leo, Natascia; Boarino, Luca; Giorgis, Fabrizio; Herzig, Hans Peter

    2013-09-01

    We present a proof of principle for a new imaging technique combining leakage radiation microscopy with high-resolution interference microscopy. By using oil immersion optics it is demonstrated that amplitude and phase can be retrieved from optical fields, which are evanescent in air. This technique is illustratively applied for mapping a surface mode propagating onto a planar dielectric multilayer on a thin glass substrate. The surface mode propagation constant estimated after Fourier transformation of the measured complex field is well matched with an independent measurement based on back focal plane imaging.

  12. Exploiting semantic linkages among multiple sources for semantic information retrieval

    Science.gov (United States)

    Li, JianQiang; Yang, Ji-Jiang; Liu, Chunchen; Zhao, Yu; Liu, Bo; Shi, Yuliang

    2014-07-01

    The vision of the Semantic Web is to build a global Web of machine-readable data to be consumed by intelligent applications. As the first step to make this vision come true, the initiative of linked open data has fostered many novel applications aimed at improving data accessibility in the public Web. Comparably, the enterprise environment is so different from the public Web that most potentially usable business information originates in an unstructured form (typically in free text), which poses a challenge for the adoption of semantic technologies in the enterprise environment. Considering that the business information in a company is highly specific and centred around a set of commonly used concepts, this paper describes a pilot study to migrate the concept of linked data into the development of a domain-specific application, i.e. the vehicle repair support system. The set of commonly used concepts, including the part name of a car and the phenomenon term on the car repairing, are employed to build the linkage between data and documents distributed among different sources, leading to the fusion of documents and data across source boundaries. Then, we describe the approaches of semantic information retrieval to consume these linkages for value creation for companies. The experiments on two real-world data sets show that the proposed approaches outperform the best baseline 6.3-10.8% and 6.4-11.1% in terms of top five and top 10 precisions, respectively. We believe that our pilot study can serve as an important reference for the development of similar semantic applications in an enterprise environment.

  13. The Medial Temporal Lobe and the Left Inferior Prefrontal Cortex Jointly Support Interference Resolution in Verbal Working Memory

    Science.gov (United States)

    Oztekin, Ilke; Curtis, Clayton E.; McElree, Brian

    2009-01-01

    During working memory retrieval, proactive interference (PI) can be induced by semantic similarity and episodic familiarity. Here, we used fMRI to test hypotheses about the role of the left inferior frontal gyrus (LIFG) and the medial temporal lobe (MTL) regions in successful resolution of PI. Participants studied six-word lists and responded to a…

  14. The intention interference effect.

    Science.gov (United States)

    Cohen, Anna-Lisa; Kantner, Justin; Dixon, Roger A; Lindsay, D Stephen

    2011-01-01

    Intentions have been shown to be more accessible (e.g., more quickly and accurately recalled) compared to other sorts of to-be-remembered information; a result termed an intention superiority effect (Goschke & Kuhl, 1993). In the current study, we demonstrate an intention interference effect (IIE) in which color-naming performance in a Stroop task was slower for words belonging to an intention that participants had to remember to carry out (Do-the-Task condition) versus an intention that did not have to be executed (Ignore-the-Task condition). In previous work (e.g., Cohen et al., 2005), having a prospective intention in mind was confounded with carrying a memory load. In Experiment 1, we added a digit-retention task to control for effects of cognitive load. In Experiment 2, we eliminated the memory confound in a new way, by comparing intention-related and control words within each trial. Results from both Experiments 1 and 2 revealed an IIE suggesting that interference is very specific to the intention, not just to a memory load.

  15. Rate adaptation in ad hoc networks based on pricing

    CSIR Research Space (South Africa)

    Awuor, F

    2011-09-01

    Full Text Available that incorporates penalty (pricing) obtruded to users’ choices of transmission parameters to curb the self-interest behaviour. Therefore users determine their data rates and transmit power based on the perceived coupled interference at the intended receiver...

  16. Semantics, contrastive linguistics and parallel corpora

    Directory of Open Access Journals (Sweden)

    Violetta Koseska

    2014-09-01

    Full Text Available Semantics, contrastive linguistics and parallel corpora In view of the ambiguity of the term “semantics”, the author shows the differences between the traditional lexical semantics and the contemporary semantics in the light of various semantic schools. She examines semantics differently in connection with contrastive studies where the description must necessary go from the meaning towards the linguistic form, whereas in traditional contrastive studies the description proceeded from the form towards the meaning. This requirement regarding theoretical contrastive studies necessitates construction of a semantic interlanguage, rather than only singling out universal semantic categories expressed with various language means. Such studies can be strongly supported by parallel corpora. However, in order to make them useful for linguists in manual and computer translations, as well as in the development of dictionaries, including online ones, we need not only formal, often automatic, annotation of texts, but also semantic annotation - which is unfortunately manual. In the article we focus on semantic annotation concerning time, aspect and quantification of names and predicates in the whole semantic structure of the sentence on the example of the “Polish-Bulgarian-Russian parallel corpus”.

  17. A Postcolonial Semantics of Personhood

    DEFF Research Database (Denmark)

    Levisen, Carsten

    that provide an answer to the question: “what makes up a person?” The paper aims toarticulate semantic explications and cultural scripts for personhood constructs in Bislama, beingmindful of the anglicizations, contradictions, and reinventions that are characteristic of postcolonialdiscourse......, 2013-2015 (Levisen 2016a, 2016b). I willfocus on the keyword tingting ‘mind, heart’ (from English ‘think-think’), and the related concepts speret(from English ‘spirit’), devil (from English ‘devil’), and pija (from English ‘picture’), as well as morerecent imports from English: maen (mind), sol (soul...... levels. Traditionalterms like devil and pija are being problematized by urban speakers, and are both in decline. Sol,maen, and had have become more common, and speret/spirit has undergone a semanticanglicization. Tingting remains the key construct, around which Bislama personhood semantics isorganized...

  18. Beamforming design with proactive interference cancelation in MISO interference channels

    Science.gov (United States)

    Li, Yang; Tian, Yafei; Yang, Chenyang

    2015-12-01

    In this paper, we design coordinated beamforming at base stations (BSs) to facilitate interference cancelation at users in interference networks, where each BS is equipped with multiple antennas and each user is with a single antenna. By assuming that each user can select the best decoding strategy to mitigate the interference, either canceling the interference after decoding when it is strong or treating it as noise when it is weak, we optimize the beamforming vectors that maximize the sum rate for the networks under different interference scenarios and find the solutions of beamforming with closed-form expressions. The inherent design principles are then analyzed, and the performance gain over passive interference cancelation is demonstrated through simulations in heterogeneous cellular networks.

  19. Weak negation in inquisitive semantics

    Czech Academy of Sciences Publication Activity Database

    Punčochář, Vít

    2015-01-01

    Roč. 24, č. 3 (2015), s. 323-355 ISSN 0925-8531 R&D Projects: GA ČR(CZ) GA13-21076S Institutional support: RVO:67985955 Keywords : inquisitive semantics * negation * possible worlds * Fitch-style natural deduction * denial Subject RIV: AA - Philosophy ; Religion Impact factor: 0.450, year: 2015 http://link.springer.com/article/10.1007%2Fs10849-015-9219-2

  20. Semantic Memory in the Clinical Progression of Alzheimer Disease.

    Science.gov (United States)

    Tchakoute, Christophe T; Sainani, Kristin L; Henderson, Victor W

    2017-09-01

    Semantic memory measures may be useful in tracking and predicting progression of Alzheimer disease. We investigated relationships among semantic memory tasks and their 1-year predictive value in women with Alzheimer disease. We conducted secondary analyses of a randomized clinical trial of raloxifene in 42 women with late-onset mild-to-moderate Alzheimer disease. We assessed semantic memory with tests of oral confrontation naming, category fluency, semantic recognition and semantic naming, and semantic density in written narrative discourse. We measured global cognition (Alzheimer Disease Assessment Scale, cognitive subscale), dementia severity (Clinical Dementia Rating sum of boxes), and daily function (Activities of Daily Living Inventory) at baseline and 1 year. At baseline and 1 year, most semantic memory scores correlated highly or moderately with each other and with global cognition, dementia severity, and daily function. Semantic memory task performance at 1 year had worsened one-third to one-half standard deviation. Factor analysis of baseline test scores distinguished processes in semantic and lexical retrieval (semantic recognition, semantic naming, confrontation naming) from processes in lexical search (semantic density, category fluency). The semantic-lexical retrieval factor predicted global cognition at 1 year. Considered separately, baseline confrontation naming and category fluency predicted dementia severity, while semantic recognition and a composite of semantic recognition and semantic naming predicted global cognition. No individual semantic memory test predicted daily function. Semantic-lexical retrieval and lexical search may represent distinct aspects of semantic memory. Semantic memory processes are sensitive to cognitive decline and dementia severity in Alzheimer disease.

  1. Discovery and Selection of Semantic Web Services

    CERN Document Server

    Wang, Xia

    2013-01-01

    For advanced web search engines to be able not only to search for semantically related information dispersed over different web pages, but also for semantic services providing certain functionalities, discovering semantic services is the key issue. Addressing four problems of current solution, this book presents the following contributions. A novel service model independent of semantic service description models is proposed, which clearly defines all elements necessary for service discovery and selection. It takes service selection as its gist and improves efficiency. Corresponding selection algorithms and their implementation as components of the extended Semantically Enabled Service-oriented Architecture in the Web Service Modeling Environment are detailed. Many applications of semantic web services, e.g. discovery, composition and mediation, can benefit from a general approach for building application ontologies. With application ontologies thus built, services are discovered in the same way as with single...

  2. A Denotational Semantics for Logic Programming

    DEFF Research Database (Denmark)

    Frandsen, Gudmund Skovbjerg

    A fully abstract denotational semantics for logic programming has not been constructed yet. In this paper we present a denotational semantics that is almost fully abstract. We take the meaning of a logic program to be an element in a Plotkin power domain of substitutions. In this way our result...... shows that standard domain constructions suffice, when giving a semantics for logic programming. Using the well-known fixpoint semantics of logic programming we have to consider two different fixpoints in order to obtain information about both successful and failed computations. In contrast, our...... semantics is uniform in that the (single) meaning of a logic program contains information about both successful, failed and infinite computations. Finally, based on the full abstractness result, we argue that the detail level of substitutions is needed in any denotational semantics for logic programming....

  3. Graphene quantum interference photodetector

    Directory of Open Access Journals (Sweden)

    Mahbub Alam

    2015-03-01

    Full Text Available In this work, a graphene quantum interference (QI photodetector was simulated in two regimes of operation. The structure consists of a graphene nanoribbon, Mach–Zehnder interferometer (MZI, which exhibits a strongly resonant transmission of electrons of specific energies. In the first regime of operation (that of a linear photodetector, low intensity light couples two resonant energy levels, resulting in scattering and differential transmission of current with an external quantum efficiency of up to 5.2%. In the second regime of operation, full current switching is caused by the phase decoherence of the current due to a strong photon flux in one or both of the interferometer arms in the same MZI structure. Graphene QI photodetectors have several distinct advantages: they are of very small size, they do not require p- and n-doped regions, and they exhibit a high external quantum efficiency.

  4. Substation electromagnetic interference

    International Nuclear Information System (INIS)

    Felic, G.; Shihab, S.

    1997-01-01

    The electric and magnetic transients in high voltage substations were studied. The electric field measurements were carried out in a 66 kV switchyard of a 500/220/66 kV substation in Melbourne, Australia. The measured waveforms make up a database to be used for reference in the testing of substation control and protection equipment. The objective of this study was to characterize the radiated interference caused by the operation of disconnect switches and circuit breakers. Disconnect switch transients can be a serious hazard for substations because the slow moving contacts during opening and closing can result in arcing events of several seconds duration. Circuit breaker transients were considered to be less hazardous. Transient magnetic fields of at least several tens of A/m can occur during the energization of the capacitor bank. Substation electronic equipment should be tested and protected against the coupling of these transients in order to avoid breakdowns. 5 refs., 4 figs

  5. Evaluation of mobile ad hoc network reliability using propagation-based link reliability model

    International Nuclear Information System (INIS)

    Padmavathy, N.; Chaturvedi, Sanjay K.

    2013-01-01

    A wireless mobile ad hoc network (MANET) is a collection of solely independent nodes (that can move randomly around the area of deployment) making the topology highly dynamic; nodes communicate with each other by forming a single hop/multi-hop network and maintain connectivity in decentralized manner. MANET is modelled using geometric random graphs rather than random graphs because the link existence in MANET is a function of the geometric distance between the nodes and the transmission range of the nodes. Among many factors that contribute to the MANET reliability, the reliability of these networks also depends on the robustness of the link between the mobile nodes of the network. Recently, the reliability of such networks has been evaluated for imperfect nodes (transceivers) with binary model of communication links based on the transmission range of the mobile nodes and the distance between them. However, in reality, the probability of successful communication decreases as the signal strength deteriorates due to noise, fading or interference effects even up to the nodes' transmission range. Hence, in this paper, using a propagation-based link reliability model rather than a binary-model with nodes following a known failure distribution to evaluate the network reliability (2TR m , ATR m and AoTR m ) of MANET through Monte Carlo Simulation is proposed. The method is illustrated with an application and some imperative results are also presented

  6. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  7. Ad-hoc Network of Smart Sensors for Mechanical Load Measurement

    Directory of Open Access Journals (Sweden)

    Manuel A. Vieira

    2016-07-01

    Full Text Available Strain gauges load cells are transducers devices capable of converting changes in applied mechanical load into an electrical analog signal. Those devices have a large spectrum of applications ranging from domestic to industrial or even medical appliances just to name a few. In this work, they are used in the electronic instrumentation of a force platform that will be used to carry out the analysis and characterization of human biomechanical walking. In this platform, four load cells are installed, each one capable of measuring forces along two different axis. A total of eight strain-gauges per load cell are employed. Hence, analog signal transmission, besides requiring a large number of connection wires, is prone to interference and noise. Moreover, with this solution, scalability requires severe changes in the connection topology. In order to circumvent those problems, an alternative in-situ signal conditioning and digital data transmission system was devised. This approach, as far as investigated, presents an innovative solution to signal conditioning and data transmission for load-cells. In particular, the presented solution allows the creation of an ad-hoc network of load cells, using the I²C protocol with a master interface that allows the users to interact and change the parameters of each load cell. This instrumentation structure has been successfully tested and the obtained results are documented in this article.

  8. An Algebraic Specification of the Semantic Web

    OpenAIRE

    Ksystra, Katerina; Triantafyllou, Nikolaos; Stefaneas, Petros; Frangos, Panayiotis

    2011-01-01

    We present a formal specification of the Semantic Web, as an extension of the World Wide Web using the well known algebraic specification language CafeOBJ. Our approach allows the description of the key elements of the Semantic Web technologies, in order to give a better understanding of the system, without getting involved with their implementation details that might not yet be standardized. This specification is part of our work in progress concerning the modeling the Social Semantic Web.

  9. Semantic Web Requirements through Web Mining Techniques

    OpenAIRE

    Hassanzadeh, Hamed; Keyvanpour, Mohammad Reza

    2012-01-01

    In recent years, Semantic web has become a topic of active research in several fields of computer science and has applied in a wide range of domains such as bioinformatics, life sciences, and knowledge management. The two fast-developing research areas semantic web and web mining can complement each other and their different techniques can be used jointly or separately to solve the issues in both areas. In addition, since shifting from current web to semantic web mainly depends on the enhance...

  10. Semantic interpretation of search engine resultant

    Science.gov (United States)

    Nasution, M. K. M.

    2018-01-01

    In semantic, logical language can be interpreted in various forms, but the certainty of meaning is included in the uncertainty, which directly always influences the role of technology. One results of this uncertainty applies to search engines as user interfaces with information spaces such as the Web. Therefore, the behaviour of search engine results should be interpreted with certainty through semantic formulation as interpretation. Behaviour formulation shows there are various interpretations that can be done semantically either temporary, inclusion, or repeat.

  11. Gricean Semantics and Vague Speaker-Meaning

    OpenAIRE

    Schiffer, Stephen

    2017-01-01

    Presentations of Gricean semantics, including Stephen Neale’s in “Silent Reference,” totally ignore vagueness, even though virtually every utterance is vague. I ask how Gricean semantics might be adjusted to accommodate vague speaker-meaning. My answer is that it can’t accommodate it: the Gricean program collapses in the face of vague speaker-meaning. The Gricean might, however, fi nd some solace in knowing that every other extant meta-semantic and semantic program is in the same boat.

  12. Some Novel Techniques in Operational Semantics

    DEFF Research Database (Denmark)

    Mosses, Peter David

    2003-01-01

    Several novel techniques for use in operational semantics are presented. They were developed in connection with a modular vatriant of the conventional Structural Operational Semantics framework, but can also be exploited when modularity is of no great concern. Gives a simple introduction to the m......Several novel techniques for use in operational semantics are presented. They were developed in connection with a modular vatriant of the conventional Structural Operational Semantics framework, but can also be exploited when modularity is of no great concern. Gives a simple introduction...

  13. Interpreting semantic clustering effects in free recall.

    Science.gov (United States)

    Manning, Jeremy R; Kahana, Michael J

    2012-07-01

    The order in which participants choose to recall words from a studied list of randomly selected words provides insights into how memories of the words are represented, organised, and retrieved. One pervasive finding is that when a pair of semantically related words (e.g., "cat" and "dog") is embedded in the studied list, the related words are often recalled successively. This tendency to successively recall semantically related words is termed semantic clustering (Bousfield, 1953; Bousfield & Sedgewick, 1944; Cofer, Bruce, & Reicher, 1966). Measuring semantic clustering effects requires making assumptions about which words participants consider to be similar in meaning. However, it is often difficult to gain insights into individual participants' internal semantic models, and for this reason researchers typically rely on standardised semantic similarity metrics. Here we use simulations to gain insights into the expected magnitudes of semantic clustering effects given systematic differences between participants' internal similarity models and the similarity metric used to quantify the degree of semantic clustering. Our results provide a number of useful insights into the interpretation of semantic clustering effects in free recall.

  14. Language networks associated with computerized semantic indices.

    Science.gov (United States)

    Pakhomov, Serguei V S; Jones, David T; Knopman, David S

    2015-01-01

    Tests of generative semantic verbal fluency are widely used to study organization and representation of concepts in the human brain. Previous studies demonstrated that clustering and switching behavior during verbal fluency tasks is supported by multiple brain mechanisms associated with semantic memory and executive control. Previous work relied on manual assessments of semantic relatedness between words and grouping of words into semantic clusters. We investigated a computational linguistic approach to measuring the strength of semantic relatedness between words based on latent semantic analysis of word co-occurrences in a subset of a large online encyclopedia. We computed semantic clustering indices and compared them to brain network connectivity measures obtained with task-free fMRI in a sample consisting of healthy participants and those differentially affected by cognitive impairment. We found that semantic clustering indices were associated with brain network connectivity in distinct areas including fronto-temporal, fronto-parietal and fusiform gyrus regions. This study shows that computerized semantic indices complement traditional assessments of verbal fluency to provide a more complete account of the relationship between brain and verbal behavior involved organization and retrieval of lexical information from memory. Copyright © 2014 Elsevier Inc. All rights reserved.

  15. Semantic models for adaptive interactive systems

    CERN Document Server

    Hussein, Tim; Lukosch, Stephan; Ziegler, Jürgen; Calvary, Gaëlle

    2013-01-01

    Providing insights into methodologies for designing adaptive systems based on semantic data, and introducing semantic models that can be used for building interactive systems, this book showcases many of the applications made possible by the use of semantic models.Ontologies may enhance the functional coverage of an interactive system as well as its visualization and interaction capabilities in various ways. Semantic models can also contribute to bridging gaps; for example, between user models, context-aware interfaces, and model-driven UI generation. There is considerable potential for using

  16. Neural correlates underlying musical semantic memory.

    Science.gov (United States)

    Groussard, M; Viader, F; Landeau, B; Desgranges, B; Eustache, F; Platel, H

    2009-07-01

    Numerous functional imaging studies have examined the neural basis of semantic memory mainly using verbal and visuospatial materials. Musical material also allows an original way to explore semantic memory processes. We used PET imaging to determine the neural substrates that underlie musical semantic memory using different tasks and stimuli. The results of three PET studies revealed a greater involvement of the anterior part of the temporal lobe. Concerning clinical observations and our neuroimaging data, the musical lexicon (and most widely musical semantic memory) appears to be sustained by a temporo-prefrontal cerebral network involving right and left cerebral regions.

  17. Towards a Reactive Semantic Execution Environment

    Science.gov (United States)

    Komazec, Srdjan; Facca, Federico Michele

    Managing complex and distributed software systems built on top of the service-oriented paradigm has never been more challenging. While Semantic Web Service technologies offer a promising set of languages and tools as a foundation to resolve the heterogeneity and scalability issues, they are still failing to provide an autonomic execution environment. In this paper we present an approach based on Semantic Web Services to enable the monitoring and self-management of a Semantic Execution Environment (SEE), a brokerage system for Semantic Web Services. Our approach is founded on the event-triggered reactivity paradigm in order to facilitate environment control, thus contributing to its autonomicity, robustness and flexibility.

  18. Semantics-based Automated Web Testing

    Directory of Open Access Journals (Sweden)

    Hai-Feng Guo

    2015-08-01

    Full Text Available We present TAO, a software testing tool performing automated test and oracle generation based on a semantic approach. TAO entangles grammar-based test generation with automated semantics evaluation using a denotational semantics framework. We show how TAO can be incorporated with the Selenium automation tool for automated web testing, and how TAO can be further extended to support automated delta debugging, where a failing web test script can be systematically reduced based on grammar-directed strategies. A real-life parking website is adopted throughout the paper to demonstrate the effectivity of our semantics-based web testing approach.

  19. SEMANTIC WEB MINING: ISSUES AND CHALLENGES

    OpenAIRE

    Karan Singh*, Anil kumar, Arun Kumar Yadav

    2016-01-01

    The combination of the two fast evolving scientific research areas “Semantic Web” and “Web Mining” are well-known as “Semantic Web Mining” in computer science. These two areas cover way for the mining of related and meaningful information from the web, by this means giving growth to the term “Semantic Web Mining”. The “Semantic Web” makes mining easy and “Web Mining” can construct new structure of Web. Web Mining applies Data Mining technique on web content, Structure and Usage. This paper gi...

  20. Studies on urban vehicular ad-hoc networks

    CERN Document Server

    Zhu, Hongzi

    2013-01-01

    With the advancement of wireless technology, vehicular ad hoc networks (VANETs) are emerging as a promising approach to realizing 'smart cities' and addressing many important transportation problems such as road safety, efficiency, and convenience.This brief provides an introduction to the large trace data set collected from thousands of taxis and buses in Shanghai, the largest metropolis in China. It also presents the challenges, design issues, performance modeling and evaluation of a wide spectrum of VANET research topics, ranging from realistic vehicular mobility models and opportunistic ro

  1. Throughput Capacity of Ad Hoc Networks with Route Discovery

    Directory of Open Access Journals (Sweden)

    Blum Rick S

    2007-01-01

    Full Text Available Throughput capacity of large ad hoc networks has been shown to scale adversely with the size of network . However the need for the nodes to find or repair routes has not been analyzed in this context. In this paper, we explicitly take route discovery into account and obtain the scaling law for the throughput capacity under general assumptions on the network environment, node behavior, and the quality of route discovery algorithms. We also discuss a number of possible scenarios and show that the need for route discovery may change the scaling for the throughput capacity.

  2. Wireless ad hoc and sensor networks management, performance, and applications

    CERN Document Server

    He, Jing

    2013-01-01

    Although wireless sensor networks (WSNs) have been employed across a wide range of applications, there are very few books that emphasize the algorithm description, performance analysis, and applications of network management techniques in WSNs. Filling this need, Wireless Ad Hoc and Sensor Networks: Management, Performance, and Applications summarizes not only traditional and classical network management techniques, but also state-of-the-art techniques in this area. The articles presented are expository, but scholarly in nature, including the appropriate history background, a review of current

  3. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  4. Mobile ad hoc networking the cutting edge directions

    CERN Document Server

    Basagni, Stefano; Giordano, Silvia; Stojmenovic, Ivan

    2013-01-01

    ""An excellent book for those who are interested in learning the current status of research and development . . . [and] who want to get a comprehensive overview of the current state-of-the-art.""-E-Streams This book provides up-to-date information on research and development in the rapidly growing area of networks based on the multihop ad hoc networking paradigm. It reviews all classes of networks that have successfully adopted this paradigm, pointing out how they penetrated the mass market and sparked breakthrough research. Covering both physical issues and applica

  5. Ad-Hoc vs. Standardized and Optimized Arthropod Diversity Sampling

    Directory of Open Access Journals (Sweden)

    Pedro Cardoso

    2009-09-01

    Full Text Available The use of standardized and optimized protocols has been recently advocated for different arthropod taxa instead of ad-hoc sampling or sampling with protocols defined on a case-by-case basis. We present a comparison of both sampling approaches applied for spiders in a natural area of Portugal. Tests were made to their efficiency, over-collection of common species, singletons proportions, species abundance distributions, average specimen size, average taxonomic distinctness and behavior of richness estimators. The standardized protocol revealed three main advantages: (1 higher efficiency; (2 more reliable estimations of true richness; and (3 meaningful comparisons between undersampled areas.

  6. Mobile agents affect worm spreading in wireless ad hoc networks

    International Nuclear Information System (INIS)

    Huang, Zi-Gang; Sun, Jin-Tu; Wang, Ying-Hai; Wang, Sheng-Jun; Xu, Xin-Jian

    2009-01-01

    Considering the dynamic nature of portable computing devices with wireless communication capability, an extended model is introduced for worm spreading in the wireless ad hoc network, with a population of mobile agents in a planar distribution, starting from an initial infected seed. The effect of agents' mobility on worm spreading is investigated via extensive Monte Carlo simulations. The threshold behavior and the dynamics of worm epidemics in the wireless networks are greatly affected by both agents' mobility and spatial and temporal correlations. The medium access control mechanism for the wireless communication promotes the sensitivity of the spreading dynamics to agents' mobility

  7. When Wine and Apple Both Help the Production of Grapes: ERP Evidence for Post-lexical Semantic Facilitation in Picture Naming.

    Science.gov (United States)

    Python, Grégoire; Fargier, Raphaël; Laganaro, Marina

    2018-01-01

    Background : Producing a word in referential naming requires to select the right word in our mental lexicon among co-activated semantically related words. The mechanisms underlying semantic context effects during speech planning are still controversial, particularly for semantic facilitation which investigation remains under-represented in contrast to the plethora of studies dealing with interference. Our aim is to study the time-course of semantic facilitation in picture naming, using a picture-word "interference" paradigm and event-related potentials (ERPs). Methods : We compared two different types of semantic relationships, associative and categorical, in a single word priming and a double word priming paradigm. The primes were presented visually with a long negative Stimulus Onset Asynchrony (SOA), which is expected to cause facilitation. Results : Shorter naming latencies were observed after both associative and categorical primes, as compared to unrelated primes, and even shorter latencies after two primes. Electrophysiological results showed relatively late modulations of waveform amplitudes for both types of primes (beginning ~330 ms post picture onset with a single prime and ~275 ms post picture onset with two primes), corresponding to a shift in latency of similar topographic maps across conditions. Conclusion : The present results are in favor of a post-lexical locus of semantic facilitation for associative and categorical priming in picture naming and confirm that semantic facilitation is as relevant as semantic interference to inform on word production. The post-lexical locus argued here might be related to self-monitoting or/and to modulations at the level of word-form planning, without excluding the participation of strategic processes.

  8. Representations for Semantic Learning Webs: Semantic Web Technology in Learning Support

    Science.gov (United States)

    Dzbor, M.; Stutt, A.; Motta, E.; Collins, T.

    2007-01-01

    Recent work on applying semantic technologies to learning has concentrated on providing novel means of accessing and making use of learning objects. However, this is unnecessarily limiting: semantic technologies will make it possible to develop a range of educational Semantic Web services, such as interpretation, structure-visualization, support…

  9. Pascal Semantics by a Combination of Denotational Semantics and High-level Petri Nets

    DEFF Research Database (Denmark)

    Jensen, Kurt; Schmidt, Erik Meineche

    1986-01-01

    This paper describes the formal semantics of a subset of PASCAL, by means of a semantic model based on a combination of denotational semantics and high-level Petri nets. It is our intention that the paper can be used as part of the written material for an introductory course in computer science....

  10. A Semantic Analysis of the Language of Advertising | Emodi | African ...

    African Journals Online (AJOL)

    A Semantic Analysis of the Language of Advertising. ... After a brief introduction to semantics and advertising language, the paper is focused on the linguistic realizations in English advertising from the semantic ... AJOL African Journals Online.

  11. Towards Compatible and Interderivable Semantic Specifications for the Scheme Programming Language, Part I: Denotational Semantics, Natural Semantics, and Abstract Machines

    DEFF Research Database (Denmark)

    Danvy, Olivier

    2009-01-01

    We derive two big-step abstract machines, a natural semantics, and the valuation function of a denotational semantics based on the small-step abstract machine for Core Scheme presented by Clinger at PLDI'98. Starting from a functional implementation of this small-step abstract machine, (1) we fus...

  12. Energy Efficient Probabilistic Broadcasting for Mobile Ad-Hoc Network

    Science.gov (United States)

    Kumar, Sumit; Mehfuz, Shabana

    2017-06-01

    In mobile ad-hoc network (MANETs) flooding method is used for broadcasting route request (RREQ) packet from one node to another node for route discovery. This is the simplest method of broadcasting of RREQ packets but it often results in broadcast storm problem, originating collisions and congestion of packets in the network. A probabilistic broadcasting is one of the widely used broadcasting scheme for route discovery in MANETs and provides solution for broadcasting storm problem. But it does not consider limited energy of the battery of the nodes. In this paper, a new energy efficient probabilistic broadcasting (EEPB) is proposed in which probability of broadcasting RREQs is calculated with respect to remaining energy of nodes. The analysis of simulation results clearly indicate that an EEPB route discovery scheme in ad-hoc on demand distance vector (AODV) can increase the network lifetime with a decrease in the average power consumption and RREQ packet overhead. It also decreases the number of dropped packets in the network, in comparison to other EEPB schemes like energy constraint gossip (ECG), energy aware gossip (EAG), energy based gossip (EBG) and network lifetime through energy efficient broadcast gossip (NEBG).

  13. A Spontaneous Ad Hoc Network to Share WWW Access

    Directory of Open Access Journals (Sweden)

    Lloret Jaime

    2010-01-01

    Full Text Available In this paper, we propose a secure spontaneous ad-hoc network, based on direct peer-to-peer interaction, to grant a quick, easy, and secure access to the users to surf the Web. The paper shows the description of our proposal, the procedure of the nodes involved in the system, the security algorithms implemented, and the designed messages. We have taken into account the security and its performance. Although some people have defined and described the main features of spontaneous ad-hoc networks, nobody has published any design and simulation until today. Spontaneous networking will enable a more natural form of wireless computing when people physically meet in the real world. We also validate the success of our proposal through several simulations and comparisons with a regular architecture, taking into account the optimization of the resources of the devices. Finally, we compare our proposal with other caching techniques published in the related literature. The proposal has been developed with the main objective of improving the communication and integration between different study centers of low-resource communities. That is, it lets communicate spontaneous networks, which are working collaboratively and which have been created on different physical places.

  14. A Novel Routing Algorithm for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Raúl Aquino Santos

    2008-01-01

    Full Text Available Este trabajo examina la importancia de las redes inalámbricas ad hoc y el algoritmo de enrutamiento con inundación basada en grupos (LORA-CBF para la comunicación inter-vehicular con la finalidad de optimizar el flujo de tráfico e incrementar la seguridad en las autopistas. Se discute el algoritmo de enrutamiento LORA-CBF y se presentan los resultados de simulaciones realizadas en OPNET de una autopista con alta movilidad vehicular. Primero, el modelo de simulación propuesto se valida a pequeña escala con resultados experimentales. Posteriormente, se emplean simulaciones de nuestro modelo comparándolos con Ad Hoc On-Demand Distance Vector (AODV y Dynamic Source Routing (DSR. Finalmente, se emplea un modelo de tráfico microscópico desarrollado en OPNET para simular la movilidad de 250 vehículos en una autopista y se aplica el algoritmo de enrutamiento LORA-CBF en un escenario vehicular.

  15. Minimizing Broadcast Expenses in Clustered Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    S. Zeeshan Hussain

    2018-01-01

    Full Text Available One way to minimize the broadcast expenses of routing protocols is to cluster the network. In clustered ad-hoc networks, all resources can be managed easily by resolving scalability issues. However, blind query broadcast is a major issue that leads to the broadcast storm problem in clustered ad-hoc networks. This query broadcast is done to carry out the route-search task that leads to the unnecessary propagation of route-query even after route has been found. Hence, this query propagation poses the problem of congestion in the network. In particular this motivates us to propose a query-control technique in such networks which works based on broadcast repealing. A huge amount of work has been devoted to propose the query control broadcasting techniques. However, such techniques used in traditional broadcasting mechanisms need to be properly extended for use in the cluster based routing architecture. In this paper, query-control technique is proposed for cluster based routing technique to reduce the broadcast expenses. Finally, we report some experiments which compare the proposed technique to other commonly used techniques including standard one-class AODV that follows TTL-sequence based broadcasting technique.

  16. LAMAN: Load Adaptable MAC for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Realp Marc

    2005-01-01

    Full Text Available In mobile ad hoc radio networks, mechanisms on how to access the radio channel are extremely important in order to improve network efficiency. In this paper, the load adaptable medium access control for ad hoc networks (LAMAN protocol is described. LAMAN is a novel decentralized multipacket MAC protocol designed following a cross-layer approach. Basically, this protocol is a hybrid CDMA-TDMA-based protocol that aims at throughput maximization in multipacket communication environments by efficiently combining contention and conflict-free protocol components. Such combination of components is used to adapt the nodes' access priority to changes on the traffic load while, at the same time, accounting for the multipacket reception (MPR capability of the receivers. A theoretical analysis of the system is developed presenting closed expressions of network throughput and packet delay. By simulations the validity of our analysis is shown and the performances of a LAMAN-based system and an Aloha-CDMA-based one are compared.

  17. Autonomous Power Control MAC Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Battery energy limitation has become a performance bottleneck for mobile ad hoc networks. IEEE 802.11 has been adopted as the current standard MAC protocol for ad hoc networks. However, it was developed without considering energy efficiency. To solve this problem, many modifications on IEEE 802.11 to incorporate power control have been proposed in the literature. The main idea of these power control schemes is to use a maximum possible power level for transmitting RTS/CTS and the lowest acceptable power for sending DATA/ACK. However, these schemes may degrade network throughput and reduce the overall energy efficiency of the network. This paper proposes autonomous power control MAC protocol (APCMP, which allows mobile nodes dynamically adjusting power level for transmitting DATA/ACK according to the distances between the transmitter and its neighbors. In addition, the power level for transmitting RTS/CTS is also adjustable according to the power level for DATA/ACK packets. In this paper, the performance of APCMP protocol is evaluated by simulation and is compared with that of other protocols.

  18. Perceptual-Semantic Congruency Facilitates Semantic Discrimination of Thermal Qualities

    Directory of Open Access Journals (Sweden)

    Yizhen Zhou

    2017-12-01

    Full Text Available The ability to sense temperature is vital to our life. It signals the environmental condition, reflects the physiological conditions of our own body, and generates feelings of pleasantness or unpleasantness. Moreover, recent studies have demonstrated implicit associations between physical temperature and social/emotional concepts, suggesting the processing of temperature may even influence cognition. In this work, we examined the effect of physical warmth and coldness on semantic cognition. Participants performed speeded target categorization for thermal descriptors in the form of semantic words or illustrative figures representing the thermal qualities “warm” or “cold” while physical thermal stimulation was presented. We compared the average reaction time (RT for the congruent and incongruent conditions managed by response key assignments. In the congruent condition, the response key for the symbol associated with warmth (coldness was assigned to the hand with warm (cold thermal stimulation, and in the incongruent condition the key assignment was reversed. Our results demonstrate that the average RT in the congruent condition was faster than in the incongruent one for both forms of thermal descriptors, suggesting that the experience of physical temperature facilitates the internal processing of the meaning of thermal quality.

  19. Developmental Change in Proactive Interference.

    Science.gov (United States)

    Kail, Robert

    2002-01-01

    Two studies examined age-related change in proactive interference from previously learned material. The meta-analysis of 26 studies indicated that proactive interference decreased with age. The cross-sectional study found that third through sixth graders' and college students' recall was accurate on Trial 1, but became less so over Trials 2…

  20. Sleep can reduce proactive interference.

    Science.gov (United States)

    Abel, Magdalena; Bäuml, Karl-Heinz T

    2014-01-01

    Sleep has repeatedly been connected to processes of memory consolidation. While extensive research indeed documents beneficial effects of sleep on memory, little is yet known about the role of sleep for interference effects in episodic memory. Although two prior studies reported sleep to reduce retroactive interference, no sleep effect has previously been found for proactive interference. Here we applied a study format differing from that employed by the prior studies to induce a high degree of proactive interference, and asked participants to encode a single list or two interfering lists of paired associates via pure study cycles. Testing occurred after 12 hours of diurnal wakefulness or nocturnal sleep. Consistent with the prior work, we found sleep in comparison to wake did not affect memory for the single list, but reduced retroactive interference. In addition we found sleep reduced proactive interference, and reduced retroactive and proactive interference to the same extent. The finding is consistent with the view that arising benefits of sleep are caused by the reactivation of memory contents during sleep, which has been suggested to strengthen and stabilise memories. Such stabilisation may make memories less susceptible to competition from interfering memories at test and thus reduce interference effects.

  1. Output Interference in Recognition Memory

    Science.gov (United States)

    Criss, Amy H.; Malmberg, Kenneth J.; Shiffrin, Richard M.

    2011-01-01

    Dennis and Humphreys (2001) proposed that interference in recognition memory arises solely from the prior contexts of the test word: Interference does not arise from memory traces of other words (from events prior to the study list or on the study list, and regardless of similarity to the test item). We evaluate this model using output…

  2. Interference Phenomenon with Mobile Displays

    Science.gov (United States)

    Trantham, Kenneth

    2015-01-01

    A simple experiment is presented in which the spacing and geometric pattern of pixels in mobile displays is measured. The technique is based on optical constructive interference. While the experiment is another opportunity to demonstrate wave interference from a grating-like structure, this can also be used to demonstrate concepts of solid state…

  3. Gazetteer Brokering through Semantic Mediation

    Science.gov (United States)

    Hobona, G.; Bermudez, L. E.; Brackin, R.

    2013-12-01

    A gazetteer is a geographical directory containing some information regarding places. It provides names, location and other attributes for places which may include points of interest (e.g. buildings, oilfields and boreholes), and other features. These features can be published via web services conforming to the Gazetteer Application Profile of the Web Feature Service (WFS) standard of the Open Geospatial Consortium (OGC). Against the backdrop of advances in geophysical surveys, there has been a significant increase in the amount of data referenced to locations. Gazetteers services have played a significant role in facilitating access to such data, including through provision of specialized queries such as text, spatial and fuzzy search. Recent developments in the OGC have led to advances in gazetteers such as support for multilingualism, diacritics, and querying via advanced spatial constraints (e.g. search by radial search and nearest neighbor). A challenge remaining however, is that gazetteers produced by different organizations have typically been modeled differently. Inconsistencies from gazetteers produced by different organizations may include naming the same feature in a different way, naming the attributes differently, locating the feature in a different location, and providing fewer or more attributes than the other services. The Gazetteer application profile of the WFS is a starting point to address such inconsistencies by providing a standardized interface based on rules specified in ISO 19112, the international standard for spatial referencing by geographic identifiers. The profile, however, does not provide rules to deal with semantic inconsistencies. The USGS and NGA commissioned research into the potential for a Single Point of Entry Global Gazetteer (SPEGG). The research was conducted by the Cross Community Interoperability thread of the OGC testbed, referenced OWS-9. The testbed prototyped approaches for brokering gazetteers through use of semantic

  4. Bare coordination: the semantic shift

    OpenAIRE

    de Swart, Henriette; Le Bruyn, Bert

    2014-01-01

    This paper develops an analysis of the syntax-semantics interface of two types of split coordination structures. In the first type, two bare singular count nouns appear as arguments in a coordinated structure, as in bride and groom were happy. We call this the N&N construction. In the second type, the determiner shows agreement with the first conjunct, while the second conjunct is bare, as in the Spanish example el hornero y hornera cobraban en panes (‘thesg.m bakersg.m and bakersg.f werepl p...

  5. Communications in interference limited networks

    CERN Document Server

    2016-01-01

    This book offers means to handle interference as a central problem of operating wireless networks. It investigates centralized and decentralized methods to avoid and handle interference as well as approaches that resolve interference constructively. The latter type of approach tries to solve the joint detection and estimation problem of several data streams that share a common medium. In fact, an exciting insight into the operation of networks is that it may be beneficial, in terms of an overall throughput, to actively create and manage interference. Thus, when handled properly, "mixing" of data in networks becomes a useful tool of operation rather than the nuisance as which it has been treated traditionally. With the development of mobile, robust, ubiquitous, reliable and instantaneous communication being a driving and enabling factor of an information centric economy, the understanding, mitigation and exploitation of interference in networks must be seen as a centrally important task.

  6. Verbal and non-verbal semantic impairment: From fluent primary progressive aphasia to semantic dementia

    Directory of Open Access Journals (Sweden)

    Mirna Lie Hosogi Senaha

    Full Text Available Abstract Selective disturbances of semantic memory have attracted the interest of many investigators and the question of the existence of single or multiple semantic systems remains a very controversial theme in the literature. Objectives: To discuss the question of multiple semantic systems based on a longitudinal study of a patient who presented semantic dementia from fluent primary progressive aphasia. Methods: A 66 year-old woman with selective impairment of semantic memory was examined on two occasions, undergoing neuropsychological and language evaluations, the results of which were compared to those of three paired control individuals. Results: In the first evaluation, physical examination was normal and the score on the Mini-Mental State Examination was 26. Language evaluation revealed fluent speech, anomia, disturbance in word comprehension, preservation of the syntactic and phonological aspects of the language, besides surface dyslexia and dysgraphia. Autobiographical and episodic memories were relatively preserved. In semantic memory tests, the following dissociation was found: disturbance of verbal semantic memory with preservation of non-verbal semantic memory. Magnetic resonance of the brain revealed marked atrophy of the left anterior temporal lobe. After 14 months, the difficulties in verbal semantic memory had become more severe and the semantic disturbance, limited initially to the linguistic sphere, had worsened to involve non-verbal domains. Conclusions: Given the dissociation found in the first examination, we believe there is sufficient clinical evidence to refute the existence of a unitary semantic system.

  7. Designing equivalent semantic models for process creation

    NARCIS (Netherlands)

    P.H.M. America (Pierre); J.W. de Bakker (Jaco)

    1986-01-01

    textabstractOperational and denotational semantic models are designed for languages with process creation, and the relationships between the two semantics are investigated. The presentation is organized in four sections dealing with a uniform and static, a uniform and dynamic, a nonuniform and

  8. The Semantic Web and Educational Technology

    Science.gov (United States)

    Maddux, Cleborne D., Ed.

    2008-01-01

    The "Semantic Web" is an idea proposed by Tim Berners-Lee, the inventor of the "World Wide Web." The topic has been generating a great deal of interest and enthusiasm, and there is a rapidly growing body of literature dealing with it. This article attempts to explain how the Semantic Web would work, and explores short-term and long-term…

  9. The Semantic Web in Teacher Education

    Science.gov (United States)

    Czerkawski, Betül Özkan

    2014-01-01

    The Semantic Web enables increased collaboration among computers and people by organizing unstructured data on the World Wide Web. Rather than a separate body, the Semantic Web is a functional extension of the current Web made possible by defining relationships among websites and other online content. When explicitly defined, these relationships…

  10. Social Networking on the Semantic Web

    Science.gov (United States)

    Finin, Tim; Ding, Li; Zhou, Lina; Joshi, Anupam

    2005-01-01

    Purpose: Aims to investigate the way that the semantic web is being used to represent and process social network information. Design/methodology/approach: The Swoogle semantic web search engine was used to construct several large data sets of Resource Description Framework (RDF) documents with social network information that were encoded using the…

  11. Semantic Convergence in the Bilingual Lexicon

    Science.gov (United States)

    Ameel, Eef; Malt, Barbara C.; Storms, Gert; Van Assche, Fons

    2009-01-01

    Bilinguals' lexical mappings for their two languages have been found to converge toward a common naming pattern. The present paper investigates in more detail how semantic convergence is manifested in bilingual lexical knowledge. We examined how semantic convergence affects the centers and boundaries of lexical categories for common household…

  12. Recall from Semantic and Episodic Memory.

    Science.gov (United States)

    Gillund, Gary; Perlmutter, Marion

    Although research in episodic recall memory, comparing younger and older adults, favors the younger adults, findings in semantic memory research are less consistent. To examine age differences in semantic and episodic memory recall, 72 young adults (mean age, 20.8) and 72 older adults (mean age 71) completed three memory tests under varied…

  13. Episodic Memory, Semantic Memory, and Fluency.

    Science.gov (United States)

    Schaefer, Carl F.

    1980-01-01

    Suggests that creating a second-language semantic network can be conceived as developing a plan for retrieving second-language word forms. Characteristics of linguistic performance which will promote fluency are discussed in light of the distinction between episodic and semantic memory. (AMH)

  14. Semantics and expressiveness of ordered SOS

    NARCIS (Netherlands)

    Mousavi, M.R.; Phillips, I.C.C.; Reniers, M.A.; Ulidowski, I.

    2009-01-01

    Structured Operational Semantics (SOS) is a popular method for defining semantics by means of transition rules. An important feature of SOS rules is negative premises, which are crucial in the definitions of such phenomena as priority mechanisms and time-outs. However, the inclusion of negative

  15. UML Semantics FAQ: Dynamic Behaviour and Concurrency

    NARCIS (Netherlands)

    Wieringa, Roelf J.; Demeyer, Serge; Astesiano, Egidio; Reggio, Gianna; Le Guennec, Alain; Hussman, Heinrich; van den Berg, Klaas; van den Broek, P.M.

    This paper reports the results of a workshop held at ECOOP'99. The workshop was set up to find answers to questions fundamental to the definition of a semantics for the Unified Modelling Language. Questions examined the meaning of the term semantics in the context of UML; approaches to defining the

  16. Towards Semantic Interpretation of Movement Behavior

    NARCIS (Netherlands)

    Baglioni, M.; Macedo, J.; Renso, C.; Trasarti, R.; Wachowicz, M.

    2009-01-01

    In this paper we aim at providing a model for the conceptual representation and deductive reasoning of trajectory patterns obtained from mining raw trajectories. This has been achieved by means of a semantic enrichment process, where raw trajectories are enhanced with semantic information and

  17. Recommendations based on semantically enriched museum collections

    NARCIS (Netherlands)

    Wang, Y.; Stash, N.; Aroyo, L.M.; Gorgels, P.; Rutledge, L.W.; Schreiber, G.

    2008-01-01

    This article presents the CHIP demonstrator1 for providing personalized access to digital museum collections. It consists of three main components: Art Recommender, Tour Wizard, and Mobile Tour Guide. Based on the semantically enriched Rijksmuseum Amsterdam2 collection, we show how Semantic Web

  18. Elaborative Retrieval: Do Semantic Mediators Improve Memory?

    Science.gov (United States)

    Lehman, Melissa; Karpicke, Jeffrey D.

    2016-01-01

    The elaborative retrieval account of retrieval-based learning proposes that retrieval enhances retention because the retrieval process produces the generation of semantic mediators that link cues to target information. We tested 2 assumptions that form the basis of this account: that semantic mediators are more likely to be generated during…

  19. Learning the Semantics of Structured Data Sources

    Science.gov (United States)

    Taheriyan, Mohsen

    2015-01-01

    Information sources such as relational databases, spreadsheets, XML, JSON, and Web APIs contain a tremendous amount of structured data, however, they rarely provide a semantic model to describe their contents. Semantic models of data sources capture the intended meaning of data sources by mapping them to the concepts and relationships defined by a…

  20. Orthographic and Semantic Processing in Young Readers

    Science.gov (United States)

    Polse, Lara R.; Reilly, Judy S.

    2015-01-01

    This investigation examined orthographic and semantic processing during reading acquisition. Children in first to fourth grade were presented with a target word and two response alternatives, and were asked to identify the semantic match. Words were presented in four conditions: an exact match and unrelated foil (STONE-STONE-EARS), an exact match…

  1. Social Semantics for an Effective Enterprise

    Science.gov (United States)

    Berndt, Sarah; Doane, Mike

    2012-01-01

    An evolution of the Semantic Web, the Social Semantic Web (s2w), facilitates knowledge sharing with "useful information based on human contributions, which gets better as more people participate." The s2w reaches beyond the search box to move us from a collection of hyperlinked facts, to meaningful, real time context. When focused through the lens of Enterprise Search, the Social Semantic Web facilitates the fluid transition of meaningful business information from the source to the user. It is the confluence of human thought and computer processing structured with the iterative application of taxonomies, folksonomies, ontologies, and metadata schemas. The importance and nuances of human interaction are often deemphasized when focusing on automatic generation of semantic markup, which results in dissatisfied users and unrealized return on investment. Users consistently qualify the value of information sets through the act of selection, making them the de facto stakeholders of the Social Semantic Web. Employers are the ultimate beneficiaries of s2w utilization with a better informed, more decisive workforce; one not achieved with an IT miracle technology, but by improved human-computer interactions. Johnson Space Center Taxonomist Sarah Berndt and Mike Doane, principal owner of Term Management, LLC discuss the planning, development, and maintenance stages for components of a semantic system while emphasizing the necessity of a Social Semantic Web for the Enterprise. Identification of risks and variables associated with layering the successful implementation of a semantic system are also modeled.

  2. Semantique et psychologie (Semantics and Psychology)

    Science.gov (United States)

    Le Ny, Jean-Francois

    1975-01-01

    Semantic activities constitute a sub-class of psychological activities; from this point of departure the article discusses such topics as: idiosyncrasies, meaning and causality, internal determinants, neo-associationism, componential theories, noun- and verb-formation, sentences and propositions, semantics and cognition, mnemesic compontents, and…

  3. Semantics by analogy for illustrative volume visualization

    NARCIS (Netherlands)

    Gerl, Moritz; Rautek, Peter; Isenberg, Tobias; Groeller, Eduard

    We present an interactive graphical approach for the explicit specification of semantics for volume visualization. This explicit and graphical specification of semantics for volumetric features allows us to visually assign meaning to both input and output parameters of the visualization mapping.

  4. Quality model for semantic IS standards

    NARCIS (Netherlands)

    Folmer, Erwin Johan Albert

    2011-01-01

    Semantic IS (Information Systems) standards are essential for achieving interoperability between organizations. However a recent survey suggests that not the full benefits of standards are achieved, due to the quality issues. This paper presents a quality model for semantic IS standards, that should

  5. Semantic Tagging with Deep Residual Networks

    NARCIS (Netherlands)

    Bjerva, Johannes; Plank, Barbara; Bos, Johan

    2016-01-01

    We propose a novel semantic tagging task, semtagging, tailored for the purpose of multilingual semantic parsing, and present the first tagger using deep residual networks (ResNets). Our tagger uses both word and character representations and includes a novel residual bypass architecture. We evaluate

  6. Ontological semantics in modified categorial grammar

    DEFF Research Database (Denmark)

    Szymczak, Bartlomiej Antoni

    2009-01-01

    Categorial Grammar is a well established tool for describing natural language semantics. In the current paper we discuss some of its drawbacks and how it could be extended to overcome them. We use the extended version for deriving ontological semantics from text. A proof-of-concept implementation...

  7. Evolution and Reactivity in the Semantic Web

    Science.gov (United States)

    Alferes, José Júlio; Eckert, Michael; May, Wolfgang

    Evolution and reactivity in the Semantic Web address the vision and concrete need for an active Web, where data sources evolve autonomously and perceive and react to events. In 2004, when the Rewerse project started, regarding work on Evolution and Reactivity in the Semantic Web there wasn’t much more than a vision of such an active Web.

  8. Semantic annotation in biomedicine: the current landscape.

    Science.gov (United States)

    Jovanović, Jelena; Bagheri, Ebrahim

    2017-09-22

    The abundance and unstructured nature of biomedical texts, be it clinical or research content, impose significant challenges for the effective and efficient use of information and knowledge stored in such texts. Annotation of biomedical documents with machine intelligible semantics facilitates advanced, semantics-based text management, curation, indexing, and search. This paper focuses on annotation of biomedical entity mentions with concepts from relevant biomedical knowledge bases such as UMLS. As a result, the meaning of those mentions is unambiguously and explicitly defined, and thus made readily available for automated processing. This process is widely known as semantic annotation, and the tools that perform it are known as semantic annotators.Over the last dozen years, the biomedical research community has invested significant efforts in the development of biomedical semantic annotation technology. Aiming to establish grounds for further developments in this area, we review a selected set of state of the art biomedical semantic annotators, focusing particularly on general purpose annotators, that is, semantic annotation tools that can be customized to work with texts from any area of biomedicine. We also examine potential directions for further improvements of today's annotators which could make them even more capable of meeting the needs of real-world applications. To motivate and encourage further developments in this area, along the suggested and/or related directions, we review existing and potential practical applications and benefits of semantic annotators.

  9. A Semantics for Modular General Logic Programs

    NARCIS (Netherlands)

    Etalle, Sandro

    1998-01-01

    Modular programs are built as a combination of separate modules, which may be developed and verified separately. Therefore, in order to reason over such programs, compositionality plays a crucial role: the semantics of the whole program must be obtainable as a simple function from the semantics of

  10. A semantics for modular general logic programs

    NARCIS (Netherlands)

    Etalle, S.

    1998-01-01

    Modular programs are built as a combination of separate modules, which may be developed and verified separately. Therefore, in order to reason over such programs, compositionality plays a crucial role: the semantics of the whole program must be obtainable as a simple function from the semantics of

  11. Semantics vs Pragmatics of a Compound Word

    Science.gov (United States)

    Smirnova, Elena A.; Biktemirova, Ella I.; Davletbaeva, Diana N.

    2016-01-01

    This paper is devoted to the study of correlation between semantic and pragmatic potential of a compound word, which functions in informal speech, and the mechanisms of secondary nomination, which realizes the potential of semantic-pragmatic features of colloquial compounds. The relevance and the choice of the research question is based on the…

  12. Adding Recursive Constructs to Bialgebraic Semantics

    DEFF Research Database (Denmark)

    Klin, Bartek

    2004-01-01

    This paper aims at fitting a general class of recursive equations into the framework of ‘well-behaved' structural operational semantics, formalized as bialgebraic semantics by Turi and Plotkin. Rather than interpreting recursive constructs by means of operational rules, separate recursive equatio...

  13. Language-motor interference reflected in MEG beta oscillations.

    Science.gov (United States)

    Klepp, Anne; Niccolai, Valentina; Buccino, Giovanni; Schnitzler, Alfons; Biermann-Ruben, Katja

    2015-04-01

    The involvement of the brain's motor system in action-related language processing can lead to overt interference with simultaneous action execution. The aim of the current study was to find evidence for this behavioural interference effect and to investigate its neurophysiological correlates using oscillatory MEG analysis. Subjects performed a semantic decision task on single action verbs, describing actions executed with the hands or the feet, and abstract verbs. Right hand button press responses were given for concrete verbs only. Therefore, longer response latencies for hand compared to foot verbs should reflect interference. We found interference effects to depend on verb imageability: overall response latencies for hand verbs did not differ significantly from foot verbs. However, imageability interacted with effector: while response latencies to hand and foot verbs with low imageability were equally fast, those for highly imageable hand verbs were longer than for highly imageable foot verbs. The difference is reflected in motor-related MEG beta band power suppression, which was weaker for highly imageable hand verbs compared with highly imageable foot verbs. This provides a putative neuronal mechanism for language-motor interference where the involvement of cortical hand motor areas in hand verb processing interacts with the typical beta suppression seen before movements. We found that the facilitatory effect of higher imageability on action verb processing time is perturbed when verb and motor response relate to the same body part. Importantly, this effect is accompanied by neurophysiological effects in beta band oscillations. The attenuated power suppression around the time of movement, reflecting decreased cortical excitability, seems to result from motor simulation during action-related language processing. This is in line with embodied cognition theories. Copyright © 2015. Published by Elsevier Inc.

  14. Relationship Structures and Semantic Type Assignments of the UMLS Enriched Semantic Network

    Science.gov (United States)

    Zhang, Li; Halper, Michael; Perl, Yehoshua; Geller, James; Cimino, James J.

    2005-01-01

    Objective: The Enriched Semantic Network (ESN) was introduced as an extension of the Unified Medical Language System (UMLS) Semantic Network (SN). Its multiple subsumption configuration and concomitant multiple inheritance make the ESN's relationship structures and semantic type assignments different from those of the SN. A technique for deriving the relationship structures of the ESN's semantic types and an automated technique for deriving the ESN's semantic type assignments from those of the SN are presented. Design: The technique to derive the ESN's relationship structures finds all newly inherited relationships in the ESN. All such relationships are audited for semantic validity, and the blocking mechanism is used to block invalid relationships. The mapping technique to derive the ESN's semantic type assignments uses current SN semantic type assignments and preserves nonredundant categorizations, while preventing new redundant categorizations. Results: Among the 426 newly inherited relationships, 326 are deemed valid. Seven blockings are applied to avoid inheritance of the 100 invalid relationships. Sixteen semantic types have different relationship structures in the ESN as compared to those in the SN. The mapping of semantic type assignments from the SN to the ESN avoids the generation of 26,950 redundant categorizations. The resulting ESN contains 138 semantic types, 149 IS-A links, 7,303 relationships, and 1,013,876 semantic type assignments. Conclusion: The ESN's multiple inheritance provides more complete relationship structures than in the SN. The ESN's semantic type assignments avoid the existing redundant categorizations appearing in the SN and prevent new ones that might arise due to multiple parents. Compared to the SN, the ESN provides a more accurate unifying semantic abstraction of the UMLS Metathesaurus. PMID:16049233

  15. Topics in Semantics-based Program Manipulation

    DEFF Research Database (Denmark)

    Grobauer, Bernt

    four articles in the field of semantics-based techniques for program manipulation: three articles are about partial evaluation, a method for program specialization; the fourth article treats an approach to automatic cost analysis. Partial evaluation optimizes programs by specializing them with respect...... article in this dissertation describes how the second Futamura projection can be achieved for type-directed partial evaluation (TDPE), a relatively recent approach to partial evaluation: We derive an ML implementation of the second Futamura projection for TDPE. Due to the differences between ‘traditional...... denotational semantics—allows us to relate various possible semantics to each other both conceptually and formally. We thus are able to explain goal-directed evaluation using an intuitive list-based semantics, while using a continuation semantics for semantics-based compilation through partial evaluation...

  16. Semantic Context Detection Using Audio Event Fusion

    Directory of Open Access Journals (Sweden)

    Cheng Wen-Huang

    2006-01-01

    Full Text Available Semantic-level content analysis is a crucial issue in achieving efficient content retrieval and management. We propose a hierarchical approach that models audio events over a time series in order to accomplish semantic context detection. Two levels of modeling, audio event and semantic context modeling, are devised to bridge the gap between physical audio features and semantic concepts. In this work, hidden Markov models (HMMs are used to model four representative audio events, that is, gunshot, explosion, engine, and car braking, in action movies. At the semantic context level, generative (ergodic hidden Markov model and discriminative (support vector machine (SVM approaches are investigated to fuse the characteristics and correlations among audio events, which provide cues for detecting gunplay and car-chasing scenes. The experimental results demonstrate the effectiveness of the proposed approaches and provide a preliminary framework for information mining by using audio characteristics.

  17. Scandinavian Semantics and the Human Body

    DEFF Research Database (Denmark)

    Levisen, Carsten

    2015-01-01

    , it is demonstrated that Scandinavian and English systems differ significantly in some aspects of the way in which the construe the human body with words. The study ventures an innovative combination of methods, pairing the Natural Semantic Metalanguage (NSM) approach to linguistic and conceptual analysis......This paper presents an ethnolinguistic analysis of how the space between the head and the body is construed in Scandinavian semantic systems vis-a-vis the semantic system of English. With an extensive case study of neck-related meanings in Danish, and with cross-Scandinavian reference...... with empirical evidence from the Evolution of Semantic Systems (EoSS) project. This combination of empirical and interpretative tools helps to integrate evidence from semantics and semiotics, pinning out in great detail the intricacies of the meanings of particular body words. The paper concludes that body words...

  18. Semantic congruence enhances memory of episodic associations: role of theta oscillations.

    Science.gov (United States)

    Atienza, Mercedes; Crespo-Garcia, Maite; Cantero, Jose L

    2011-01-01

    Growing evidence suggests that theta oscillations play a crucial role in episodic encoding. The present study evaluates whether changes in electroencephalographic theta source dynamics mediate the positive influence of semantic congruence on incidental associative learning. Here we show that memory for episodic associations (face-location) is more accurate when studied under semantically congruent contexts. However, only participants showing RT priming effect in a conceptual priming test (priming group) also gave faster responses when recollecting source information of semantically congruent faces as compared with semantically incongruent faces. This improved episodic retrieval was positively correlated with increases in theta power during the study phase mainly in the bilateral parahippocampal gyrus, left superior temporal gyrus, and left lateral posterior parietal lobe. Reconstructed signals from the estimated sources showed higher theta power for congruent than incongruent faces and also for the priming than the nonpriming group. These results are in agreement with the attention to memory model. Besides directing top-down attention to goal-relevant semantic information during encoding, the dorsal parietal lobe may also be involved in redirecting attention to bottom-up-driven memories thanks to connections between the medial-temporal and the left ventral parietal lobe. The latter function can either facilitate or interfere with encoding of face-location associations depending on whether they are preceded by semantically congruent or incongruent contexts, respectively, because only in the former condition retrieved representations related to the cue and the face are both coherent with the person identity and are both associated with the same location.

  19. Determining Semantically Related Significant Genes.

    Science.gov (United States)

    Taha, Kamal

    2014-01-01

    GO relation embodies some aspects of existence dependency. If GO term xis existence-dependent on GO term y, the presence of y implies the presence of x. Therefore, the genes annotated with the function of the GO term y are usually functionally and semantically related to the genes annotated with the function of the GO term x. A large number of gene set enrichment analysis methods have been developed in recent years for analyzing gene sets enrichment. However, most of these methods overlook the structural dependencies between GO terms in GO graph by not considering the concept of existence dependency. We propose in this paper a biological search engine called RSGSearch that identifies enriched sets of genes annotated with different functions using the concept of existence dependency. We observe that GO term xcannot be existence-dependent on GO term y, if x- and y- have the same specificity (biological characteristics). After encoding into a numeric format the contributions of GO terms annotating target genes to the semantics of their lowest common ancestors (LCAs), RSGSearch uses microarray experiment to identify the most significant LCA that annotates the result genes. We evaluated RSGSearch experimentally and compared it with five gene set enrichment systems. Results showed marked improvement.

  20. Intelligent routing protocol for ad hoc wireless network

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  1. Radio Frequency Interference Mitigation

    Science.gov (United States)

    An, T.; Chen, X.; Mohan, P.; Lao, B. Q.

    2017-09-01

    The observational facilities of radio astronomy keep constant upgrades and developments to achieve better capabilities including increasing the time of the data recording and frequency resolutions, and increasing the receiving and recording bandwidth. However in contrast, only a limited spectrum resource has been allocated to radio astronomy by the International Telecommunication Union, resulting in that the radio observational instrumentations are inevitably exposed to undesirable radio frequency interference (RFI) signals which originate mainly from the terrestrial human activity and are becoming stronger with time. RFIs degrade the quality of data and even lead to invalid data. The impact of RFIs on scientific outcome becomes more and more serious. In this article, the requirement for RFI mitigation is motivated, and the RFI characteristics, mitigation techniques, and strategies are reviewed. The mitigation strategies adopted at some representative observatories, telescopes, and arrays are also introduced. The advantages and shortcomings of the four classes of RFI mitigation strategies are discussed and presented, applicable at the connected causal stages: preventive, pre-detection, pre-correlation, and post-correlation. The proper identification and flagging of RFI is the key to the reduction of data loss and improvement in data quality, and is also the ultimate goal of developing RFI mitigation technique. This can be achieved through a strategy involving a combination of the discussed techniques in stages. The recent advances in the high speed digital signal processing and high performance computing allow for performing RFI excision of the large data volumes generated from large telescopes or arrays in both real time and offline modes, aiding the proposed strategy.

  2. Extending Service Area of IEEE 802.11 Ad Hoc Networks

    Science.gov (United States)

    Choi, Woo-Yong

    2012-06-01

    According to the current IEEE 802.11 wireless LAN standards, IEEE 802.11 ad hoc networks have the limitation that all STAs (Stations) are in the one-hop transmission range of each other. In this paper, to alleviate the limitation of IEEE 802.11 ad hoc networks we propose the efficient method for selecting the most appropriate pseudo AP (Access Point) from among the set of ad hoc STAs and extending the service area of IEEE 802.11 ad hoc networks by the pseudo AP's relaying the internal traffic of IEEE 802.11 ad hoc networks. Numerical examples show that the proposed method significantly extends the service area of IEEE 802.11 ad hoc networks.

  3. The Separability of Morphological Processes from Semantic Meaning and Syntactic Class in Production of Single Words: Evidence from the Hebrew Root Morpheme

    Science.gov (United States)

    Deutsch, Avital

    2016-01-01

    In the present study we investigated to what extent the morphological facilitation effect induced by the derivational root morpheme in Hebrew is independent of semantic meaning and grammatical information of the part of speech involved. Using the picture-word interference paradigm with auditorily presented distractors, Experiment 1 compared the…

  4. The Influence of Semantic and Morphological Complexity of Verbs on Sentence Recall: Implications for the Nature of Conceptual Representation and Category-Specific Deficits

    Science.gov (United States)

    Mobayyen, F.; de Almeida, R.G.

    2005-01-01

    One hundred and forty normal undergraduate students participated in a Proactive Interference (PI) experiment with sentences containing verbs from four different semantic and morphological classes (lexical causatives, morphological causatives, and morphologically complex and simplex perception verbs). Past research has shown significant PI build-up…

  5. A dual contribution to the involuntary semantic processing of unexpected spoken words.

    Science.gov (United States)

    Parmentier, Fabrice B R; Turner, Jacqueline; Perez, Laura

    2014-02-01

    Sounds are a major cause of distraction. Unexpected to-be-ignored auditory stimuli presented in the context of an otherwise repetitive acoustic background ineluctably break through selective attention and distract people from an unrelated visual task (deviance distraction). This involuntary capture of attention by deviant sounds has been hypothesized to trigger their semantic appraisal and, in some circumstances, interfere with ongoing performance, but it remains unclear how such processing compares with the automatic processing of distractors in classic interference tasks (e.g., Stroop, flanker, Simon tasks). Using a cross-modal oddball task, we assessed the involuntary semantic processing of deviant sounds in the presence and absence of deviance distraction. The results revealed that some involuntary semantic analysis of spoken distractors occurs in the absence of deviance distraction but that this processing is significantly greater in its presence. We conclude that the automatic processing of spoken distractors reflects 2 contributions, one that is contingent upon deviance distraction and one that is independent from it.

  6. Les Protocoles de routage dans les réseaux mobiles Ad Hoc ...

    African Journals Online (AJOL)

    Dans cet article nous présentons un état de l'art sur les protocoles de routage dans les réseaux mobiles Ad hoc. Mots clés : Réseaux mobiles ad hoc/, Protocoles de routage. Routing protocols in wireless mobile ad hoc networks. Abstract:The communication between users with handheld computers interconnected through ...

  7. Topology for efficient information dissemination in ad-hoc networking

    Science.gov (United States)

    Jennings, E.; Okino, C. M.

    2002-01-01

    In this paper, we explore the information dissemination problem in ad-hoc wirless networks. First, we analyze the probability of successful broadcast, assuming: the nodes are uniformly distributed, the available area has a lower bould relative to the total number of nodes, and there is zero knowledge of the overall topology of the network. By showing that the probability of such events is small, we are motivated to extract good graph topologies to minimize the overall transmissions. Three algorithms are used to generate topologies of the network with guaranteed connectivity. These are the minimum radius graph, the relative neighborhood graph and the minimum spanning tree. Our simulation shows that the relative neighborhood graph has certain good graph properties, which makes it suitable for efficient information dissemination.

  8. Undilatable Stent Neoatherosclerosis Treated with Ad Hoc Rotational Atherectomy

    Directory of Open Access Journals (Sweden)

    Michael Koutouzis

    2017-01-01

    Full Text Available A middle age woman with known ischemic heart disease and old stents in proximal left anterior descending coronary artery (LAD was admitted to Coronary Care Unit with acute coronary syndrome. The coronary angiography showed one vessel disease with significant restenosis within the previously implanted stents. The lesion was tough and remained undilatable despite high pressure balloon inflation. Eventually, the balloon ruptured creating a massive dissection of the LAD beginning immediately after the distal part of the undilatable lesion. We proceeded with a challenging ad hoc rotational atherectomy of the lesion and finally stenting of the lesion. In-stent restenosis many years after stent implantation is considered to be mainly due to neoatheromatosis compared to intimal hyperplasia, making lesion treatment more difficult and unpredictable.

  9. Optimum Combining for Rapidly Fading Channels in Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Sonia Furman

    2003-10-01

    Full Text Available Research and technology in wireless communication systems such as radar and cellular networks have successfully implemented alternative design approaches that utilize antenna array techniques such as optimum combining, to mitigate the degradation effects of multipath in rapid fading channels. In ad hoc networks, these methods have not yet been exploited primarily due to the complexity inherent in the network's architecture. With the high demand for improved signal link quality, devices configured with omnidirectional antennas can no longer meet the growing need for link quality and spectrum efficiency. This study takes an empirical approach to determine an optimum combining antenna array based on 3 variants of interelement spacing. For rapid fading channels, the simulation results show that the performance in the network of devices retrofitted with our antenna arrays consistently exceeded those with an omnidirectional antenna. Further, with the optimum combiner, the performance increased by over 60% compared to that of an omnidirectional antenna in a rapid fading channel.

  10. Vehicular ad hoc networks standards, solutions, and research

    CERN Document Server

    Molinaro, Antonella; Scopigno, Riccardo

    2015-01-01

    This book presents vehicular ad-hoc networks (VANETs) from the their onset, gradually going into technical details, providing a clear understanding of both theoretical foundations and more practical investigation. The editors gathered top-ranking authors to provide comprehensiveness and timely content; the invited authors were carefully selected from a list of who’s who in the respective field of interest: there are as many from Academia as from Standardization and Industry sectors from around the world. The covered topics are organized around five Parts starting from an historical overview of vehicular communications and standardization/harmonization activities (Part I), then progressing to the theoretical foundations of VANETs and a description of the day-one standard-compliant solutions (Part II), hence going into details of vehicular networking and security (Part III) and to the tools to study VANETs, from mobility and channel models, to network simulators and field trial methodologies (Part IV), and fi...

  11. Making friends on the fly advances in ad hoc teamwork

    CERN Document Server

    Barrett, Samuel

    2015-01-01

    This book is devoted to the encounter and interaction of agents such as robots with other agents and describes how they cooperate with their previously unknown teammates, forming an Ad Hoc team. It presents a new algorithm, PLASTIC, that allows agents to quickly adapt to new teammates by reusing knowledge learned from previous teammates.  PLASTIC is instantiated in both a model-based approach, PLASTIC-Model, and a policy-based approach, PLASTIC-Policy.  In addition to reusing knowledge learned from previous teammates, PLASTIC also allows users to provide expert-knowledge and can use transfer learning (such as the new TwoStageTransfer algorithm) to quickly create models of new teammates when it has some information about its new teammates. The effectiveness of the algorithm is demonstrated on three domains, ranging from multi-armed bandits to simulated robot soccer games.

  12. A Hybrid Energy Efficient Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Niranjan Kumar Ray

    2016-01-01

    Full Text Available We proposed an energy conservation technique called Location Based Topology Control with Sleep Scheduling for ad hoc networks. It uses the feature of both topology control approach and power management approach. Like the topology control approach, it attempts to reduce the transmission power of a node, which is determined from its neighborhood location information. A node goes to sleep state based on the traffic condition as that of power management approach. In the proposed scheme, a node goes to sleep state only when its absence does not create local partition in its neighborhood. We preformed extensive simulation to compare the proposed scheme with existing ones. Simulation results show that the energy consumption is lower with increase in the network lifetime and higher throughput in the proposed scheme.

  13. Adaptive Probabilistic Broadcasting over Dense Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Victor Gau

    2010-01-01

    Full Text Available We propose an idle probability-based broadcasting method, iPro, which employs an adaptive probabilistic mechanism to improve performance of data broadcasting over dense wireless ad hoc networks. In multisource one-hop broadcast scenarios, the modeling and simulation results of the proposed iPro are shown to significantly outperform the standard IEEE 802.11 under saturated condition. Moreover, the results also show that without estimating the number of competing nodes and changing the contention window size, the performance of the proposed iPro can still approach the theoretical bound. We further apply iPro to multihop broadcasting scenarios, and the experiment results show that within the same elapsed time after the broadcasting, the proposed iPro has significantly higher Packet-Delivery Ratios (PDR than traditional methods.

  14. Increased longevity of wireless Ad hoc network through fuzzy system

    Directory of Open Access Journals (Sweden)

    Fawzia Abdali Larki

    2014-06-01

    Full Text Available The Ad hoc network is one of the multistep-based self-organizing networks, which are dynamically changing and are taken more into account as the ways of connecting the terminals through the development of wireless communication terminals. We are faced with numerous challenges in designing a wireless network such as the dynamic topology, common and limited bandwidth, and the limited energy. The nodes are moving according to the continuous changes in the topology and the source-to-destination paths are completely broken. Therefore, the repeated route discovery enhances the delay and overload of routing. Thus, it is essential to consider the link stability while designing the path in order to choose the routing protocol. Providing the multiple paths may lead to the better performance than a path. The transmission energy control in the wireless Ad hoc networks is the option for the level of transmission energy in order to transmit each node packet in this system. Therefore, transmission energy control affects the wireless medium interface. Because of choosing the appropriate protocol, the routing operation can be improved and the energy consumption can be controlled properly as well as enhancing the durability and longevity of network. The main objective of this study is to enhance the network longevity. The proposed algorithm in this research considers the combination of 2 parameters including the rate of node energy and number of steps in Fuzzy System applied on AOMDV Protocol, which is a Multipath Routing Protocol. The results of simulation also indicate the improved performance of proposed algorithm (AOMDV-F compared to AODV and AOMDV Protocols in NS2 simulator.

  15. Getting connected: Both associative and semantic links structure semantic memory for newly learned persons.

    Science.gov (United States)

    Wiese, Holger; Schweinberger, Stefan R

    2015-01-01

    The present study examined whether semantic memory for newly learned people is structured by visual co-occurrence, shared semantics, or both. Participants were trained with pairs of simultaneously presented (i.e., co-occurring) preexperimentally unfamiliar faces, which either did or did not share additionally provided semantic information (occupation, place of living, etc.). Semantic information could also be shared between faces that did not co-occur. A subsequent priming experiment revealed faster responses for both co-occurrence/no shared semantics and no co-occurrence/shared semantics conditions, than for an unrelated condition. Strikingly, priming was strongest in the co-occurrence/shared semantics condition, suggesting additive effects of these factors. Additional analysis of event-related brain potentials yielded priming in the N400 component only for combined effects of visual co-occurrence and shared semantics, with more positive amplitudes in this than in the unrelated condition. Overall, these findings suggest that both semantic relatedness and visual co-occurrence are important when novel information is integrated into person-related semantic memory.

  16. Interference management using direct sequence spread spectrum ...

    African Journals Online (AJOL)

    Interference management using direct sequence spread spectrum (DSSS) technique ... Journal of Fundamental and Applied Sciences ... Keywords: DSSS, LTE network; Wi-Fi network; SINR; interference management and interference power.

  17. Examining lateralized semantic access using pictures.

    Science.gov (United States)

    Lovseth, Kyle; Atchley, Ruth Ann

    2010-03-01

    A divided visual field (DVF) experiment examined the semantic processing strategies employed by the cerebral hemispheres to determine if strategies observed with written word stimuli generalize to other media for communicating semantic information. We employed picture stimuli and vary the degree of semantic relatedness between the picture pairs. Participants made an on-line semantic relatedness judgment in response to sequentially presented pictures. We found that when pictures are presented to the right hemisphere responses are generally more accurate than the left hemisphere for semantic relatedness judgments for picture pairs. Furthermore, consistent with earlier DVF studies employing words, we conclude that the RH is better at accessing or maintaining access to information that has a weak or more remote semantic relationship. We also found evidence of faster access for pictures presented to the LH in the strongly-related condition. Overall, these results are consistent with earlier DVF word studies that argue that the cerebral hemispheres each play an important and separable role during semantic retrieval. Copyright 2009 Elsevier Inc. All rights reserved.

  18. Electrocortical N400 Effects of Semantic Satiation

    Directory of Open Access Journals (Sweden)

    Kim Ströberg

    2017-12-01

    Full Text Available Semantic satiation is characterised by the subjective and temporary loss of meaning after high repetition of a prime word. To study the nature of this effect, previous electroencephalography (EEG research recorded the N400, an ERP component that is sensitive to violations of semantic context. The N400 is characterised by a relative negativity to words that are unrelated vs. related to the semantic context. The semantic satiation hypothesis predicts that the N400 should decrease with high repetition. However, previous findings have been inconsistent. Because of these inconsistent findings and the shortcomings of previous research, we used a modified design that minimises confounding effects from non-semantic processes. We recorded 64-channel EEG and analysed the N400 in a semantic priming task in which the primes were repeated 3 or 30 times. Critically, we separated low and high repetition trials and excluded response trials. Further, we varied the physical features (letter case and format of consecutive primes to minimise confounding effects from perceptual habituation. For centrofrontal electrodes, the N400 was reduced after 30 repetitions (vs. 3 repetitions. Explorative source reconstructions suggested that activity decreased after 30 repetitions in bilateral inferior temporal gyrus, the right posterior section of the superior and middle temporal gyrus, right supramarginal gyrus, bilateral lateral occipital cortex, and bilateral lateral orbitofrontal cortex. These areas overlap broadly with those typically involved in the N400, namely middle temporal gyrus and inferior frontal gyrus. The results support the semantic rather than the perceptual nature of the satiation effect.

  19. Episodic memory, semantic memory, and amnesia.

    Science.gov (United States)

    Squire, L R; Zola, S M

    1998-01-01

    Episodic memory and semantic memory are two types of declarative memory. There have been two principal views about how this distinction might be reflected in the organization of memory functions in the brain. One view, that episodic memory and semantic memory are both dependent on the integrity of medial temporal lobe and midline diencephalic structures, predicts that amnesic patients with medial temporal lobe/diencephalic damage should be proportionately impaired in both episodic and semantic memory. An alternative view is that the capacity for semantic memory is spared, or partially spared, in amnesia relative to episodic memory ability. This article reviews two kinds of relevant data: 1) case studies where amnesia has occurred early in childhood, before much of an individual's semantic knowledge has been acquired, and 2) experimental studies with amnesic patients of fact and event learning, remembering and knowing, and remote memory. The data provide no compelling support for the view that episodic and semantic memory are affected differently in medial temporal lobe/diencephalic amnesia. However, episodic and semantic memory may be dissociable in those amnesic patients who additionally have severe frontal lobe damage.

  20. Optical interference with noncoherent states

    International Nuclear Information System (INIS)

    Sagi, Yoav; Firstenberg, Ofer; Fisher, Amnon; Ron, Amiram

    2003-01-01

    We examine a typical two-source optical interference apparatus consisting of two cavities, a beam splitter, and two detectors. We show that field-field interference occurs even when the cavities are not initially in coherent states but rather in other nonclassical states. However, we find that the visibility of the second-order interference, that is, the expectation values of the detectors' readings, changes from 100%, when the cavities are prepared in coherent states, to zero visibility when they are initially in single Fock states. We calculate the fourth-order interference, and for the latter case find that it corresponds to a case where the currents oscillate with 100% visibility, but with a random phase for every experiment. Finally, we suggest an experimental realization of the apparatus with nonclassical sources

  1. Quantum Erasure: Quantum Interference Revisited

    OpenAIRE

    Walborn, Stephen P.; Cunha, Marcelo O. Terra; Pádua, Sebastião; Monken, Carlos H.

    2005-01-01

    Recent experiments in quantum optics have shed light on the foundations of quantum physics. Quantum erasers - modified quantum interference experiments - show that quantum entanglement is responsible for the complementarity principle.

  2. Inter-deriving Semantic Artifacts for Object-Oriented Programming

    DEFF Research Database (Denmark)

    Danvy, Olivier; Johannsen, Jacob

    2010-01-01

    We present a new abstract machine for Abadi and Cardelli's untyped non-imperative calculus of objects.  This abstract machine mechanically corresponds to both the reduction semantics (i.e., small-step operational semantics) and the natural semantics (i.e., big-step operational semantics) specified...

  3. The Semantics of Plurals: A Defense of Singularism

    Science.gov (United States)

    Florio, Salvatore

    2010-01-01

    In this dissertation, I defend "semantic singularism", which is the view that syntactically plural terms, such as "they" or "Russell and Whitehead", are semantically singular. A semantically singular term is a term that denotes a single entity. Semantic singularism is to be distinguished from "syntactic singularism", according to which…

  4. The Influence of Semantic Neighbours on Visual Word Recognition

    Science.gov (United States)

    Yates, Mark

    2012-01-01

    Although it is assumed that semantics is a critical component of visual word recognition, there is still much that we do not understand. One recent way of studying semantic processing has been in terms of semantic neighbourhood (SN) density, and this research has shown that semantic neighbours facilitate lexical decisions. However, it is not clear…

  5. Semantic Priming for Coordinate Distant Concepts in Alzheimer's Disease Patients

    Science.gov (United States)

    Perri, R.; Zannino, G. D.; Caltagirone, C.; Carlesimo, G. A.

    2011-01-01

    Semantic priming paradigms have been used to investigate semantic knowledge in patients with Alzheimer's disease (AD). While priming effects produced by prime-target pairs with associative relatedness reflect processes at both lexical and semantic levels, priming effects produced by words that are semantically related but not associated should…

  6. Interference, reduced action, and trajectories

    OpenAIRE

    Floyd, Edward R.

    2006-01-01

    Instead of investigating the interference between two stationary, rectilinear wave functions in a trajectory representation by examining the two rectilinear wave functions individually, we examine a dichromatic wave function that is synthesized from the two interfering wave functions. The physics of interference is contained in the reduced action for the dichromatic wave function. As this reduced action is a generator of the motion for the dichromatic wave function, it determines the dichroma...

  7. Combinatorial algebra syntax and semantics

    CERN Document Server

    Sapir, Mark V

    2014-01-01

    Combinatorial Algebra: Syntax and Semantics provides a comprehensive account of many areas of combinatorial algebra. It contains self-contained proofs of  more than 20 fundamental results, both classical and modern. This includes Golod–Shafarevich and Olshanskii's solutions of Burnside problems, Shirshov's solution of Kurosh's problem for PI rings, Belov's solution of Specht's problem for varieties of rings, Grigorchuk's solution of Milnor's problem, Bass–Guivarc'h theorem about the growth of nilpotent groups, Kleiman's solution of Hanna Neumann's problem for varieties of groups, Adian's solution of von Neumann-Day's problem, Trahtman's solution of the road coloring problem of Adler, Goodwyn and Weiss. The book emphasize several ``universal" tools, such as trees, subshifts, uniformly recurrent words, diagrams and automata.   With over 350 exercises at various levels of difficulty and with hints for the more difficult problems, this book can be used as a textbook, and aims to reach a wide and diversified...

  8. The Semantic Analysis of Icon

    Directory of Open Access Journals (Sweden)

    m Piravivanak

    2012-03-01

    Full Text Available "Eikon" (Greek word or "Imago" (Latin word signifies a kind of similarity or "likeness". In Plato’s philosophy, this term implies "likeness" of appearance to pattern or symbol. In semantic analysis of icon, which is correlated with Idea, we can find factors such as "perception", "imagination", "likeness", "imitation" (Mimesis, "imaginary ideas", that is, it is not possible to reduce icon to a material picture because it is supported by cultural (symbolic, perceptual and conceptual sources. The process in which an icon is established indicates a special relation between icon and imaginary ideas that is supported by symbolic sources. Then, it is not possible to regard icon as a material picture because icon is an icon of a symbol which is able to play its role visibly in relation to a symbol.

  9. Initial Semantics for Strengthened Signatures

    Directory of Open Access Journals (Sweden)

    André Hirschowitz

    2012-02-01

    Full Text Available We give a new general definition of arity, yielding the companion notions of signature and associated syntax. This setting is modular in the sense requested by Ghani and Uustalu: merging two extensions of syntax corresponds to building an amalgamated sum. These signatures are too general in the sense that we are not able to prove the existence of an associated syntax in this general context. So we have to select arities and signatures for which there exists the desired initial monad. For this, we follow a track opened by Matthes and Uustalu: we introduce a notion of strengthened arity and prove that the corresponding signatures have initial semantics (i.e. associated syntax. Our strengthened arities admit colimits, which allows the treatment of the λ-calculus with explicit substitution.

  10. Semantics of color in chromatism

    Science.gov (United States)

    Serov, Nikolai V.

    2002-06-01

    The aim of this investigation is to describe the semantics of color in chromatism (from the ancient Greek triune notion of >: (1) color as ideal (Id- plan), psychic; (2) tint as physical, verbal; material (M- plan), physiological, syntonic (S-plan), and (3) emotion as their informative-energetic correlation). Being a new field of science, chromatism links humanitarian and natural subjects by means of interdiscipline investigation of a real (f-m) man living in a real (color) surrounding environment. According to the definition for >, color may be considered to be the most universal notion, permitting to assume the unity of both a man and an environment. Due to this assumption, we may give models of human intellect.

  11. Semantic-Web Technology: Applications at NASA

    Science.gov (United States)

    Ashish, Naveen

    2004-01-01

    We provide a description of work at the National Aeronautics and Space Administration (NASA) on building system based on semantic-web concepts and technologies. NASA has been one of the early adopters of semantic-web technologies for practical applications. Indeed there are several ongoing 0 endeavors on building semantics based systems for use in diverse NASA domains ranging from collaborative scientific activity to accident and mishap investigation to enterprise search to scientific information gathering and integration to aviation safety decision support We provide a brief overview of many applications and ongoing work with the goal of informing the external community of these NASA endeavors.

  12. A Developer's Guide to the Semantic Web

    CERN Document Server

    Yu, Liyang

    2011-01-01

    The Semantic Web represents a vision for how to make the huge amount of information on the Web automatically processable by machines on a large scale. For this purpose, a whole suite of standards, technologies and related tools have been specified and developed over the last couple of years, and they have now become the foundation for numerous new applications. A Developer's Guide to the Semantic Web helps the reader to learn the core standards, key components, and underlying concepts. It provides in-depth coverage of both the what-is and how-to aspects of the Semantic Web. From Yu's presentat

  13. Change management for semantic web services

    CERN Document Server

    Liu, Xumin; Bouguettaya, Athman

    2011-01-01

    Change Management for Semantic Web Services provides a thorough analysis of change management in the lifecycle of services for databases and workflows, including changes that occur at the individual service level or at the aggregate composed service level. This book describes taxonomy of changes that are expected in semantic service oriented environments. The process of change management consists of detecting, propagating, and reacting to changes. Change Management for Semantic Web Services is one of the first books that discuss the development of a theoretical foundation for managing changes

  14. A developer's guide to the semantic web

    CERN Document Server

    Yu, Liyang

    2014-01-01

    The Semantic Web represents a vision for how to make the huge amount of information on the Web automatically processable by machines on a large scale. For this purpose, a whole suite of standards, technologies and related tools have been specified and developed over the last couple of years and they have now become the foundation for numerous new applications. A Developer's Guide to the Semantic Web helps the reader to learn the core standards, key components and underlying concepts. It provides in-depth coverage of both the what-is and how-to aspects of the Semantic Web. From Yu's presentat

  15. Semantic matchmaking with nonmonotonic description logics

    CERN Document Server

    Grimm, S

    2009-01-01

    Semantic web has grown into a mature field of research. Its methods find innovative applications on and off the World Wide Web. Its underlying technologies have significant impact on adjacent fields of research and on industrial applications. This new book series reports on the state-of-the-art in foundations, methods, and applications of semantic web and its underlying technologies. It is a central forum for the communication of recent developments and comprises research monographs, textbooks and edited volumes on all topics related to the semantic web. In this first volume several non-monoto

  16. Reflect: a practical approach to web semantics

    DEFF Research Database (Denmark)

    O'Donoghue, S.I.; Horn, Heiko; Pafilisa, E.

    2010-01-01

    To date, adding semantic capabilities to web content usually requires considerable server-side re-engineering, thus only a tiny fraction of all web content currently has semantic annotations. Recently, we announced Reflect (http://reflect.ws), a free service that takes a more practical approach......: Reflect uses augmented browsing to allow end-users to add systematic semantic annotations to any web-page in real-time, typically within seconds. In this paper we describe the tagging process in detail and show how further entity types can be added to Reflect; we also describe how publishers and content...... web technologies....

  17. Cytoarchitecture of the human lateral occipital cortex: mapping of two extrastriate areas hOc4la and hOc4lp.

    Science.gov (United States)

    Malikovic, Aleksandar; Amunts, Katrin; Schleicher, Axel; Mohlberg, Hartmut; Kujovic, Milenko; Palomero-Gallagher, Nicola; Eickhoff, Simon B; Zilles, Karl

    2016-05-01

    The microstructural correlates of the functional segregation of the human lateral occipital cortex are largely unknown. Therefore, we analyzed the cytoarchitecture of this region in ten human post-mortem brains using an observer-independent and statistically testable parcellation method to define the position and extent of areas in the lateral occipital cortex. Two new cytoarchitectonic areas were found: an anterior area hOc4la and a posterior area hOc4lp. hOc4la was located behind the anterior occipital sulcus in rostral and ventral portions of this region where it occupies the anterior third of the middle and inferior lateral occipital gyri. hOc4lp was found in caudal and dorsal portions of this region where it extends along the superior and middle lateral occipital gyri. The cytoarchitectonic areas were registered to 3D reconstructions of the corresponding brains, which were subsequently spatially normalized to the Montreal Neurological Institute reference space. Continuous probabilistic maps of both areas based on the analysis of ten brains were generated to characterize their inter-subject variability in location and size. The maps of hOc4la and hOc4lp were then used as seeds for meta-analytic connectivity modeling and quantitative functional decoding to identify their co-activation patterns and assignment to functional domains. Convergent evidence from their location, topography, size, functional domains and connectivity indicates that hOc4la and hOc4lp are the potential anatomical correlates of the functionally defined lateral occipital areas LO-1 and LO-2.

  18. Word-embeddings Italian semantic spaces: A semantic model for psycholinguistic research

    Directory of Open Access Journals (Sweden)

    Marelli Marco

    2017-01-01

    Full Text Available Distributional semantics has been for long a source of successful models in psycholinguistics, permitting to obtain semantic estimates for a large number of words in an automatic and fast way. However, resources in this respect remain scarce or limitedly accessible for languages different from English. The present paper describes WEISS (Word-Embeddings Italian Semantic Space, a distributional semantic model based on Italian. WEISS includes models of semantic representations that are trained adopting state-of-the-art word-embeddings methods, applying neural networks to induce distributed representations for lexical meanings. The resource is evaluated against two test sets, demonstrating that WEISS obtains a better performance with respect to a baseline encoding word associations. Moreover, an extensive qualitative analysis of the WEISS output provides examples of the model potentialities in capturing several semantic phenomena. Two variants of WEISS are released and made easily accessible via web through the SNAUT graphic interface.

  19. SemanticOrganizer: A Customizable Semantic Repository for Distributed NASA Project Teams

    Science.gov (United States)

    Keller, Richard M.; Berrios, Daniel C.; Carvalho, Robert E.; Hall, David R.; Rich, Stephen J.; Sturken, Ian B.; Swanson, Keith J.; Wolfe, Shawn R.

    2004-01-01

    SemanticOrganizer is a collaborative knowledge management system designed to support distributed NASA projects, including diverse teams of scientists, engineers, and accident investigators. The system provides a customizable, semantically structured information repository that stores work products relevant to multiple projects of differing types. SemanticOrganizer is one of the earliest and largest semantic web applications deployed at NASA to date, and has been used in diverse contexts ranging from the investigation of Space Shuttle Columbia's accident to the search for life on other planets. Although the underlying repository employs a single unified ontology, access control and ontology customization mechanisms make the repository contents appear different for each project team. This paper describes SemanticOrganizer, its customization facilities, and a sampling of its applications. The paper also summarizes some key lessons learned from building and fielding a successful semantic web application across a wide-ranging set of domains with diverse users.

  20. Cross border semantic interoperability for clinical research: the EHR4CR semantic resources and services

    Science.gov (United States)

    Daniel, Christel; Ouagne, David; Sadou, Eric; Forsberg, Kerstin; Gilchrist, Mark Mc; Zapletal, Eric; Paris, Nicolas; Hussain, Sajjad; Jaulent, Marie-Christine; MD, Dipka Kalra

    2016-01-01

    With the development of platforms enabling the use of routinely collected clinical data in the context of international clinical research, scalable solutions for cross border semantic interoperability need to be developed. Within the context of the IMI EHR4CR project, we first defined the requirements and evaluation criteria of the EHR4CR semantic interoperability platform and then developed the semantic resources and supportive services and tooling to assist hospital sites in standardizing their data for allowing the execution of the project use cases. The experience gained from the evaluation of the EHR4CR platform accessing to semantically equivalent data elements across 11 European participating EHR systems from 5 countries demonstrated how far the mediation model and mapping efforts met the expected requirements of the project. Developers of semantic interoperability platforms are beginning to address a core set of requirements in order to reach the goal of developing cross border semantic integration of data. PMID:27570649

  1. Towards Compatible and Interderivable Semantic Specifications for the Scheme Programming Language, Part I: Denotational Semantics, Natural Semantics, and Abstract Machines

    DEFF Research Database (Denmark)

    Danvy, Olivier

    2008-01-01

    We derive two big-step abstract machines, a natural semantics, and the valuation function of a denotational semantics based on the small-step abstract machine for Core Scheme presented by Clinger at PLDI'98. Starting from a functional implementation of this small-step abstract machine, (1) we fuse...... its transition function with its driver loop, obtaining the functional implementation of a big-step abstract machine; (2) we adjust this big-step abstract machine so that it is in defunctionalized form, obtaining the functional implementation of a second big-step abstract machine; (3) we...... refunctionalize this adjusted abstract machine, obtaining the functional implementation of a natural semantics in continuation style; and (4) we closure-unconvert this natural semantics, obtaining a compositional continuation-passing evaluation function which we identify as the functional implementation...

  2. A Semantic Analysis Method for Scientific and Engineering Code

    Science.gov (United States)

    Stewart, Mark E. M.

    1998-01-01

    This paper develops a procedure to statically analyze aspects of the meaning or semantics of scientific and engineering code. The analysis involves adding semantic declarations to a user's code and parsing this semantic knowledge with the original code using multiple expert parsers. These semantic parsers are designed to recognize formulae in different disciplines including physical and mathematical formulae and geometrical position in a numerical scheme. In practice, a user would submit code with semantic declarations of primitive variables to the analysis procedure, and its semantic parsers would automatically recognize and document some static, semantic concepts and locate some program semantic errors. A prototype implementation of this analysis procedure is demonstrated. Further, the relationship between the fundamental algebraic manipulations of equations and the parsing of expressions is explained. This ability to locate some semantic errors and document semantic concepts in scientific and engineering code should reduce the time, risk, and effort of developing and using these codes.

  3. Putting semantics into the semantic web: how well can it capture biology?

    Science.gov (United States)

    Kazic, Toni

    2006-01-01

    Could the Semantic Web work for computations of biological interest in the way it's intended to work for movie reviews and commercial transactions? It would be wonderful if it could, so it's worth looking to see if its infrastructure is adequate to the job. The technologies of the Semantic Web make several crucial assumptions. I examine those assumptions; argue that they create significant problems; and suggest some alternative ways of achieving the Semantic Web's goals for biology.

  4. The contribution of executive control to semantic cognition: Convergent evidence from semantic aphasia and executive dysfunction.

    Science.gov (United States)

    Thompson, Hannah E; Almaghyuli, Azizah; Noonan, Krist A; Barak, Ohr; Lambon Ralph, Matthew A; Jefferies, Elizabeth

    2018-01-03

    Semantic cognition, as described by the controlled semantic cognition (CSC) framework (Rogers et al., , Neuropsychologia, 76, 220), involves two key components: activation of coherent, generalizable concepts within a heteromodal 'hub' in combination with modality-specific features (spokes), and a constraining mechanism that manipulates and gates this knowledge to generate time- and task-appropriate behaviour. Executive-semantic goal representations, largely supported by executive regions such as frontal and parietal cortex, are thought to allow the generation of non-dominant aspects of knowledge when these are appropriate for the task or context. Semantic aphasia (SA) patients have executive-semantic deficits, and these are correlated with general executive impairment. If the CSC proposal is correct, patients with executive impairment should not only exhibit impaired semantic cognition, but should also show characteristics that align with those observed in SA. This possibility remains largely untested, as patients selected on the basis that they show executive impairment (i.e., with 'dysexecutive syndrome') have not been extensively tested on tasks tapping semantic control and have not been previously compared with SA cases. We explored conceptual processing in 12 patients showing symptoms consistent with dysexecutive syndrome (DYS) and 24 SA patients, using a range of multimodal semantic assessments which manipulated control demands. Patients with executive impairments, despite not being selected to show semantic impairments, nevertheless showed parallel patterns to SA cases. They showed strong effects of distractor strength, cues and miscues, and probe-target distance, plus minimal effects of word frequency on comprehension (unlike semantic dementia patients with degradation of conceptual knowledge). This supports a component process account of semantic cognition in which retrieval is shaped by control processes, and confirms that deficits in SA patients reflect

  5. The contribution of executive control to semantic cognition: Convergent evidence from semantic aphasia and executive dysfunction

    OpenAIRE

    Thompson, Hannah E; Almaghyuli, Azizah; Noonan, Krist A.; Barak, Ohr; Lambon Ralph, Matthew; Jefferies, Elizabeth

    2018-01-01

    Semantic cognition, as described by the Controlled Semantic Cognition (CSC) framework (Rogers, Patterson, Jefferies, & Lambon Ralph, 2015), involves two key components: activation of coherent, generalizable concepts within a heteromodal ‘hub’ in combination with modality-specific features (spokes), and a constraining mechanism that manipulates and gates this knowledge to generate time- and task- appropriate behaviour. Executive-semantic goal representations, largely supported by executive...

  6. The contribution of executive control to semantic cognition: Convergent evidence from semantic aphasia and executive dysfunction

    OpenAIRE

    Thompson, Hannah; Almaghyuli, Azizah; Noonan, Krist A.; barak, Ohr; Lambon Ralph, Matthew A.; Jefferies, Elizabeth

    2018-01-01

    Semantic cognition, as described by the controlled semantic cognition (CSC) framework (Rogers et al., 2015, Neuropsychologia, 76, 220), involves two key components: activation of coherent, generalizable concepts within a heteromodal ‘hub’ in combination with modality-specific features (spokes), and a constraining mechanism that manipulates and gates this knowledge to generate time- and task-appropriate behaviour. Executive–semantic goal representations, largely supported by executive regions ...

  7. Using semantic analysis to improve speech recognition performance

    OpenAIRE

    Erdoğan, Hakan; Erdogan, Hakan; Sarıkaya, Ruhi; Sarikaya, Ruhi; Chen, Stanley F.; Gao, Yuqing; Picheny, Michael

    2005-01-01

    Although syntactic structure has been used in recent work in language modeling, there has not been much effort in using semantic analysis for language models. In this study, we propose three new language modeling techniques that use semantic analysis for spoken dialog systems. We call these methods concept sequence modeling, two-level semantic-lexical modeling, and joint semantic-lexical modeling. These models combine lexical information with varying amounts of semantic information, using ann...

  8. Information Interaction as a Mechanism of Semantic Gap Elimination

    Directory of Open Access Journals (Sweden)

    Victor Y. Tsvetkov

    2013-01-01

    Full Text Available The article studies semantic gap as an objective phenomenon, shows that semantic gap occurs both in parallel computing and in other areas. Semantic description of the content is revealed as a set of different descriptions. Causes of semantic gap are described. The content of information exchange is explained in the article. Information interaction in the semantic field is interpreted as a mechanism to lessen the gap

  9. A logical correspondence between natural semantics and abstract machines

    DEFF Research Database (Denmark)

    Simmons, Robert J.; Zerny, Ian

    2013-01-01

    We present a logical correspondence between natural semantics and abstract machines. This correspondence enables the mechanical and fully-correct construction of an abstract machine from a natural semantics. Our logical correspondence mirrors the Reynolds functional correspondence, but we...... manipulate semantic specifications encoded in a logical framework instead of manipulating functional programs. Natural semantics and abstract machines are instances of substructural operational semantics. As a byproduct, using a substructural logical framework, we bring concurrent and stateful models...

  10. The structure of semantic person memory: evidence from semantic priming in person recognition.

    Science.gov (United States)

    Wiese, Holger

    2011-11-01

    This paper reviews research on the structure of semantic person memory as examined with semantic priming. In this experimental paradigm, a familiarity decision on a target face or written name is usually faster when it is preceded by a related as compared to an unrelated prime. This effect has been shown to be relatively short lived and susceptible to interfering items. Moreover, semantic priming can cross stimulus domains, such that a written name can prime a target face and vice versa. However, it remains controversial whether representations of people are stored in associative networks based on co-occurrence, or in more abstract semantic categories. In line with prominent cognitive models of face recognition, which explain semantic priming by shared semantic information between prime and target, recent research demonstrated that priming could be obtained from purely categorically related, non-associated prime/target pairs. Although strategic processes, such as expectancy and retrospective matching likely contribute, there is also evidence for a non-strategic contribution to priming, presumably related to spreading activation. Finally, a semantic priming effect has been demonstrated in the N400 event-related potential (ERP) component, which may reflect facilitated access to semantic information. It is concluded that categorical relatedness is one organizing principle of semantic person memory. ©2011 The British Psychological Society.

  11. Building Realistic Mobility Models for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Adrian Pullin

    2018-04-01

    Full Text Available A mobile ad hoc network (MANET is a self-configuring wireless network in which each node could act as a router, as well as a data source or sink. Its application areas include battlefields and vehicular and disaster areas. Many techniques applied to infrastructure-based networks are less effective in MANETs, with routing being a particular challenge. This paper presents a rigorous study into simulation techniques for evaluating routing solutions for MANETs with the aim of producing more realistic simulation models and thereby, more accurate protocol evaluations. MANET simulations require models that reflect the world in which the MANET is to operate. Much of the published research uses movement models, such as the random waypoint (RWP model, with arbitrary world sizes and node counts. This paper presents a technique for developing more realistic simulation models to test and evaluate MANET protocols. The technique is animation, which is applied to a realistic scenario to produce a model that accurately reflects the size and shape of the world, node count, movement patterns, and time period over which the MANET may operate. The animation technique has been used to develop a battlefield model based on established military tactics. Trace data has been used to build a model of maritime movements in the Irish Sea. Similar world models have been built using the random waypoint movement model for comparison. All models have been built using the ns-2 simulator. These models have been used to compare the performance of three routing protocols: dynamic source routing (DSR, destination-sequenced distance-vector routing (DSDV, and ad hoc n-demand distance vector routing (AODV. The findings reveal that protocol performance is dependent on the model used. In particular, it is shown that RWP models do not reflect the performance of these protocols under realistic circumstances, and protocol selection is subject to the scenario to which it is applied. To

  12. Typicality Mediates Performance during Category Verification in Both Ad-Hoc and Well-Defined Categories

    Science.gov (United States)

    Sandberg, Chaleece; Sebastian, Rajani; Kiran, Swathi

    2012-01-01

    Background: The typicality effect is present in neurologically intact populations for natural, ad-hoc, and well-defined categories. Although sparse, there is evidence of typicality effects in persons with chronic stroke aphasia for natural and ad-hoc categories. However, it is unknown exactly what influences the typicality effect in this…

  13. Ad Hoc Categories and False Memories: Memory Illusions for Categories Created On-The-Spot

    Science.gov (United States)

    Soro, Jerônimo C.; Ferreira, Mário B.; Semin, Gün R.; Mata, André; Carneiro, Paula

    2017-01-01

    Three experiments were designed to test whether experimentally created ad hoc associative networks evoke false memories. We used the DRM (Deese, Roediger, McDermott) paradigm with lists of ad hoc categories composed of exemplars aggregated toward specific goals (e.g., going for a picnic) that do not share any consistent set of features. Experiment…

  14. A peer-to-peer file search and download protocol for wireless ad-hoc networks

    NARCIS (Netherlands)

    Sözer, Hasan; Tekkalmaz, M.; Korpeoglu, I.

    Deployment of traditional peer-to-peer file sharing systems on a wireless ad-hoc network introduces several challenges. Information and workload distribution as well as routing are major problems for members of a wireless ad-hoc network, which are only aware of their immediate neighborhood. In this

  15. A flow level model for wireless multihop ad hoc network throughput

    NARCIS (Netherlands)

    Coenen, Tom Johannes Maria; van den Berg, Hans Leo; Boucherie, Richardus J.

    2005-01-01

    A flow level model for multihop wireless ad hoc networks is presented in this paper. Using a flow level view, we show the main properties and modeling challenges for ad hoc networks. Considering different scenarios, a multihop WLAN and a serial network with a TCP-like flow control protocol, we

  16. On the impact of network dynamics on a discovery protocol for ad-hoc networks

    NARCIS (Netherlands)

    Liu, F.; Heijenk, Geert

    A very promising approach to discovering services and context information in ad-hoc networks is based on the use of Attenuated Bloom filters. In this paper we analyze the impact of changes in the connectivity of an ad-hoc network on this approach. We evaluate the performance of the discovery

  17. Twenty-One at TREC-7: ad-hoc and cross-language track

    NARCIS (Netherlands)

    Hiemstra, Djoerd; Kraaij, Wessel; Voorhees, E.M; Harman, D.K.

    1999-01-01

    This paper describes the official runs of the Twenty-One group for TREC-7. The Twenty-One group participated in the ad-hoc and the cross-language track and made the following accomplishments: We developed a new weighting algorithm, which outperforms the popular Cornell version of BM25 on the ad-hoc

  18. The semantic sphere of juvenile offenders

    Directory of Open Access Journals (Sweden)

    Oshevsky D.S.

    2017-01-01

    Full Text Available The article presents the results of a preliminary empirical study aimed to identify features of the semantic sphere of adolescents who have committed illegal, including aggressive acts. The study included 50 male juveniles aged of 16 - 17 years. The first group consisted of adolescents convicted of aggressive and violent crimes; the second – of property socially dangerous acts (SDA. It is shown that evaluation of such adolescents is generally categorical and polar, the semantic field is subdifferentiable, less hierarchic, and has not enough realistic structure of meanings. Developed structure of motives and meanings is the basis of voluntary regulation of socially significant behavior. Thus, assessing the semantic sphere of juvenile offenders we can highlight its characteristics as risk factors of unlawful behavior, as well as the resource side, that will contribute to addressing issues of prevention and correction of unlawful behavior. Key words: juvenile offenders, semantic field of juvenile offenders, unlawful behavior.

  19. Metamodeling of Semantic Web Enabled Multiagent Systems

    NARCIS (Netherlands)

    Kardas, G.; Göknil, Arda; Dikenelli, O.; Topaloglu, N.Y.; Weyns, D.; Holvoet, T.

    2006-01-01

    Several agent researchers are currently studying agent modeling and they propose dierent architectural metamodels for developing Multiagent Systems (MAS) according to specic agent development methodologies. When support for Semantic Web technology and its related constructs are considered, agent

  20. SPARK: Adapting Keyword Query to Semantic Search

    Science.gov (United States)

    Zhou, Qi; Wang, Chong; Xiong, Miao; Wang, Haofen; Yu, Yong

    Semantic search promises to provide more accurate result than present-day keyword search. However, progress with semantic search has been delayed due to the complexity of its query languages. In this paper, we explore a novel approach of adapting keywords to querying the semantic web: the approach automatically translates keyword queries into formal logic queries so that end users can use familiar keywords to perform semantic search. A prototype system named 'SPARK' has been implemented in light of this approach. Given a keyword query, SPARK outputs a ranked list of SPARQL queries as the translation result. The translation in SPARK consists of three major steps: term mapping, query graph construction and query ranking. Specifically, a probabilistic query ranking model is proposed to select the most likely SPARQL query. In the experiment, SPARK achieved an encouraging translation result.

  1. Priming in Episodic and Semantic Memory.

    Science.gov (United States)

    McKoon, Gail; Ratcliff, Roger

    1979-01-01

    Four experiments examined priming between newly learned paired associates through two procedures, lexical decision and item recognition. Results argue against a functional separation of the semantic and episodic memory systems. (Author/AM)

  2. Propagating semantic information in biochemical network models

    Directory of Open Access Journals (Sweden)

    Schulz Marvin

    2012-01-01

    Full Text Available Abstract Background To enable automatic searches, alignments, and model combination, the elements of systems biology models need to be compared and matched across models. Elements can be identified by machine-readable biological annotations, but assigning such annotations and matching non-annotated elements is tedious work and calls for automation. Results A new method called "semantic propagation" allows the comparison of model elements based not only on their own annotations, but also on annotations of surrounding elements in the network. One may either propagate feature vectors, describing the annotations of individual elements, or quantitative similarities between elements from different models. Based on semantic propagation, we align partially annotated models and find annotations for non-annotated model elements. Conclusions Semantic propagation and model alignment are included in the open-source library semanticSBML, available on sourceforge. Online services for model alignment and for annotation prediction can be used at http://www.semanticsbml.org.

  3. Preserved semantic priming effect in alexia.

    Science.gov (United States)

    Mimura, M; Goodglass, H; Milberg, W

    1996-09-01

    BH, a left-handed patient with alexia and nonfluent aphasia, was presented with a lexical-decision task in which words and pronounceable pseudowords were preceded by semantically related or unrelated picture primes (Experiment 1). In Experiment 2, BH was given an explicit reading task using the word lists from Experiment 1. Performance on Experiment 2 disclosed severe reading deficits in both oral reading and semantic matching of the words to pictures. However, in Experiment 1, BH demonstrated a significant semantic priming effect, responding more accurately and more quickly to words preceded by related primes than by unrelated primes. The present results suggest that even in a patient with severe alexia, implicit access to semantic information can be preserved in the absence of explicit identification. The possibility of categorical gradient in implicit activation (living vs. nonliving) in BH was also discussed, which, however, needs to be clarified in the further investigation.

  4. Semantic Considerations in the Treatment of Echolalia

    Science.gov (United States)

    Garber, Norman B.; David, Leigh E.

    1975-01-01

    Two mentally retarded preschool children, both of whom echoed all forms of yes-no questions, were subjected to different treatment procedures varied according to the semantic function of the antecedent verbal stimulus. (Author)

  5. Semantic computing and language knowledge bases

    Science.gov (United States)

    Wang, Lei; Wang, Houfeng; Yu, Shiwen

    2017-09-01

    As the proposition of the next-generation Web - semantic Web, semantic computing has been drawing more and more attention within the circle and the industries. A lot of research has been conducted on the theory and methodology of the subject, and potential applications have also been investigated and proposed in many fields. The progress of semantic computing made so far cannot be detached from its supporting pivot - language resources, for instance, language knowledge bases. This paper proposes three perspectives of semantic computing from a macro view and describes the current status of affairs about the construction of language knowledge bases and the related research and applications that have been carried out on the basis of these resources via a case study in the Institute of Computational Linguistics at Peking University.

  6. Semantic transparency affects morphological priming . . . eventually.

    Science.gov (United States)

    Heyer, Vera; Kornishova, Dana

    2018-05-01

    Semantic transparency has been in the focus of psycholinguistic research for decades, with the controversy about the time course of the application of morpho-semantic information during the processing of morphologically complex words not yet resolved. This study reports two masked priming studies with English - ness and Russian - ost' nominalisations, investigating how semantic transparency modulates native speakers' morphological priming effects at short and long stimulus onset asynchronies (SOAs). In both languages, we found increased morphological priming for nominalisations at the transparent end of the scale (e.g. paleness - pale) in comparison to items at the opaque end of the scale (e.g. business - busy) but only at longer prime durations. The present findings are in line with models that posit an initial phase of morpho-orthographic (semantically blind) decomposition.

  7. Trust Networks on the Semantic Web

    National Research Council Canada - National Science Library

    Golbeck, Jennifer; Parisa, Bijan; Hendler, James

    2006-01-01

    The so-called "Web of Trust" is one of the ultimate goals of the Semantic Web. Research on the topic of trust in this domain has focused largely on digital signatures, certificates, and authentication...

  8. Bibliographic information organization in the semantic web

    CERN Document Server

    Willer, Mirna

    2013-01-01

    New technologies will underpin the future generation of library catalogues. To facilitate their role providing information, serving users, and fulfilling their mission as cultural heritage and memory institutions, libraries must take a technological leap; their standards and services must be transformed to those of the Semantic Web. Bibliographic Information Organization in the Semantic Web explores the technologies that may power future library catalogues, and argues the necessity of such a leap. The text introduces international bibliographic standards and models, and fundamental concepts in

  9. Learning Semantic Segmentation with Diverse Supervision

    OpenAIRE

    Ye, Linwei; Liu, Zhi; Wang, Yang

    2018-01-01

    Models based on deep convolutional neural networks (CNN) have significantly improved the performance of semantic segmentation. However, learning these models requires a large amount of training images with pixel-level labels, which are very costly and time-consuming to collect. In this paper, we propose a method for learning CNN-based semantic segmentation models from images with several types of annotations that are available for various computer vision tasks, including image-level labels fo...

  10. Concealed semantic and episodic autobiographical memory electrified

    Directory of Open Access Journals (Sweden)

    Giorgio eGanis

    2013-01-01

    Full Text Available Electrophysiology-based concealed information tests (CIT try to determine whether somebody possesses concealed information about a probe item by comparing event-related potentials (ERPs between this item and comparison items (irrelevants. Although the broader field is sometimes referred to as memory detection, little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addressed the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth and episodic autobiographical probes (a secret date learned just before the study. Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing semantic knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive component (LPC than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. Thus, the type of memory associated with a probe has both theoretical and practical importance for CIT research.

  11. Applying semantic web services to enterprise web

    OpenAIRE

    Hu, Y; Yang, Q P; Sun, X; Wei, P

    2008-01-01

    Enterprise Web provides a convenient, extendable, integrated platform for information sharing and knowledge management. However, it still has many drawbacks due to complexity and increasing information glut, as well as the heterogeneity of the information processed. Research in the field of Semantic Web Services has shown the possibility of adding higher level of semantic functionality onto the top of current Enterprise Web, enhancing usability and usefulness of resource, enabling decision su...

  12. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  13. Semantic Web Without SPARQL.pdf

    OpenAIRE

    Szekely, Pedro

    2016-01-01

    Discuss the creation of large Semantic Web applications with billions of triples. Instead of using a traditional SPARQL endpoint, our toolchain is a pure JSON toolchain using JSON-LD and ElasticSearch to support queries. The toolchain is familiar to all developers, does not require knowledge of Semantic Web technologies, and performance is 10X better than using SPARQL endpoints. The presentation illustrates the approach in the context of an application to fight human trafficking, using data f...

  14. Semantics of probabilistic processes an operational approach

    CERN Document Server

    Deng, Yuxin

    2015-01-01

    This book discusses the semantic foundations of concurrent systems with nondeterministic and probabilistic behaviour. Particular attention is given to clarifying the relationship between testing and simulation semantics and characterising bisimulations from metric, logical, and algorithmic perspectives. Besides presenting recent research outcomes in probabilistic concurrency theory, the book exemplifies the use of many mathematical techniques to solve problems in computer science, which is intended to be accessible to postgraduate students in Computer Science and Mathematics. It can also be us

  15. A Walk in the Semantic Park

    DEFF Research Database (Denmark)

    Danvy, Olivier; Johannsen, Jacob; Zerny, Ian

    2011-01-01

    To celebrate the 20th anniversary of PEPM, we are inviting you to a walk in the semantic park and to inter-derive reduction-based and reduction-free negational normalization functions.......To celebrate the 20th anniversary of PEPM, we are inviting you to a walk in the semantic park and to inter-derive reduction-based and reduction-free negational normalization functions....

  16. Verbal prefixation, construction grammar, and semantic compatibility

    DEFF Research Database (Denmark)

    Lewandowski, Wojciech

    2016-01-01

    This paper aims to analyze the interaction between prefixes, verbs, and abstract argument structure constructions, using as a testing ground the locative alternation. It has been assumed that in order to participate in the locative alternation, a verb must specify a manner of motion from which a ...... between resultative prefixes, alternating verbs, and the more abstract change-of-state variant is driven by semantic coherence. Keywords: resultative prefixes, construction grammar, semantic coherence, locative alternation, Polish...

  17. Contextual Semantic Parsing using Crowdsourced Spatial Descriptions

    OpenAIRE

    Dukes, Kais

    2014-01-01

    We describe a contextual parser for the Robot Commands Treebank, a new crowdsourced resource. In contrast to previous semantic parsers that select the most-probable parse, we consider the different problem of parsing using additional situational context to disambiguate between different readings of a sentence. We show that multiple semantic analyses can be searched using dynamic programming via interaction with a spatial planner, to guide the parsing process. We are able to parse sentences in...

  18. Concurrent semantics for structured design methods

    OpenAIRE

    Nixon, Patrick

    1996-01-01

    Also in Jelly, I., Gordon, I., & Groll, P. Software Engineering for Parallel and Distributed Systems. London: Chapman Hall. Design methods can be ambiguous due to di#11;erent interpretations of symbols or concepts. This paper presents a formal semantics for the Ward/Mellor Structured Analysis Method for Real Time systems. These semantics ensures that an unambiguous meaning can be attributed to a particular design. Speci#12;cally, it ensures that concurrent and real-time propert...

  19. Interference in motor learning - is motor interference sensory?

    DEFF Research Database (Denmark)

    Jensen, Jesper Lundbye; Petersen, Tue Hvass; Rothwell, John C

    mechanisms determine whether or not interference occurs. We hypothesised that interference requires the same neural circuits to be engaged in the two tasks and provoke competing processes of synaptic plasticity. To test this, subjects learned a ballistic ankle plantarflexion task. Early motor memory...... was disrupted by subsequent learning of a precision tracking task with the same agonist muscle group, but not by learning involving antagonist muscles or by voluntary agonist contractions that did not require learning. If the competing task was learned with the same agonist muscle group 4 hours following...

  20. Reliability analysis of cluster-based ad-hoc networks

    International Nuclear Information System (INIS)

    Cook, Jason L.; Ramirez-Marquez, Jose Emmanuel

    2008-01-01

    The mobile ad-hoc wireless network (MAWN) is a new and emerging network scheme that is being employed in a variety of applications. The MAWN varies from traditional networks because it is a self-forming and dynamic network. The MAWN is free of infrastructure and, as such, only the mobile nodes comprise the network. Pairs of nodes communicate either directly or through other nodes. To do so, each node acts, in turn, as a source, destination, and relay of messages. The virtue of a MAWN is the flexibility this provides; however, the challenge for reliability analyses is also brought about by this unique feature. The variability and volatility of the MAWN configuration makes typical reliability methods (e.g. reliability block diagram) inappropriate because no single structure or configuration represents all manifestations of a MAWN. For this reason, new methods are being developed to analyze the reliability of this new networking technology. New published methods adapt to this feature by treating the configuration probabilistically or by inclusion of embedded mobility models. This paper joins both methods together and expands upon these works by modifying the problem formulation to address the reliability analysis of a cluster-based MAWN. The cluster-based MAWN is deployed in applications with constraints on networking resources such as bandwidth and energy. This paper presents the problem's formulation, a discussion of applicable reliability metrics for the MAWN, and illustration of a Monte Carlo simulation method through the analysis of several example networks