scholarly journals Designing equivalent semantic models for process creation

Author(s):  
Pierre America ◽  
Jaco Bakker
1988 ◽  
Vol 60 (2) ◽  
pp. 109-176 ◽  
Author(s):  
Pierre America ◽  
Jaco De Bakker

Author(s):  
Anastasia Fedorova

In Linguistics the terms model and modelling have a vast array of meanings, which depends on the purpose and the object, and the type of the scientific research. The article is dedicated to the investigation of a special procedure of semantic processes modelling, deducing and substantiating the notion “evolutional semantic model”, the content and operational opportunities of which differ drastically from the essence and purpose of the known from the scientific literature phenomenon of the same name. In the proposed research this variety of modelling is oriented towards the description of the dynamics of the legal terms content loading, the estimation of possible vectors of the semantic evolution on the way of its terminalization/determinalization. The evolutional model of semantics has here as its basis the succession of sememes or series of sememes, the order of which is determined with accounting of a number of parameters. The typical schemes of the meaning development, illustrated by the succession of sememes, are considered to be the models of semantic laws (evolutional semantic models = EMS). Their function is the explanation of the mechanism and the order of the stages of the semantic evolution of the system of the words which sprung from one root on the way of its legal specialization, and, therefore, the proposed in the paper experience of semantic laws modelling differs from the expertise of the “catalogue of semantic derivations”, proposed by H. A. Zaliznjak, which doesn’t have as its purpose the explanation of meaning displacements, and from the notion of semantic derivation, models of derivation, dynamic models, worked out by O. V. Paducheva, which also only state such a displacement, without proving its reality. Key words: evolutional semantic model (EMS), modelling, semantic law, sememe, pre(law).


2014 ◽  
Author(s):  
Masoud Rouhizadeh ◽  
Emily Prud'hommeaux ◽  
Jan van Santen ◽  
Richard Sproat

Cybersecurity ◽  
2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Yu Zhang ◽  
Wei Huo ◽  
Kunpeng Jian ◽  
Ji Shi ◽  
Longquan Liu ◽  
...  

AbstractSOHO (small office/home office) routers provide services for end devices to connect to the Internet, playing an important role in cyberspace. Unfortunately, security vulnerabilities pervasively exist in these routers, especially in the web server modules, greatly endangering end users. To discover these vulnerabilities, fuzzing web server modules of SOHO routers is the most popular solution. However, its effectiveness is limited due to the lack of input specification, lack of routers’ internal running states, and lack of testing environment recovery mechanisms. Moreover, existing works for device fuzzing are more likely to detect memory corruption vulnerabilities.In this paper, we propose a solution ESRFuzzer to address these issues. It is a fully automated fuzzing framework for testing physical SOHO devices. It continuously and effectively generates test cases by leveraging two input semantic models, i.e., KEY-VALUE data model and CONF-READ communication model, and automatically recovers the testing environment with power management. It also coordinates diversified mutation rules with multiple monitoring mechanisms to trigger multi-type vulnerabilities. With the guidance of the two semantic models, ESRFuzzer can work in two ways: general mode fuzzing and D-CONF mode fuzzing. General mode fuzzing can discover both issues which occur in the CONF and READ operation, while D-CONF mode fuzzing focus on the READ-op issues especially missed by general mode fuzzing.We ran ESRFuzzer on 10 popular routers across five vendors. In total, it discovered 136 unique issues, 120 of which have been confirmed as 0-day vulnerabilities we found. As an improvement of SRFuzzer, ESRFuzzer have discovered 35 previous undiscovered READ-op issues that belong to three vulnerability types, and 23 of them have been confirmed as 0-day vulnerabilities by vendors. The experimental results show that ESRFuzzer outperforms state-of-the-art solutions in terms of types and number of vulnerabilities found.


1984 ◽  
Vol 12 (3) ◽  
pp. 306-313 ◽  
Author(s):  
William J. Friedman
Keyword(s):  

Author(s):  
Markus Jiuhanteng ◽  
Acep Iwan Saidi ◽  
R. Drajatno Widi Utomo

<p>Abstract This paper is a study of Andreas Gursky’s photo Rhein II. In this study, the post-structural semiotic analysis method is used to interpret meaning based on signs on the Rhein II. The post-structural semiotic analysis becomes the basis for interpreting meanings using related references. In the study of Rhein II photo objects, visual text analysis is expected to provide positive benefits for the development of photography, especially academically. Rhein II is a photo by Andreas Gursky. In Rhein II’s photograph, a contemporary photo is presented as a multi-reality representation analyzed using the post-structural semiotic method. The object of research is interpreted as a text that has a layer of meaning that is squeezed out of its essence by semiotics. The deconstruction of the signification system in the visual element is identified by reading the structural postal semiotic theory codes: text analysis process, creation process. The results of semiotic extraction produce an interpretive study of Rhein II which is full of meaning.</p><p>Keyword: imagery, photography, semiotica</p><p>Abstrak Makalah ini merupakan kajian dari foto Rhein II karya Andreas Gursky. Dalam kajian ini digunakan metode analisis semiotika post struktural untuk menginterpretasikan makna berdasarkan tanda-tanda pada Rhein. Analisis semiotika post struktural menjadi landasan dalam menginterpretasikan makna-makna dengan menggunakan referensi terkait. analisis teks visual, dalam kajian objek foto Rhein II diharapkan dapat memberikan kebermanfaatan yang positif bagi perkembangan fotografi khususnya secara akademis. Rhein II adalah foto karya Andreas Gursky. Dalam karya Rhein II, sebuah foto kontemporer dihadirkan sebagai representasi multi realitas yang dianalisis menggunakan metode semiotika post struktural. Objek penelitian dimaknai sebagai teks yang memiliki lapisan makna yang terperas esensinya oleh semiotika. Dekonstruksi sistem penandaan dalam elemen visual diidentifikasikan dengan pembacaan kode-kode teori semiotika pos struktural. Proses analisis teks, proses penciptaan. Hasil ekstraksi semiotika menghasilkan kajian interpretatif Rhein II yang sarat makna.</p><p>Kata kunci: citra imaji, fotografi, semiotika</p>


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  

Purpose This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies. Design/methodology/approach This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context. Findings This research paper determines how service supply chains can create value with big data, by building cross-departmental processes. Based on the study’s results, the critical alignment capabilities for successful big data value creation are: IT-process alignment; IT-performance alignment; performance-process alignment; human-IT alignment; and human-process alignment. Additionally, overarching and underlying strategic and organizational alignment capabilities also impacted this value creation. The human impact on employees of big data-led process creation shouldn’t be underestimated. Originality/value The briefing saves busy executives, strategists and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy-to-digest format.


Sign in / Sign up

Export Citation Format

Share Document