EPP Extensions

2007 ◽  
Vol 38 (3) ◽  
pp. 485-523 ◽  
Author(s):  
Idan Landau

The fact that the specifier of T0 is subject both to the Extended Projection Principle (EPP) and to the Empty Category Principle (ECP) has remained an unexplained accident within Government-Binding Theory. I propose a principled account of this correlation. The EPP is a selectional requirement of functional heads (e.g., T, Top, C) that applies at PF—an instance of p-selection for an overt element. Like all selectional requirements, it applies to the head of the selected phrase, explaining why null heads cannot appear in EPP positions (thus deriving certain representational ECP effects). A wide range of empirical results follow, all unified by the exclusion of null-headed phrases from EPP positions: subject-object asymmetries in the distribution of bare nouns in Romance and sentential complements; failure of certain adjuncts to occur in clause-initial position; resistance of indirect objects to Ā-movement; and phonological doubling of heads of fronted categories. I argue against the agreement/checking view of the EPP and show that only the selectional construal allows a natural explanation of its puzzling properties.

2017 ◽  
Vol 2 (1) ◽  
Author(s):  
Lisa Parola

This essay derives from the primary need to make order between direct and indirect sources available for the reconstruction of the history of video art in Italy in the seventies. In fact, during the researches for the Ph.D. thesis it became clear that in most cases it is difficult to define, in terms of facts, which of the different historiographies should be taken into consideration to deepen the study of video art in Italy. Beyond legitimate differences of perspectives and methods, historiographical narratives all share similar issues and narrative structure. The first intention of the essay is, therefore, to compare the different historiographic narratives on Italian video art of the seventies, verifying their genealogy, the sources used and the accuracy of the narrated facts. For the selection of the corpus, it was decided to analyze in particular monographic volumes dealing with the history of the origins of video art in Italy. The aim was, in fact, to get a wide range of types of "narrations", as in the case of contemporary art and architecture magazines, which are examined in the second part of the essay. After the selection, for an analytical and comparative study of the various historiography, the essay focuses only on the Terza Biennale Internazionale della Giovane Pittura. Gennaio ’70. Comportamenti, oggetti e mediazioni (Third International Biennial of Young Painting. January '70. Behaviors, Objects and Mediations, 1970, Bologna), the exhibition which - after Lucio Fontana's pioneering experiments - is said to be the first sign of the arrival of videotape in Italy (called at the time videorecording), curated by Renato Barilli, Tommaso Trini, Andrea Emiliani and Maurizio Calvesi. The narration given so far of this exhibition appeared more mythological than historical and could be compared structurally to that of the many numerous beginnings that historiographyies on international video art identify as ‘first’ and ‘generative’. In the first part of the essay the 'facts' related to Gennaio ’70, as narrated by historiography on video art, are compared. In the second part the survey is carried out through some of the direct sources identified during the research, with the aim of answering to questions raised by the comparison between historiographies. Concluding, it is important to underline that the tapes containing the videos transmitted have not been found and seem to have disappeared since the ending of the exhibition. Nevertheless, the deepening of the works and documentation transmitted during the exhibition is possible thanks to other types of sources which give us many valuable information regarding video techniques and practices at the beginning of 1970 in Italy.


2021 ◽  
pp. 101-107
Author(s):  
Mohammad Alshehri ◽  

Presently, a precise localization and tracking process becomes significant to enable smartphone-assisted navigation to maximize accuracy in the real-time environment. Fingerprint-based localization is the commonly available model for accomplishing effective outcomes. With this motivation, this study focuses on designing efficient smartphone-assisted indoor localization and tracking models using the glowworm swarm optimization (ILT-GSO) algorithm. The ILT-GSO algorithm involves creating a GSO algorithm based on the light-emissive characteristics of glowworms to determine the location. In addition, the Kalman filter is applied to mitigate the estimation process and update the initial position of the glowworms. A wide range of experiments was carried out, and the results are investigated in terms of distinct evaluation metrics. The simulation outcome demonstrated considerable enhancement in the real-time environment and reduced the computational complexity. The ILT-GSO algorithm has resulted in an increased localization performance with minimal error over the recent techniques.


1985 ◽  
Vol 1 (1) ◽  
pp. 18-46 ◽  
Author(s):  
Paul van Buren ◽  
Michael Sharwood Smith

This paper discusses the application of Government Binding Theory to second language acquisition in the context of a project which is looking into the acquisition of preposition stranding in English and Dutch. The bulk of the discussion focuses on the theoretical problems involved. Firstly, the potential value of Government Binding Theory in principle is considered both in terms of the formulation of linguistic questions per se and also in terms of more specifically acquisitional questions having to do with the speed and order of acquisition. Secondly, some results in the pilot studies conducted so far in Utrecht are examined with respect to the theoretical usefulness of the framework adopted. The potential of the framework to generate sophisticated linguistic research questions is found to be undeniable. The acquisitional aspects need to be elaborated and adapted to cope with the special features of second, as opposed to first, language acquisition. This involves an elaboration of scenarios to be investigated: one in which the learner's initial assumption is that the unmarked setting of a given parameter of Universal Grammar holds for the target system, one in which the settings of parameters shared by the target and native systems are assumed to be identical, the second being a 'cross linguistic' scenario. These possibilities are considered in the light of the nature of evidence derived from the input and in the light of a set of possible learning strategies derived from the scenarios. The scenarios, the types of evidence and the strategies are spelled out in terms of the specific problem of preposition stranding in Universal Grammar, in Dutch and in English.


2021 ◽  
Vol 12 ◽  
Author(s):  
◽  
Aline Fugeray-Scarbel ◽  
Catherine Bastien ◽  
Mathilde Dupont-Nivet ◽  
Stéphane Lemarié

The present study is a transversal analysis of the interest in genomic selection for plant and animal species. It focuses on the arguments that may convince breeders to switch to genomic selection. The arguments are classified into three different “bricks.” The first brick considers the addition of genotyping to improve the accuracy of the prediction of breeding values. The second consists of saving costs and/or shortening the breeding cycle by replacing all or a portion of the phenotyping effort with genotyping. The third concerns population management to improve the choice of parents to either optimize crossbreeding or maintain genetic diversity. We analyse the relevance of these different bricks for a wide range of animal and plant species and sought to explain the differences between species according to their biological specificities and the organization of breeding programs.


2006 ◽  
Vol 274 (1606) ◽  
pp. 73-78 ◽  
Author(s):  
Alex R Hall ◽  
Nick Colegrave

The availability of different resources in the environment can affect the outcomes of evolutionary diversification. A unimodal distribution of diversity with resource supply has been widely observed and explained previously in the context of selection acting in a spatially heterogeneous environment. Here, we propose an alternative mechanism to explain the relationship between resource supply and diversification that is based on selection for exploitation of different resources. To test this mechanism, we conducted a selection experiment using the bacterium Pseudomonas fluorescens in spatially homogeneous environments over a wide range of resource supply rates. Our results show that niche diversification peaks at intermediate levels of resource availability. We suggest that this unimodal relationship is due to evolutionary diversification that is driven by competition for resources but constrained by the ecological opportunity represented by different resource types. These processes may underlie some general patterns of diversity, including latitudinal gradients in species richness and the effects of anthropogenic enrichment of the environment.


1999 ◽  
Vol 50 (8) ◽  
pp. 1425 ◽  
Author(s):  
M. Q. Lu ◽  
L. O'Brien ◽  
I. M. Stuart

Genotype, environment, and genotype × environment interaction effects for malting quality attributes and grain yield were investigated using breeding lines from the F2, F3, and F4 generations and the parental varieties of 4 barley crosses. There were significant differences between the parental varieties for all attributes studied. Both malting quality and grain yield exhibited a wide range among progenies in all generations. While performance of the parental varieties and progeny for malting quality and grain yield were greatly influenced by environment, performance in one environment was predictive of that in other environments. Only for grain protein content was there evidence of crossover G × E interaction. Heritability was generally higher for F3 to F4 than for F2 to F3 for all malting quality attributes. F3 on F2 regression per cent heritability estimates for protein content, potential malt extract and grain weight were all highly significant with values generally medium in magnitude. Genetic gain was obtained from selection in both the F2 and F3 generations. Heritability and genetic gain varied from cross to cross for diastatic power. Progress from selection for the other quality attributes attests to the potential value of NIT (near infrared transmittance) spectroscopy for predicting potential malting quality. Heritability for F2 to F3 for grain yield was not significant in any cross, indicating selection for yield on the basis of individual F2 plant yield was ineffective. Heritability for grain yield from F3 to F4 was highly significant and medium in magnitude for 3 of the 4 crosses. The results of this study indicate that good genetic gain could be expected from early generation selection for potential malting quality using NIT spectroscopy and for grain yield using F3 progeny testing.


2019 ◽  
Vol 63 (8) ◽  
pp. 1125-1138
Author(s):  
Mahmood Yousefi-Azar ◽  
Len Hamey ◽  
Vijay Varadharajan ◽  
Shiping Chen

Abstract Malware detection based on static features and without code disassembling is a challenging path of research. Obfuscation makes the static analysis of malware even more challenging. This paper extends static malware detection beyond byte level $n$-grams and detecting important strings. We propose a model (Byte2vec) with the capabilities of both binary file feature representation and feature selection for malware detection. Byte2vec embeds the semantic similarity of byte level codes into a feature vector (byte vector) and also into a context vector. The learned feature vectors of Byte2vec, using skip-gram with negative-sampling topology, are combined with byte-level term-frequency (tf) for malware detection. We also show that the distance between a feature vector and its corresponding context vector provides a useful measure to rank features. The top ranked features are successfully used for malware detection. We show that this feature selection algorithm is an unsupervised version of mutual information (MI). We test the proposed scheme on four freely available Android malware datasets including one obfuscated malware dataset. The model is trained only on clean APKs. The results show that the model outperforms MI in a low-dimensional feature space and is competitive with MI and other state-of-the-art models in higher dimensions. In particular, our tests show very promising results on a wide range of obfuscated malware with a false negative rate of only 0.3% and a false positive rate of 2.0%. The detection results on obfuscated malware show the advantage of the unsupervised feature selection algorithm compared with the MI-based method.


Author(s):  
Lisa Travis ◽  
Greg Lamontagne

In this paper, we will investigate certain phenomena which appear sensitive to particular conditions of adjacency and provide an explanation of these conditions in terms of syntactic structure and principles defined over such structure. Two interesting results which follow from such an explanation are: (i) the Case Filter given in (1) below, which stipulates that phonetically realized NPs must receive Case, may be subsumed under the Empty Category Principle, and (ii) the claim that only Case-marked traces are visible at PF (which has been suggested as an explanation of wanna contraction facts) can be given a structural account.


Sign in / Sign up

Export Citation Format

Share Document