scholarly journals CONTRAST AS A METHOD OF FOREGROUNDING IN THE PROSE OF M. TSVETAEVA: OPPOSITION WITH THE HELP OF QUASI-ANTONYMS

Author(s):  
M.G. Milyutina ◽  
E.V. Tuktangulova

Contrast, as one of the ways of foregrounding, plays a crucial role in the organization of M. Tsvetayeva's prose texts of different genres. The article shows this by analyzing an excerpt from M. Tsvetaeva’s letter to B. Pasternak (1926). This passage is two paragraphs and by its structure and content is close to the antonymic block-composite. The contrast between the sea and the land is actualized by M. Tsvetaeva and is the main principle of the organization of the given text passage. The contrasting foregrounding of meaningful information is carried out with the help of quasi-antonyms land - sea, mountain - sea, mountain - ocean. The authors show how the end-to-end antithesis based on the semantic opposition of land and water is built in the analyzed passage, how new asymmetrical relations - contradictory (land/water; land/sea), vector (sea/mountain) and gradational (mountain/sea; mountain/ocean) - are built in it, laying one on another and gradually deepening the contrast, which help the author to convey figuratively and emotionally her negative attitude to the sea and positive one to the mountain.

10.12737/2629 ◽  
2014 ◽  
Vol 3 (1) ◽  
pp. 45-48
Author(s):  
Макарова ◽  
Stanislava Makarova

Individual’s attitude to labor in many respects defines his behavior at work. Modern socio-economic realities of this country allows to discuss emergence of a set of patterns for creating an image of «modern man of labor» which differs from that born under the Soviet rule. Strong addiction to opportunistic behavior is an integral part of labor in organizations and thus poses urgent problem at micro-level as well as at the level of the national economy as a whole. One of the effective methods to overcome opportunistic behavior at work is to develop positive work ethics. At the micro-level of organization corporate management should use a combination of managerial and socio-psychological tools, easily available and appropriate to the given situation, to develop among subordinates «pattern of sustainable negative attitude» to opportunistic behavior as a sort of deviant behavior.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Sajid Hussain ◽  
Hammad Afzal ◽  
Ramsha Saeed ◽  
Naima Iltaf ◽  
Mir Yasir Umair

Adverse drug reactions (ADRs) are the undesirable effects associated with the use of a drug due to some pharmacological action of the drug. During the last few years, social media has become a popular platform where people discuss their health problems and, therefore, has become a popular source to share information related to ADR in the natural language. This paper presents an end-to-end system for modelling ADR detection from the given text by fine-tuning BERT with a highly modular Framework for Adapting Representation Models (FARM). BERT overcame the predominant neural networks bringing remarkable performance gains. However, training BERT is a computationally expensive task which limits its usage for production environments and makes it difficult to determine the most important hyperparameters for the downstream task. Furthermore, developing an end-to-end ADR extraction system comprising two downstream tasks, i.e., text classification for filtering text containing ADRs and extracting ADR mentions from the classified text, is also challenging. The framework used in this work, FARM-BERT, provides support for multitask learning by combining multiple prediction heads which makes training of the end-to-end systems easier and computationally faster. In the proposed model, one prediction head is used for text classification and the other is used for ADR sequence labeling. Experiments are performed on Twitter, PubMed, TwiMed-Twitter, and TwiMed-PubMed datasets. The proposed model is compared with the baseline models and state-of-the-art techniques, and it is shown that it yields better results for the given task with the F -scores of 89.6%, 97.6%, 84.9%, and 95.9% on Twitter, PubMed, TwiMed-Twitter, and TwiMed-PubMed datasets, respectively. Moreover, training time and testing time of the proposed model are compared with BERT’s, and it is shown that the proposed model is computationally faster than BERT.


2019 ◽  
Vol 9 (1) ◽  
Author(s):  
G. Di Cesare ◽  
M. Marchi ◽  
C. Pinardi ◽  
G. Rizzolatti

Abstract During social interactions, actions and words can be expressed in different ways, for example gently, vigorously or rudely communicating the positive or negative attitude of the agent. These forms of communication are called vitality forms and play a crucial role in social relations. While the neural bases of speech and actions vitality forms have been investigated, there is no information on how we recognize others’ mood/attitude by hearing the sound of their actions. In the present fMRI study we investigated the neural basis of vitality forms while participants heard action sounds in two different conditions: sounds resulting from gentle and rude actions, sounds communicating the same actions without vitality forms (control stimuli). Results showed that hearing action sounds conveying rude and gentle vitality forms respect to the control stimuli produced a specific activation of the dorso-central insula. In addition, hearing both vitality forms action sounds and control stimuli produced the activation of the parieto-frontal circuit typically involved in the observation and the execution of arm actions. In conclusion, our data indicate that, the dorso-central insula is a key region involved in the processing of vitality forms regardless of the modality by which they are conveyed.


2020 ◽  
Vol 34 (09) ◽  
pp. 13604-13605
Author(s):  
Song Feng ◽  
Kshitij Fadnis ◽  
Q. Vera Liao ◽  
Luis A. Lastras
Keyword(s):  

We introduce Doc2Dial, an end-to-end framework for generating conversational data grounded in given documents. It takes the documents as input and generates the pipelined tasks for obtaining the annotations specifically for producing the simulated dialog flows. Then, the dialog flows are used to guide the collection of the utterances via the integrated crowdsourcing tool. The outcomes include the human-human dialogue data grounded in the given documents, as well as various types of automatically or human labeled annotations that help ensure the quality of the dialog data with the flexibility to (re)composite dialogues. We expect such data can facilitate building automated dialogue agents for goal-oriented tasks. We demonstrate Doc2Dial system with the various domain documents for customer care.


Author(s):  
Johan Tobias Kristiano

<p>The use of personal and social deixis often has a crucial role in political speeches. This study investigated how personal deixis was used as a strategy to get other people’s support in Donald Trump’s presidential campaign speech. The object of the study was Trump’s speech in his presidential rally on October 10, 2020, and the data were the personal and social deixis in the speech. The occurrences of deixis were counted to reveal the parties to whom Trump gave his attention, and an analysis of the words used was conducted to see Trump’s attitudes toward the parties addressed by the deixis. The study revealed that Trump used personal deixis more than social deixis. There were five big parties to which he gave his attention using the deixis: the audience, Trump himself, the USA and its people, his opponents, and his party and government. Using the deixis, Trump also showed a positive attitude to his side and a negative attitude to the opponents. His use of personal and social deixis was also used as a campaign strategy. The deixis created inclusiveness, positioned Trump in different roles, showed support from several American communities, and influenced the audience’s attitude toward Trump’s opponents.</p>


Author(s):  
Yang Li

The continued trend of globalization and technology improvement like the internet and transportation have spawned an increasing number of complex service chains that span across local, regional and national boundaries. Service level agreement (SLA) plays a crucial role in gluing service chains together. In that regard, this paper provides a complete guidance of end-to-end lifecycle management of SLA, including SLA-aware service modelling and terms optimization, contract drafting and compliance tracking. Among these, the author introduces his work in the area of enterprise SLA optimization to address existing deficiencies in this area including a roadmap for industry-strength SLA optimization capability and an initial version of SLA modeling and optimization toolset—code-named SLA-OASIS. Some out-of-box toolsets for SLA contract drafting and compliance tracking are also introduced.


2018 ◽  
Vol 7 (1) ◽  
pp. 1-14
Author(s):  
Smita Selot ◽  
Neeta Tripathi ◽  
A. S. Zadgaonkar

Semantic analysis is the process of extracting meaning of the sentence, from a given language. From the perspective of computer processing, challenge lies in making computer understand the meaning of the given sentence. Understandability depends upon the grammar, syntactic and semantic representation of the language and methods employed for extracting these parameters. Semantics interpretation methods of natural language varies from language to language, as grammatical structure and morphological representation of one language may be different from another. One ancient Indian language, Sanskrit, has its own unique way of embedding syntactic information within words of relevance in a sentence. Sanskrit grammar is defined in 4000 rules by PaninI reveals the mechanism of adding suffixes to words according to its use in sentence. Through this article, a method of extracting meaningful information through suffixes and classifying the word into a defined semantic category is presented. The application of NN-based classification has improved the processing of text.


2010 ◽  
Vol 1 (3) ◽  
pp. 18-43 ◽  
Author(s):  
Yang Li

The continued trend of globalization and technology improvement like the internet and transportation have spawned an increasing number of complex service chains that span across local, regional and national boundaries. Service level agreement (SLA) plays a crucial role in gluing service chains together. In that regard, this paper provides a complete guidance of end-to-end lifecycle management of SLA, including SLA-aware service modelling and terms optimization, contract drafting and compliance tracking. Among these, the author introduces his work in the area of enterprise SLA optimization to address existing deficiencies in this area including a roadmap for industry-strength SLA optimization capability and an initial version of SLA modeling and optimization toolset—code-named SLA-OASIS. Some out-of-box toolsets for SLA contract drafting and compliance tracking are also introduced.


2020 ◽  
Vol 26 (2) ◽  
pp. 66-72
Author(s):  
Iryna Tryshchenko

This paper aims at analysis of stylistic devices based on semantic contrast and inequality actualized in the vocative position. The subject of the study is functioning of the given vocatives in literary texts. The author used methods of semantic, contextual analysis and elements of pragmatic analysis. The results of the study. Ironic forms of address were firstly analysed among contrastive vocatives. They often include evaluative component of connotation. Depending on the context this component of connotation may change its meaning from negative to positive and vice versa. Cases of non-referential use of address forms for creating ironic meaning are also discussed. During the analysis of address forms based on oxymoron certain postulates of M. V. Nikitin's theory of semantic combinatorics are used. The findings indicate that contradictory relations may exist not only inside a vocative syntagm, but also between the vocative and the rest of the utterance. In addition to that, semantic and stylistic types of such contradictoriness are characterized. Moreover, types of gradation and frequency of their actualization in the vocative position are analyzed. Besides that, variants of gradation components positioning in the text are revealed. The role of authorial text in the adequate interpretation of emotional and evaluative address forms — components of gradation — is defined. The usage of all of the above mentioned stylistic devices in the vocative position is combined with the evaluative component of connotation, highlighting positive or negative attitude of the speaker to the addressee and certain reaction of the speaker to the concrete communicative situation, addressee's words or behaviour. Further study of address forms may be promising in their interrelation with other means expressing the category of speech addressability, in revealing their genre specificity and characteristic features of other stylistic devices actualization in the vocative position.


Author(s):  
Anushka Xavier K

In this era people are closely connected to each other using technology.Messaging services a plays a crucial role in this process.For this, WhatsApp Messenger being an exclusive cross-platform that allows to exchange text, files as well as audio and video messages.WhatsApp has 1.5 billion dynamic clients in 180 nations.However, being such a well liked application,taking care of privacy breach is very salient. It is necessary that the application protects clients confidentiality and authenticity. Thus, to give assurance and stealth to client, for the most part cryptography is utilized as a spine of the web based exchanges. WhatsApp utilizes End-to-End Encryption technique and uses various protocols (Signal protocol etc.) and keys (public key, private key etc.) along with algorithm like Curve25519.In this era people are closely connected to each other using technology.Messaging services a plays a crucial role in this process.For this, WhatsApp Messenger being an exclusive cross-platform that allows to exchange text, files as well as audio and video messages.WhatsApp has 1.5 billion dynamic clients in 180 nations.However, being such a well liked application,taking care of privacy breach is very salient. It is necessary that the application protects clients confidentiality and authenticity. Thus, to give assurance and stealth to client, for the most part cryptography is utilized as a spine of the web based exchanges. WhatsApp utilizes End-to-End Encryption technique and uses various protocols (Signal protocol etc.) and keys (public key, private key etc.) along with algorithm like Curve25519.


Sign in / Sign up

Export Citation Format

Share Document