scholarly journals Some new Linear Elamite inscriptions

Author(s):  
Michael Mäder

The Linear Elamite writing system was used in the late 3rd millennium in ancient Iran.The underlying language is supposed to be Elamite – an isolate language otherwise known from cuneiform sources. 40 to 60% of the Elamite words and morphemes are decoded.In early 2016, about ten new inscriptions and fragments were presented at the University of Hamedan, Iran. They are now in the Mahboubian Gallery. Some of these new texts are the longest ones ever found, depicting up to 200 signs.In the  past months, the Deciphering Crew at the Institut für Sprachwissenschaft, Universität Bern, has made drawings of the so far unpublished inscriptions and compiled a sign catalogue.Preliminary results show that  fragments from Gonur and Altyn Depe formerly tagged as “Linear Elamite”  do not belong to the Linear Elamite text corpus.The Deciphering Project is hoping to collaborate with scholars of different fields. The web page http://elamicon.org is an open source project.

2010 ◽  
Vol 4 (1-2) ◽  
pp. 39-53 ◽  
Author(s):  
James Cummings ◽  
Arno Mittelbach

This article documents the digital humanities aspects of The Holinshed Project at the University of Oxford. It outlines the nature of the project, in particular the need to compare paragraphs of the 1577 and 1587 editions of Holinshed's Chronicles of England, Scotland, and Ireland. In order to accomplish these comparisons, a tool known as the TEI-Comparator was created. This is a bespoke fuzzy text comparison engine with a frontend web interface designed for the project. The TEI-Comparator automatically matches reorganised and fragmented paragraphs in the two editions. It is then used for confirming, removing, creating and annotating the links between the editions. This article describes the steps necessary to use the TEI-Comparator, its comparison algorithm, and the handling of the output it creates with respect to its use for The Holinshed Project. The TEI-Comparator was launched in 2009 as an open source project on Sourceforge and is available for other projects to use.


Author(s):  
Aso Mohammed Aladdin ◽  
Chnoor M. Rahman ◽  
Mzhda S. Abdulkarim

In developing web sites there are some rules that developers should depend on in order to create a site suitable to the users’ needs and also to make them as comfort as possible when they surf it. Before creating any website or operating any application, it is important for developers to address the functionality, design, usability and security of the work according to the demands.  Every developer has his/her own way to develop a website, some prefer to use website builders and while others prefer to what they have primarily formed in their mind What they have primarily formed in their mind preferred software and programming languages. Therefore, this paper will compare the web based sites and open source projects in terms of functionality, usability, design and security in order to help academic staffs or business organization for choosing the best way for developing an academic or e-commerce web site.  


2012 ◽  
Vol 3 (6) ◽  
pp. 54
Author(s):  
Felice Stoico ◽  
Luca D'Altilia

<p>The Northern Daunian Subappennino Survey project, realised within the scientific research related to the PhD (Dottorato di ricerca) in "Archaeology and didactics of cultural heritage", proposes a methodological study of castles, aimed to rebuild the medieval landscape through the knowledge and interpretation of settlements. Starting from the results gained in the past researches and from many ideas offered by the analysis of medieval landscapes conducted by the University of Foggia, the project has been designed with a "global-type" analysis in mind, trying to redefine completely all the aspects involved in the archaeological documentation process and field-work, with the aid of archaeological computing, focusing on the use of free and open source software.</p>


Author(s):  
Richard Caladine

Online learning and course management systems are central to learning universities and colleges, and a model that blends face-to-face learning with distance education can combine benefits of the rich human learning relationships with the benefits of flexibility of where and when students learn. A large number of universities and colleges are adopting a blended model of learning. In the past, online interactions between learners generally have taken the form of text-based discussion forums, and while these have been used with great success in many courses, there are other interactions that have been difficult or impossible to undertake online. Database-driven Web sites were developed to make these interactions possible. Database-driven Web pages or collaborative, user-produced, Internet documents (CUPIDs) represent an innovation in online learning that allows learners to add, remove and edit the content of a Web page and/or upload files. As the data are input via Web forms, no programming skills are required. The data from the forms are processed by the database and the Web page is then rebuilt by the database. In this way, the database constructs or “drives” the Web page. CUPIDs have been used to facilitate a range of online interactions between learners in subjects at the University of Wollongong. The subjects all employ a model that blends face-to-face and online components. As well, learners may be distributed geographically between the five campuses of the university. The examples are: a Collaborative Online Glossary (COG); a Collaborative Online Reporting (COR); an Online Student Collected and Annotated Resources (OSCAR); as well as, a Collaborative Online Movie Review (COMR). By fostering new types of online interactions, CUPIDs provide greater functionality to online collaboration and open the door to a host of activities that are new to collaboration, online or otherwise and hence have a place in online learning of the future.


Author(s):  
Brian D. Ballentine

This chapter introduces Greasemonkey, a new extension for the Firefox browser, which enables users to alter the behavior and appearance of Web pages as the pages load. The chapter claims that Greasemonkey is forcing a reevaluation of what it means to be an author in digital environments. Using Michel Foucault’s (1979) original question, “What is an author?” the chapter argues that creators of Greasemonkey scripts take on the additional roles of designer and programmer. Also, the chapter cautions that since Greasemonkey scripts have the ability to alter the layout, navigation, and advertising on a Web page, there may be legal ramifi cations in the future for this open source project.


2020 ◽  
Vol 17 (8) ◽  
pp. 3558-3562
Author(s):  
M. Sai Praveen ◽  
L. Mary Gladence ◽  
M. Rajasekhar Reddy ◽  
J. Refona ◽  
Usha Nandhini

Phishing attacks include the use of techniques to create polymorphic phishing web pages to give the impression of real sites. Other sites rely on the risk of phishing, including money linked, informal organizations, the travel industry, web-based business, and so on. For e.g., phishers are specifically attached to travel-related administrations by mirroring them as excursion experts, aircraft reservations, accommodation bookings, and so on. Be that as it may, concentrating on reputable pages, given all, leaves the web page looking outwardly like the first one. Right now, suggest a methodology that relies on the favicon database to discover the existence of the site and use it to determine the validity of the site. Phishing is a program that tricks individuals into giving touchy data such as usernames and passwords, paying card subtleties, delicate bank data, and so on, by way of e-mail mocking, tweeting, or using counterfeit sites whose look and feel gives the presence of a real site Right now, a technique called parse tree approval is proposed to determine whether a website page is legitimate or phishing. This paper provides an in-depth study of methods accessible to the detection of phishing sites. A similar research was carried out into the use of enemy phishing instruments and their containment was acknowledged. We have broken down the URL-based highlights used in the past to refine their meanings according to the current situation, which is our major commitment. In addition, the step-by-step method of structuring the enemy of the phishing model is talked about developing a competent system that adds to our commitment. The views of this analysis are presented alongside recommendations on the existing frameworks.


2017 ◽  
Vol 11 (3-4) ◽  
pp. 53-59
Author(s):  
Nikolett Kosztin ◽  
József Tőzsér ◽  
László Csernoch ◽  
Ildikó Balatoni

It is a basic aim of the European Union that due to the developments in 2014-2020 the bicycle would become one of the most often used transportation, touristic, and sports equipment. We were interested to see to what extent is bicycling present in the transportation system of Debrecen and what are the most important reasons for its residents to use the bicycles. The dedication of Debrecen to promote cycling is clearly proven by the number of newly built or resurfaced bike paths and by the fact that the University of Debrecen has introduced – alone in the region – UniBike which is a bicycle renting system brought forth by the need of its students. Here we present the developments that took place in the North Plain Region in the past few years. We have also analyzed the national and European strategies and reports on bicycling. A survey was conducted among the youth of Debrecen to explore their cycling habits. The data were evaluated using the EvaSys program. Until the end of 2011 with the help of different funds 862 km of bike paths had been built in Hungary. In the North Plain Region due to funds totaling 777 million HUF 15.7 km long bike paths had been constructed until 2015. The development of tourism in this direction is promoted by the web-pages and brochures offering bicycle-tours around Debrecen. Nevertheless, bicycling in the neighboring townships is present not as an instrument for sports and/or tourism, rather as a mean of transportation. It is a clear goal in Europe and thus in Hungary to have bike paths that can provide the means of safe cycling. In parallel, it is also important to promote the benefits of bicycling, including positive physiological effects, cost-effectiveness, and environment-friendliness to increase the proportion of those who select bicycling as an alternative. JEL Code: I15


Author(s):  
Birong Ho

With new Web tools, information can be released to flow in every direction (library to user, user to library, library to library, and user to user). Western Michigan University (WMU) implemented VuFind as the primary OPAC interface for its Voyager system in September 2009. VuFind includes many Web 2.0 catalog features such as user tagging, comments, and reviews, as well as “more like this” and “Did you mean?” Having relied in the past on vendors with relatively restrictive licenses and indexes, and being mindful that Voyager does not allow users to write to its database tables (i.e. to allow more community participation in describing what is in the catalog), WMU chose the open source VuFind. Originally developed at Villanova’s Falvey Memorial Library to work with Voyager; VuFind now has a community of libraries that have implemented and improved it. This chapter discusses some of the Web 2.0 services and functions that VuFind provides, and how examines how they are being used at WMU. User access logs are analyzed, and the use of tagging is examined. There was undoubtedly a significant degree of hype around VuFind a year ago, but what is the reality one year after implementation?


2011 ◽  
Vol 219-220 ◽  
pp. 1069-1072 ◽  
Author(s):  
Dong Fei Liu ◽  
Xian Shuang Fan

In this paper, the web crawler in search engine was introduced firstly, based on the detailed analysis of the system architecture about open source web crawler Heritrix, proposed design of a particular parser, parsed the particular web site to achieve the purpose of particular crawl. Then by eliminating the impact on individual processors caused by robots.txt file, and introduced the ELFHash algorithm implements the purpose of efficient, multi-thread access to the web crawler resources. Finally, by the comparison of the speed of crawl web page between before-improved and after-improved, and the analysis of the number of crawled pages in the same long time, verify the performance of the after-improved web crawler has been more obvious increased.


1979 ◽  
Vol 46 ◽  
pp. 96-101
Author(s):  
J.A. Graham

During the past several years, a systematic search for novae in the Magellanic Clouds has been carried out at Cerro Tololo Inter-American Observatory. The Curtis Schmidt telescope, on loan to CTIO from the University of Michigan is used to obtain plates every two weeks during the observing season. An objective prism is used on the telescope. This provides additional low-dispersion spectroscopic information when a nova is discovered. The plates cover an area of 5°x5°. One plate is sufficient to cover the Small Magellanic Cloud and four are taken of the Large Magellanic Cloud with an overlap so that the central bar is included on each plate. The methods used in the search have been described by Graham and Araya (1971). In the CTIO survey, 8 novae have been discovered in the Large Cloud but none in the Small Cloud. The survey was not carried out in 1974 or 1976. During 1974, one nova was discovered in the Small Cloud by MacConnell and Sanduleak (1974).


Sign in / Sign up

Export Citation Format

Share Document