data modifications
Recently Published Documents


TOTAL DOCUMENTS

16
(FIVE YEARS 1)

H-INDEX

3
(FIVE YEARS 0)

Prosodi ◽  
2021 ◽  
Vol 15 (1) ◽  
pp. 23-34
Author(s):  
Lulu’ Ulfiyah Aprilia ◽  
Misnadin Misnadin

This study used Palmer’s (1986) theory to analyzed Modality and Halliday (2008) to analyze the meaning of modality. Relating to the statements above, this study was proposed to answer two articulated research problems, namely; (1) what are the types of modality found in Emma Watson and Michael Kimmel’s Speech Texts? And (2) To what extent do Emma Watson and Michael Kimmel’s Speech Texts show similarities and differences, if any, in their use of types of modality? This study employs a descriptive qualitative design. The data were all of the speech by Emma Watson and Michael Kimmel’s Speech Texts that contain modality. In terms of types of modality, 30 data of modality were found. The data are classified into two types of modality: Epistemic modality consists of 10 data; judgments (5 data) and modifications (5 data). Deontic modality consists of 20 data; directives (3 data), modifications (4 data), subjectivity (5 data), imperatives (3 data), commissives (2 data), and volitives (3 data). Moreover, in terms of similarities and differences, the data are classified into two terms similarities and differences. We found 11 data of similarities and differences in types of modality: In terms of similarities in types of epistemic modality (3 data) and similarities in types of deontic modality (2 data). In terms of differences in epistemic modality (2 data) and differences in deontic modality (4 data). Keywords: Modality, Epistemic, and Deontic


Author(s):  
Wenlong Tian ◽  
Ruixuan Li ◽  
Cheng‐Zhong Xu ◽  
Zhiyong Xu
Keyword(s):  

2017 ◽  
Author(s):  
Vitaly V. Ganusov

AbstractThe ability of HIV to avoid recognition by humoral and cellular immunity (viral escape) is well documented but the strength of the immune response needed to cause such a viral escape remains poorly quantified. Several previous studies observed a more rapid escape of HIV from CD8 T cell responses in the acute phase of infection as compared to the chronic infection. With the help of simple mathematical models the rate of HIV escape was estimated and results were interpreted to suggest that CD8 T cell responses causing escape in acute HIV infection may be more efficient at killing virus-infected cells than responses that cause escape in chronic infection, or alternatively, early escapes occur in epitopes mutations in which there is minimal fitness cost to the virus. These conclusions, however, were challenged on several grounds, including linkage and interference of multiple escape mutations due to a low population size and because of potential issues associated with modifying the data to estimate escape rates. Here we use a parametric resampling method which does not require data modification to show that previous results on the decline of the viral escape rate with time since infection remain unchanged. However, using this method we also show that estimates of the escape rate are highly sensitive to the time interval between measurements with longer intervals biasing estimates of the escape rate downwards. Our results thus suggest that data modifications for early and late escapes were not the primary reason for the observed decline in the escape rate with time since infection. However, longer sampling periods for escapes in chronic infection strongly influence estimates of the escape rate. More frequent sampling of viral sequences in the chronic infection may improve our understanding of factors influencing the rate of HIV escape from CD8 T cell responses.


2013 ◽  
Vol 2013 ◽  
pp. 1-16 ◽  
Author(s):  
Aihab Khan ◽  
Syed Afaq Husain

We put forward a fragile zero watermarking scheme to detect and characterize malicious modifications made to a database relation. Most of the existing watermarking schemes for relational databases introduce intentional errors or permanent distortions as marks into the database original content. These distortions inevitably degrade the data quality and data usability as the integrity of a relational database is violated. Moreover, these fragile schemes can detect malicious data modifications but do not characterize the tempering attack, that is, the nature of tempering. The proposed fragile scheme is based on zero watermarking approach to detect malicious modifications made to a database relation. In zero watermarking, the watermark is generated (constructed) from the contents of the original data rather than introduction of permanent distortions as marks into the data. As a result, the proposed scheme is distortion-free; thus, it also resolves the inherent conflict between security and imperceptibility. The proposed scheme also characterizes the malicious data modifications to quantify the nature of tempering attacks. Experimental results show that even minor malicious modifications made to a database relation can be detected and characterized successfully.


2008 ◽  
Vol 22 (07) ◽  
pp. 909-915
Author(s):  
R. S. CHAUHAN ◽  
K. LAL

An analysis has been presented using the Roy-Roy equation of state (EOS), which represents an extended and modified version of the Murnaghan EOS. It is found that the value of [Formula: see text] for various types of solids remain between 5/3 and 2. The Roy-Roy EOS has been found to become applicable for the core of the Earth, predicting the values of the pressure and bulk modulus in the range of seismological data. Modifications suggested recently to remove the shortcomings of the Murnaghan equation have been discussed. The maximum values of [Formula: see text] obtained from the Roy-Roy EOS for different inorganic solids and organic solids are also discussed.


Sign in / Sign up

Export Citation Format

Share Document