Results 31 to 40 of about 30,235 (124)

An ECA-based Semantic Architecture for IoT Building Automation Systems

open access: yesJournal of Communications Software and Systems, 2016
The Internet of Things (IoT), with its plethora of smart objects and technologies, allows to realize smart environments in several scenarios. However, the existing solutions are strictly intended for specific applications and their customization is often
Paolo Lillo   +4 more
doaj  

Proverbs of Biblical origin: from a single source to linguistic diversity

open access: yesRussian Language Studies
The study analyzes Russian proverbs of biblical origin in their diverse semantic and structural connections with their original source. The relevance of the research is determined by the insufficient attention to the Bible heritage as a dynamically ...
Valery M. Mokienko
doaj   +1 more source

Outdated vocabulary in the karachay-balkarian nart epic

open access: yesКавказология
This article considers the lexical layer of the language, the study of which contributes to a more in-depth understanding of the culture, life, traditions of the people.
Mariam A. Akhmatova   +2 more
doaj   +1 more source

The study of polysemy of derivative suffix "-ین" based on literal texts [PDF]

open access: yesLiterary Arts, 2017
Derivational word, based on the structural theory, is made up of a free morpheme and at least an affix. Based on this theory, the root of the derived word is not necessarily verbal; it can be a nominal or adjectival, etc. Furthermore, an affix can change
Aliakbar Bagheri Khalili   +1 more
doaj   +1 more source

Deutsch-polnische Konfigurationen in den Straßennamen von Grünberg – Zielona Góra [PDF]

open access: yesLinguistische Treffen in Wrocław
The subject of the analysis in this article is changes in the naming of streets in Grünberg, now Zielona Góra. This city was part of Germany for a long time and was assigned to Poland after World War II.
Joanna Dubiec-Stach
doaj   +1 more source

Ontology Generation of Advanced Persistent Threats and their Automated Analysis

open access: yesNUST Journal of Engineering Sciences, 2016
Advance Persistent Threats (APTs) are a continuous hacking process during which the perpetrator changes signatures and uses different malware to launch an attack.
Zafar Iqbal, Zahid Anwar
doaj   +1 more source

The Problems and Contradictions of Complex Adjectives Codification in the Russian Language

open access: yesВестник Волгоградского государственного университета: Серия 2. Языкознание, 2018
The paper analyzes the linguistic content of the norm regulating the writing of complex adjectives, fixed in the Rules of Russian spelling and punctuation of 1956.
Elena G. Sidorova
doaj   +1 more source

Tracking novel visual word learning via different methods with an original FPVS-EEG approach

open access: yesFrontiers in Human Neuroscience
Reading is a crucial human skill and learning novel written word forms is a life-long process. Here, we tracked the emergence of novel word lexical and neural representations after a training procedure, contrasting two learning methods, in 32 monolingual
Amaury Barillon   +2 more
doaj   +1 more source

BugPrioritizeAI for multimodal test case prioritisation using bug reports, code changes, and test metadata

open access: yesScientific Reports
Regression testing is necessary in modern software development with continuous integration and delivery, but running it in full after every change is often too expensive. Test case prioritisation (TCP) can aid this process by prioritising test cases that
P. Kalyani   +4 more
doaj   +1 more source

Analysis of the Farsi translation of the book Al-Faraj Bad al-Shedda based on the model of Katharina Reiss [PDF]

open access: yesپژوهش‌های ترجمه در زبان و ادبیات عربی
The book Al-Faraj  Bad al-Shedda is one of the narrative works that revives a large part of ancient popular culture and literature In this book, more than two hundred life stories of people caught in problems are depicted in the form of stories.
Sayyed Mehdi Masboogh, Solmaz Ghafari
doaj   +1 more source

Home - About - Disclaimer - Privacy