8,926 research outputs found

    Assessing the Current State of Net Neutrality and Exploring Solutions in Creating and Maintaining Open, Available, and Innovative Internet and Broadband Services

    Get PDF
    This article examines the current state of net neutrality regulation in the United States. Debates surrounding net neutrality are varied and layered. They include legal questions regarding how the internet should be classified under existing statutes, and the level of authority for federal agencies when regulating internet service providers. The Article will provide an extensive background of net neutrality in the United States, discussing the pertinent case law and legislation that shaped the modern Internet regulatory landscape. It will conclude by discussing the current state of the law, focusing on the perspectives of proponents and opponents of the law as it currently stands under the Restoring Internet Freedom Order. Finally, it will analyze examples of measures that opponents of the Restoring Internet Freedom Order are taking to repeal it

    Molière's life and a critical study of some of his famous works

    Full text link
    Thesis (M.A.)--Boston Universit

    What happens when a woman wins an election? Evidence from close races in Brazil

    Get PDF
    This paper analyzes the effect of the gender of local policymakers on policy outcomes. Analyzing a rich dataset from Brazilian municipalities and using a regression discontinuity design, we find that municipalities ruled by female mayors have better health outcomes, receive more federal discretionary transfers, and have lower corruption. Additionally, male mayors hire more temporary public employees than their female counterparts when they are allowed to run for re-election, and when municipal elections are approaching. These findings suggest that male mayors may promote more political patronage than female mayors and that men and women may respond differently to local election incentives

    Regression Driven F--Transform and Application to Smoothing of Financial Time Series

    Full text link
    In this paper we propose to extend the definition of fuzzy transform in order to consider an interpolation of models that are richer than the standard fuzzy transform. We focus on polynomial models, linear in particular, although the approach can be easily applied to other classes of models. As an example of application, we consider the smoothing of time series in finance. A comparison with moving averages is performed using NIFTY 50 stock market index. Experimental results show that a regression driven fuzzy transform (RDFT) provides a smoothing approximation of time series, similar to moving average, but with a smaller delay. This is an important feature for finance and other application, where time plays a key role.Comment: IFSA-SCIS 2017, 5 pages, 6 figures, 1 tabl

    Standardization of guidelines for patient photograph deidentification

    Full text link
    IMPORTANCE: This work was performed to advance patient care by protecting patient anonymity. OBJECTIVES: This study aimed to analyze the current practices used in patient facial photograph deidentification and set forth standardized guidelines for improving patient autonomy that are congruent with medical ethics and Health Insurance Portability and Accountability Act. DESIGN: The anonymization guidelines of 13 respected journals were reviewed for adequacy in accordance to facial recognition literature. Simple statistics were used to compare the usage of the most common concealment techniques in 8 medical journals which may publish the most facial photographs. SETTING: Not applicable. PARTICIPANTS: Not applicable. MAIN OUTCOME MEASURES: Facial photo deidentification guidelines of 13 journals were ascertained. Number and percentage of patient photographs lacking adequate anonymization in 8 journals were determined. RESULTS: Facial image anonymization guidelines varied across journals. When anonymization was attempted, 87% of the images were inadequately concealed. The most common technique used was masking the eyes alone with a black box. CONCLUSIONS: Most journals evaluated lack specific instructions for properly de-identifying facial photographs. The guidelines introduced here stress that both eyebrows and eyes must be concealed to ensure patient privacy. Examples of proper and inadequate photo anonymization techniques are provided. RELEVANCE: Improving patient care by ensuring greater patient anonymity

    Challenges in Emotion Style Transfer: An Exploration with a Lexical Substitution Pipeline

    Full text link
    We propose the task of emotion style transfer, which is particularly challenging, as emotions (here: anger, disgust, fear, joy, sadness, surprise) are on the fence between content and style. To understand the particular difficulties of this task, we design a transparent emotion style transfer pipeline based on three steps: (1) select the words that are promising to be substituted to change the emotion (with a brute-force approach and selection based on the attention mechanism of an emotion classifier), (2) find sets of words as candidates for substituting the words (based on lexical and distributional semantics), and (3) select the most promising combination of substitutions with an objective function which consists of components for content (based on BERT sentence embeddings), emotion (based on an emotion classifier), and fluency (based on a neural language model). This comparably straight-forward setup enables us to explore the task and understand in what cases lexical substitution can vary the emotional load of texts, how changes in content and style interact and if they are at odds. We further evaluate our pipeline quantitatively in an automated and an annotation study based on Tweets and find, indeed, that simultaneous adjustments of content and emotion are conflicting objectives: as we show in a qualitative analysis motivated by Scherer's emotion component model, this is particularly the case for implicit emotion expressions based on cognitive appraisal or descriptions of bodily reactions.Comment: Accepted at the SocialNLP Workshop at ACL 202
    corecore