Automatic Ranking of MT Outputs using Approximations
نویسندگان
چکیده
منابع مشابه
Automatic Ranking of MT Outputs using Approximations
Since long, research on machine translation has been ongoing. Still, we do not get good translations from MT engines so developed. Manual ranking of these outputs tends to be very time consuming and expensive. Identifying which one is better or worse than the others is a very taxing task. In this paper, we show an approach which can provide automatic ranks to MT outputs (translations) taken fro...
متن کاملAutomatic Ranking of MT Systems
In earlier work, we succeeded in automatically predicting the relative rankings of MT systems derived from human judgments on the Fluency, Adequacy or Informativeness of their output. In this paper, we present an experiment – using human evaluators and additional data – designed to test the robustness of our earlier results. These had yielded two promising automatically computable predictors, t...
متن کاملAutomatic Ranking of Machine Translation Outputs Using Linguistic Factors
Machine Translation is the challenging problem in Indian languages. The main goal of MT research are to develop an MT systems that consistently provide high accuracy translations and that have broad coverage to handle the full range of languages. At an age of Internet and Globalization MT have a great demand. Since MT is an automated system; therefore, it is not necessary that the system will p...
متن کاملDEPFIX: A System for Automatic Correction of Czech MT Outputs
We present an improved version of DEPFIX (Mareček et al., 2011), a system for automatic rule-based post-processing of Englishto-Czech MT outputs designed to increase their fluency. We enhanced the rule set used by the original DEPFIX system and measured the performance of the individual rules. We also modified the dependency parser of McDonald et al. (2005) in two ways to adjust it for the pars...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2013
ISSN: 0975-8887
DOI: 10.5120/14217-2463