نتایج جستجو برای: key word
تعداد نتایج: 651123 فیلتر نتایج به سال:
since the word “treasuries” has been mentioned in the koran and hadiths, scholars of the interpretation of the koran and hadiths as well as theologians, philosophers and gnostics have discussed it from several aspects. in this paper, we first interpret it literally, formulating the scholars’ opinions about it; then, we develop the discussion to the “key of treasury” and “treasurers”; finally, ...
the purpose of this paper is organizing, classifying and visualizing the literature of supply chain coordination with mind map method. this method uses all the key skills of brain such as word, image, number, logic, rhythm and color for creating, visualizing, organizing and classifying of ideas. furthermore, it is a good utility for studying and organizing information, solving problems, making ...
Context representations are a key element in distributional models of word meaning. In contrast to typical representations based on neighboring words, a recently proposed approach suggests to represent a context of a target word by a substitute vector, comprising the potential fillers for the target word slot in that context. In this work we first propose a variant of substitute vectors, which ...
Introduction: Cascaded Rayleigh distribution is used to model multipath fading in mobile-to-mobile communication scenarios and provides a better fit to experimental data in such scenarios compared to the conventional Rayleigh channel model, see [1] and references therein. Although there is a vast literature dedicated to the performance analysis over Rayleigh fading channels, there are only a fe...
We present upper and lower bounds on the minimum Euclidean distance dEmin(C) for block coded PSK. The upper bound is an analytic expression depending on the alphabet size q, the block length n and the number of codewords jCj of the code C. This bound is valid for all block codes with q 4 and with medium or high rate codes where jCj > (q=3). The lower bound is valid for Gray coded binary codes o...
We further the study of order-preserving symmetric encryption (OPE), a primitive for allowing efficient range queries on encrypted data, recently initiated (from a cryptographic perspective) by Boldyreva et al. (Eurocrypt ’09). First, we address the open problem of characterizing what encryption via a random order-preserving function (ROPF) leaks about underlying data (ROPF being the “ideal obj...
Growth in the complexity of computing systems, in the dynamism of the environments they operate in, and the need for timely adaptations as conditions change, now pose significant challenges for manual systems management and reconfiguration. There is thus increasing interest in systems that sense relevant conditions and adapt automatically as they change. A problem we have observed in designing ...
This paper proposes a new topic model that exploits word sense information in order to discover less redundant and more informative topics. Word sense information is obtained from WordNet and the discovered topics are groups of synsets, instead of mere surface words. A key feature is that all the known senses of a word are considered, with their probabilities. Alternative configurations of the ...
We address the issue of data sparseness problem in language model (LM). Using class LM is one way to avoid this problem. In class LM, infrequent words are supported by more frequent words in the same class. This paper investigates a class LM based on LSA. A word-document matrix is usually used to represent a corpus in LSA framework. However, this matrix ignores word order in the sentence. We pr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید