نتایج جستجو برای: key word

تعداد نتایج: 651123  

2007
Suzanne Curtin Christopher Fennell Paola Escudero

At the end of the first year of life, there is a confluence of two major developments in infant language acquisition. Infants this age are emerging from a period of refining their speech perception skills to native-language contrasts (e.g., Werker & Tees, 1984). Concurrently, the infants’ word learning skills are solidifying. Although infants have some success with word learning prior to 12 mon...

2003
Jin Hu Huang David M. W. Powers

Chinese is written without word delimiters so word segmentation is generally considered a key step in processing Chinese texts. This paper presents a new statistical approach to segment Chinese sequences into words based on contextual entropy on both sides of a bigram. It is used to capture the dependency with the left and right contexts in which a bigram occurs. Our approach tries to segment b...

2005
DAN TUFIŞ

The paper presents a method for word sense disambiguation (WSD) based on parallel corpora. The method exploits recent advances in word alignment and word clustering based on automatic extraction of translation equivalents and is supported by a lexical ontology made of aligned wordnets for the languages in the corpora. The wordnets are aligned to the Princeton Wordnet, according to the principle...

Journal: :CoRR 2017
Ahmed El Shafie Ahmed Sultan Asma Mabrouk Kamel Tourki Naofal Al-Dhahir

This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has be...

2012
Fuchun Guo Yi Mu Willy Susilo

Identity-based traitor tracing (IBTT) scheme can be utilized to identify a private (decryption) key of any identity that is illegally used in an identity-based broadcast encryption scheme. In PKC'07, Abdalla et al. proposed the first IBTT construction with short private key. In CCS'08, Boneh and Naor proposed a publickey traitor tracing, which can be extended to IBTT with short ciphertext. With...

1995
B. Huttner N. Gisin T. Mor

The safety of a quantum key distribution system relies on the fact that any eavesdropping attempt on the quantum channel creates errors in the transmission. For a given error rate, the amount of information that may have leaked to the eavesdropper depends on both the particular system and the eavesdropping strategy. In this work, we discuss quantum cryptographic protocols based on the transmiss...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1391

different researchers in different parts of the world have investigated the strategies used to translate written works ranging from novels to classroom assignments. however, by the significant increase in the number of postgraduate students in iran in the last few years, a very common kind of translation in iran includes translating abstracts of master’s theses. in this work, the researcher hav...

Journal: :journal of research in rehabilitation sciences 0
ناهید بهارلوئی alireza taheri منصوره پیرمرادیان nahid baharloue لیلا قسیسین mansoureh pirmoradian ahmad salehi leila ghesisin علیرضا طاهری ناهید بهارلوئی منصوره پیرمرادیان

introduction: one of the important evaluative indexes of language development is word finding ability. the application of formal assessment tools, such as twf-2, is the most common way of assessing this ability in western countries. there is not any formal assessment tool for assessment of this ability in iran. therefore this study aimed to determine the validity and reliability of persian vers...

Journal: :Da'watuna 2023

Da'wah is een van die communications-active, wat specific specialist in pogings om Islamitiese boodskappe te kommunikeer. Aangesien ontwikkeling automatice tegnologie communication also directepatrone verander communication, moet da'wah nuwe strategyeë en methods ontwikkel veranderinge bestaande epatrone antisipeer communication. uitsending deur television kan dieperceptions Moslem-gemeenskap v...

2001
Samia Snoussi Maddouri Hamid Amiri Abdel Belaïd

In this paper we present a geometrical correction method of handwritten characters. This normalization method is based on Fourier coefficients of a chain-encoded contour. It is carried out in order to improve the rate and the performance of an Arabic handwritten word recognition system. The recognition is based on the global observation of apparent features associated to key-letters of the reco...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید