نتایج جستجو برای: alphabetic method

تعداد نتایج: 1630969  

2005
John R. Beech

A theory of how children progress through different phases of reading should be an asset both to reading researchers and teachers alike. The present paper provides a brief review of Ehri’s influential four phases of reading development: pre-alphabetic, partial alphabetic, full alphabetic and consolidated alphabetic. The model is flexible enough to acknowledge that children do not necessarily pr...

Journal: :SIAM J. Comput. 1976
Alon Itai

An algorithm of Knuth for finding an optimal binary tree is extended in several directions to solve related problems. The first case considered is restricting the depth of the tree by some predetermined integer K, and a Kn algorithm is given. Next, for trees of degree tr, rather than binary trees, Kn log tr and n log tr algorithms are found for the restricted and nonrestricted cases, respective...

Journal: :Brain and language 2013
Leilei Mei Gui Xue Zhong-Lin Lu Qinghua He Mingxia Zhang Feng Xue Chuansheng Chen Qi Dong

The laterality difference in the occipitotemporal region between Chinese (bilaterality) and alphabetic languages (left laterality) has been attributed to their difference in visual appearance. However, these languages also differ in orthographic transparency. To disentangle the effect of orthographic transparency from visual appearance, we trained subjects to read the same artificial script eit...

Journal: :IBM Journal of Research and Development 1975
Walter S. Rosenbaum John J. Hilliard

A series of techniques is being developed to postprocess noisy, multifont, nonformatted OCR data on a word basis to 1 ) determine if a field is alphabetic or numeric; 2) verify that an alphabetic word is legitimate; 3 ) fetch from a dictionary a set of potential entries using a garbled word as a key; and 4) error-correct the garbled word by selecting the most likely dictionary word. Four algori...

2003
Hisako Asano Masaaki Nagata Masanobu Abe

Modern Japanese texts often include Western sourced words written in Roman alphabet. For example, a shopping directory in a web portal, which lists more than 8,000 shops, includes a total of 6,400 alphabetic words. As most of them are very new and idiosyncratic proper nouns, it is impractical to assume all those alphabetic words can be registered in the word dictionary of a text-to-speech synth...

2007
A. K. Verma C. Joshi

With exponential growth of networked system and application such as e-Commerce, the demand for effective Internet security is increasing. Cryptology is the science and study of systems for secret communication. In consists of two complementary fields of study: cryptography and cryptanalysis. This study presents a cryptanalysis method based on Genetic Algorithm and Tabu Search to break a Mono-Al...

2003
Judith D.M. Grob

A study investigating the way in which people solve alphabetic analogical reasoning tasks (cf Copycat; Hofstadter & Mitchell, 1995), revealed that participants tend to use the same basic strategy, which was modelled in the cognitive architecture ACT-R. Performance evaluations indicate an average goodness of fit of 66.75% and a 100% goodness of fit on a subset of problems for which participants ...

Journal: :Inf. Process. Lett. 2010
Michael B. Baer

An alphabetic binary tree formulation applies to problems in which an outcome needs to be determined via alphabetically ordered search prior to the termination of some window of opportunity. Rather than finding a decision tree minimizing ∑n i=1w(i)l(i), this variant involves minimizing loga ∑n i=1 w(i)a l(i) for a given a ∈ (0, 1). This note introduces a dynamic programming algorithm that finds...

Journal: :Human brain mapping 2005
Li Hai Tan Angela R Laird Karl Li Peter T Fox

We used the activation likelihood estimation (ALE) method to quantitatively synthesize data from 19 published brain mapping studies of phonological processing in reading, six with Chinese and 13 with alphabetic languages. It demonstrated high concordance of cortical activity across multiple studies in each written language system as well as significant differences of activation likelihood betwe...

In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Fillin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید