نتایج جستجو برای: key word bpnts
تعداد نتایج: 651132 فیلتر نتایج به سال:
A fast software encryption algorithm is described. The computation cost is about 20 simple machine code instructions per word, although a key dependent table has to be constructed for each new key. Table construction time is some hundreds of word encryption times. It is a word based algorithm with a running key.
The GE NLTooLsET aims at extracting and deriving useful information from text using a knowledge-based , domain-independent core of text processing tools, and customizing the existing programs to each new task . The program achieves this transportability by using a core knowledge base and lexicon that adapts easil y to new applications, along with a flexible text processing strategy that is tole...
introduction: children with attention deficit hyperactivity disorder have problem in sustain attention that is necessary for learning. the purpose of present study is comparing explicit and implicit memory in children with attention deficit disorder and typically developing children. material and methods: in present cross sectional study, fifteen children with attention deficit disorder compare...
Classifier combination is an effective and broadly useful method of improving system performance. This article investigates in depth a large number of both well-established and novel classifier combination approaches for the word sense disambiguation task, studied over a diverse classifier pool which includes feature-enhanced Näıve Bayes, Cosine, Decision List, Transformation-based Learning and...
objectives: stuttering is one of the most prevalent speech and language disorders. symptomology of stuttering has been surveyed from different aspects such as biological, developmental, environmental, emotional, learning and linguistic. previous researches in english-speaking people have suggested that some linguistic features such as word meanings may play a role in the frequency of speech non...
We present VPS-GradeUp – a set of 11,400 graded human decisions on usage patterns of 29 English lexical verbs from the Pattern Dictionary of English Verbs by Patrick Hanks. The annotation contains, for each verb lemma, a batch of 50 concordances with the given lemma as KWIC, and for each of these concordances we provide a graded human decision on how well the individual PDEV patterns for this p...
We devise a simple modification that essentially doubles the efficiency of the BB84 quantum key distribution scheme proposed by Bennett and Brassard. We also prove the security of our modified scheme against the most general eavesdropping attack that is allowed by the laws of physics. The first major ingredient of our scheme is the assignment of significantly different probabilities to the diff...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید