نتایج جستجو برای: incrementation
تعداد نتایج: 73 فیلتر نتایج به سال:
This paper describes our submission to the WMT 2017 Neural MT Training Task. We modified the provided NMT system in order to allow for interrupting and continuing the training of models. This allowed mid-training batch size decrementation and incrementation at variable rates. In addition to the models with variable batch size, we tried different setups with pre-trained word2vec embeddings. Asid...
The conventional generalized Hough transform (GHT) is useful for detecting or locating translated 2-dimensional (2D) object shapes. However, a weakness of the conventional GHT is that a brute force approach is usually required to handle shape scaling and rotation, resulting in the use of a 4D Hough counting space (HCS). A new version of the GHT, called scaleand orientation-invariant GHT (SOIGHT...
I discuss a stochastic model of language learning and change. During a syntactic change, each speaker makes use of constructions from two different idealized grammars at variable rates. The model incorporates regularization in that speakers have a slight preference for using the dominant idealized grammar. It also includes incrementation: The population is divided into two interacting generatio...
Dynamic sequential computed tomographic scanning with automatic table incrementation uses low milliampere-second technique to eliminate tube cooling delays between scanning slices and, thus, markedly shortens examination times. A total of 25 patients with spinal column trauma involving 28 levels were studied with dynamic scans and retrospectively reviewed. Dynamic studies were considerably fast...
This paper gives a clear look at the segmentation process at the basic level. Segmentation is done at multiple levels so that we will get different results. Segmentation of relative motion descriptors gives a clear picture about the segmentation done for a given input video. Relative motion computation and histograms incrementation are used to evaluate this approach. Also here we will give comp...
Adolescent peaks have been observed across a range of different types of language change (Labov 2001, Tagliamonte and D’Arcy 2009). However, while Labov (2001) finds that peaks are only present in the gender leading the change in phonetic variables, Tagliamonte and D’Arcy (2009) find no gender asymmetry in morphosyntactic and discourse-pragmatic changes. This paper contributes to this issue thr...
1 Region incrementing visual cryptography is used to hide multiple secrecy levels in a single image. In n level region incrementing visual cryptography scheme, image is divided in n regions. Each region consists of one level information. For implementing visual cryptography in n levels we need to encode (n+1) shares in such a way so that any single share is not able to show the information and ...
In this article we present a hardware solution for finite field arithmetic with application in asymmetric cryptography. It supports calculation in GF (p) as well as in GF (2). Addition and multiplication with interleaved modular reduction are the main functionality of the unit. Additional functions—like shift operations and integer incrementation—allow the calculation of the multiplicative inve...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید