We address the problem of predicting a word from previous words in a sample of text. In particular, we discuss n-gram models based on classes of words. We also discuss several statistical algorithms for assigning words to classes based on the frequency of their co-occurrence with other words. We find that we are able to extract classes that have the flavor of either syntactically based groupings or semantically based groupings, depending on the nature of the underlying statistics.
資源簡介:We address the problem of predicting a word from previous words in a sample of text. In particular, we discuss n-gram models based on classes of words. We also discuss several statistical algorithms for assigning words to classes based on...
上傳時間: 2016-12-26
上傳用戶:xfbs821
資源簡介:We address the problem of blind carrier frequency-offset (CFO) estimation in quadrature amplitude modulation, phase-shift keying, and pulse amplitude modulation communications systems.We study the performance of a standard CFO estimate, ...
上傳時間: 2014-01-22
上傳用戶:牛布牛
資源簡介:In this paper, we consider the problem of filtering in relational hidden Markov models. We present a compact representation for such models and an associated logical particle filtering algorithm. Each particle contains a logical formula ...
上傳時間: 2016-01-02
上傳用戶:海陸空653
資源簡介:The 808 Virus Here another virus from Skism. It s a quick overwriting virus but you can use the source code to write your own viruses.
上傳時間: 2013-12-03
上傳用戶:ippler8
資源簡介:In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadline violations. Priority inheritance protocol is one of the approaches to reduce priority inversion. Unfortunately, RTOS like uC/OS can’...
上傳時間: 2015-12-14
上傳用戶:氣溫達上千萬的
資源簡介:The problem of image registration subsumes a number of problems and techniques in multiframe image analysis, including the computation of optic flow (general pixel-based motion), stereo correspondence, structure from motion, and feature t...
上傳時間: 2016-01-20
上傳用戶:520
資源簡介:In this paper, we describe the development of a rapidly reconfigurable system in which the users’ tacit knowledge and requirements are elicited via a process of Interactive Evolution, finding the image processing parameters to achieve the...
上傳時間: 2014-01-05
上傳用戶:hopy
資源簡介:For the incomplete methods, we kept the representation of the queens by a table and the method of calculation to determine if two queens are in conflict, which is much faster for this kind of problems than the representation by a matrix. h...
上傳時間: 2015-05-05
上傳用戶:1159797854
資源簡介:This paper deals with the problem of speech enhancement when a corrupted speech signal with an additive colored noise is the only information available for processing. Kalman filtering is known as an effective speech enhancement techniqu...
上傳時間: 2015-09-07
上傳用戶:zhangyi99104144
資源簡介:This paper deals with the problem of speech enhancement when only a corrupted speech signal is available for processing. Kalman filtering is known as an effective speech enhancement technique, in which speech signal is usually modeled as...
上傳時間: 2013-12-20
上傳用戶:569342831
資源簡介:In this paper, we describe the development of a mobile butterfly-watching learning (BWL) system to realize outdoor independent learning for mobile learners. The mobile butterfly-watching learning system was designed in a wireless mobile a...
上傳時間: 2014-11-26
上傳用戶:waizhang
資源簡介:This paper studies the problem of categorical data clustering, especially for transactional data characterized by high dimensionality and large volume. Starting from a heuristic method of increasing the height-to-width ratio of the clust...
上傳時間: 2015-10-24
上傳用戶:evil
資源簡介:The present paper deals with the problem of calculating mean delays in polling systems with either exhaustive or gated service. We develop a mean value analysis (MVA) to compute these delay figures. The merits of MVA are in its intrinsic ...
上傳時間: 2014-11-17
上傳用戶:kelimu
資源簡介:This a journal paper on the optimization of Max Connection problem in a telecommunication optical network.
上傳時間: 2015-12-27
上傳用戶:xaijhqx
資源簡介:The problem of ¯ nding a linear discriminant function will be formulated as a problem of minimizing a criterion function
上傳時間: 2014-11-30
上傳用戶:15071087253
資源簡介:Over the past years, we have witnessed destructions of various kinds caused by human actions. As a university student, write a letter to our society to
上傳時間: 2014-11-23
上傳用戶:一諾88
資源簡介:This paper studies the problem of tracking a ballistic object in the reentry phase by processing radar measurements. A suitable (highly nonlinear) model of target motion is developed and the theoretical Cramer—Rao lower bounds (CRLB) of...
上傳時間: 2014-10-31
上傳用戶:yyyyyyyyyy
資源簡介:This paper studies the problem of tracking a ballistic object in the reentry phase by processing radar measurements. A suitable (highly nonlinear) model of target motion is developed and the theoretical Cramer—Rao lower bounds (CRLB) of...
上傳時間: 2014-01-14
上傳用戶:奇奇奔奔
資源簡介:This paper studies the problem of tracking a ballistic object in the reentry phase by processing radar measurements. A suitable (highly nonlinear) model of target motion is developed and the theoretical Cramer—Rao lower bounds (CRLB) of...
上傳時間: 2013-12-22
上傳用戶:asddsd
資源簡介:In this program we calculate the sum of the incident and scattered fields in a 90 degree conducting wedge by using the analytic and Image theotem method
上傳時間: 2014-10-27
上傳用戶:lizhen9880
資源簡介:In this program we calculate the scattering field of a infinite dielectric cylinder by two methods. 1)Moment 2)Analytic
上傳時間: 2017-03-30
上傳用戶:BIBI
資源簡介:In this program we calculate the scattering field of a infinite rectangular surface. I use Physical Optic method and compare the result with exact solution.
上傳時間: 2014-01-19
上傳用戶:362279997
資源簡介:This thesis presents a comprehensive overview of the problem of facial recognition. A survey of available facial detection algorithms as well as implementation and tests of di鏗€erent feature extraction and dimensionality reduction methods...
上傳時間: 2017-05-05
上傳用戶:royzhangsz
資源簡介:FERRET - a broadcast analysis tool This tool is designed to demonstrate the problem of "data seapage". The average machine broadcasts a lot of information about itself on open networks. This tool captures and organizes this information...
上傳時間: 2013-11-30
上傳用戶:1101055045
資源簡介:The objective of this project is to create a driver for a camera module (we used the OV7620). After taking the image with the camera, the driver will store into the external asynchronous RAM, and then send it to the computer through a seria...
上傳時間: 2017-09-11
上傳用戶:遠遠ssad
資源簡介:this tar includes my code which employ the Lin-Kernighan algorithm to address the tsp problem. this tar also include some testfiles and config file and a readme which describes how to run this program.
上傳時間: 2014-01-10
上傳用戶:stella2015
資源簡介:Organized in a practical problem-and-solution format, More Exceptional C++ picks up where the widely acclaimed Exceptional C++ leaves off, providing successful strategies for solving real-world problems in C++. Drawing from years of in-the-...
上傳時間: 2015-10-20
上傳用戶:chenbhdt
資源簡介:What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Pr...
上傳時間: 2013-12-25
上傳用戶:playboys0
資源簡介:Carrier-phase synchronization can be approached in a general manner by estimating the multiplicative distortion (MD) to which a baseband received signal in an RF or coherent optical transmission system is subjected. This paper presents a...
上傳時間: 2013-11-28
上傳用戶:windwolf2000
資源簡介:This document represents the first stage in a process of taking the National Strategy for Police Information Systems (NSPIS) forward. It defines the mechanisms to ensure that we (and our partners) have access to the right information, in th...
上傳時間: 2016-03-08
上傳用戶:wangdean1101