Usually, Stemmers are manually created by native target language speakers, on the basis of rules for suffix stripping or replacements. In such cases linguistic knowledge of the target language is a requirement. There ...
详细信息
ISBN:
(纸本)9798400713170
Usually, Stemmers are manually created by native target language speakers, on the basis of rules for suffix stripping or replacements. In such cases linguistic knowledge of the target language is a requirement. There are also approaches for automatic creation of stemmers. The later approaches are usually based on statistical processing of text corpuses to calculate the occurrences and other metrics for stems and affixes. In such cases linguistic knowledge of the target language is not needed. We have invented a semi-automatic methodology (and we have made an equivalent implementation) for Stemmer generation that neither linguistic knowledge of target language nor statistical processing of corpuses is needed. In our approach only Information Retrieval expertise is needed. Here we are evaluating our approach against the rule-based (linguistic-knowledge-based) approach. To do so we evaluate two stemmers by a native speaker of the target (Polish) language. The first Stemmer is rule-based (it incorporates linguistic knowledge of Polish language) and the second one is based on our methodology (only the experience of Information Retrieval Experts is incorporated). The results are interesting and hard to wait for, they are in favor of our methodology.
Considering the fact of increasing population and as a result, the number of patients is constantly increasing the delivery of medical services must be prompt and of good quality. There is no question that any perfect...
详细信息
Printed Electronics (PE) technology has emerged as a promising alternative to silicon-based computing. It offers attractive properties such as on-demand ultra-low-cost fabrication, mechanical flexibility, and conforma...
详细信息
Printed Electronics (PE) provide a mechanically flexible and cost-effective solution for machine learning (ML) circuits, compared to silicon-based technologies. However, due to large feature sizes, printed classifiers...
详细信息
Printed Electronics (PE) provide a mechanically flexible and cost-effective solution for machine learning (ML) circuits, compared to silicon-based technologies. However, due to large feature sizes, printed classifiers...
详细信息
ISBN:
(数字)9783982674100
ISBN:
(纸本)9798331534646
Printed Electronics (PE) provide a mechanically flexible and cost-effective solution for machine learning (ML) circuits, compared to silicon-based technologies. However, due to large feature sizes, printed classifiers are limited by high power, area, and energy overheads, which restricts the realization of battery-powered systems. In this work, we design sequential printed bespoke Support Vector Machine (SVM) circuits that adhere to the power constraints of existing printed batteries while minimizing energy consumption, thereby boosting battery life. Our results show 6.5x energy savings while maintaining higher accuracy compared to the state of the art.
The manual analysis of job resumes poses specific challenges, including the time-intensive process and the high likelihood of human error, emphasizing the need for automation in content-based recommendations. Recent a...
详细信息
The Metaverse, a dynamic and immersive virtual realm, has captured the imagination of researchers and enthusiasts worldwide. This survey paper aims to introduce a groundbreaking taxonomy for the characteristics of the...
详细信息
Satellite images are widely used for remote sensing and defence applications,however,they are subject to a variety of *** ensure the security and privacy of these images,theymust be watermarked and encrypted before **...
详细信息
Satellite images are widely used for remote sensing and defence applications,however,they are subject to a variety of *** ensure the security and privacy of these images,theymust be watermarked and encrypted before ***,this paper proposes a novel watermarked satellite image encryption scheme based on chaos,Deoxyribonucleic Acid(DNA)sequence,and hash *** watermark image,DNA sequence,and plaintext image are passed through the Secure Hash Algorithm(SHA-512)to compute the initial condition(keys)for the Tangent-Delay Ellipse Reflecting Cavity Map(TD-ERCS),Henon,and Duffing chaotic maps,*** bitwise XOR and substitution,the TD-ERCS map encrypts the watermark *** ciphered watermark image is embedded in the plaintext *** embedded plaintext image is permuted row-wise and column-wise using the Henon chaotic *** permuted image is then bitwise XORed with the values obtained from the Duffing *** additional security,the XORed image is substituted through a dynamic *** evaluate the efficiency and performance of the proposed algorithm,several tests are performed which prove its resistance to various types of attacks such as brute-force and statistical attacks.
FC Portugal, a simulated humanoid soccer team from the universities of Porto and Aveiro, achieved the third consecutive victory in the main competition of the 2024 RoboCup 3D Simulation League. The team registered 16 ...
详细信息
暂无评论