This paper describes a computational approach to resolving the true referent of a named mention of a person in the body of an email. A generative model of mention generation is used to guide mention resolution. Result...
详细信息
Inverse Document Frequency (IDF) is an important quantity in many applications, including Information Retrieval. IDF is defined in terms of document frequency, df (w), the number of documents that mention w at least o...
详细信息
The recently introduced online confidence-weighted (CW) learning algorithm for binary classification performs well on many binary NLP tasks. However, for multi-class problems CW learning updates and inference cannot b...
详细信息
We propose a simple and effective method to build a meta-level Statistical Machine Translation (SMT), called meta-SMT, for system combination. Our approach is based on the framework of Stacked Generalization, also kno...
详细信息
Many techniques are implemented to perform fingerprint recognition approach, and each technique based on specific criteria. The aim of this work is to find an efficient fingerprint recognition technique. This paper tr...
详细信息
ISBN:
(纸本)9781538629567
Many techniques are implemented to perform fingerprint recognition approach, and each technique based on specific criteria. The aim of this work is to find an efficient fingerprint recognition technique. This paper tries to offer a simple high performance approach to perform fingerprint recognition. This approach based on two main stages; the first one is the real data collection of human fingerprint samples and the second stage is concentrated on design and implementation of high performance fingerprint recognition approach. The implemented approach concentrated on the feature extraction part in which many levels of two dimensional discrete wavelet transform (2D-DWT) are used to generate high performance feature. This approach is implemented via mixing the features of both right hand thumb and left hand thumb. The results indicate that a good accuracy of recognition is obtained by this approach.
For cyclic codes some well-known lower bounds and some decoding methods up to the half of the bounds are suggested. Particularly, the shift bound is a good lower bound of the minimum distance or cyclic codes, Reed-Mul...
详细信息
Map usage on handheld devices suffers from limited screen size and the minimal attention that users can dedicate to them in mobile situations. This work examines effects of automating navigation features like zooming ...
详细信息
computer games are fun, exciting and motivational when used as leisure pursuits. But do they have similar attributes when utilized for educational purposes? This article investigates whether learning by computer game ...
详细信息
PLDA is a popular normalization approach for the i-vector model, and it has delivered state-of-the-art performance in speaker verification. However, PLDA training requires a large amount of labeled development data, w...
详细信息
Differential privacy provides a formal approach to privacy of individuals. Applications of differential privacy in various scenarios, such as protecting users' original utterances, must satisfy certain mathematica...
详细信息
暂无评论