In this paper, we use a lexical method to do sentence alignment for an English-Chinese corpus. Past research slows that alignment using a dictionary involves a lot of word matching and dictionary look ups. To address ...
详细信息
In this paper, we use a lexical method to do sentence alignment for an English-Chinese corpus. Past research slows that alignment using a dictionary involves a lot of word matching and dictionary look ups. To address these two issues, we first restrict the range of candidate target sentences, based on the location of the source sentence relative to the beginning of the text. Moreover, careful empirical selection of stop words, based on word frequencies in the source text, helps to reduce the number of dictionary look ups. Experimental results show that the amount of word matching can be cut down by 75% and that of dictionary look ups by as much as 43% without sacrificing precision and recall. Another experiment was also done with twenty New York Times articles with 598 sentences and 18395 words. The resulted precision is 95.6% and the recall is 93.8%. Among all predicted alignment, 86% of the alignment is 1:1 (one source sentence to one target sentence), 8% is 1:2, and 6% is 2:1. Further analysis shows that most errors occur in alignments of types 1:2 and 2:1. Future work should focus on problems with these two alignment types.
In this paper, a novel variable rate based time frame scheduling scheme is proposed to further reduce collisions and improve energy saving in wireless sensor networks. The MAC combines CSMA and TDMA functionalities, w...
详细信息
Prolonging the lifetime is an important design consideration for battery powered wireless sensor networks. In a network with stationary sink, the sensor nodes located near the sink have to relay data from the rest of ...
详细信息
ISBN:
(纸本)9781605581491
Prolonging the lifetime is an important design consideration for battery powered wireless sensor networks. In a network with stationary sink, the sensor nodes located near the sink have to relay data from the rest of the network and thus deplete their energy very quickly. A sink mobility strategy was proposed in [1], which manages the sink to move along the periphery of the network for load-balancing. In this paper, based on the work in [1], we study the relationship of the energy efficiency and load-balancing. A novel mobility scheme for sink has been proposed to achieve the energy efficient load-balancing. By this scheme, the sink is controlled to move along a circle trajectory in a stationary for data buffering. All sensed data are forwarded into the annularity area firstly and then collected by the mobile sink. We find the optimum trajectory of sink movement with consideration of energy consumption and load-balancing and present how to find the location for the buffering area. Compared with the static sink scheme and the existing mobile sink scheme, the proposed is the most energy-efficient and it can reduce the load by 95% and 70%, respectively. Copyright 2008 ACM.
Promoter recognition is important for the understanding of gene transcription mechanisms and gene functions. The motifs, short DNA slices as transcription factor binding sites, can help do an effective promoter recogn...
详细信息
Promoter recognition is important for the understanding of gene transcription mechanisms and gene functions. The motifs, short DNA slices as transcription factor binding sites, can help do an effective promoter recognition. In this paper, the dependent relations of codons are analyzed using Independent Component Analysis to extract more effective promoter features. Experiments exploit the data of human chromosome 22. The experiment results show that the deeper relations of motifs can effectively increase the sensitivity of promoter recognition.
Run length encoding can be found in numerous applications such as data transfer or image storing (Sayood, 2002). It is a well known, easy and efficient compression method based on the assumption of long data sequences...
详细信息
ISBN:
(纸本)9780863419317
Run length encoding can be found in numerous applications such as data transfer or image storing (Sayood, 2002). It is a well known, easy and efficient compression method based on the assumption of long data sequences without the change of content. These sequences can be described by their position and length of appearance. Implementations using dedicated logic are optimised for parallel data processing. Here, images are transferred in blocks of multiple pixels in parallel. A compression of these streams into a run length code requires an encoder with a parallel input. This run length encoder has to compress the sequence at a minimum of clock cycles to avoid long inhibit intervals at the input. This paper describes a hardware algorithm performing a high performance run length encoding for binary images using a parallel input.
A design of data fusion software architecture for laser radar and FLIR was introduced in the paper; this architecture can achieve data fusion on decision-layer for control and guide with multi-sensors system of guided...
详细信息
A design of data fusion software architecture for laser radar and FLIR was introduced in the paper; this architecture can achieve data fusion on decision-layer for control and guide with multi-sensors system of guided missile. This design realizes the practicability and reliability of system enough, and collects information by laser radar and FLIR, and achieve a new method of control and guide with multi-sensors, that includes target identification, navigation, orientation, and anti-jamming.
Wireless video security becomes an important challenge for commercial applications. Two efficient encryption algorithms for video system, Signed Integer Exponential-Golomb Coded (SE) Encryption Algorithm and Context-A...
详细信息
The problem of characterizing lower bounds on data-rates needed for closed loop stability has been solved in a variety of settings. However, the available results lead to coding schemes which are very complex and, thu...
详细信息
ISBN:
(纸本)9781424431236
The problem of characterizing lower bounds on data-rates needed for closed loop stability has been solved in a variety of settings. However, the available results lead to coding schemes which are very complex and, thus, of limited practical interest. In this paper, we show how simple coding systems comprising only LTI filters and memoryless entropy coded dithered scalar quantizers can be used to stabilize strongly stabilizable SISO LTI plant models over error-free bit-rate limited feedback channels. Despite the simplicity of the building blocks employed, we prove that the data-rates incurred do not exceed absolute lower bounds by more than 1.25 bits per sample.
This paper describes the implementation of a general and embedded decoder for the evaluation of unstructured low-density parity-check (LDPC) codes over additive-white Gaussian noise (AWGN) channels. The decoder, which...
详细信息
This paper describes the implementation of a general and embedded decoder for the evaluation of unstructured low-density parity-check (LDPC) codes over additive-white Gaussian noise (AWGN) channels. The decoder, which has a serial architecture and moderate throughput, is a peripheral connected to the embedded Power PC processor of a Xilinx Virtex-II Pro FPGA and is managed by the processor. This method of hardware/software implementation provides the maximum flexibility for the development and rapid prototyping of the hardware-based simulator system. The decoding algorithm proposed in this paper belongs to the class of min-sum with correction factor in which the correction factor updates with the log-likelihood ratio (LLR) values.
Evolutionary gradient search is a hybrid algorithm that exploits the complementary features of gradient search and evolutionary algorithm to achieve a level of efficiency and robustness that cannot be attained by eith...
详细信息
Evolutionary gradient search is a hybrid algorithm that exploits the complementary features of gradient search and evolutionary algorithm to achieve a level of efficiency and robustness that cannot be attained by either techniques alone. Unlike the conventional coupling of local search operators and evolutionary algorithm, this algorithm follows a trajectory based on the gradient information that is obtain via the evolutionary process. In this paper, we consider how gradient information can be obtained and used in the context of multi-objective optimization problems. The different types of gradient information are used to guide the evolutionary gradient search to solve multi-objective problems. Experimental studies are conducted to analyze and compare the effectiveness of various implementations.
暂无评论