We address the problem of predicting a word from previous words in a sample of text. In particular, we discuss n-gram models based on classes of words. We also discuss several statistical algorithms for assigning words to classes based on the frequency of their co-occurrence with other words. We find that we are able to extract classes that have the flavor of either syntactically based groupings or semantically based groupings, depending on the nature of the underlying statistics.
资源简介:We address the problem of predicting a word from previous words in a sample of text. In particular, we discuss n-gram models based on classes of words. We also discuss several statistical algorithms for assigning words to classes based on...
上传时间: 2016-12-26
上传用户:xfbs821
资源简介:We address the problem of blind carrier frequency-offset (CFO) estimation in quadrature amplitude modulation, phase-shift keying, and pulse amplitude modulation communications systems.We study the performance of a standard CFO estimate, ...
上传时间: 2014-01-22
上传用户:牛布牛
资源简介:In this paper, we consider the problem of filtering in relational hidden Markov models. We present a compact representation for such models and an associated logical particle filtering algorithm. Each particle contains a logical formula ...
上传时间: 2016-01-02
上传用户:海陆空653
资源简介:The 808 Virus Here another virus from Skism. It s a quick overwriting virus but you can use the source code to write your own viruses.
上传时间: 2013-12-03
上传用户:ippler8
资源简介:In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadline violations. Priority inheritance protocol is one of the approaches to reduce priority inversion. Unfortunately, RTOS like uC/OS can’...
上传时间: 2015-12-14
上传用户:气温达上千万的
资源简介:The problem of image registration subsumes a number of problems and techniques in multiframe image analysis, including the computation of optic flow (general pixel-based motion), stereo correspondence, structure from motion, and feature t...
上传时间: 2016-01-20
上传用户:520
资源简介:In this paper, we describe the development of a rapidly reconfigurable system in which the users’ tacit knowledge and requirements are elicited via a process of Interactive Evolution, finding the image processing parameters to achieve the...
上传时间: 2014-01-05
上传用户:hopy
资源简介:For the incomplete methods, we kept the representation of the queens by a table and the method of calculation to determine if two queens are in conflict, which is much faster for this kind of problems than the representation by a matrix. h...
上传时间: 2015-05-05
上传用户:1159797854
资源简介:This paper deals with the problem of speech enhancement when a corrupted speech signal with an additive colored noise is the only information available for processing. Kalman filtering is known as an effective speech enhancement techniqu...
上传时间: 2015-09-07
上传用户:zhangyi99104144
资源简介:This paper deals with the problem of speech enhancement when only a corrupted speech signal is available for processing. Kalman filtering is known as an effective speech enhancement technique, in which speech signal is usually modeled as...
上传时间: 2013-12-20
上传用户:569342831
资源简介:In this paper, we describe the development of a mobile butterfly-watching learning (BWL) system to realize outdoor independent learning for mobile learners. The mobile butterfly-watching learning system was designed in a wireless mobile a...
上传时间: 2014-11-26
上传用户:waizhang
资源简介:This paper studies the problem of categorical data clustering, especially for transactional data characterized by high dimensionality and large volume. Starting from a heuristic method of increasing the height-to-width ratio of the clust...
上传时间: 2015-10-24
上传用户:evil
资源简介:The present paper deals with the problem of calculating mean delays in polling systems with either exhaustive or gated service. We develop a mean value analysis (MVA) to compute these delay figures. The merits of MVA are in its intrinsic ...
上传时间: 2014-11-17
上传用户:kelimu
资源简介:This a journal paper on the optimization of Max Connection problem in a telecommunication optical network.
上传时间: 2015-12-27
上传用户:xaijhqx
资源简介:The problem of ¯ nding a linear discriminant function will be formulated as a problem of minimizing a criterion function
上传时间: 2014-11-30
上传用户:15071087253
资源简介:Over the past years, we have witnessed destructions of various kinds caused by human actions. As a university student, write a letter to our society to
上传时间: 2014-11-23
上传用户:一诺88
资源简介:This paper studies the problem of tracking a ballistic object in the reentry phase by processing radar measurements. A suitable (highly nonlinear) model of target motion is developed and the theoretical Cramer—Rao lower bounds (CRLB) of...
上传时间: 2014-10-31
上传用户:yyyyyyyyyy
资源简介:This paper studies the problem of tracking a ballistic object in the reentry phase by processing radar measurements. A suitable (highly nonlinear) model of target motion is developed and the theoretical Cramer—Rao lower bounds (CRLB) of...
上传时间: 2014-01-14
上传用户:奇奇奔奔
资源简介:This paper studies the problem of tracking a ballistic object in the reentry phase by processing radar measurements. A suitable (highly nonlinear) model of target motion is developed and the theoretical Cramer—Rao lower bounds (CRLB) of...
上传时间: 2013-12-22
上传用户:asddsd
资源简介:In this program we calculate the sum of the incident and scattered fields in a 90 degree conducting wedge by using the analytic and Image theotem method
上传时间: 2014-10-27
上传用户:lizhen9880
资源简介:In this program we calculate the scattering field of a infinite dielectric cylinder by two methods. 1)Moment 2)Analytic
上传时间: 2017-03-30
上传用户:BIBI
资源简介:In this program we calculate the scattering field of a infinite rectangular surface. I use Physical Optic method and compare the result with exact solution.
上传时间: 2014-01-19
上传用户:362279997
资源简介:This thesis presents a comprehensive overview of the problem of facial recognition. A survey of available facial detection algorithms as well as implementation and tests of di铿€erent feature extraction and dimensionality reduction methods...
上传时间: 2017-05-05
上传用户:royzhangsz
资源简介:FERRET - a broadcast analysis tool This tool is designed to demonstrate the problem of "data seapage". The average machine broadcasts a lot of information about itself on open networks. This tool captures and organizes this information...
上传时间: 2013-11-30
上传用户:1101055045
资源简介:The objective of this project is to create a driver for a camera module (we used the OV7620). After taking the image with the camera, the driver will store into the external asynchronous RAM, and then send it to the computer through a seria...
上传时间: 2017-09-11
上传用户:远远ssad
资源简介:this tar includes my code which employ the Lin-Kernighan algorithm to address the tsp problem. this tar also include some testfiles and config file and a readme which describes how to run this program.
上传时间: 2014-01-10
上传用户:stella2015
资源简介:Organized in a practical problem-and-solution format, More Exceptional C++ picks up where the widely acclaimed Exceptional C++ leaves off, providing successful strategies for solving real-world problems in C++. Drawing from years of in-the-...
上传时间: 2015-10-20
上传用户:chenbhdt
资源简介:What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Pr...
上传时间: 2013-12-25
上传用户:playboys0
资源简介:Carrier-phase synchronization can be approached in a general manner by estimating the multiplicative distortion (MD) to which a baseband received signal in an RF or coherent optical transmission system is subjected. This paper presents a...
上传时间: 2013-11-28
上传用户:windwolf2000
资源简介:This document represents the first stage in a process of taking the National Strategy for Police Information Systems (NSPIS) forward. It defines the mechanisms to ensure that we (and our partners) have access to the right information, in th...
上传时间: 2016-03-08
上传用户:wangdean1101