To see the other types of publications on this topic, follow the link: Word 97. (Computer file).

Journal articles on the topic 'Word 97. (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Word 97. (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kim, Hyunji, Jaehoon Park, Hyeokdong Kwon, Kyoungbae Jang, and Hwajeong Seo. "Convolutional Neural Network-Based Cryptography Ransomware Detection for Low-End Embedded Processors." Mathematics 9, no. 7 (March 24, 2021): 705. http://dx.doi.org/10.3390/math9070705.

Full text
Abstract:
A crypto-ransomware has the process to encrypt victim’s files. Afterward, the crypto-ransomware requests a ransom for the password of encrypted files to victims. In this paper, we present a novel approach to prevent crypto-ransomware by detecting block cipher algorithms for Internet of Things (IoT) platforms. We extract the sequence and frequency characteristics from the opcode of binary files for the 8-bit Alf and Vegard’s RISC (AVR) processor microcontroller. In other words, the late fusion method is used to extract two features from one source data, learn through each network, and integrate them. We classify the crypto-ransomware virus or harmless software through the proposed method. The general software from AVR packages and block cipher implementations written in C language from lightweight block cipher library (i.e., Fair Evaluation of Lightweight Cryptographic Systems (FELICS)) are trained through the deep learning network and evaluated. The general software and block cipher algorithms are successfully classified by training functions in binary files. Furthermore, we detect binary codes that encrypt a file using block ciphers. The detection rate is evaluated in terms of F-measure, which is the harmonic mean of precision and recall. The proposed method not only achieved 97% detection success rate for crypto-ransomware but also achieved 80% success rate in classification for each lightweight cryptographic algorithm and benign firmware. In addition, the success rate in classification for Substitution-Permutation-Network (SPN) structure, Addition-Rotation-eXclusive-or structures (ARX) structure, and benign firmware is 95%.
APA, Harvard, Vancouver, ISO, and other styles
2

Amos, Adediran Adekunle. "Sources of Information for Social Studies Teachers and their Level of usage in Abeokuta, Ogun State Nigeria." Information Management and Business Review 4, no. 10 (October 15, 2012): 517–22. http://dx.doi.org/10.22610/imbr.v4i10.1007.

Full text
Abstract:
The study examined sources of information for teachers in social studies and their level of usage in secondary schools. The design of this study was descriptive of survey type. Data was collected from twentyfour (24) secondary schools and was randomly selected from Abeokuta north local government and Abeokuta south local government area of Ogun state, Nigeria. Ninety-seven (97) secondary schools female and male teachers of different age- grades, qualifications and experience were used as sample. Questionnaire was made use of for data collection. The questionnaire was the close-ended likert- type technique that expresses degree of agreement or disagreement with he supplied statement. Data was analyzed using standard deviation, students- t-test statistics, mean and rank order. The findings of the study revealed that, teachers’ sources of information for social studies include reference materials, newspapers, journals, literary materials, historical monuments and artefacts, television, textbooks, resource person, magazines, pamphlet, bulletins and radio. Computer component, such as e-mail, file transfer protocol, World Wide Web (www) rarely used by social studies teachers. Recommendations were made which includes computer training be provided for social studies teachers at all level of education in Nigeria and modern information centers with integrated circuits and digital communication to link schools should be provided at local levels for the use of teachers, particularly for social studies teachers.
APA, Harvard, Vancouver, ISO, and other styles
3

Pitaud, Philippe. "The Elderly, Digital Technologies and the Breakdown of Social Ties: Risks of Exclusion or Lures of Inclusion?" Ciências e Políticas Públicas / Public Sciences & Policies 6, no. 2 (December 2020): 79–97. http://dx.doi.org/10.33167/2184-0644.cpp2020.vvin2/pp.79-97.

Full text
Abstract:
When you are old in France in 2019, you do not have to be living on the street to be excluded or even feel excluded from a society that is increasingly turning its back on some of its members, because of the digital revolution imposed on citizens. In fact, faced with the excessive digitization advocated by governing bodies and other technocrats, which is rising speedily like a Tsunami, the elderly, often single women and/or widows belonging to underprivileged categories of society, generally with little or no education, and even less awareness in terms of management of minimal IT practices, are already or will soon find themselves on the sidelines of this type of modernization, which has nothing inclusive about it. A few local actors in the social and medico-social field and rights activists are already sounding the alarm and raising the voices of anguish in defense of these elderly people who no longer know how to cope with the dehumanization of public services: “I am 78 years old, I have a very small pension, no computer and anyway, I do not know how to do anything. So, it is annoying now because I have to get help and I do not know people who can help me. I am going to have to go there. It is a long way from home, I have to wait a long time and I am tired. And then you must be sure that there will be someone there!”. Aware of this dynamic of exclusion that is currently taking place and because we have been collecting the signs of this disarray for months, aggravated by isolation and loneliness, our action-research approach aims in the long run to implement counter-actions that aim to offset the harmful effects induced by the digital transition on the social life of the elderly, while seeking to free them from the negative confinement into which their inability to manage this transition by themselves has insidiously led them. It is these changes in the aspects of the most fragile of human existences that are at the heart of our approach as researchers-practitioners, as well as of our actions; acting like a mild buffer against the inhumanity of the system that is inexorably set up when a robot signals to you: “You have exceeded the deadline [note that this word contains the word ‘dead’] for the submission of your file on the lambda portal and therefore the administration can no longer do anything for you.”. There is no doubt that this is an immediate field of action for public policies, particularly in the fight against the digital exclusion of older citizens. For the time being, as always, in France, associations and humanitarian actors compensate for this absence of public authority with their limited means, but such a situation cannot last without in the long term seriously affecting societal balance and the moral principles of social justice, such as access to rights for all.
APA, Harvard, Vancouver, ISO, and other styles
4

Ceccon Ribeiro, Paula, Melissa L. Biles, Charles Lang, Claudio Silva, and Jan L. Plass. "Visualizing log-file data from a game using timed word trees." Information Visualization 17, no. 3 (August 2, 2017): 183–95. http://dx.doi.org/10.1177/1473871617720810.

Full text
Abstract:
In this article, we present the application of a method for visualizing gameplay patterns observed in log-file data from a geometry game. Using VisCareTrails, a data visualization software system based on the principle of timed word trees, we were able to identify five novel behaviors that informed our understanding of how players were approaching the game. We further utilized these newly identified player behaviors by triangulating them with geometry test scores collected from players outside the game setting. We compared the predictive capacity of these behaviors against five demographic characteristics commonly observed to be associated with educational outcomes: age, gender, ethnicity, mother’s education, and attitude toward video games. Two of the novel behaviors we identified, both reflecting inflexible problem-solving strategies, outperformed all demographic variables except age in terms of predicting change in geometry test scores post-gameplay. We believe that this is sound evidence for the utility of VisCareTrails and the timed-word-tree method for identifying pedagogically relevant player behaviors from semi-structured data associated with educational games.
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Zhi Qiang, Yayin Du, and Feng Liu. "Catastrophe Model of Elastic Compression Pole Buckling." Applied Mechanics and Materials 166-169 (May 2012): 3369–73. http://dx.doi.org/10.4028/www.scientific.net/amm.166-169.3369.

Full text
Abstract:
This screen is for uploading/submitting a new manuscript. This screen is NOT for updating revised versions of a previously submitted manuscript (click on 'My Papers' above to revise previous submissions). To upload/submit a new manuscript, first enter the title of the manuscript into the 'Paper Title' box. Then use the Browse buttons below to select BOTH a Word file and a PDF file on your computer of the manuscript that you are submitting. After you have selected both Word and PDF files from your local computer and entered your title, press the 'Update' button and the files will be transferred to our online system.
APA, Harvard, Vancouver, ISO, and other styles
6

Aqilah Mohd Nahar, Nur Farah, Nurul Hidayah Ab Rahman, and Kamarudin Malik Mohammad. "E-Raser: File Shredder Application With Content Replacement by Using Random Words Function." JOIV : International Journal on Informatics Visualization 2, no. 4-2 (September 10, 2018): 313. http://dx.doi.org/10.30630/joiv.2.4-2.175.

Full text
Abstract:
Data shredding indicates a process of irreversible file destruction while file shredder is the program designed to render computer-based files unreadable by implementing overwriting method to destroy data in the content of a file. The addressable problem with existence of file recovery tools is it may lead to data leakage, exploitation or dissemination from an unauthorized person. Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. A file shredder application named E-Raser was developed to shred Microsoft Word documents with (.doc) or (.docx) format. The implemented algorithm replaced the original content of the files with uninformative words provided by the application. After rewriting phase is complete, shredding process take place to make the file unrecoverable. Object Oriented Software Development was used as the methodology to develop this application. As a result, E-Raser achieved the objectives to add, remove, rewrite, display and shred files. Also, E-Raser is significantly facilitates users to securely dispose their file, protect the confidentiality and privacy of the file’s content.
APA, Harvard, Vancouver, ISO, and other styles
7

Khumrin, Piyapong, Ariyaphong Wongnoppavich, Khemmapop Boonploy, and Volaluck Supajatura. "A new approach to Computer-Based Examinations using word documents and spreadsheets." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12, no. 3 (January 10, 2014): 3319–24. http://dx.doi.org/10.24297/ijct.v12i3.3241.

Full text
Abstract:
This paper describes a new approach to computer based testing where lecturers submit questions via word document which is processed to produce an examination, with student results analyzed and reported in a spreadsheet. The overall process starts with lecturers sending question files in word document format via email to the service provider. The questions are passed through the approval process using the editing system and then transferred to the examination system. The examination system directly accesses information from the question files to create a test, which students complete by inserting their answers directly into the spreadsheet file. Finally, the data are analyzed using spreadsheet formulas and the report system sends the results to students' emails. The document based approach helps the system implementation to be simpler and well accepted by the users while consistent with organizational requirements of moving towards electronic data management.
APA, Harvard, Vancouver, ISO, and other styles
8

Dervos, D., Y. Manolopoulos, and P. Linardis. "Comparison of signature file models with superimposed coding." Information Processing Letters 65, no. 2 (January 1998): 101–6. http://dx.doi.org/10.1016/s0020-0190(97)00210-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Eladawi, A. E., E. S. Gadelmawla, I. M. Elewa, and A. A. Abdel-Shafy. "An application of computer vision for programming computer numerical control machines." Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture 217, no. 9 (September 1, 2003): 1315–24. http://dx.doi.org/10.1243/095440503322420241.

Full text
Abstract:
Generation of the part programs, or tool paths, for products to be manufactured by computer numerical control (CNC) machines is very important. Many methods have been used to produce part programs, ranging from manual calculations to computer aided design/ manufacturing (CAD/CAM) systems. This work introduces a new technique for generating the part programs of existing products using the latest technology of computer vision. The proposed vision system is applicable for two-dimensional vertical milling CNC machines and is calibrated to produce both metric and imperial dimensions. Two steps are used to generate the part program. In the first step, the vision system is used to capture an image for the product to be manufactured. In the second step, the image is processed and analysed by software specially written for this purpose. The software CNCVision is fully written (in lab) using Microsoft Visual C++ 6.0. It is ready to run on any Windows environment. The CNCVision software processes the captured images and applies computer vision techniques to extract the product dimensions, then generates a suitable part program. All required information for the part program is calculated automatically, such as G-codes, X and Y coordinates of start-points and end-points, radii of arcs and circles and direction of arcs (clockwise or counterclockwise). The generated part program can be displayed on screen, saved to a file or sent to MS Word or MS Excel. In addition, the engineering drawing of the product can be displayed on screen or sent to AutoCAD as a drawing file.
APA, Harvard, Vancouver, ISO, and other styles
10

,, ,. "Great Enterprise Contribution to Society in Information System Perspectives PlagScan." Global Journal of Enterprise Information System 7, no. 1 (March 1, 2015): 89. http://dx.doi.org/10.18311/gjeis/2015/3047.

Full text
Abstract:
PlagScan is an entirely browser-based web service that verifies the authenticity of documents. Files can be uploaded in all com- mon file formats (MS Word, PDF and many more). Alternatively, users can paste text directly into PlagScan and check for authen - ticity. Our service employs a highly advanced two-step algorithm based on the latest research in computer linguistics.
APA, Harvard, Vancouver, ISO, and other styles
11

Meyer, Helen. "Self-mutating Word viruses create strain." Computers & Security 16, no. 7 (January 1997): 621–22. http://dx.doi.org/10.1016/s0167-4048(97)80809-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Plank, James S. "The Raid-6 Liber8Tion Code." International Journal of High Performance Computing Applications 23, no. 3 (June 2, 2009): 242–51. http://dx.doi.org/10.1177/1094342009106191.

Full text
Abstract:
Large centralized and networked storage systems have grown to the point where the single fault tolerance provided by RAID-5 is no longer enough. RAID-6 storage systems protect k disks of data with two parity disks so that the system of k + 2 disks may tolerate the failure of any two disks. Coding techniques for RAID-6 systems are varied, but an important class of techniques are those with minimum density, featuring an optimal combination of encoding, decoding and modification complexity. The word size of a code has an impact on both how the code is laid out on each disk's sectors and how large k can be. Word sizes which are powers of two are especially important, since they fit precisely into file system blocks. Minimum density codes exist for many word sizes with the notable exception of eight. This paper fills that gap by describing a new code called The RAID-6 Liber8tion Code for this important word size. The description includes performance properties as well as details of the discovery process.
APA, Harvard, Vancouver, ISO, and other styles
13

Pollack, S. N., Z. J. Haskal, and S. A. Foster. "Personal Computer-Based Integrated Interventional Radiology Case Log and Digital Teaching File Database." Journal of Vascular and Interventional Radiology 8, no. 1 (January 1997): 261. http://dx.doi.org/10.1016/s1051-0443(97)70120-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Qiao, Yanchen, Weizhe Zhang, Xiaojiang Du, and Mohsen Guizani. "Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security." ACM Transactions on Internet Technology 22, no. 1 (February 28, 2022): 1–22. http://dx.doi.org/10.1145/3436751.

Full text
Abstract:
With the construction of smart cities, the number of Internet of Things (IoT) devices is growing rapidly, leading to an explosive growth of malware designed for IoT devices. These malware pose a serious threat to the security of IoT devices. The traditional malware classification methods mainly rely on feature engineering. To improve accuracy, a large number of different types of features will be extracted from malware files in these methods. That brings a high complexity to the classification. To solve these issues, a malware classification method based on Word2Vec and Multilayer Perception (MLP) is proposed in this article. First, for one malware sample, Word2Vec is used to calculate a word vector for all bytes of the binary file and all instructions in the assembly file. Second, we combine these vectors into a 256x256x2-dimensional matrix. Finally, we designed a deep learning network structure based on MLP to train the model. Then the model is used to classify the testing samples. The experimental results prove that the method has a high accuracy of 99.54%.
APA, Harvard, Vancouver, ISO, and other styles
15

Madeja, Matej, Jaroslav Porubän, Sergej Chodarev, Matúš Sulír, and Filip Gurbáľ. "Empirical Study of Test Case and Test Framework Presence in Public Projects on GitHub." Applied Sciences 11, no. 16 (August 6, 2021): 7250. http://dx.doi.org/10.3390/app11167250.

Full text
Abstract:
Automated tests are often considered an indicator of project quality. In this paper, we performed a large analysis of 6.3 M public GitHub projects using Java as the primary programming language. We created an overview of tests occurrence in publicly available GitHub projects and the use of test frameworks in them. The results showed that 52% of the projects contain at least one test case. However, there is a large number of example tests that do not represent relevant production code testing. It was also found that there is only a poor correlation between the number of the word “test” in different parts of the project (e.g., file paths, file name, file content, etc.) and the number of test cases, creation date, date of the last commit, number of commits, or number of watchers. Testing framework analysis confirmed that JUnit is the most used testing framework with a 48% share. TestNG, considered the second most popular Java unit testing framework, occurred in only 3% of the projects.
APA, Harvard, Vancouver, ISO, and other styles
16

Gao, Jie. "A Parametric Design of Teaching Aid in Russian Class Based on Computer Technology." Advanced Materials Research 912-914 (April 2014): 1116–19. http://dx.doi.org/10.4028/www.scientific.net/amr.912-914.1116.

Full text
Abstract:
A parametric design of teaching aid in Russian class was carried out based on VB6.0 and AutoCAD2008 in this paper. The process of the graphical drawing is investigated in detail. The results show that the SCR file successfully achieves the graphical drawing in AutoCAD2008. And the process is listed as following: First, choose the centerline layer, and call the library functions Pline". Then the line widths are set as 0, and draw the centerline. Second, select the layer of solid line and set the line width of 0.5 to draw the contour. Third, choose the dotted line layer and set the line width of 0 to draw the dotted line. Fourth, choose the Mirror, and mirror the lower half of the contour. Finally call the library function "Insert" insert roughness, word and tolerances.
APA, Harvard, Vancouver, ISO, and other styles
17

Tukino, Tukino. "Pelatihan Microsoft Office 2010 pada Kelompok Kerja Kepala TK (K3TK) dan Gugus Paud Naga di Kota Batam sebagai Aplikasi dari Pembelajaran Komputer pada Anak Usia Dini." J-ABDIPAMAS (Jurnal Pengabdian Kepada Masyarakat) 2, no. 2 (October 31, 2018): 65. http://dx.doi.org/10.30734/j-abdipamas.v2i2.245.

Full text
Abstract:
ABSTRACTThe material provided in this guidance is divided into 3 groups, there are Microsoft Word, Microsoft PowerPoint and Microsoft Paint. Activities are carried out based on the division level of the ability/skill of each teacher. Teachers who have been adept grouped separately from the teacher who still lay on the computer so that the coaching is intensive. Teachers who still lay be guided and accompanied by the instructor ranging from the procedure turn on the computer, opening files, saving files, using the mouse, typing basic, introduction computer parts up on the procedure to turn off the computer. The methods applied in this activity is the Method of Presentation, Demonstration and Practice. The method of Presentation used for the introduction of software using Microsoft PowerPoint 2010. The results of this study are: First, the Training provided some of the materials associated with efforts to improve the quality of learning by giving knowledge about the use of the Program PowerPoint to create interactive games as learning media multimedia ICT-based attractive and interactive, Second, the Material presented can be accepted, digested, and understood the participant well, the Third, the Activity takes place smoothly, on time and as expected. Keywords: Microsoft Word, Microsoft PowerPoint, and Microsoft Paint. ABSTRAKMateri yang diberikan dalam pembinaan ini terbagi menjadi 3 kelompok, yaitu kelompok Microsoft Word, Microsoft PowerPoint dan Microsoft Paint. Kegiatan dilakukan berdasarkan pembagian tingkat kemampuan/skill masing - masing guru. Guru yang telah mahir dikelompokkan tersendiri dari guru yang masih awam tentang komputer supaya pembinaan lebih intensif. Guru yang masih awam dibimbing dan ditemani instruktur mulai dari prosedur menyalakan komputer, membuka file, menyimpan file, menggunakan mouse, mengetik dasar, pengenalan bagian-bagian komputer sampai pada prosedur mematikan komputer. Metode yang diterapkan dalam kegiatan ini adalah Metode Presentasi, Demonstrasi dan Praktik. Metode Presentasi digunakan untuk pengenalan software menggunakan Microsoft PowerPoint 2010. Hasil penelitian ini adalah: Pertama, Pelatihan memberikan beberapa materi yang terkait dengan upaya meningkatkan kualitas pembelajaran dengan pemberikan pengetahuan mengenai pemanfaatan Program PowerPoint untuk membuat game interaktif sebagai media pembelajaran multimedia berbasis TIK yang atraktif dan interaktif, Kedua, Materi yang disajikan dapat diterima, dicerna, dan dipahami peserta dengan baik, Ketiga, Kegiatan berlangsung lancar, tepat waktu dan sesuai dengan yang diharapkan. Kata Kunci: Microsoft Word, Microsoft PowerPoint, dan Microsoft Paint.
APA, Harvard, Vancouver, ISO, and other styles
18

Noever, David A., and Samantha E. Miller Noever. "Deep Learning Classification Methods Applied to Tabular Cybersecurity Benchmarks." International Journal of Network Security & Its Applications 13, no. 03 (May 31, 2021): 1–13. http://dx.doi.org/10.5121/ijnsa.2021.13301.

Full text
Abstract:
This research recasts the network attack dataset from UNSW-NB15 as an intrusion detection problem in image space. Using one-hot-encodings, the resulting grayscale thumbnails provide a quarter-million examples for deep learning algorithms. Applying the MobileNetV2’s convolutional neural network architecture, the work demonstrates a 97% accuracy in distinguishing normal and attack traffic. Further class refinements to 9 individual attack families (exploits, worms, shellcodes) show an overall 54% accuracy. Using feature importance rank, a random forest solution on subsets shows the most important source-destination factors and the least important ones as mainly obscure protocols. It further extends the image classification problem to other cybersecurity benchmarks such as malware signatures extracted from binary headers, with an 80% overall accuracy to detect computer viruses as portable executable files (headers only). Both novel image datasets are available to the research community on Kaggle.
APA, Harvard, Vancouver, ISO, and other styles
19

ZHANG, HENG, DA-HAN WANG, CHENG-LIN LIU, and HORST BUNKE. "KEYWORD SPOTTING FROM ONLINE CHINESE HANDWRITTEN DOCUMENTS USING ONE-VERSUS-ALL CHARACTER CLASSIFICATION MODEL." International Journal of Pattern Recognition and Artificial Intelligence 27, no. 03 (May 2013): 1353001. http://dx.doi.org/10.1142/s0218001413530017.

Full text
Abstract:
In this paper, we propose a method for text-query-based keyword spotting from online Chinese handwritten documents using character classification model. The similarity between the query word and handwriting is obtained by combining the character classification scores. The classifier is trained by one-versus-all strategy so that it gives high similarity to the target class and low scores to the others. Using character classification-based word similarity also helps overcome the out-of-vocabulary (OOV) problem. We use a character-synchronous dynamic search algorithm to efficiently spot the query word in large database. The retrieval performance is further improved by using competing character confusion and writer-adaptive thresholds. Our experimental results on a large handwriting database CASIA-OLHWDB justify the superiority of one-versus-all trained classifiers and the benefits of confidence transformation, character confusion and adaptive thresholds. Particularly, a one-versus-all trained prototype classifier performs as well as a linear support vector machine (SVM) classifier, but consumes much less storage of index file. The experimental comparison with keyword spotting based on handwritten text recognition also demonstrates the effectiveness of the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
20

Martin, Sven, Jörg Liermann, and Hermann Ney. "Algorithms for bigram and trigram word clustering." Speech Communication 24, no. 1 (April 1998): 19–37. http://dx.doi.org/10.1016/s0167-6393(97)00062-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Lee, Sungkyu, and Rachelle S. Heller. "Use of a keystroke log file to evaluate an interactive computer system in a museum setting." Computers & Education 29, no. 2-3 (November 1997): 89–101. http://dx.doi.org/10.1016/s0360-1315(97)00025-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Bulley, Michael. "Unicode for beginners." English Today 21, no. 2 (April 2005): 63–64. http://dx.doi.org/10.1017/s0266078405002087.

Full text
Abstract:
THIS ARTICLE springs from my experiences when I submitted a piece to English Today that contained characters from the International Phonetic Alphabet (IPA). I had used a font containing such characters that came with my word-processing program, and I submitted the article electronically as a file attachment. Unfortunately, the characters did not arrive in the same form as they had left, owing to incompatibility between the two computer systems, and so there were parts of the article that did not make much sense. The editor graciously reprinted it in its correct form in the following issue (ET80).
APA, Harvard, Vancouver, ISO, and other styles
23

Jang, Gilsang, and Heeseok Lee. "File and workload allocation design for distributed database on a two-level local multi-access computer network." Computers & Industrial Engineering 33, no. 3-4 (December 1997): 649–52. http://dx.doi.org/10.1016/s0360-8352(97)00213-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Moore, G. W., U. N. Riede, R. A. Polacsek, R. E. Miller, and G. M. Hutchins. "Group Theory Approach to Computer Translation of Medical German." Methods of Information in Medicine 25, no. 03 (July 1986): 176–82. http://dx.doi.org/10.1055/s-0038-1635465.

Full text
Abstract:
SummaryComputer translators have been studied for almost four decades, but recent advances in speed and storage capabilities have made such translators accessible to small computer users. We obtained the computer typesetting file for a German language medical textbook and wrote computer software sufficient to obtain a draft quality English language translation of the entire book, at a speed of 9,671 words per hour. This translator uses two external tables, namely a word and idiom list and a list of grammatical rules, which completely specify the behavior of the translator. The grammatical rule table satisfies the properties of a mathematical group, and the inverse operation for this group allows one in principle to convert this German to English translator into an English to German translator. For the larger problem of creating multilingual computer translators, the group theory inversion property may allow one to substantially reduce the effort of creating a separate translator for each language pair. Future development of computer translators will depend upon the wider availability of computer-readable documents and will be aided by use of vocabulary and grammatical rule tables with group theory properties which permit the invertability between language pairs.
APA, Harvard, Vancouver, ISO, and other styles
25

Barnes, Richard, Kerry L. Callaghan, and Andrew D. Wickert. "Computing water flow through complex landscapes – Part 3: Fill–Spill–Merge: flow routing in depression hierarchies." Earth Surface Dynamics 9, no. 1 (March 2, 2021): 105–21. http://dx.doi.org/10.5194/esurf-9-105-2021.

Full text
Abstract:
Abstract. Depressions – inwardly draining regions – are common to many landscapes. When there is sufficient moisture, depressions take the form of lakes and wetlands; otherwise, they may be dry. Hydrological flow models used in geomorphology, hydrology, planetary science, soil and water conservation, and other fields often eliminate depressions through filling or breaching; however, this can produce unrealistic results. Models that retain depressions, on the other hand, are often undesirably expensive to run. In previous work we began to address this by developing a depression hierarchy data structure to capture the full topographic complexity of depressions in a region. Here, we extend this work by presenting the Fill–Spill–Merge algorithm that utilizes our depression hierarchy data structure to rapidly process and distribute runoff. Runoff fills depressions, which then overflow and spill into their neighbors. If both a depression and its neighbor fill, they merge. We provide a detailed explanation of the algorithm and results from two sample study areas. In these case studies, the algorithm runs 90–2600 times faster (with a reduction in compute time of 2000–63 000 times) than the commonly used Jacobi iteration and produces a more accurate output. Complete, well-commented, open-source code with 97 % test coverage is available on GitHub and Zenodo.
APA, Harvard, Vancouver, ISO, and other styles
26

Yang, Kang, Huiqun Yu, Guisheng Fan, and Xingguang Yang. "Graph embedding code prediction model integrating semantic features." Computer Science and Information Systems 17, no. 3 (2020): 907–26. http://dx.doi.org/10.2298/csis190908027y.

Full text
Abstract:
With the advent of Big Code, code prediction has received widespread attention. However, the state-of-the-art code prediction techniques are inadequate in terms of accuracy, interpretability and efficiency. Therefore, in this paper, we propose a graph embedding model that integrates code semantic features. The model extracts the structural paths between the nodes in source code file?s Abstract Syntax Tree(AST). Then, we convert paths into training graph and extracted interdependent semantic structural features from the context of AST. Semantic structure features can filter predicted candidate values and effectively solve the problem of Out-of- Word(OoV). The graph embedding model converts the structural features of nodes into vectors which facilitates quantitative calculations. Finally, the vector similarity of the nodes is used to complete the prediction tasks of TYPE and VALUE. Experimental results show that compared with the existing state-of-the-art method, our method has higher prediction accuracy and less time consumption.
APA, Harvard, Vancouver, ISO, and other styles
27

Zhang, Kai, Wei Jun Liu, and Xiao Feng Shang. "Process Research on the Laser Rapid Manufacturing Technology." Advanced Materials Research 97-101 (March 2010): 4042–45. http://dx.doi.org/10.4028/www.scientific.net/amr.97-101.4042.

Full text
Abstract:
Laser additive direct deposition of metals is a new rapid manufacturing technology, which combines with computer aided design, laser cladding and rapid prototyping. The advanced technology can build fully-dense metal components directly from the information transferred from a computer file by depositing metal powders layer by layer with neither mould nor tool. Based on the theory of this technology, an experimental setup for laser rapid manufacturing process was developed. Through this state-of-the-art automated apparatus, some cladding experiments were performed to grasp the process features of laser rapid manufacturing technology. Finally, the columnar/equiaxed grain growth transition model is used to explain the morphology characteristic. Accordingly, the appropriate microstructure can be obtained by adjusting the processing parameters.
APA, Harvard, Vancouver, ISO, and other styles
28

Chapman, Stephen K. "The Development of Remote Teaching Aids." Microscopy and Microanalysis 7, S2 (August 2001): 802–3. http://dx.doi.org/10.1017/s1431927600030087.

Full text
Abstract:
For many years the means of communicating electron microscopy techniques had been through either the spoken or the written word. with the advent of the computer and in particular the notebook computer more exotic methods of information presentation were made available. Now with the compact disk or the DVD, with their ability to store very large quantities of data, even more new avenues have been opened up for trainers.There are a number of programs by small organisations, like QM Slide Show and EZ Slide, that enable the trainer to take the simple approach to presentation preparation. Using a Windows Notepad interface or similar the trainer gathers bitmap files in a simple sequence, referencing the file source to activate each part of the presentation. This type of presentation is extremely flexible, so much so that the trainer, with a large selection of bitmap files and a good filing system, may develop a completely new or modified presentation in just a few minutes.
APA, Harvard, Vancouver, ISO, and other styles
29

DE BEUVRON, FRANÇOIS DE BERTRAND, and PHILIPPE TRIGANO. "HIERARCHICALLY CODED LEXICON WITH VARIANTS." International Journal of Pattern Recognition and Artificial Intelligence 09, no. 01 (February 1995): 145–65. http://dx.doi.org/10.1142/s0218001495000080.

Full text
Abstract:
This paper describes a new lexicon organization intended to provide high speed string correction. This method links two different approaches: code based partition of the lexicon using a hierarchical file for the first part,21 and generation of neighboring strings or code for the second.3,18 The lexicon is preprocessed using a hierarchy of codes. This preprocessing can be done incrementally as each new word is entered. The resulting size of the lexicon remains proportional to the number of words entered with a rather high proportionality factor. Given a new string, it is then possible to find a set of candidate corrections in constant time. This set contains at least all the desired neighbors (in a sense defined by the user) of the given string. This method is therefore well-suited for a small to medium sized lexicon in applications where the correction speed is crucial (the method has been successfully tested with a French lexicon of about 10,000 words collected from scientific texts).
APA, Harvard, Vancouver, ISO, and other styles
30

Ahamed, Istiak, Maliha Jahan, Zarin Tasnim, Tajbia Karim, S. M. Salim Reza, and Dilshad Ara Hossain. "Spell corrector for Bangla language using Norvig’s algorithm and Jaro-Winkler distance." Bulletin of Electrical Engineering and Informatics 10, no. 4 (August 1, 2021): 1997–2005. http://dx.doi.org/10.11591/eei.v10i4.2410.

Full text
Abstract:
In the online world, especially in the social media platform most of us write without much regard to correct spelling and grammar. The spelling mistakes are much larger in proportion when it comes to Bangla language. In our paper, we presented a method for error detection and correction in Bangla words' spellings. Our system could detect a misspelled Bangla word and provide two following services-suggesting correct spellings for the word and correcting the word. We had used Norvig's algorithm for the purpose but instead of using probabilities of the words to prepare the suggestions and corrections, we had used Jaro-Winkler distance. The previous works done in this field for Bangla language are either very slow or offers less accuracy. Our system successfully achieved a 97% accuracy when evaluated with 1000 Bangla words.
APA, Harvard, Vancouver, ISO, and other styles
31

Treff, Gunnar, Kay Winkert, Katja Machus, and Jürgen M. Steinacker. "Computer-Aided Stroke-by-Stroke Visualization of Actual and Target Power Allows for Continuously Increasing Ramp Tests on Wind-Braked Rowing Ergometers." International Journal of Sports Physiology and Performance 13, no. 6 (July 1, 2018): 729–34. http://dx.doi.org/10.1123/ijspp.2016-0716.

Full text
Abstract:
Purpose: Ramp tests are continuously increasing exercise tests used for the determination of maximal oxygen uptake (), which is identifiable by a plateau in oxygen uptake despite increasing mechanical power output (LOAD). On wind-braked rowing ergometers (RowErg), it is hardly feasible to ensure a continuous increase in LOAD until test termination, as neither resistance nor stroke frequency is externally adjustable but depends on the rower. To enable ramp tests on RowErg, the authors produced visual stroke-by-stroke feedback showing target and actual LOAD to the rower. The software supports automatic test termination (TERMauto) if LOAD ceases to increase. The authors aimed to evaluate linearity of the LOAD increment and calculate the difference between TERMauto and test duration at subjective exhaustion. Materials: Twenty-eight highly trained male rowers performed a ramp test until subjective exhaustion on RowErg, targeting an increment of 35 W·min−1. LOAD was measured as work per time via external force and position sensors and visualized on a computer screen. TERMauto was deactivated, but all data were logged. Test duration at subjective exhaustion was subsequently compared with virtual test duration at TERMauto calculated from the log files. Results: Regression between time and LOAD was y = 167 + 34.6 W (r = .99). Individual correlations ranged from .97 to 1.0. TERMauto caused 12- to 35-s-shorter test durations than subjective exhaustion in 4 rowers, leading to an underestimation in not higher than 1.2% or 3.7%. Conclusion: This setup allows one to perform ramp tests on RowErg with continuously increasing LOAD until TERMauto. In particular cases might be slightly underestimated at TERMauto.
APA, Harvard, Vancouver, ISO, and other styles
32

Hou, Yumin, Hu He, Xu Yang, Deyuan Guo, Xu Wang, Jiawei Fu, and Keni Qiu. "FuMicro: A Fused Microarchitecture Design Integrating In-Order Superscalar and VLIW." VLSI Design 2016 (December 15, 2016): 1–12. http://dx.doi.org/10.1155/2016/8787919.

Full text
Abstract:
This paper proposes FuMicro, a fused microarchitecture integrating both in-order superscalar and Very Long Instruction Word (VLIW) in a single core. A processor with FuMicro microarchitecture can work under alternative in-order superscalar and VLIW mode, using the same pipeline and the same Instruction Set Architecture (ISA). Small modification to the compiler is made to expand the register file in VLIW mode. The decision of mode switch is made by software, and this does not need extra hardware. VLIW code can be exploited in the form of library function and the users will be exposed under only superscalar mode; by this means, we can provide the users with a convenient development environment. FuMicro could serve as a universal microarchitecture for it can be applied to different ISAs. In this paper, we focus on the implementation of FuMicro with ARM ISA. This architecture is evaluated on gem5, which is a cycle accurate microarchitecture simulation platform. By adopting FuMicro microarchitecture, the performance can be improved on an average of 10%, with the best performance improvement being 47.3%, compared with that under pure in-order superscalar mode. The result shows that FuMicro microarchitecture can improve Instruction Level Parallelism (ILP) significantly, making it promising to expand digital signal processing capability on a General Purpose Processor.
APA, Harvard, Vancouver, ISO, and other styles
33

Kobayashi, Kent D., Mary A. Young, David L. Hensley, H. C. Bittenbender, and Julie Ann T. Yogi. "Farmer's Bookshelf: Hypermedia Information System to Recommend Trees for Landscaping." HortScience 31, no. 4 (August 1996): 652c—652. http://dx.doi.org/10.21273/hortsci.31.4.652c.

Full text
Abstract:
A hypermedia information system was developed to recommend trees for landscaping and to obtain information on these individual trees. Using the software HyperCard on the Macintosh computer, we developed a system that uses the idea of index cards with information being stored on separate screens called “cards.” Using a mouse, the user navigates from one card to another by click on a “button” on the card. The user may select from several criteria including tree type, tree height, soil type, drought tolerance, wind tolerance, shade tolerance, salt tolerance, and growth rate. The program then finds which trees meet the desired criteria and provides information on these trees. This easy-to-use system requires no typing except to enter a word to search for. The user can quickly browse for the desired information and save it as a text file or print it. The Farmer's Bookshelf provides a tool for extension agents, growers, and homeowners to easily obtain vitally needed information. The program has further application for landscape companies, Master Gardener programs, and in horticultural courses.
APA, Harvard, Vancouver, ISO, and other styles
34

O’Brien, Myles. "A set of free cross-platform authoring programs for flexible web-based CALL exercises." EuroCALL Review 20, no. 2 (September 29, 2012): 59. http://dx.doi.org/10.4995/eurocall.2012.11378.

Full text
Abstract:
<p>The Mango Suite is a set of three freely downloadable cross-platform authoring programs for flexible network-based CALL exercises. They are Adobe Air applications, so they can be used on Windows, Macintosh, or Linux computers, provided the freely-available Adobe Air has been installed on the computer. The exercises which the programs generate are all Adobe Flash based. The three programs are: (1) Mango-multi, which constructs multiple-choice exercises with an optional sound and/or image; (2) Mango-match, which is for word/phrase matching exercises, and has an added feature intended to promote memorization, whereby an item must be matched correctly not once but an optional consecutive number of times; (3) Mango-gap, which produces seamless gap filling exercises, where the gaps can be as small as desired, down to the level of individual letters, and correction feedback is similarly detailed. Sounds may also be inserted at any desired points within the text, so that it is suitable for listening or dictation exercises. Each exercise generated by any of the programs is produced in the form of a folder containing all of the necessary files for immediate upload and deployment (except that if sound files are used in a Mango-gap exercise, they must be copied to the folder manually). The html file in which the flash exercise is embedded may be edited in any way to suit the user, and an xml file controlling the appearance of the exercise itself may be edited through a wysiwyg interface in the authoring program. The programs aim to combine ease of use with features not available in other authoring programs, toprovide a useful teaching and research tool.</p>
APA, Harvard, Vancouver, ISO, and other styles
35

Hoyer, A. "Een Terminologiedatabank Voor Vertalers - Meer dan een Woordenboek." Toegepaste Taalwetenschap in Artikelen 27 (January 1, 1987): 77–87. http://dx.doi.org/10.1075/ttwia.27.10hoy.

Full text
Abstract:
One of the marks of a good translation is the use of the precise terminology, i.e. that technical terms are translated correctly into the target language or - if there is no direct translation - are paraphrased. With the increasing specialisation of tech-nical fields and the rapid growth in the number of new terms, the search for the correct words tends to be very time-consum-ing. As a result the need is often felt to record equivalent terms for future translation work. For this a terminology data bank can be used, either decentrally on stand-alone equipment or centrally on a mainframe computer. Even if the translator continues for the time being to keep his own collection of terminology on file cards, he can still make use of a generally accessible terminology data bank such as EURODICAUTOM in his search for terms. Unlike a "normal" dictionary, the terminology bank provides additional information such as definitions, relationships between terms and especially the sources of this information. This makes it easier to assess the reliability of the translation given. This article considers the possibilities offered to the translator by a terminology bank and also further developments such as the connection of a data bank to a word processor or a machine translation system. We are now observing the development of a new branch of technology: CAT - Computer Aided Translation.
APA, Harvard, Vancouver, ISO, and other styles
36

Tejedor, Javier, Doroteo T. Toledano, Jose M. Ramirez, Ana R. Montalvo, and Juan Ignacio Alvarez-Trejos. "The Multi-Domain International Search on Speech 2020 ALBAYZIN Evaluation: Overview, Systems, Results, Discussion and Post-Evaluation Analyses." Applied Sciences 11, no. 18 (September 14, 2021): 8519. http://dx.doi.org/10.3390/app11188519.

Full text
Abstract:
The large amount of information stored in audio and video repositories makes search on speech (SoS) a challenging area that is continuously receiving much interest. Within SoS, spoken term detection (STD) aims to retrieve speech data given a text-based representation of a search query (which can include one or more words). On the other hand, query-by-example spoken term detection (QbE STD) aims to retrieve speech data given an acoustic representation of a search query. This is the first paper that presents an internationally open multi-domain evaluation for SoS in Spanish that includes both STD and QbE STD tasks. The evaluation was carefully designed so that several post-evaluation analyses of the main results could be carried out. The evaluation tasks aim to retrieve the speech files that contain the queries, providing their start and end times and a score that reflects how likely the detection within the given time intervals and speech file is. Three different speech databases in Spanish that comprise different domains were employed in the evaluation: the MAVIR database, which comprises a set of talks from workshops; the RTVE database, which includes broadcast news programs; and the SPARL20 database, which contains Spanish parliament sessions. We present the evaluation itself, the three databases, the evaluation metric, the systems submitted to the evaluation, the evaluation results and some detailed post-evaluation analyses based on specific query properties (in-vocabulary/out-of-vocabulary queries, single-word/multi-word queries and native/foreign queries). The most novel features of the submitted systems are a data augmentation technique for the STD task and an end-to-end system for the QbE STD task. The obtained results suggest that there is clearly room for improvement in the SoS task and that performance is highly sensitive to changes in the data domain.
APA, Harvard, Vancouver, ISO, and other styles
37

Kanavas, Vasilios, Athanasios Zisopoulos, and Konstantinos Spinthiropoulos. "Law, Ethics and Tech Aspects for an Irrevocable BlockChain Based Curriculum Vitae Created by Big Data Analytics Fed by Internet of Things, Sensors and Approved Data Sources." Int'l Journal of Management Innovation Systems 3, no. 1 (November 14, 2018): 50. http://dx.doi.org/10.5296/ijmis.v3i1.13774.

Full text
Abstract:
Our general idea is to adopt Blockchain Ledger Technology for volunteered recording of business skills to formulate an irrevocable irresistible Curriculum Vitae to be processed by Recruiting agencies. The desperate well-educated jobless people of our times rely on recruiting agencies to analyze their qualification and find them a descent work. The general process starts with personal data feed automatically from sensors to an irrevocable BlockChain. At the final stage recruiting companies read these data, they process and offer a better job. A modified Time-Series is used to store work history and skills as the most important part of a Curriculum-Vitae. Every moment of our work life is recorded accordingly. These data are collected from various IoT sources like; Internet of things, Word, Excel computer file headers, URL fingerprints, Data Centers & Banks Big Data. It looks like self-slavery although according to GDPR the necessary consent must be freely given, specific, informed and unambiguous. In order to obtain freely given consent, it must be given on a voluntary basis. We attempted a primitive social research. In our University young people, they prefer to follow the blockchain recruiting route at a rate of 96% while in a local prefecture only 1% endorses the technology for unemployment.
APA, Harvard, Vancouver, ISO, and other styles
38

Banerjee, S., F. Steenkeste, P. Couturier, M. Debray, and A. Franco. "Telesurveillance of elderly patients by use of passive infra-red sensors in a 'smart' room." Journal of Telemedicine and Telecare 9, no. 1 (February 1, 2003): 23–29. http://dx.doi.org/10.1258/135763303321159657.

Full text
Abstract:
We have developed an automated surveillance system based on passive infra-red sensors. Eight sensors were installed in a hospital room. A computer automatically captured data from the sensors every night from 21:00 until 06:00 the following morning. The sensors were polled twice per second and when a sensor was activated by movement, the event and time were recorded in a data file. At the end of the surveillance period the program analysed the data and generated a report showing the activities taking place in the room and their times. Four elderly patients were observed for a total of 97 nights. A total of 1637 possible sequences of movements by the patient and the hospital staff were detected. The computer was able to identify 1450 sequences (89%) correctly, in comparison with manual analysis. Only 10 movements (0.6%) were undetected by the system; all were very short sequences (five or six activations of the sensors). The system was generally capable of detecting and classifying all major movements in the room.
APA, Harvard, Vancouver, ISO, and other styles
39

Musfika, Puput Nada, and Depi Rusda. "Sistem Informasi Lowongan Kerja di Kota Sampit Berbasis Web." Building of Informatics, Technology and Science (BITS) 2, no. 2 (December 10, 2020): 84–90. http://dx.doi.org/10.47065/bits.v2i2.498.

Full text
Abstract:
The need for information is very much needed in line with the rapid technological advances in modern times such as today, especially the use of computerized systems that propagate in all fields. So, every Human Resource (HR) must always be required to fulfill the expertise, skills and abilities in running a computer hardware or software. In the field of information delivery services to companies or agencies that require labor, such as those in Sampit City, Central Borneo, currently information is conveyed only through several media such as newspapers, magazines, and information obtained by word of mouth. This makes it difficult to find accurate information for job applicants, and for companies it is also difficult to find prospective employees in a time efficient manner because it is still done without an information system. With the development of information technology, it is necessary to provide an Information System to solve problems in delivering job information directly from companies. With this Information System, applicants will also find it easy to receive information, submit job application files, and take written tests online. And the company will get employees in an effective and time-efficient way, starting from the delivery of information, file selection, written tests and passing results from written tests that can be processed directly through this information system.
APA, Harvard, Vancouver, ISO, and other styles
40

Vinh, Truong Quang, Le Hoai Duy, and Nguyen Thanh Nhan. "Vietnamese handwritten character recognition using convolutional neural network." IAES International Journal of Artificial Intelligence (IJ-AI) 9, no. 2 (June 1, 2020): 276. http://dx.doi.org/10.11591/ijai.v9.i2.pp276-281.

Full text
Abstract:
Handwriting recognition is one of the core applications of computer vision for real-word problems and it has been gaining more interest because of the progression in this field. This paper presents an efficient model for Vietnamese handwriting character recognition by Convolutional Neural Networks (CNNs) – a kind of deep neural network model can achieve high performance on hard recognition tasks. The proposed architecture of the CNN network for Vietnamese handwriting character recognition consists of five hidden layers in which the first 3 layers are convolutional layers and the last 2 layers are fully-connected layers. Overfitting problem is also minimized by using dropout techniques with the reasonable drop rate. The experimental results show that our model achieves approximately 97% accuracy.
APA, Harvard, Vancouver, ISO, and other styles
41

Spiroski, Mirko. "How to Verify Plagiarism of the Paper Written in Macedonian and Translated in Foreign Language?" Open Access Macedonian Journal of Medical Sciences 4, no. 1 (February 29, 2016): 1–4. http://dx.doi.org/10.3889/oamjms.2016.035.

Full text
Abstract:
AIM: The aim of this study was to show how to verify plagiarism of the paper written in Macedonian and translated in foreign language.MATERIAL AND METHODS: Original article “Ethics in Medical Research Involving Human Subjects”, written in Macedonian, was submitted as an assay-2 for the subject Ethics and published by Ilina Stefanovska, PhD candidate from the Iustinianus Primus Faculty of Law, Ss Cyril and Methodius University of Skopje (UKIM), Skopje, Republic of Macedonia in Fabruary, 2013. Suspected article for plagiarism was published by Prof. Dr. Gordana Panova from the Faculty of Medical Sciences, University Goce Delchev, Shtip, Republic of Macedonia in English with the identical title and identical content in International scientific on-line journal "SCIENCE & TECHNOLOGIES", Publisher "Union of Scientists - Stara Zagora".RESULTS: Original document (written in Macedonian) was translated with Google Translator; suspected article (published in English pdf file) was converted into Word document, and compared both documents with several programs for plagiarism detection. It was found that both documents are identical in 71%, 78% and 82%, respectively, depending on the computer program used for plagiarism detection. It was obvious that original paper was entirely plagiarised by Prof. Dr. Gordana Panova, including six references from the original paper.CONCLUSION: Plagiarism of the original papers written in Macedonian and translated in other languages can be verified after computerised translation in other languages. Later on, original and translated documents can be compared with available software for plagiarism detection.
APA, Harvard, Vancouver, ISO, and other styles
42

Kobayashi, Kent D., and H. C. Bittenbender. "FARMER'S BOOKSHELF™: HYPERMEDIA INFORMATION SYSTEM TO RECOMMEND GROUND COVERS." HortScience 27, no. 6 (June 1992): 578d—578. http://dx.doi.org/10.21273/hortsci.27.6.578d.

Full text
Abstract:
Hawaii has had a large growth in housing, and with the reduced lot sizes of single family dwellings has come interest in using ground covers to landscape limited areas. As residential areas are being located on less desirable lands, there is a need to select ground covers that do well in these areas. The objective of this study was to develop a hypermedia information system to recommend ground covers and to obtain information on individual ground covers. Using the software HyperCard® on the Macintosh® computer, we developed a system that uses the idea of index cards with information being stored on separate screens called “cards.” Using a mouse, the user navigates from one card to another by clicking on a “button” on the card. The user may select up to four criteria from 33 criteria including plant height, elevation, soil moisture, flower color, erosion control, and shade. The program then finds which of 48 ground covers meet the desired criteria and provides information on these ground covers. This easy-to-use system requires no typing except to enter a word to search for. The user can quickly browse for the desired information and save it as a text file or print it. The Farmer's Bookshelf™ provides a tool for extension agents and growers to obtain easily vitally needed information. The program has further application for landscape companies, Master Gardener programs, and in horticultural courses.
APA, Harvard, Vancouver, ISO, and other styles
43

Khalafat, Monther, Ja'far S. Alqatawna, Rizik M. H. Al-Sayyed, Mohammad Eshtay, and Thaeer Kobbaey. "Violence Detection over Online Social Networks: An Arabic Sentiment Analysis Approach." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 14 (July 28, 2021): 90. http://dx.doi.org/10.3991/ijim.v15i14.23029.

Full text
Abstract:
<p class="0abstract">Today, the influence of the social media on different aspects of our lives is increasing, many scholars from various disciplines and majors looking at the social media networks as the ongoing revolution. In Social media networks, many bonds and connections can be established whether being direct or indirect ties. In fact, Social networks are used not only by people but also by companies. People usually create their own profiles and join communities to discuss different common issues that they have interest in. On the other hand, companies also can create their virtual presence on the social media networks to benefit from this media to understand the customers and gather richer information about them. With all of the benefits and advantages of social media networks, they should not always be seen as a safe place for communicating, sharing information and ideas, and establishing virtual communities. These information and ideas could carry with them hatred speeches that must be detected to avoid raising violence. Therefore, web content mining can be used to handle this issue. Web content mining is gaining more concern because of its importance for many businesses and institutions. Sentiment Analysis (SA) is an important sub-area of web content mining. The purpose of SA is to determine the overall sentiment attitude of writer towards a specific entity and classify these opinions automatically. There are two main approaches to build systems of sentiment analysis: the machine learning approach and the lexicon-based approach. This research presents the design and implementation for violence detection over social media using machine learning approach. Our system works on Jordanian Arabic dialect instead of Modern Standard Arabic (MSA). The data was collected from two popular social media websites (Facebook, Twitter) and has used native speakers to annotate the data. Moreover, different preprocessing techniques have been used to show their effect on our model accuracy. The Arabic lexicon was used for generating feature vectors and separate them to features set. Here, we have three well known machine learning algorithms: Support Vector Machine (SVM), Naive Bayes (NB) and k-Nearest Neighbors (KNN). Building on this view, Information Science Research Institute’s (ISRI) stemming and stop word file as a result of preprocessing were used to extract the features. Indeed, several features have been extracted; however, using the SVM classifier reveals that unigram and features extracted from lexicon are characterized by the highest accuracy to detect violence.</p>
APA, Harvard, Vancouver, ISO, and other styles
44

Gelfand, Stanley A. "Tri-Word Presentations With Phonemic Scoring for Practical High-Reliability Speech Recognition Assessment." Journal of Speech, Language, and Hearing Research 46, no. 2 (April 2003): 405–12. http://dx.doi.org/10.1044/1092-4388(2003/033).

Full text
Abstract:
Speech recognition test reliability is optimized with 450 test items, and the Computer Assisted Speech Recognition Assessment (CASRA) test is a practical approach for achieving this goal by combining 50 presentations of 3 consonantvowel nucleus-consonant (CNC) words each with phonemic scoring (S. A. Gelfand, 1998). However, optimized reliability might not be essential if reliability is as high as possible in light of practical constraints and what the clinician is trying to do with the results. The CASRA paradigm addresses these compromise goals with a reduced number of 3-word sets: 25 sets yield 25 (groups) x 3 (words) x 3 (phonemes) = 225 test items, 20 sets give 20 x 3 x 3 = 180 items, and 10 sets provide 10 x 3x 3= 90 items. This study addressed the empirical reliability of such an approach, and the extent to which results on shortened versions predict full-test scores. Test and retest scores were obtained for 10-, 20-, and 25-set versions of the CASRA for 144 participants with a wide range of hearing ability. For group data, first and second scores were highly correlated and not significantly different from each other for all 3 test sizes. Performance based on 20 and 25 sets accounted for roughly 97% of the variance of full (50-set) test scores, and scores based on 10 sets accounted for about 88% of the full-test variance. Individual test-retest reliability agreed with theoretical expectations based on 95% binomial confidence intervals. Cases outside the 95% confidence limits were 7.6% for 10 sets, and 3.5% for 20 and 25 sets with phoneme scoring, and 4.9% for 10 and 20 sets and 3.5% for 25 sets with word scoring. The shortened CASRA is a practical way to achieve improvements in reliability over traditional word tests. The 20-set version may approximate the strongest compromise when trying to shorten test size without appreciably reducing reliability for clinical purposes. However, the 10-set version is probably a more practical approach for routine use because it accounts for 88% of full-test variance, is more reliable than a traditional 75-word test, and does not appear to be subject to significant short-term learning effects.
APA, Harvard, Vancouver, ISO, and other styles
45

Zanona, Marwan Abo, Anmar Abuhamdah, and Bassam Mohammed El-Zaghmouri. "Arabic Hand Written Character Recognition Based on Contour Matching and Neural Network." Computer and Information Science 12, no. 2 (April 30, 2019): 126. http://dx.doi.org/10.5539/cis.v12n2p126.

Full text
Abstract:
Complexity of Arabic writing language makes its handwritten recognition very complex in terms of computer algorithms. The Arabic handwritten recognition has high importance in modern applications. The contour analysis of word image can extract special contour features that discriminate one character from another by the mean of vector features. This paper implements a set of pre-processing functions over a handwritten Arabic characters, with contour analysis, to enter the contour vector to neural network to recognize it. The selection of this set of pre-processing algorithms was completed after hundreds of tests and validation. The feed forward neural network architecture was trained using many patterns regardless of the Arabic font style building a rigid recognition model. Because of the shortcomings in Arabic written databases or datasets, the testing was done by non-standard data set. The presented algorithm structure got recognition ratio about 97%.
APA, Harvard, Vancouver, ISO, and other styles
46

Haliq, Abdul, Akmal Hamsa, and Sakaria Sakaria. "ANALISIS PEMANFAATAN, FAKTOR PENDUKUNG DAN PENGHAMBAT, SERTA UPAYA OPTIMALISASI APLIKASI ZOTERO DALAM PENULISAN KARYA ILMIAH." Edukasi: Jurnal Pendidikan 19, no. 1 (April 30, 2021): 16. http://dx.doi.org/10.31571/edukasi.v19i1.2325.

Full text
Abstract:
<p class="StyleAuthorBold"><strong>Abstrak</strong></p><p class="abstrak">Penelitian bertujuan untuk menganalisis pemanfaatan, faktor penghambat dan pendukung, serta upaya optimalisasi aplikasi Zotero dalam mengelola referensi karya tulis ilmiah. Penelitian menggunakan pendekatan kualitatif dan dilakukan pada mahasiswa Program Studi Pendidikan Bahasa dan Sastra, Universitas Negeri Makassar dengan jumlah 40 orang. Pengumpulan data menggunakan teknik observasi, angket, dan wawancara. Analisis data mengadopsi model analisis interaktif yang terdiri atas empat alur kegiatan, yaitu pengumpulan, reduksi, penyajian data, dan penarikan kesimpulan. Hasil penelitian menunjukkan bahwa pemanfaatan aplikasi Zotero memudahkan dalam mengelola referensi, memiliki perpustakaan digital, kemudahan sitasi tulisan, dan efisien. Adapun faktor penghambat yaitu mahasiswa tidak terbiasa menggunakan aplikasi, proses instalasi, sinkronisasi <em>file</em>, integrasi, dan penambahan sitasi dengan Microsoft Word. Sedangkan faktor pendukung yaitu keterampilan mengoperasikan komputer, penguasaan teknik penulisan makalah, aplikasi Zotero bersifat nonkomersial, kemudahan menyimpan, mengonversi, dan mengedit metadata. Upaya optimalisasi dilakukan dengan memberikan fasilitas pendukung seperti buku panduan dan video tutorial, buku panduan sitasi, serta WhatsApp <em>group</em>. </p><p class="abstrak"> </p><p class="StyleAuthorBold"><strong><em>Abstract</em></strong></p><p class="abstrak"><em>This research aimed to analyze the utilization, inhibiting and supporting factors, and the efforts to optimize the Zotero application in managing references to scientific papers. This research used a qualitative approach and was conducted on 40 students of the Language and Literature Education Study Program, Universitas Negeri Makassar. Data collection was carried out by observation, questionnaire, and interview techniques. Data analysis was carried out by adopting an interactive analysis model consisting of four activity streams, namely data collection, reduction, presentation, and drawing conclusions. The results showed that the use of the Zotero application made it easier to manage references, have a digital library, ease writing citation, and efficient. The inhibiting factors including students are not accustomed to using applications, the installation process, synchronizing files, integrating, and adding citations to Microsoft Word. Furthermore, supporting factors, including computer skills, mastery of paper writing techniques, noncommercial Zotero applications, ease of storing, converting, and editing metadata. Optimization efforts are carried out by providing supporting facilities such guidebooks-video tutorials, citation manuals, and WhatsApp groups.</em></p>
APA, Harvard, Vancouver, ISO, and other styles
47

ORAN, Mehmet. "Opinions of Social Studies Teacher Candidates Prepared for KPSS Regarding the Effect of the Pandemic Period on Their Course Studies." International Education Studies 14, no. 6 (May 7, 2021): 12. http://dx.doi.org/10.5539/ies.v14n6p12.

Full text
Abstract:
This study aims to reveal the opinions of social studies teacher candidates who are prepared for KPSS on the effects of the pandemic period on their studies. KPSS: It is the shortening of the Public Personnel Selection Exam. These exams determine people to work in public institutions and organizations in Turkey. The phenomenology model, one of the qualitative research techniques, was used in the study. The study group of the research consists of 34 teacher candidates (male = 19, female = 15) graduated from Usak University, Department of Social Studies. In the collection of data in the research, firstly review of literature about the subject was done, and then a semi-structured interview form was used to apply to social studies teacher candidates. Some questions are standardized, some questions are prepared open-ended. In this type of interview, it is possible to obtain in-depth information. The data collected within the scope of the research were transferred to a word file in computer- mediated and subjected to content analysis. At the end of the research, the most frequently applied sources of candidate teachers preparing for KPSS during the pandemic period is that; videos, books, online lessons, articles and lesson notes. The teacher candidates stated that their families&rsquo; attitudes towards them were generally positive during the pandemic period. The advantages of the pandemic period was revealed that candidate teachers studied more than usual, the disadvantages of the pandemic periodwas that there was no activity, anxiety and stress increased, and the fear of getting sick came out. In addition, it was emphasized in the study that preparing for KPSS during the pandemic period is more difficult than preparing for it in the normal period.
APA, Harvard, Vancouver, ISO, and other styles
48

Sarmini, Sarmini, Niken Lia Prihatiningtias Pambayun, and Nilam Puspita Nurdewanti. "PELATIHAN PEMBUATAN BAHAN AJAR MENGGUNAKAN FILMORA KEPADA GURU MADRASAH ALIYAH (MA) TANBIHUL GHOFILIIN BANJARNEGARA." SELAPARANG Jurnal Pengabdian Masyarakat Berkemajuan 4, no. 3 (August 5, 2021): 672. http://dx.doi.org/10.31764/jpmb.v4i3.4871.

Full text
Abstract:
ABSTRAKBeberapa kendala dialami oleh guru-guru di MA Tanbihul Ghofiliin dengan adanya perubahan model pembelajaran tersebut diantara adalah bagaimana membuat materi pembelajaran yang menarik dan tidak monoton yang hanya berupa teks disampaikan dalam powerpoint ataupun file dokumen word atau pdf. Pelatihan pembuatan bahan ajar menggunakan Filmora kepada guru MA Tanbihul Ghofiliin Banjarnegara bertujuan untuk meningkatkan kemampuan guru dalam membuat bahan ajar berupa video pembelajaran. Kegiatan pelatihan dilaksanakan pada hari Sabtu tanggal 5 Juni 2021 di Laboratorium Komputer 2 MA Tanbihul Ghofiliin Banjarnegara yang diikuti oleh 9 orang peserta yaitu bapak dan ibu guru MA Tanbihul Ghofiliin. Kegiatan pelatihan dilakukan dengan mempraktikkkan langsung bagaimana cara mengedit video menggunakan aplikasi Filmora, dari tahap membuat video pembuka sampai dengan video penutup hingga menambahkan efek-efek dalam video serta rendering video. Berdasarkan hasil pengamatan selama kegiatan berjalan dan juga jawaban peserta, kegiatan pelatihan dapat diikuti dengan baik oleh peserta, dimana peserta dapat mengikuti setiap tahapan editing video hingga akhir menjadi sebuah video utuh. Tanggapan positif diberikan oleh peserta yang antusias dan berharap akan ada pelatihan-pelatihan pemanfaatan teknologi lainnya yang dapat menunjang proses kegiatan belajar mengajar khususnya di masa pandemi covid-19. Kata kunci: bahan ajar; filmora; editing; pelatihan; video. ABSTRACTSome of the obstacles experienced by the teachers at MA Tanbihul Ghofiliin with the changes in the learning model, including how to make learning materials that are interesting and not monotonous, which are only in the form of text delivered in powerpoint or word or pdf document files. Training on making teaching materials using Filmora for MA Tanbihul Ghofiliin Banjarnegara teachers aims to improve the ability of teachers to make teaching materials in the form of learning videos. The training activity was carried out on Saturday, June 5, 2021 at the Computer Laboratory of MA Tanbihul Ghofiliin Banjarnegara which was attended by 9 participants, namely the teacher of MA Tanbihul Ghofiliin. The activity was carried out by practicing directly how to make videos using the Filmora application, from the stage of making the opening video to closing the video to adding effects in the video and rendering the video. Based on observations during the activity as well as participants' answers, the training activities can be followed well by the participants, where participants can follow each stage of video editing until the end becomes a complete video. The positive response was given by enthusiastic participants and hoped that there would be trainings on the use of other technologies that could support the teaching and learning process, especially during a pandemic Covid-19. Keywords: training; editing; videos; teaching materials; filmora.
APA, Harvard, Vancouver, ISO, and other styles
49

Lee, Gary Geunbae, Jeongwon Cha, and Jong-Hyeok Lee. "Syllable-Pattern-Based Unknown-Morpheme Segmentation and Estimation for Hybrid Part-of-Speech Tagging of Korean." Computational Linguistics 28, no. 1 (March 2002): 53–70. http://dx.doi.org/10.1162/089120102317341774.

Full text
Abstract:
Most errors in Korean morphological analysis and part-of-speech (POS) tagging are caused by unknown morphemes. This paper presents a syllable-pattern-based generalized unknown-morpheme-estimation method with POSTAG (POStech TAGger), 1 which is a statistical and rule-based hybrid POS tagging system. This method of guessing unknown morphemes is based on a combination of a morpheme pattern dictionary that encodes general lexical patterns of Korean morphemes with a posteriori syllable trigram estimation. The syllable trigrams help to calculate lexical probabilities of the unknown morphemes and are utilized to search for the best tagging result. This method can guess the POS tags of unknown morphemes regardless of their numbers and/or positions in an eojeol (a Korean spacing unit similar to an English word), which is not possible with other systems for tagging Korean. In a series of experiments using three different domain corpora, the system achieved a 97% tagging accuracy even though 10% of the morphemes in the test corpora were unknown. It also achieved very high coverage and accuracy of estimation for all classes of unknown morphemes. 1 The binary code of POSTAG is open to the public for research and evaluation purposes at http://nlp.postech.ac.kr/. Follow the link OpenResources→DownLoad.
APA, Harvard, Vancouver, ISO, and other styles
50

DeCola, Elise G., Tim L. Robertson, Terry Bryant, and Gary Folley. "TAMING THE OIL SPILL PAPERWORK BEAST: THE ALASKA SPILL RESPONSE PERMITS PROJECT." International Oil Spill Conference Proceedings 2005, no. 1 (May 1, 2005): 115–18. http://dx.doi.org/10.7901/2169-3358-2005-1-115.

Full text
Abstract:
ABSTRACT Spill responders, state and federal agencies, and responsible parties have all acknowledged the fact that the permits, forms, and applications required to mount an effective oil spill response can often slow down the response progress or lead to unnecessary confusion. In Alaska, there are forms in use that are copies of copies of forms that have not been updated in years. In other cases, standard agency forms that are available as Word documents have been slightly modified by various users over time. Some forms appear unnecessary in the response effort and may well be carryovers from other venues. This problem has been exacerbated as many Alaska state agencies have reorganized and in some cases, permitting authorities have been transferred. The Spill Response Permits Project was initiated by the Cook Inlet Regional Citizens Advisory Council (CIRCAC) in response to a common concern, voiced by response organizations, responsible parties, and state and federal agencies, that the paperwork burden associated with an Alaska oil spill response is excessive. CIRCAC provided initial funding to form a work group of industry, agency, and response organization representatives that would be charged with taking a fresh look at Alaska's spill permitting requirements. The work group, co-chaired by the Alaska Department of Environmental Conservation, the US Coast Guard, and the Tesoro Alaska Company, began by identifying all oil spill response activities that might generate the need to fill out a permit or authorization form. Next, they inventoried and collected the most up-to-date versions of all permits. Work group participants, including oil spill response cooperatives as well as state and federal agencies with permitting authority, then reviewed all forms and deleted outdated or duplicated requirements. Once the list of permits had been updated, the work group then developed a computer-based organizational tool that could be used to sort, fill out, submit, and file applicable permit forms during an oil spill response or exercise. The computer interface allows the user to enter incident-specific information into a central data set, so that the data may then be exported to the required permit forms with a simple mouse click. The computer tool can be run on any computer platform, with files available for download from the Internet or stored on a CD-Rom. The tool uses the Adobe Acrobat® software application and fills out and stores permit forms in Adobe portable document format (PDF). Additional information about this ongoing project is available at http://www.akgrs.net/Circac/home.htm.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography