|
|
|
Núria Bel, Gabriel Bracons and Sophia Anderberg
The goal of our research was to assess whether the observation about deceptive texts having a lower positive tone than truthful ones in terms of sentiment could become operative and be used for building a classifier in the particular case of fraudster?s ...
ver más
|
|
|
|
|
|
|
Hadil H. Sami,Ammar S. Mahmood
Pág. 37 - 46
Since the topic of e-Abacus diagram appeared in 1978 through its application within the partition theory, where this representation was one of the ideas of cryptography, many researchers study this subject from a purely theoretical perspective without pr...
ver más
|
|
|
|
|
|
|
Angga Wijaya
Pág. 133 - 139
Classical cryptography is study of securing a secret message (plaintext) into a hidden message (ciphertext) which in the process changes each character. The process of converting plaintext into ciphertext is called encryption, the reverse process is call...
ver más
|
|
|
|
|
|
|
Xiaoyu Han, Yue Zhang, Wenkai Zhang and Tinglei Huang
Relation extraction is a vital task in natural language processing. It aims to identify the relationship between two specified entities in a sentence. Besides information contained in the sentence, additional information about the entities is verified to...
ver más
|
|
|
|
|
|
|
Tilla Fick, Chris J. Swanepoel
Pág. 48 - 65
In contrast to English, automatic hyphenation by computer of Afrikaans words is a problem that still needs to be addressed, since errors are still often encountered in printed text. An initial step in this task is the ability to automatically syll...
ver más
|
|
|
|