0

task of a computer designer

Báo cáo khoa học:

Báo cáo khoa học: "SOFTWARE TOOLS FOR THE ENVIRONMENT OF A COMPUTER AIDED TRANSLATION SYSTEM" pptx

Báo cáo khoa học

... lexical data base may reside on much more 50 files, for a given pair of language. This data base is composed of dictionaries, "formats" and "procedures" of the analysis, trans- ... is a handy and easy-to-use visualisa- tion tool designed to reassemble and clearly distinguish certain information contained in a linguistic application data base. VISULEX is intended to facilitate ... ASP:=ASPO, TENSE:-TENSEO !! ZDEN2AN:VALI:=DEN,VAL2:=AN !! KVDNPAN:CAT:-V,POTDRV:=VN-U-VPA-U-VPAN !! 'PASS' !! VIAAGI:FLXV-E-AIMER,DRNV-E-AGEI !! si: JPOV:JPCL-E-OVER !! 'PASSER'...
  • 4
  • 404
  • 0
Báo cáo khoa học:

Báo cáo khoa học: "The Design of a Computer Language for Linguistic Information" ppt

Báo cáo khoa học

... a set of DAGs. 4 The root of each DAG will have an arc labeled eat aTechnically, these are rooted, directed, acyclic graphs with labeled arcs. Formal definition of these and other technical ... lexical items, enabling one variant of a word to be built from the specification of another variant. A lexical rule is specified as a set of selective unifications relating an input DAG and an ... International and Center for the Study of Language and Information Stanford University Abstract A considerable body of accumulated knowledge about the design of languages for communicating...
  • 5
  • 383
  • 0
Tài liệu A collection of various computer and security logs pdf

Tài liệu A collection of various computer and security logs pdf

Quản trị mạng

... 3Nzc3Nzc3Nzc3Nzc33 4e 7a 63 30 49 41 41 41 41 6e 77 41 41 41 4e 3Nzc0IAAAAnwAAANMore information available at: http://www.sfc.keio.ac.jp/~keiji/ids/pakemon/ Pakemon signature files available at: http://www.whitehats.com/ids/vision-pakemon.conf ... is available at: http://www.silicondefense.com/snortsnarf/ The meaning of various computer and security logs Page 22 of 39 73 73 69 6f 6e 3d 41 51 41 41 41 41 4d 41 41 41 ssion=AQAAAAMAAA41 ... 192.168.30.10:1 UDP Available at http://www.snort.org The meaning of various computer and security logs Page 33 of 39 Fragmentation required, DF flag set The router discovers a datagram that is send...
  • 39
  • 738
  • 0
A STUDY ON THE TRANSLATION OF ENGLISH COMPUTER TEXTS IN VIETNAMESE EQUIVALENTS

A STUDY ON THE TRANSLATION OF ENGLISH COMPUTER TEXTS IN VIETNAMESE EQUIVALENTS

Khoa học xã hội

... form of the original. Usually, it is a paraphrase much longer than the original, a so- called “intralingual translation”, often prolix and pretentious, and not translation at all. For example, ... Communicative translation Communicative translation attempts to render the exact contextual meaning of the original in such a way that both content and language are readily acceptable and comprehensible ... I.1.3.4. Semantic translation Semantic translation differs from faithful translation only in as far as it must take more account of the aesthetic value of the SL text. Further, it may translate less...
  • 94
  • 1,125
  • 3
Tài liệu Orthodontists and patient´s aesthetic perception to different types of profi les modifi ed by a computer program pdf

Tài liệu Orthodontists and patient´s aesthetic perception to different types of profi les modifi ed by a computer program pdf

Chụp ảnh - Quay phim

... Imaging and Management® creándose dos secuencias, 90 personas (30 ortodoncistas, 30 cirujanos maxilofaciales, 30 pacientes de la DEPeI) evaluaron los perfiles en la escala analógica visual, ... Photographs and cephalographs of a Mexican man and a woman were used. Position of upper and lower jaws were modifi ed by the Dolphin Imaging and Management® pro-gram, so as to create two ... orthodontists, 30 maxillofacial surgeons and 30 patients of the Graduate School) assessed profi les in the visual, analogical scale. SPSS was used to process statistical analysis. Scores given...
  • 7
  • 708
  • 0
Báo cáo khoa học:

Báo cáo khoa học: "Development and Evaluation of a Broad-Coverage Probabilistic Grammar of English-Language Computer Manuals" pdf

Báo cáo khoa học

... mnemonics of the feature-based grammar to the nonterminal labels of the treebank grammar. For example, our grammar main- tains a fairly large number of semantic classes of singular nouns, and it ... range of sentence types and the availability of large corpora of computer manuals. We amassed a corpus of 40 million words, consisting of several hundred computer manuals. Our approach in attacking ... of application domain. • Development of a manually-bracketed corpus (tree- bank) of the domain. • Creation of a grammar with a large coverage of a blind test set of treebanked text. Statistical...
  • 8
  • 562
  • 0
Báo cáo Y học: Subsite mapping of the binding region of a-amylases with a computer program ppt

Báo cáo Y học: Subsite mapping of the binding region of a-amylases with a computer program ppt

Báo cáo khoa học

... and barley a- amylases are thus also presented.MATERIALS AND METHODSSUMAsoftware: subsite mapping of amylasesThis software calculates the apparent binding energies onthe basis of the measured ... PPA, an a- amylase studied by us earlier. Also an attempt has beenmade to use this program for subsite mapping of other a- amylases found in the literature. Evaluations of subsitemaps of rice and ... (1981) Action pattern of human pancreatic alpha-amylaseon maltoheptaose, a substrate for determining alpha-amylase inserum. J. Chromatogr. 223, 69–84.16. Farkas, E., Ja´nossy, L., Harangi,...
  • 6
  • 387
  • 0
the effect of monetary incentive on effort and task performance a study of vietnamese company

the effect of monetary incentive on effort and task performance a study of vietnamese company

Sư phạm

... measures used as a basic for rewarding managers. For example, bonus is calculated based on percentage of after-tax profits of the previous year, percentage of after tax profits after adjustment ... circumstances can the companies use money to motivate managers and accountants on effort and task performance?  What happens if monetary incentives are not parallel with managers and accountants’ ... They will act in the interest of the company. Accounting-based bonus plan is a form of a variable pay plan because managers and accountants will receive bonus only if the company has profit. The...
  • 89
  • 442
  • 0
Ten Ways to Improve the Security of a New Computer doc

Ten Ways to Improve the Security of a New Computer doc

An ninh - Bảo mật

... antivirus software will be most effective if the signatures are up to date. Many antivirus and antispyware programs offer automatic updating. Enable that feature so your software always has ... web pages that appear to come from a legitimate source may actually be the work of an attacker. An example is an email claiming to be sent from a system administrator requesting your password ... we can continue to rely on them and keep our information safe. Attackers can infect your computer with malicious software, or malware, in many different ways. They can take advantage of unsafe...
  • 5
  • 620
  • 0
17% of cell phone owners do most of their online browsing on their phone, rather than a computer or other device pdf

17% of cell phone owners do most of their online browsing on their phone, rather than a computer or other device pdf

Quản trị mạng

... each sample. The second stage of weighting balances sample demographics to population parameters. The sample is balanced to match national population parameters for sex, age, education, race, ... subgroup is also balanced on age, education and region. The basic weighting parameters came from a special analysis of the Census Bureau’s 2011 Annual Social and Economic Supplement (ASEC) that included ... times of day and days of the week to maximize the chances of making contact with a potential respondent. Each number received at least one daytime call in an attempt to find someone available....
  • 16
  • 336
  • 0
A computer system consists of hardware, system programs, and application programs figs 1

A computer system consists of hardware, system programs, and application programs figs 1

Phần cứng

... dataUser programand dataOperatingSystemAddress0xFFFFFFFFLimitBase0 (a) User-2 dataUser-1 dataUser programOperatingSystemBase-2Limit-2Limit-2Limit-1Base-2Base-1(b)Limit-1Base-1 ... slotKey-boardMon-itorGraphicsadaptorLevel 2cacheCache bus Memory busPCI busFig. 1-11. The structure of a large Pentium system (a) (b)Fig. 1-13. (a) A potential deadlock. (b) An actual deadlock.Process ... TANENBAUM$FORTRAN$LOAD$RUN$ENDFortran programData for programFig. 1-3. Structure of a typical FMS job.UNIX Win32 Descriptionfork CreateProcess Create a new processwaitpid WaitForSingleObject Can wait for a process...
  • 30
  • 388
  • 0
A computer system consists of hardware, system programs, and application programs figs 2

A computer system consists of hardware, system programs, and application programs figs 2

Phần cứng

... request(&buf); wait for work(&buf)handoff work(&buf); look for page in cache(&buf, &page);} if (page not in cache(&page))read page from disk(&buf, &page);return page(&page);} (a) ... SCHEDULING2.6 RESEARCH ON PROCESSES AND THREADS2.7 SUMMARYThread 1'scodeThread 2'scodeThread 1'sstackThread 2'sstackThread 1'sglobalsThread 2'sglobalsFig. 2-17. ... the readers and writers problem.BarrierBarrierBarrier A A A B B BC CDD DTimeTime TimeProcess (a) (b) (c)CFig. 2-30. Use of a barrier. (a) Processes approaching a barrier.(b) All processes...
  • 45
  • 346
  • 0
A computer system consists of hardware, system programs, and application programs figs 3

A computer system consists of hardware, system programs, and application programs figs 3

Phần cứng

... 7(e)Has Max Has Max Has Max Has Max Has MaxFig. 3-9. Demonstration that the state in (a) is safe.typedef int semaphore; typedef int semaphore;semaphore resource 1; semaphore resource 1;semaphore ... 0(c) A BC4—297Free: 4(d)Has Max Has Max Has Max Has MaxFig. 3-10. Demonstration that the state in (b) is not safe.typedef int semaphore;semaphore resource 1; semaphore resource 1;semaphore ... deadlock A RBSCT(i) A RBSCT(h) A RBSCT(g) A RBSCT(f) A RBSCT(e)(d)(c)(b) (a) A RBSCT(q) A RBSCT(p) A RBSCT(o) A RBSCT(n) A RBSCT(m) A RBSCT(l)(k) A RBSCTFig. 3-4. An example of how deadlock occurs and how it can beavoided.Tape...
  • 15
  • 306
  • 0
A computer system consists of hardware, system programs, and application programs figs 4

A computer system consists of hardware, system programs, and application programs figs 4

Phần cứng

... page table fields.(b) Two-level page tables.Page faults/secNumber of page frames assigned A BFig. 4-29. Page fault rate as a function of the number of pageframes assigned.50% I/O wait80% ... page framesHash table216 -1252 -1216 -100Indexedby virtualpage0Indexedby hash onvirtual pageVirtualpagePageframeFig. 4-15. Comparison of a traditional page table with an ... memoryExternalpagerFaulthandlerUserprocessMMUhandler1. Page fault6. Mappage in 5. Here is pageUserspaceKernelspace2. Neededpage4. Pagearrives3. Request pageFig. 4-34. Page fault handling with an external pager.ConsiderationPagingSegmentationNeed...
  • 48
  • 291
  • 0
A computer system consists of hardware, system programs, and application programs figs 5

A computer system consists of hardware, system programs, and application programs figs 5

Phần cứng

... driver (a) (b)Fig. 5-13. (a) Without a standard driver interface. (b) With a stan-dard driver interface.Crystal oscillatorCounter is decremented at each pulseHolding register is used to load ... using programmed I/O.5INPUT/OUTPUT5.1 PRINCIPLES OF I/O HARDWARE5.2 PRINCIPLES OF I/O SOFTWARE5.3 I/O SOFTWARE LAYERS5.4 DISKS5.5 CLOCKS5.6 CHARACTER-ORIENTED TERMINALS5.7 GRAPHICAL USER ... groovePitLand2K block of user dataFig. 5-20. Recording structure of a compact disc or CD-ROM.User-level I/O softwareDevice-independent operating system softwareDevice driversInterrupt handlersHardwareFig....
  • 52
  • 404
  • 0

Xem thêm