Results 61 to 70 of about 623,633 (264)

The Distribution of N-Grams

open access: yesScientometrics, 2000
N-grams are generalized words consisting of N consecutive symbols, as they are used in a text. This paper determines the rank-frequency distribution for redundant N-grams. For entire texts this is known to be Zipf's law (i.e., an inverse power law).
openaire   +3 more sources

Malware Classification Based on Shallow Neural Network

open access: yesFuture Internet, 2020
The emergence of a large number of new malicious code poses a serious threat to network security, and most of them are derivative versions of existing malicious code.
Pin Yang   +4 more
doaj   +1 more source

Learning Distributed Representations for Multiple-Viewpoint Melodic Prediction [PDF]

open access: yes, 2013
The analysis of sequences is important for extracting in- formation from music owing to its fundamentally temporal nature. In this paper, we present a distributed model based on the Restricted Boltzmann Machine (RBM) for learning melodic sequences.
Cherla, S.   +3 more
core  

Combining antibody conjugates with cytotoxic and immune‐stimulating payloads maximizes anti‐cancer activity

open access: yesMolecular Oncology, EarlyView.
Methods to improve antibody–drug conjugate (ADC) treatment durability in cancer therapy are needed. We utilized ADCs and immune‐stimulating antibody conjugates (ISACs), which are made from two non‐competitive antibodies, to enhance the entry of toxic payloads into cancer cells and deliver immunostimulatory agents into immune cells.
Tiexin Wang   +3 more
wiley   +1 more source

N-grams Bayesian Differential Privacy

open access: yes, 2021
Differential privacy has gained popularity in machine learning as a strong privacy guarantee, in contrast to privacy mitigation techniques such as k-anonymity. However, applying differential privacy to n-gram counts significantly degrades the utility of derived language models due to their large vocabularies. We propose a differential privacy mechanism
Ramadan, Osman   +2 more
openaire   +2 more sources

Linear levels through n-grams [PDF]

open access: yesProceedings of the 18th International Academic MindTrek Conference: Media Business, Management, Content & Services, 2014
We show that novel, linear game levels can be created using n-grams that have been trained on a corpus of existing levels. The method is fast and simple, and produces levels that are recognisably in the same style as those in the corpus that it has been trained on. We use Super Mario Bros.
Dahlskog, Steve   +2 more
openaire   +1 more source

Using percolated dependencies for phrase extraction in SMT [PDF]

open access: yes, 2009
Statistical Machine Translation (SMT) systems rely heavily on the quality of the phrase pairs induced from large amounts of training data. Apart from the widely used method of heuristic learning of n-gram phrase translations from word alignments, there ...
Srivastava, Ankit Kumar, Way, Andy
core   +2 more sources

Engineered extracellular vesicles enriched with the miR‐214/199a cluster enhance the efficacy of chemotherapy in ovarian cancer

open access: yesMolecular Oncology, EarlyView.
Loss of the miR‐214/199a cluster is associated with recurrence in ovarian cancer. Engineered small extracellular vesicles (m214‐sEVs) elevate miR‐214‐3p/miR‐199a‐5p in tumor cells, suppress β‐catenin, TLR4, and YKT6 signaling, reprogram tumor‐derived sEV cargo, reduce chemoresistance and migration, and enhance carboplatin efficacy and survival in ...
Weida Wang   +12 more
wiley   +1 more source

PENYUSUNAN STRONG’S CONCORDANCE UNTUK ALKITAB PERJANJIAN BARU BAHASA INDONESIA

open access: yesJurnal Sistem Informasi, 2012
Sampai saat ini belum pernah ditemukan Alkitab Perjanjian Baru Bahasa Indonesia secara online yang dilengkapi dengan Strong’s Concordance. Oleh karena itu penelitian ini melakukan penyusunan Strong’s Concordance ke dalam Alkitab Perjanjian Baru Bahasa ...
. Gunawan   +3 more
doaj   +3 more sources

The Optimization of n-Gram Feature Extraction Based on Term Occurrence for Cyberbullying Classification

open access: yesData Science Journal
Cyberbullied communications should be bundled since online harassment is growing and has serious implications. High cyberbullying requires strong text classification algorithms to safeguard persons and communities.
Yudi Setiawan   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy