text file
Recently Published Documents


TOTAL DOCUMENTS

159
(FIVE YEARS 69)

H-INDEX

7
(FIVE YEARS 2)

Author(s):  
Pragya Katyayan ◽  
Nisheeth Joshi

Hindi is the third most-spoken language in the world (615 million speakers) and has the fourth highest native speakers (341 million). It is an inflectionally rich and relatively free word-order language with an immense vocabulary set. Despite being such a celebrated language across the globe, very few Natural Language Processing (NLP) applications and tools have been developed to support it computationally. Moreover, most of the existing ones are not efficient enough due to the lack of semantic information (or contextual knowledge). Hindi grammar is based on Paninian grammar and derives most of its rules from it. Paninian grammar very aggressively highlights the role of karaka theory in free-word order languages. In this article, we present an application that extracts all possible karakas from simple Hindi sentences with an accuracy of 84.2% and an F1 score of 88.5%. We consider features such as Parts of Speech tags, post-position markers (vibhaktis), semantic tags for nouns and syntactic structure to grab the context in different-sized word windows within a sentence. With the help of these features, we built a rule-based inference engine to extract karakas from a sentence. The application takes in a text file with clean (without punctuation) simple Hindi sentences and gives back karaka tagged sentences in a separate text file as output.


2022 ◽  
Author(s):  
Kelly D. Thomson ◽  
et al.

Excel spreadsheets containing sample locations and full detrital zircon U-Pb isotopic ratios and age results. Text file containing detailed description of detrital zircon U-Pb results and three supplemental figures.


2022 ◽  
Author(s):  
Kelly D. Thomson ◽  
et al.

Excel spreadsheets containing sample locations and full detrital zircon U-Pb isotopic ratios and age results. Text file containing detailed description of detrital zircon U-Pb results and three supplemental figures.


2021 ◽  
Vol 10 (3) ◽  
pp. 105-110
Author(s):  
Al Zimy Siregar

In data communication, the aspect of security and confidentiality data is needed. To maintain the security and confidentiality of the data is by using cryptography. Cryptography is the science of mathematical techniques related to aspects of information security such as data confidentiality, data authenticity, data integrity, and authentication data. Text security is done by a hybrid cryptography in a text file that is first performed using ADFGVX Cipher encryption, then the results of ADFGVX Cipher encryption is encrypted using the RSA. Testing primes using the Fermat algorithm. Implementation of the system using C# programming language in Microsoft Visual Studio 2010. The system on RSA was tested with a maximum key length of 256 bits to 32 bits intervals.


2021 ◽  
Author(s):  
Hugo Schweke ◽  
Marie-Helene Mucchielli ◽  
Nicolas Chevrollier ◽  
Simon Gosset ◽  
Anne Lopes

Molecular cartography using two-dimensional (2D) representation of protein surfaces has been shown to be very promising for protein surface analysis. Here, we present SURFMAP, a free standalone and easy-to-use software that enables the fast and automated 2D projection of either predefined features of protein surface (i.e., electrostatic potential, Kyte-Doolittle hydrophobicity, stickiness, and surface relief) or any descriptor encoded in the temperature factor column of a PDB file. SURFMAP uses a pseudo-cylindrical sinusoidal "equal-area" projection that has the advantage of preserving the area measures. It provides the user with (i) 2D maps that enable the easy and visual analysis of protein surface features of interest and (ii) maps in a text file format allowing the fast and straightforward quantitative comparison of 2D maps of homologous proteins.


2021 ◽  
Vol 11 (5) ◽  
pp. 7605-7609
Author(s):  
. Waseemullah ◽  
M. F. Hyder ◽  
M. A. Siddiqui ◽  
M. Mukarram

Automatic TV ad detection is a challenging task in computer vision. Manual ad detection is considered a tedious job. Detecting advertisements automatically saves time and human effort. In this paper, a method is proposed for detecting repeated video segments automatically, since generally, ads appear in TV transmissions frequently. At first, the user is allowed to browse the advertisements needed to be detected, and the video in which they are to be detected. The videos are then converted into a text file using the Base64 encodings. In the third step, the advertisements are detected using string comparison methods. In the end, a report, with the names of the advertisements is shown against the total time and the number of times these advertisements appeared in the stream. The implementation was carried out in python.


2021 ◽  
Author(s):  
Soohyun Lee ◽  
Carl Vitzthum ◽  
Burak H. Alver ◽  
Peter J. Park

AbstractSummaryAs the amount of three-dimensional chromosomal interaction data continues to increase, storing and accessing such data efficiently becomes paramount. We introduce Pairs, a block-compressed text file format for storing paired genomic coordinates from Hi-C data, and Pairix, an open-source C application to index and query Pairs files. Pairix (also available in Python and R) extends the functionalities of Tabix to paired coordinates data. We have also developed PairsQC, a collapsible HTML quality control report generator for Pairs files.AvailabilityThe format specification and source code are available at https://github.com/4dn-dcic/pairix, https://github.com/4dn-dcic/Rpairix and https://github.com/4dn-dcic/[email protected] or [email protected]


2021 ◽  
Vol 48 (4) ◽  
Author(s):  
Zainab N. Sultani ◽  
◽  
Ban N. Dhannoon ◽  

Hiding the presence of data during communication has become a pressing concern in this overly digitalized world as a consequence of illegitimate access. These concerns have led to cryptography and steganography techniques as methods for securing data. This paper presents a modified information hiding technique based on an indirect least significant bit. Instead of saving each bit of the secret message in the least significant bit (LSB) of the cover media, each bit of the secret message is compared to a mask bit in the cover media. The result is saved in the cover media’s LSB. In this paper, two steganography schemas are designed in which the cover media are image and audio, while the secret message is a text file. A simple encryption technique is used to transform the secret message into an unreadable format before the hiding process begins. The experimental results indicate that the proposed algorithm achieves promising performance


Author(s):  
C Vijaya Kumar ◽  
G S Udaya Kiran Babu
Keyword(s):  

Steganography is a way of hiding data in the context of an image, preventing a person from finding it by mistake. This is an explicit text file with an image file. Due to the need for steganography, we have proposed a new algorithm called the use of steganography. In our algorithm, we should have a cover and a message. It can be pixel-for-pixel in an image. In it, we will have to use every bit of encryption. This process will continue until the final track of encryption. After this step, the data is hidden in the image. We will send the image file to the client, and the client will need to change the process to download the source code to the image.


2021 ◽  
Vol 23 (07) ◽  
pp. 220-228
Author(s):  
Shravya K Holla ◽  
◽  
Rakshita M ◽  
Varshitha P ◽  
Tejaswini B.J ◽  
...  

Braille Display is a device which helps the visually impaired to read a text file in Braille format and as well receive an audio output of the text file. It gives an option to the user whether to receive output in terms of braille or audio. Braille is a tactile writing language of raised dots using which blinds and visually impaired people read and write through touch. The pattern of raised dots can be read with the fingers by blinds. The number and arrangement of these dots forms alphabets, numbers and special characters. The braille output in Braille display is observed in Braille text popper device which is made up of a plate having holes. Solenoids are placed under each hole to raise or lower the braille pin which will emerge through perforations on the top plate to form a Braille dot. The perforations serve as guides for the pins and form six dots which is equivalent to one Braille cell. Raspberry Pi Microcontroller is used to convert the text file into Braille format and thus controls the corresponding solenoid present below each of the holes to either pop up or down the hole by sending signal values to solenoids. Thus the solenoids align themselves based on the input character from the text file . The blinds can feel the sense of touch of the Braille pins that are popped up and they recognize the character accordingly. This way, blinds can recognize character by character. At every iteration, three characters from text file comes out in braille in Braille text popper device. The next button would display next three characters and previous button would display previous three characters. If the user prefers to hear audio, then it would give audio output of the text file through ear phones. Thus, the device facilitates the user either to read the text in braille or to hear the text as audio making it multifunctional.


Sign in / Sign up

Export Citation Format

Share Document