نتایج جستجو برای: الگوریتم levenshtein

تعداد نتایج: 22948  

2009
José Ignacio Abreu Salas Juan Ramón Rico-Juan

In this paper, we present a new method for constructing prototypes representing a set of contours encoded by Freeman Chain Codes. Our method build new prototypes taking into account similar segments shared between contours instances. The similarity criterion was based on the Levenshtein Edit Distance definition. We also outline how to apply our method to reduce a data set without sensibly affec...

2006
Andrew Freeman Sherri L. Condon Christopher Ackerman

This paper presents a solution to the problem of matching personal names in English to the same names represented in Arabic script. Standard string comparison measures perform poorly on this task due to varying transliteration conventions in both languages and the fact that Arabic script does not usually represent short vowels. Significant improvement is achieved by augmenting the classic Leven...

2005
Uwe D. Reichel Florian Schiel

In this study four statistical grapheme-to-phoneme (G2P) conversion methods for canonical German are compared. The G2P models differ in terms of usage of morphologic information and of phoneme history (left context) information. In order to evaluate our models we introduce two measures, namely mean normalized Levenshtein distance for classification accuracy and conditional relative entropy for ...

2015
Eckhard Bick

This paper presents a Constraint Grammarbased pedagogical proofing tool for Danish. The system recognizes not only spelling errors, but also grammatical errors in otherwise correctly spelled words, and categorizes errors for WORD-integrated pedagogical comments. Possible spelling corrections are prioritized from context, and grammatical corrections generated by a morphological module. The syste...

Journal: :Scientific Programming 2021

In this digital era of technology and software development tools, low-cost cameras powerful video editing (such as Adobe Premiere, Microsoft Movie Maker, Magix Vegas) have become available for any common user. Through these softwares, the contents videos became very easy. Frame duplication is a forgery attack which can be done by copying pasting sequence frames within same in order to hide or r...

Journal: :Des. Codes Cryptography 2008
Khmaies Ouahada Theo G. Swart Hendrik C. Ferreira Ling Cheng

We investigate binary sequences which can be obtained by concatenating the columns of (0,1)-matrices derived from permutation sequences. We then prove that these binary sequences are subsets of a surprisingly diverse ensemble of codes, namely the Levenshtein codes, capable of correcting insertion/deletion errors; spectral null codes, with spectral nulls at certain frequencies; as well as being ...

2010
Svetlin Nakov Elena Paskaleva Preslav Nakov

We propose a novel knowledge-rich approach to measuring the similarity between a pair of words. The algorithm is tailored to Bulgarian and Russian and takes into account the orthographic and the phonetic correspondences between the two Slavic languages: it combines lemmatization, hand-crafted transformation rules, and weighted Levenshtein distance. The experimental results show an 11-pt interpo...

2013
Davide Buscaldi Joseph Le Roux Jorge J. García Flores Adrian Popescu

This paper describes the system used by the LIPN team in the Semantic Textual Similarity task at SemEval 2013. It uses a support vector regression model, combining different text similarity measures that constitute the features. These measures include simple distances like Levenshtein edit distance, cosine, Named Entities overlap and more complex distances like Explicit Semantic Analysis, WordN...

2004
Andrei Scherbina

Various commercial and scientific applications require analysis of user behaviour in the Internet. New web user sessions classification method is the main goal of proposed research. In this paper web usage analysis is described. Previously Levenshtein metric was applied to web sessions domain in hierarchical clustering. Test results show that the proposed clustering method has good accuracy in ...

2011
Thierry M. Lavoie Ettore Merlo Thierry Lavoie

This paper presents an original technique for clone detection with metric trees using Levenshtein distance as the metric defined between two code fragments. This approach achieves a faster empirical performance. The resulting clones may be found with varying thresholds allowing type 3 clone detection. Experimental results of metric trees performance as well as clone detection statistics on an o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید