Showing 281 - 300 results of 548 for search '"dictionary"', query time: 0.05s Refine Results
  1. 281

    Un cas de grammaticalisation ratée ? Étude diachronique de l’emploi du verbe stand en anglais by Maarten Lemmens

    Published 2014-10-01
    “…This article discusses the different uses of the verb stand in earlier stages of the English language, based on data from the Oxford English Dictionary. While Modern English does not use the posture verbs all that much compared to the other Germanic languages where these verbs have become basic locative verbs, the older uses show that English stand (as well as the other posture verbs sit and lie) was used in a way quite similar to what is found in other Germanic languages today. …”
    Get full text
    Article
  2. 282

    Corpus based study of verbs explain and clarify as an example of assistance in pedagogical settings by Séguin Maja

    Published 2020-12-01
    “…This paper examines the usage of the two verbs by looking into corpus data and uses Sinclair's methodological procedure as an alternative to dictionary references. Also included is a discussion of aspects and criticisms of corpus linguistics, mentions (and uses of) computer technologies for the analysis of language by discovering usage patterns, significant exceptions and semantic prosody, and exploring whether using corpora in the classroom would be beneficial to language learners.…”
    Get full text
    Article
  3. 283

    Discovery and segmentation method in micro-blog topics based on public emotional engagement analysis by Chunhua JU, Fuguang BAO, Junyan DAI

    Published 2016-07-01
    “…To improve the discovery efficiency and quality of micro-blog topic,a method of rapid discovery and segmentation in micro-blog topics based on public emotional engagement analysis was proposed,it would prompt evolution of the topics,then generate new topics and gain emotional change trend.Firstly,common emotional words were mined from corpus to build emotional thesaurus based on emotional word dictionary and TFDF.Then,emotional text was extracted quickly and sigmoid function was utilized to detect the intensive period of emotional engagement,ensuring the validity of topic mining.Besides,an improved adaptive FCM was used to cluster and discover topics.The experimental results show that this method can enhance the efficiency and quality of topic discovery in mobile environment.…”
    Get full text
    Article
  4. 284

    Réflexions sur l’histoire globale et transnationale by Akira Iriye

    Published 2013-04-01
    “…Akira Iriye, qui a dirigé avec Pierre-Yves Saunier le Palgrave Dictionary of Transnational History, paru en 2009, retrace comment, au fil du XXe siècle et particulièrement depuis les années 1990, la communauté historienne s’est de plus en plus intéressée au phénomène de la mondialisation et à l’histoire globale et transnationale. …”
    Get full text
    Article
  5. 285

    Complex Dynamics of an Adnascent-Type Game Model by Baogui Xin, Junhai Ma, Qin Gao

    Published 2008-01-01
    “…See Webster's Revised Unabridged Dictionary published in 1913 by C. & G. Merriam Co., edited by Noah Porter.) …”
    Get full text
    Article
  6. 286

    Printed Persian Subword Recognition Using Wavelet Packet Descriptors by Samira Nasrollahi, Afshin Ebrahimi

    Published 2013-01-01
    “…The obtained feature vectors yield a pictorial dictionary for which an entry is the mean of each group that consists of the same subword with 4 fonts in 3 sizes. …”
    Get full text
    Article
  7. 287

    Sentiment Analysis of International and Foreign Chinese-Language Texts with Multilevel Features by Minxia Zhu

    Published 2022-01-01
    “…This paper selects three features: dictionary-based sentiment value feature, expression feature, and improved semantic feature. …”
    Get full text
    Article
  8. 288

    A new mathematical model to improve encryption process based on Split-Radix Fast Fourier Transform algorithm by Abdulle Hassan Mohamud

    Published 2025-01-01
    “…Several types of cryptoanalysis attacks such as brute-forcing, autocorrelation and dictionary attacks are comparatively evaluated and the end result of SRFFT evaluation indicates that SRFFT is preferable in many practical encryption applications since SRFFT complexity increases with the range of split-radix computations thus eliminating the potential chances of cryptanalysis attacks.…”
    Get full text
    Article
  9. 289

    L’archive (re)dessinée : documents et souvenirs dans les bandes dessinées d’Alison Bechdel by Côme Martin

    Published 2017-11-01
    “…Within her autobiographical work, Bechdel uses many written documents, from family letters to dictionary extracts. These documents are all copied out, meaning they are integrated to the panel as images and not simply inserted or reproduced. …”
    Get full text
    Article
  10. 290

    The Romantics of 1909: Arthur Symons, Pierre Lasserre and T. E. Hulme by Bénédicte COSTE

    Published 2016-12-01
    “…Arthur Symons’s The Romantic Movement in English Poetry (1909) has elicited scant discussion. Part dictionary of British authors born before 1800, part series of portraits of canonical Romantic poets, The Romantic Movement remains perplexing with its unclear purpose and ungainly format. …”
    Get full text
    Article
  11. 291

    Les faux-amis dans les notices lexicales des dictionnaires bilingues au service de l’apprentissage du FLE by Witold Ucherek, Monika Grabowska

    Published 2024-10-01
    “…The article is devoted to lexical notes concerning false friends found in two compact Polish-French and French-Polish general dictionaries that have been commercially available for about fifteen years. …”
    Get full text
    Article
  12. 292

    Neologisms in contemporary feminisms: For a redefinition of feminist linguistic activism by Océane Foubert

    Published 2023-12-01
    “…Based on a collection of neologisms in a crowdsourced dictionary, it is found that only a small portion of these neologisms align with the initial definition. …”
    Get full text
    Article
  13. 293

    THE INGENUITY OF THE TONAL PLAN OF THE DEVELOPMENT SECTIONS OF THE SONATA FORMS OF PIANO SONATAS BY W. A. MOZART by Gabriela COCA

    Published 2011-06-01
    “…I opened the Explanatory Dictionary of the Romanian Language to look for ingenuity in order to fins out the explanation for myself. …”
    Get full text
    Article
  14. 294

    Calculer la sémantique avec le langage IEML by Pierre Lévy

    Published 2023-12-01
    “…The article explains its dictionary, its formal grammar, and its integrated tools for building semantic graphs. …”
    Get full text
    Article
  15. 295

    L’instituteur du Code Soleil : la vocation d’un prophète missionnaire by André Pachod

    Published 2013-01-01
    “…More famous than Ferdinand Buisson’s Dictionary, the Code Soleil was an essential reference in the initial training and the daily life of teachers from 1923 to 1979. …”
    Get full text
    Article
  16. 296

    Celestial $w_{1+\infty}$ charges and the subleading structure of asymptotically-flat spacetimes by Marc Geiller

    Published 2025-01-01
    “…We do so using both the Bondi–Sachs and the Newman–Penrose formalism, via a dictionary built from a preferred choice of tetrad. …”
    Get full text
    Article
  17. 297

    Two-factor authenticated key agreement protocol based on biometric feature and password by Xiao-wei LI, Deng-qi YANG, Ben-hui CHEN, Yu-qing ZHANG

    Published 2017-07-01
    “…A new two-factor authenticated key agreement protocol based on biometric feature and password was proposed.The protocol took advantages of the user’s biological information and password to achieve the secure communication without bringing the smart card.The biometric feature was not stored in the server by using the fuzzy extractor technique,so the sensitive information of the user cannot be leaked when the server was corrupted.The authentication messages of the user were protected by the server’s public key,so the protocol can resist the off-line dictionary attack which often appears in the authentication protocols based on password.The security of the proposed protocol was given in the random oracle model provided the elliptic computational Diffie-Hellman assumption holds.The performance analysis shows the proposed protocol has better security.…”
    Get full text
    Article
  18. 298

    İBN KUTEYBE (v.276/889) VE TARİHÇİLİĞİ by M. Bahaüddin Varol

    Published 2008-11-01
    “…His books contain numerous sciences such as language, dictionary, poetry, Qur’an and Hadith as well as Islamic jurisprudence and history. …”
    Get full text
    Article
  19. 299

    Personalized requirements oriented trustworthy services recommendation based on social network by Pei-yun ZHANG, En-hong CHEN, Bo HUANG

    Published 2013-12-01
    “…In current background of service computing and society computing,it is difficult to obtain the trustworthy Web services to meet users' personalized requirements.To olve the problem,the trustworthy services recommendation model was proposed which orients personalized requirements based on socia twork.The decomposing and matching algorithm was proposed for users' personalized requirements,and the algorithm utilizes the semantic dictionary to improve the se-mantic match of users' requirements.Based on personal zed functional requirements and social trust values of network nodes and the services' direct trust values and indirect trust values,a trustworthy service recommendation algorithm was designed which meets the personalized requirements.By analyzing the correlation among the social network and services' trust values,the method can improve the performance of trustworthy services collaborative recommendation.The analysis of algorithms and experiments' results show that the approach is effective and feasible.…”
    Get full text
    Article
  20. 300

    Multi-server identity authentication scheme based on biometric and chaotic maps by Jianwu ZHANG, Zejin YAO, Zhendong WU

    Published 2017-02-01
    “…Password-based user remote authentication system has been widely used in recent years,the study found that a single password system is so vulnerable to dictionary analysis and brute force attack as well as other attacks that the security is not high.Biometric and password combination authentication method gradually added to the remote authentication system in order to improve the security level of authentication system.However,the existing authentication systems work in a single server environment,if extended to a multi-server environment,biometric templates and passwords will encounter single point breakthrough and cross-crack problem.In order to overcome the above problems,a multi-server key authentication scheme based on biometric and chaotic map was proposed.The scheme was based on smart cards,passwords and biometrics,which could significantly improve the security and the ability of anti-password guessing of multi-server authentication systems.…”
    Get full text
    Article