on jointly recognizing and aligning bilingual named entities

Báo cáo khoa học: " Translating Named Entities Using Monolingual and Bilingual Resources" ppt

Báo cáo khoa học: " Translating Named Entities Using Monolingual and Bilingual Resources" ppt

... transliterated into: Bell Clinton, Bill Clinton, Bill Klington, etc. 3.3 Producing Candidates for Location and Organization Names Words in organization and location names, on the other hand, are either translated ... Evaluation and Discussion 6.1 Test Set This section presents our evaluation results on the named entitytranslationtask. We compare the trans- lation results obtained from human translations, a commercial ... questions involve named entities (e.g., answers to who questions usually involve Per- sons/Organizations, where questionsinvolveLoca- tions, and when questions involve Temporal Ex- pressions). In this...

Ngày tải lên: 08/03/2014, 07:20

9 297 0
Báo cáo khoa học: "Annotating and Recognising Named Entities in Clinical Notes" pot

Báo cáo khoa học: "Annotating and Recognising Named Entities in Clinical Notes" pot

... holding one anno- tation as the standard. F-score is commonly used in information retrieval and information extraction evaluations, which calculates the harmonic mean of recall and precision as ... described in Section 4 and Section 5 respectively. A Conditional Random Fields based system was used to study and analyse the contri- bution of various feature types. The results and discussion are presented ... or irregular conventions further in- creased both precision and recall. The 14.72 gain in recall mainly came from resolution and expan- sion of shorthand, abbreviations, and acronyms in the notes....

Ngày tải lên: 08/03/2014, 01:20

9 413 0
Converting, Organizing, and Aligning

Converting, Organizing, and Aligning

... see and select in a 3D viewport. While in Controller Edit mode, when you click-drag on a control icon, you move the icon’s position relative to the bone it controls. 14. Drag the control icons ... calculations, and to fix other bones in place. 6. Select Spine1. Right-click on its control icon and choose (ikstop). This still lets this bone be rotated using IK Booster, but it will no longer ... IK and IKB to Work Note: In the case of *Hand_Trans and *Hand_Rot, I find it to be much easier to get the exact arcs of motion I’m looking for if I use *Hand_Trans for heading and bank, and *Hand_Rot...

Ngày tải lên: 27/08/2012, 14:31

50 595 0
Hands-On Ethical Hacking and Network Defense

Hands-On Ethical Hacking and Network Defense

... DOES THE WEB APPLICATION  REQUIRE AUTHENTICATION OF THE  USER?  Many Web applications require another server  authenticate users  Examine how information is passed between the  two servers  Encrypted channels  Verify that logon and password information is  stored on secure places  Authentication servers introduce a second target 44 37 34 APPLICATION VULNERABILITIES  COUNTERMEASURES (CONTINUED)  Top­10 Web application vulnerabilities (continued)  Remote administration flaws  Attacker can gain access to the Web server through the  remote administration interface  Web and application server misconfiguration  Any Web server software out of the box is usually vulnerable  to attack  Default accounts and passwords  Overly informative error messages 32 16 WEB FORMS  Use the <form> element or tag in an HTML document  Allows customer to submit information to the Web server  Web servers process information from a Web form by  using a Web application  Easy way for attackers to intercept data that users  submit to a Web server 7 APPLICATION VULNERABILITIES  COUNTERMEASURES  Open Web Application Security Project (OWASP)  Open, not­for­profit organization dedicated to finding  and fighting vulnerabilities in Web applications  Publishes the Ten Most Critical Web Application  Security Vulnerabilities  Top­10 Web application vulnerabilities  Unvalidated parameters  HTTP requests are not validated by the Web server  Broken access control  Developers implement access controls but fail to test them  properly 29 USING SCRIPTING LANGUAGES  Dynamic Web pages can be developed using scripting  languages  VBScript  JavaScript  PHP 18 OPEN DATABASE CONNECTIVITY  (ODBC) (CONTINUED)  ODBC defines  Standardized representation of data types  A library of ODBC functions  Standard methods of connecting to and logging on to a  DBMS 24 WEB APPLICATION COMPONENTS  Static Web pages  Created using HTML  Dynamic Web pages  Need special components  <form> tags  Common Gateway Interface (CGI)  Active Server Pages (ASP)  PHP  ColdFusion  Scripting languages  Database connectors 6 APACHE WEB SERVER  Tomcat Apache is another Web Server program  Tomcat Apache hosts anywhere from 50% to 60% of all  Web sites  Advantages  Works on just about any *NIX and Windows platform  It is free  Requires Java 2 Standard Runtime Environment (J2SE,  version 5.0) 15 ON WHAT PLATFORM WAS THE WEB  APPLICATION DEVELOPED?  Several different platforms and technologies can  be used to develop Web applications  Attacks differ depending on the platform and technology used to develop the application  Footprinting is used to find out as much information  as possible about a target system  The more you know about a system the easier it is to  gather information about its vulnerabilities 45 OPEN DATABASE CONNECTIVITY  (ODBC)  Standard database access method developed by  the SQL Access Group  ODBC interface allows an application to access  Data stored in a database management system  Any system that understands and can issue ODBC  commands  Interoperability among back­end DBMS is a key  feature of the ODBC interface 23 48 UNDERSTANDING WEB APPLICATIONS  It is nearly impossible to write a program without bugs  Some bugs create security vulnerabilities  Web applications also have bugs  Web applications have a larger user base than standalone  applications  Bugs are a bigger problem for Web applications 5 DOES THE WEB APPLICATION  CONNECT TO A BACKEND DATABASE  SERVER? (CONTINUED)  Basic testing should look for  Whether you can enter text with punctuation marks  Whether you can enter a single quotation mark followed by  any SQL keywords  Whether you can get any sort of database error when  attempting to inject SQL 43 DOES THE WEB APPLICATION USE  DYNAMIC WEB PAGES?  Static Web pages do not create a security  environment  IIS attack example  Submitting a specially formatted URL to the  attacked Web server  IIS does not correctly parse the URL  information  Attackers could launch a Unicode exploit http://www.nopatchiss.com/scripts/ ... DOES THE WEB APPLICATION  REQUIRE AUTHENTICATION OF THE  USER?  Many Web applications require another server  authenticate users  Examine how information is passed between the  two servers  Encrypted channels  Verify that logon and password information is  stored on secure places  Authentication servers introduce a second target 44 37 34 APPLICATION VULNERABILITIES  COUNTERMEASURES (CONTINUED)  Top­10 Web application vulnerabilities (continued)  Remote administration flaws  Attacker can gain access to the Web server through the  remote administration interface  Web and application server misconfiguration  Any Web server software out of the box is usually vulnerable  to attack  Default accounts and passwords  Overly informative error messages 32 16 WEB FORMS  Use the <form> element or tag in an HTML document  Allows customer to submit information to the Web server  Web servers process information from a Web form by  using a Web application  Easy way for attackers to intercept data that users  submit to a Web server 7 APPLICATION VULNERABILITIES  COUNTERMEASURES  Open Web Application Security Project (OWASP)  Open, not­for­profit organization dedicated to finding  and fighting vulnerabilities in Web applications  Publishes the Ten Most Critical Web Application  Security Vulnerabilities  Top­10 Web application vulnerabilities  Unvalidated parameters  HTTP requests are not validated by the Web server  Broken access control  Developers implement access controls but fail to test them  properly 29 USING SCRIPTING LANGUAGES  Dynamic Web pages can be developed using scripting  languages  VBScript  JavaScript  PHP 18 OPEN DATABASE CONNECTIVITY  (ODBC) (CONTINUED)  ODBC defines  Standardized representation of data types  A library of ODBC functions  Standard methods of connecting to and logging on to a  DBMS 24 WEB APPLICATION COMPONENTS  Static Web pages  Created using HTML  Dynamic Web pages  Need special components  <form> tags  Common Gateway Interface (CGI)  Active Server Pages (ASP)  PHP  ColdFusion  Scripting languages  Database connectors 6 APACHE WEB SERVER  Tomcat Apache is another Web Server program  Tomcat Apache hosts anywhere from 50% to 60% of all  Web sites  Advantages  Works on just about any *NIX and Windows platform  It is free  Requires Java 2 Standard Runtime Environment (J2SE,  version 5.0) 15 ON WHAT PLATFORM WAS THE WEB  APPLICATION DEVELOPED?  Several different platforms and technologies can  be used to develop Web applications  Attacks differ depending on the platform and technology used to develop the application  Footprinting is used to find out as much information  as possible about a target system  The more you know about a system the easier it is to  gather information about its vulnerabilities 45 OPEN DATABASE CONNECTIVITY  (ODBC)  Standard database access method developed by  the SQL Access Group  ODBC interface allows an application to access  Data stored in a database management system  Any system that understands and can issue ODBC  commands  Interoperability among back­end DBMS is a key  feature of the ODBC interface 23 48 UNDERSTANDING WEB APPLICATIONS  It is nearly impossible to write a program without bugs  Some bugs create security vulnerabilities  Web applications also have bugs  Web applications have a larger user base than standalone  applications  Bugs are a bigger problem for Web applications 5 DOES THE WEB APPLICATION  CONNECT TO A BACKEND DATABASE  SERVER? (CONTINUED)  Basic testing should look for  Whether you can enter text with punctuation marks  Whether you can enter a single quotation mark followed by  any SQL keywords  Whether you can get any sort of database error when  attempting to inject SQL 43 DOES THE WEB APPLICATION USE  DYNAMIC WEB PAGES?  Static Web pages do not create a security  environment  IIS attack example  Submitting a specially formatted URL to the  attacked Web server  IIS does not correctly parse the URL  information  Attackers could launch a Unicode exploit http://www.nopatchiss.com/scripts/ ... DOES THE WEB APPLICATION  REQUIRE AUTHENTICATION OF THE  USER?  Many Web applications require another server  authenticate users  Examine how information is passed between the  two servers  Encrypted channels  Verify that logon and password information is  stored on secure places  Authentication servers introduce a second target 44 37 34 APPLICATION VULNERABILITIES  COUNTERMEASURES (CONTINUED)  Top­10 Web application vulnerabilities (continued)  Remote administration flaws  Attacker can gain access to the Web server through the  remote administration interface  Web and application server misconfiguration  Any Web server software out of the box is usually vulnerable  to attack  Default accounts and passwords  Overly informative error messages 32 16 WEB FORMS  Use the <form> element or tag in an HTML document  Allows customer to submit information to the Web server  Web servers process information from a Web form by  using a Web application  Easy way for attackers to intercept data that users  submit to a Web server 7 APPLICATION VULNERABILITIES  COUNTERMEASURES  Open Web Application Security Project (OWASP)  Open, not­for­profit organization dedicated to finding  and fighting vulnerabilities in Web applications  Publishes the Ten Most Critical Web Application  Security Vulnerabilities  Top­10 Web application vulnerabilities  Unvalidated parameters  HTTP requests are not validated by the Web server  Broken access control  Developers implement access controls but fail to test them  properly 29 USING SCRIPTING LANGUAGES  Dynamic Web pages can be developed using scripting  languages  VBScript  JavaScript  PHP 18 OPEN DATABASE CONNECTIVITY  (ODBC) (CONTINUED)  ODBC defines  Standardized representation of data types  A library of ODBC functions  Standard methods of connecting to and logging on to a  DBMS 24 WEB APPLICATION COMPONENTS  Static Web pages  Created using HTML  Dynamic Web pages  Need special components  <form> tags  Common Gateway Interface (CGI)  Active Server Pages (ASP)  PHP  ColdFusion  Scripting languages  Database connectors 6 APACHE WEB SERVER  Tomcat Apache is another Web Server program  Tomcat Apache hosts anywhere from 50% to 60% of all  Web sites  Advantages  Works on just about any *NIX and Windows platform  It is free  Requires Java 2 Standard Runtime Environment (J2SE,  version 5.0) 15 ON WHAT PLATFORM WAS THE WEB  APPLICATION DEVELOPED?  Several different platforms and technologies can  be used to develop Web applications  Attacks differ depending on the platform and technology used to develop the application  Footprinting is used to find out as much information  as possible about a target system  The more you know about a system the easier it is to  gather information about its vulnerabilities 45 OPEN DATABASE CONNECTIVITY  (ODBC)  Standard database access method developed by  the SQL Access Group  ODBC interface allows an application to access  Data stored in a database management system  Any system that understands and can issue ODBC  commands  Interoperability among back­end DBMS is a key  feature of the ODBC interface 23 48 UNDERSTANDING WEB APPLICATIONS  It is nearly impossible to write a program without bugs  Some bugs create security vulnerabilities  Web applications also have bugs  Web applications have a larger user base than standalone  applications  Bugs are a bigger problem for Web applications 5 DOES THE WEB APPLICATION  CONNECT TO A BACKEND DATABASE  SERVER? (CONTINUED)  Basic testing should look for  Whether you can enter text with punctuation marks  Whether you can enter a single quotation mark followed by  any SQL keywords  Whether you can get any sort of database error when  attempting to inject SQL 43 DOES THE WEB APPLICATION USE  DYNAMIC WEB PAGES?  Static Web pages do not create a security  environment  IIS attack example  Submitting a specially formatted URL to the  attacked Web server  IIS does not correctly parse the URL  information  Attackers could launch a Unicode exploit http://www.nopatchiss.com/scripts/...

Ngày tải lên: 17/09/2012, 10:44

51 694 0
Cambridge.University.Press.The.Works.of.Archimedes.Volume.1.The.Two.Books.On.the.Sphere.and.the.Cylinder.Translation.and.Commentary.May.2004.pdf

Cambridge.University.Press.The.Works.of.Archimedes.Volume.1.The.Two.Books.On.the.Sphere.and.the.Cylinder.Translation.and.Commentary.May.2004.pdf

... Propositions 17–20, measuring conical volumes. Interlude Propositions 21–2, finding proportions holding with a circle and an inscribed polygon. Section 2: Main treatise Chapter 5 Propositions 23–34, ... stretched to the limits and beyond: the mini-treatise at the end of the work relies essentially upon conic sections; the notion of the exponent is ad- umbrated in Proposition 8. Both treat geometrical ... are both concave in the same direction and either one of them is wholly contained by the other and by the straight <line> having the same limits as itself, or some is contained, and some...

Ngày tải lên: 21/09/2012, 11:00

387 1.2K 3
Development of indicators on consumer satisfaction and Pilot survey

Development of indicators on consumer satisfaction and Pilot survey

... for the European Commission Directorate General on Health and Consumer Protection Development of indicators on consumer satisfaction and Pilot survey Contract n° B5-1000/03/000382 ... proposed methodology and the underlying model for the construction of consumer satisfaction indicators. In section 2.2 we introduce and define a number of terms and concepts. This is important ... The focus was on two main areas: o Existing (national) models and tools for consumer satisfaction indicators o Research results in relation to consumer behaviour and satisfaction measurement....

Ngày tải lên: 23/10/2012, 11:54

130 744 0
Báo cáo y học: "Impact of the Kenya post-election crisis on clinic attendance and medication adherence for HIV-infected children in western Kenya"

Báo cáo y học: "Impact of the Kenya post-election crisis on clinic attendance and medication adherence for HIV-infected children in western Kenya"

... publication. PB contributed to the conception and design of the study, revised the manu- script critically, and gave final approval for publication. SEW contributed to the conception and design ... perspective of families and children. In-depth exploration of the longer-term psychological and social impact of the election conflict on individual children is still needed and is ongoing within the ... purposes) Introduction Conflicts, population displacement, and the economic consequences of disasters affect children disproportion- ately.[1] Children are more vulnerable to communicable diseases and environmental...

Ngày tải lên: 25/10/2012, 10:31

10 696 0
Báo cáo y học: "The Impact of a Nationwide Antibiotic Restriction Program on Antibiotic Usage and Resistance against Nosocomial Pathogens in Turkey"

Báo cáo y học: "The Impact of a Nationwide Antibiotic Restriction Program on Antibiotic Usage and Resistance against Nosocomial Pathogens in Turkey"

... and antibiotic consumption from 2001 to 2005 were analyzed retrospectively. Results: A negative correlation was observed between the ceftriaxone consumption and the prevalence of ceftriaxone ... 2. A negative correlation was observed between the ceftriaxone consumption and the prevalence of ceftriaxone resistant E.coli and Klebsiella spp. (rho:-0.395, p=0.332 and rho:-0.627, p=0.037, ... infections and fluoroquino- lone resistance: a prospective observational study. Ann Clin Microbiol Antimicrob. 2009; 24(8):27. 30. Austin DJ, Kristinsson KG, Anderson RM. The relationship between...

Ngày tải lên: 25/10/2012, 11:00

6 692 0
Báo cáo y học: "Effect of Acute Administration of an Herbal Preparation on Blood Pressure and Heart Rate in Humans"

Báo cáo y học: "Effect of Acute Administration of an Herbal Preparation on Blood Pressure and Heart Rate in Humans"

... of Acute Administration of an Herbal Preparation on Blood Pressure and Heart Rate in Humans John G. Seifert 1  , Aaron Nelson 2 , Julia Devonish 2 , Edmund R. Burke 3 , and Sidney J. Stohs 4 ... collection. All subjects com- pleted a health history questionnaire and provided informed consent prior to participation. An uninvolved individual randomly divided subjects into two groups, 12 and ... Putzbach K, Nelson BC, et al. Certification of standard reference materials containing bitter orange. Analyt Bioanalyt Chem. 2008; 391: 2023-2034. 23. Stewart A, Fernando R, McDonald S, et al....

Ngày tải lên: 25/10/2012, 11:10

6 490 0
A study on idiomatic variants and synonymous idioms in english and vietnamese

A study on idiomatic variants and synonymous idioms in english and vietnamese

... paper, the author presented a contrastive analysis on the concept, formulation, cultural traditional function, syntactic function and classification of simile in English and its Vietnamese equivalents. ... are told to contain three main literature functions which are perceptive function, aesthetic function and educational function. For example, the proverb Money makes the mare go demonstrates a ... (semantics containing pragmatics and on the contrary). Due to the aims and objectives of the thesis, the scope of contrastive analysis is based on the following principles and aspects: - Contrastive...

Ngày tải lên: 07/11/2012, 15:01

71 1.9K 12
Xem thêm

Bạn có muốn tìm thêm với từ khóa:

w