Data-driven models perform poorly on part-of-speech tagging problems with the square Hmong language, a low-resource corpus. This paper designs a weight evaluation function to reduce the influence of unknown words. It proposes an improved harmony search algorithm utilizing the roulette and local evaluation strategies for handling the square Hmong part-of-speech tagging problem. The experiment shows that the average accuracy of the proposed model is 6%, 8% more than HMM and BiLSTM-CRF models, respectively. Meanwhile, the average F1 of the proposed model is also 6%, 3% more than HMM and BiLSTM-CRF models, respectively.
In this article, the solvability of some proposal types of the multi-fractional integro-partial differential system has been discussed in details by using the concept of abstract Cauchy problem and certain semigroup operators and some necessary and sufficient conditions.
The present study is a qualitative study that aims to investigate the way the Iraqi caricaturist,Dheaa Al-Hajjar uses caricatures to produce a satirical meaning humorously.Producing satire while at the same maintaining humor requires a creative thinking on the part of the caricaturist. Thus, the study examines the production of humorous satire in terms of creativity. The analysis is done from the cognitive linguistic point of view using Arthur Koestler's theory of bisociation as presented in his book The Act of Creation in 1964. The main principle on which the theory is based is that humor is created via linking (or bisociating in Koestler's terms) two habitually incompatible trains of thought in order to come up with a novel me
... Show MoreThe current theoretical research targeted to construct a model of terrorist personality and its differentiation from psychopathic personality . Several assumptions or theories of perspectives of psychopathic personality have been compared with the terrorist personality studies that concerned . The suggested theoretical model is interrupting the terrorist personality . The conclusions , discussions are mentioned. Finally, recommendation is suggested .
Özet
Dünyanın muhtelif yerlerinde yaşayan, farklı din, kültür ve etnik gruba mensup olan insanlar arasında nazar inancının mevcut olduğu bilinmektedir. Nazar inancı İslam dinine inananlar arasında olduğu gibi farklı semavi ve gayri semavi dinlere inanan insanlar arasında da mevcut olduğu çeşitli pratik ve uygulamalardan tespit edilebilir. İnsanlar, nazara gelmemek için çeşitli yollara başvurmaktadırlar. Kötü nazarlı insanlara karşı her zaman bir korku, rahatsızlık ve çekingenliğin var olduğu söylenebilir. Dolayısıyla birçok insan, nazara ve başına kötü bir şeyin gelmemesi için söz konusu nazarı kötü
... Show MoreThroughout the ages, a number of natural and human disasters have
occurred in the Islamic world,
Abstract
The twentieth century French novel had undergo a significant change that took the form of a radical move from the traditional son who follows his father to one who no way prevalent in the classical French novel. The new son in the 2Oth century novel finds himself emotionally attached which both became a new trend and approach in novel writing.
Marcel Proust's novel which can be considered a source of inspiration for most of 2Oth century novelists is a good example of the mother supremacy which is crystal clear from the first page through its parts and chapters till the last page. In fact, Proust had written a completely different novel from the Balzacian conventions. Unlike the latter's novels, Pro
... Show MoreThis paper deals with the political, economic and cultural condition wich in volves a lot of events that angaged Arab is history Islamic, The advantage of the Ibn AL-saa`i is in fact a study of the character of the historian and how classihy us his book History of the Caliphs in the eventes of this era.
بعد الاحتجاجات التي اندلعت في ليبيا في فبراير 3122 ،استند مجلس الأمن وهيئات الأمم المتحدة الأخرى على مفهوم المسئولية عن الحماية (R2P )(لمعالجة الأوضاع الإنسانية الناجمة عن تلك الاحتجاجات. وأصدر المجلس القرار 1970والذي فرض بموجبه حزمة من العقوبات على ليبيا، ثم أصدر القرار 1973 الذي سمح بالتدخل العسكري هناك. وبعد البدء بتنفيذ الحملة العسكرية تبين أن الناتو استغل هذه القرارات لتنفيذ أجندته الخاصة وعمل على الإطاحة بالن
... Show MoreAbstract
This study aimed to kmow the effect of food on appearance of ovaries cyst in women aged 15-54 year in Baghdad. City and its relation ship with reproductive health Woman samples was divided to four aged groups;15-24 , 25-34 , 35-44 and 45-54 years.
Results demonstrate that all samples of women has varied level of obesity.
Also we are noticed that all samples of women has varied level of obesity.
Also we are noticed tgat is a relation ship between obesity and marriagestatas with the highest proportion of ovarian cystsin obese marriage woman reached to37.90% The percent of un married women which have obesity class // with ovarian cysts reached50% Results refer to found that %19-24 of married women had obortians and
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More