期刊文献+
共找到45篇文章
< 1 2 3 >
每页显示 20 50 100
Research on the Public Perception of Yangzhou Historical and Cultural Districts Based on Network Review Text Analysis
1
作者 WU Tao SHAO Yuanhua 《Journal of Landscape Research》 2023年第3期36-41,共6页
The historical and cultural districts of a city serve as important cultural heritage and tourism resources.This paper focused on four such districts in Yangzhou and performed semantic analysis on online public comment... The historical and cultural districts of a city serve as important cultural heritage and tourism resources.This paper focused on four such districts in Yangzhou and performed semantic analysis on online public comments using ROST CM6 software.According to the high frequency words,attention preference of district site elements,activities and feelings in Yangzhou historical and cultural districts were analyzed.Through the analysis of semantic network and public emotional tendency,the relationship between the protection and utilization of Yangzhou historical and cultural districts and the perception and demand of users were discussed,and some suggestions for the protection,utilization and renewal of historical and cultural districts were put forward. 展开更多
关键词 Yangzhou historical and cultural districts text analysis Public perception Protection and renewal
下载PDF
Study on text analysis and advanced English teaching 被引量:5
2
作者 赵晓囡 《Sino-US English Teaching》 2007年第11期19-23,共5页
This paper is attempted to explore advanced English teaching from perspective of text analysis. It involves the introduction of culture background, the application of genre-based approach, the appreciation of writing ... This paper is attempted to explore advanced English teaching from perspective of text analysis. It involves the introduction of culture background, the application of genre-based approach, the appreciation of writing style and the analysis of textual structure through sample studies. 展开更多
关键词 text analysis advanced English CULTURE GENRE STYLISTICS
下载PDF
Text Analysis-Based Watermarking Approach for Tampering Detection of English Text 被引量:1
3
作者 Fahd N.Al-Wesabi 《Computers, Materials & Continua》 SCIE EI 2021年第6期3701-3719,共19页
Due to the rapid increase in the exchange of text information via internet networks,the security and the reliability of digital content have become a major research issue.The main challenges faced by researchers are a... Due to the rapid increase in the exchange of text information via internet networks,the security and the reliability of digital content have become a major research issue.The main challenges faced by researchers are authentication,integrity verication,and tampering detection of the digital contents.In this paper,text zero-watermarking and text feature-based approach is proposed to improve the tampering detection accuracy of English text contents.The proposed approach embeds and detects the watermark logically without altering the original English text document.Based on hidden Markov model(HMM),the fourth level order of the word mechanism is used to analyze the contents of the given English text to nd the interrelationship between the contexts.The extracted features are used as watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,the proposed approach has been implemented and validated with attacked English text.Experiments were performed using four standard datasets of varying lengths under multiple random locations of insertion,reorder,and deletion attacks.The experimental and simulation results prove the tampering detection accuracy of our method against all kinds of tampering attacks.Comparison results show that our proposed approach outperforms all the other baseline approaches in terms of tampering detection accuracy. 展开更多
关键词 text analysis English language processing hidden Markov model ZERO-WATERMARKING content authentication tampering detection
下载PDF
Priorities for Social and Humanities Projects Based on Text Analysis 被引量:1
4
作者 Ülle Must 《Journal of Data and Information Science》 CSCD 2020年第4期116-125,共10页
Purpose:Changes in the world show that the role,importance,and coherence of SSH(social sciences and the humanities)will increase significantly in the coming years.This paper aims to monitor and analyze the evolution(o... Purpose:Changes in the world show that the role,importance,and coherence of SSH(social sciences and the humanities)will increase significantly in the coming years.This paper aims to monitor and analyze the evolution(or overlapping)of the SSH thematic pattern through three funding instruments since 2007.Design/methodology/approach:The goal of the paper is to check to what extent the EU Framework Program(FP)affects/does not affect research on national level,and to highlight hot topics from a given period with the help of text analysis.Funded project titles and abstracts derived from the EU FP,Slovenian,and Estonian RIS were used.The final analysis and comparisons between different datasets were made based on the 200 most frequent words.After removing punctuation marks,numeric values,articles,prepositions,conjunctions,and auxiliary verbs,4,854 unique words in ETIS,4,421 unique words in the Slovenian Research Information System(SICRIS),and 3,950 unique words in FP were identified.Findings:Across all funding instruments,about a quarter of the top words constitute half of the word occurrences.The text analysis results show that in the majority of cases words do not overlap between FP and nationally funded projects.In some cases,it may be due to using different vocabulary.There is more overlapping between words in the case of Slovenia(SL)and Estonia(EE)and less in the case of Estonia and EU Framework Programmes(FP).At the same time,overlapping words indicate a wider reach(culture,education,social,history,human,innovation,etc.).In nationally funded projects(bottom-up),it was relatively difficult to observe the change in thematic trends over time.More specific results emerged from the comparison of the different programs throughout FP(top-down).Research limitations:Only projects with English titles and abstracts were analyzed.Practical implications:The specifics of SSH have to take into account—the one-to-one meaning of terms/words is not as important as,for example,in the exact sciences.Thus,even in co-word analysis,the final content may go unnoticed.Originality/value:This was the first attempt to monitor the trends of SSH projects using text analysis.The text analysis of the SSH projects of the two new EU Member States used in the study showed that SSH’s thematic coverage is not much affected by the EU Framework Program.Whether this result is field-specific or country-specific should be shown in the following study,which targets SSH projects in the so-called old Member States. 展开更多
关键词 text analysis SSH Estonian Research Information System(ETIS) Slovenian Research Information System(SICRIS) Community Research and Development Information Service(CORDIS)
下载PDF
Reference in cohesion: From the perspective of text analysis
5
作者 ZHANG Bo 《Sino-US English Teaching》 2010年第4期46-49,共4页
This paper attempts to explore how cohesion is realized by meanings of reference in text analysis. Through analyzing some aspects of reference, especially personal reference and demonstrative reference, we know that r... This paper attempts to explore how cohesion is realized by meanings of reference in text analysis. Through analyzing some aspects of reference, especially personal reference and demonstrative reference, we know that reference is a text characteristic beyond sentences. It contributes to the development of a text and makes the text more cohesive, communicative and accurate. Of course, reference in cohesion is not used separately, it is closely related with other aspects of text analysis, and they cooperate and restrain each other and perform functions together. So translators are required to have the competence of understanding and applying reference, ellipsis and other cohesive device from the viewpoint of texts level with the combination of other aspects in text analysis, then texts can be more cohesive, coherent and acceptable. 展开更多
关键词 text analysis COHESION REFERENCE
下载PDF
Text Analysis and Developing Students' English Thinking Ability
6
作者 Yuanpeng Huang 《Sino-US English Teaching》 2004年第6期64-68,共5页
Different from other studies, the paper makes some attempts to combine text analysis with developing students' English thinking ability. Based on the view that English thinking ability is connected with improving ove... Different from other studies, the paper makes some attempts to combine text analysis with developing students' English thinking ability. Based on the view that English thinking ability is connected with improving overall language abilities such as listening, speaking, reading, writing and translating, the paper proposes approaches to develop English thinking ability as well as syntactic fluency. The paper presents a hypothesis: The development of a text is the author's train of thought. If one wants to acquire the thinking way used by author, the indirect but efficient approach is to analyze the texts written by the authors. If we want to develop students' thinking ability, the way is to analyze the various texts rather than to give the list of text developing principles. Therefore, the key to the problem is how to analyze text so as to improve students' thinking ability? Michael Stubbs in his Discourse Analysis wrote, "Predict ability may be the single most important feature of human communication, precisely since it is central not only to all level of language; but also central to meaning and to thinking in general. Predictions are possible because language is structured. Such intuitive predictions are in turn a crucial part of our data in setting up language structures." According to the view given by Michael Stubbs, the paper offers three approaches to analyzing texts. 展开更多
关键词 text analysis thinking ability approach
下载PDF
The Thematic Progression Patterns and Text Analysis of Necklace
7
作者 朱汉敏 《海外英语》 2018年第3期201-203,共3页
This paper is an attempt to discuss the relationship between genre and the thematic progression. Through qualitative analysis of the short story Necklace of Maupassant, it is found that narrative texts always use the ... This paper is an attempt to discuss the relationship between genre and the thematic progression. Through qualitative analysis of the short story Necklace of Maupassant, it is found that narrative texts always use the linear theme pattern and the constant theme pattern, and sometimes the derived theme pattern and other patterns are also used to facilitate the text coherence and the plot development. Thematic progression in various fields has been studied extensively, but the analysis aims to short story is less than text coherence and other aspects. And there are some implications to teaching, writing, reading, and translation. 展开更多
关键词 thematic progression patterns text analysis NECKLACE SFG
下载PDF
On the Greatness of The Great Gatsby——About the Text Analysis of The Great Gatsby
8
作者 左美玲 《海外英语》 2017年第8期185-186,共2页
The Great Gatsby is universally recognized as one of the masterpieces in the world literature. This thesis adopts the methods of comparison, contrast, and quotation to explore why Great Gatsby is great. This thesis an... The Great Gatsby is universally recognized as one of the masterpieces in the world literature. This thesis adopts the methods of comparison, contrast, and quotation to explore why Great Gatsby is great. This thesis analyzes the text from the three aspects:the greatness in Gatsby's economic success, the greatness in Gatsby's perseverance of love, the greatness of Gatsby's personality. In this way, the readers can understand the great Gatsby's greatness. 展开更多
关键词 The Great Gatsby greatness text analysis
下载PDF
Orbit Weighting Scheme in the Context of Vector Space Information Retrieval
9
作者 Ahmad Ababneh Yousef Sanjalawe +2 位作者 Salam Fraihat Salam Al-E’mari Hamzah Alqudah 《Computers, Materials & Continua》 SCIE EI 2024年第7期1347-1379,共33页
This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schem... This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schemes like tf-idf and BM25.These conventional methods often struggle with accurately capturing document relevance,leading to inefficiencies in both retrieval performance and index size management.OWS proposes a dynamic weighting mechanism that evaluates the significance of terms based on their orbital position within the vector space,emphasizing term relationships and distribution patterns overlooked by existing models.Our research focuses on evaluating OWS’s impact on model accuracy using Information Retrieval metrics like Recall,Precision,InterpolatedAverage Precision(IAP),andMeanAverage Precision(MAP).Additionally,we assessOWS’s effectiveness in reducing the inverted index size,crucial for model efficiency.We compare OWS-based retrieval models against others using different schemes,including tf-idf variations and BM25Delta.Results reveal OWS’s superiority,achieving a 54%Recall and 81%MAP,and a notable 38%reduction in the inverted index size.This highlights OWS’s potential in optimizing retrieval processes and underscores the need for further research in this underrepresented area to fully leverage OWS’s capabilities in information retrieval methodologies. 展开更多
关键词 Information retrieval orbit weighting scheme semantic text analysis Tf-Idf weighting scheme vector space model
下载PDF
APPLYING DISCOURSE PRAGMATICS IN TEXT ANALYSIS
10
作者 侯涛 《Chinese Journal of Applied Linguistics》 2006年第1期116-120,129,共6页
Discourse pragmatics interprets the context-specific meaning of communicative events underlining texts in use. It is a cross-disciplinary study based on pragmatics, social linguistics and discourse analysis. This pape... Discourse pragmatics interprets the context-specific meaning of communicative events underlining texts in use. It is a cross-disciplinary study based on pragmatics, social linguistics and discourse analysis. This paper uses the theories and dynamic descriptions of conversation analysis and thematic structure analysis to examine two real texts for their textual and interpersonal meanings in order to illustrate the necessity as well as the feasibility of applying modern linguistic theories in transforming traditional methods of language teaching. 展开更多
关键词 text analysis DISCOURSE PRAGMATICS communicative process
原文传递
A quantum‐like approach for text generation from knowledge graphs
11
作者 Jia Zhu Xiaodong Ma +1 位作者 Zhihao Lin Pasquale De Meo 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第4期1455-1463,共9页
Recent text generation methods frequently learn node representations from graph‐based data via global or local aggregation,such as knowledge graphs.Since all nodes are connected directly,node global representation en... Recent text generation methods frequently learn node representations from graph‐based data via global or local aggregation,such as knowledge graphs.Since all nodes are connected directly,node global representation encoding enables direct communication between two distant nodes while disregarding graph topology.Node local representation encoding,which captures the graph structure,considers the connections between nearby nodes but misses out onlong‐range relations.A quantum‐like approach to learning bettercontextualised node embeddings is proposed using a fusion model that combines both encoding strategies.Our methods significantly improve on two graph‐to‐text datasets compared to state‐of‐the‐art models in various experiments. 展开更多
关键词 data mining knowledge‐based vision machine learning natural language processing text analysis
下载PDF
Automatic Persian Text Summarization Using Linguistic Features from Text Structure Analysis 被引量:1
12
作者 Ebrahim Heidary Hamïd Parvïn +2 位作者 Samad Nejatian Karamollah Bagherifard Vahideh Rezaie 《Computers, Materials & Continua》 SCIE EI 2021年第12期2845-2861,共17页
With the remarkable growth of textual data sources in recent years,easy,fast,and accurate text processing has become a challenge with significant payoffs.Automatic text summarization is the process of compressing text... With the remarkable growth of textual data sources in recent years,easy,fast,and accurate text processing has become a challenge with significant payoffs.Automatic text summarization is the process of compressing text documents into shorter summaries for easier review of its core contents,which must be done without losing important features and information.This paper introduces a new hybrid method for extractive text summarization with feature selection based on text structure.The major advantage of the proposed summarization method over previous systems is the modeling of text structure and relationship between entities in the input text,which improves the sentence feature selection process and leads to the generation of unambiguous,concise,consistent,and coherent summaries.The paper also presents the results of the evaluation of the proposed method based on precision and recall criteria.It is shown that the method produces summaries consisting of chains of sentences with the aforementioned characteristics from the original text. 展开更多
关键词 Natural language processing extractive summarization linguistic feature text structure analysis
下载PDF
Research on Wulong Tourism Service Experience Based on Network Travelogue
13
作者 Qiaoli He Guanghua Luo Xiantang Yang 《Proceedings of Business and Economic Studies》 2024年第3期149-160,共12页
This paper analyzes 1,662 travelogues about the Wulong tourism destination from the Mafengwo platform using literature research and network text analysis.The goal is to identify the driving factors affecting Wulong’s... This paper analyzes 1,662 travelogues about the Wulong tourism destination from the Mafengwo platform using literature research and network text analysis.The goal is to identify the driving factors affecting Wulong’s tourism service experience and suggest improvements.By extracting high-frequency words and analyzing emotions from the travelogues,tourists’conceptions and perceptions were identified and the factors affecting the tourism service experience in Wulong were summarized into six categories:tourism resource attractions,tourism transportation,tourism facilities and digital services,cultural charms,special cuisines,and environmental ambiance.Tourists’emotional perceptions of Wulong are primarily positive,with negative perceptions mainly related to unsatisfactory tourism facilities and digital services in the Wulong scenic area.This study helps the Wulong tourist destination understand the issues and deficiencies in tourists’service experiences,providing significant guidance for improving service quality and offering data support for service marketing and optimization. 展开更多
关键词 Online text analysis Wulong tourism Service experience
下载PDF
A Hybrid Intelligent Approach for Content Authentication and Tampering Detection of Arabic Text Transmitted via Internet 被引量:10
14
作者 Fahd N.Al-Wesabi 《Computers, Materials & Continua》 SCIE EI 2021年第1期195-211,共17页
In this paper,a hybrid intelligent text zero-watermarking approach has been proposed by integrating text zero-watermarking and hidden Markov model as natural language processing techniques for the content authenticati... In this paper,a hybrid intelligent text zero-watermarking approach has been proposed by integrating text zero-watermarking and hidden Markov model as natural language processing techniques for the content authentication and tampering detection of Arabic text contents.The proposed approach known as Second order of Alphanumeric Mechanism of Markov model and Zero-Watermarking Approach(SAMMZWA).Second level order of alphanumeric mechanism based on hidden Markov model is integrated with text zero-watermarking techniques to improve the overall performance and tampering detection accuracy of the proposed approach.The SAMMZWA approach embeds and detects the watermark logically without altering the original text document.The extracted features are used as a watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,SAMMZWA has been implemented and validated with attacked Arabic text.Experiments were performed on four datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results show that our method is more sensitive for all kinds of tampering attacks with high level accuracy of tampering detection than compared methods. 展开更多
关键词 HMM NLP text analysis ZERO-WATERMARKING tampering detection
下载PDF
A Reliable NLP Scheme for English Text Watermarking Based on Contents Interrelationship 被引量:3
15
作者 Fahd N.Al-Wesabi Saleh Alzahrani +3 位作者 Fuad Alyarimi Mohammed Abdul Nadhem Nemri Mohammed M.Almazah 《Computer Systems Science & Engineering》 SCIE EI 2021年第6期297-311,共15页
In this paper,a combined approach CAZWNLP(a combined approach of zero-watermarking and natural language processing)has been developed for the tampering detection of English text exchanged through the Internet.The thir... In this paper,a combined approach CAZWNLP(a combined approach of zero-watermarking and natural language processing)has been developed for the tampering detection of English text exchanged through the Internet.The third gram of alphanumeric of the Markov model has been used with text-watermarking technologies to improve the performance and accuracy of tampering detection issues which are limited by the existing works reviewed in the literature of this study.The third-grade level of the Markov model has been used in this method as natural language processing technology to analyze an English text and extract the textual characteristics of the given contexts.Moreover,the extracted features have been utilized as watermark information and then validated with the attacked English text to detect any suspected tampering occurred on it.The embedding mechanism of CAZWNLP method will be achieved logically without effects or modifying the original text document to embed a watermark key.CAZWNLP has been implemented using VS code IDE with PHP.The experimental and simulation results using standard datasets of varying lengths show that the proposed approach can obtain high robustness and better detection accuracy of tampering common random insertion,reorder,and deletion attacks,e.g.,Comparison results with baseline approaches also show the advantages of the proposed approach. 展开更多
关键词 NLP text analysis English text watermarking ROBUSTNESS tampering detection
下载PDF
Smart-Fragile Authentication Scheme for Robust Detecting of Tampering Attacks on English Text 被引量:1
16
作者 Mohammad Alamgeer Fahd N.Al-Wesabi +5 位作者 Huda G.Iskandar Imran Khan Nadhem Nemri Mohammad Medani Mohammed Abdullah Al-Hagery Ali Mohammed Al-Sharafi 《Computers, Materials & Continua》 SCIE EI 2022年第5期2497-2513,共17页
Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology.In this paper,a... Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology.In this paper,a text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing and Digital Watermarking(SFASCDW)is proposed for content authentication and tampering detection of English text.A first-level order of alphanumeric mechanism,based on hidden Markov model,is integrated with digital zero-watermarking techniques to improve the watermark robustness of the proposed approach.The researcher uses the first-level order and alphanumeric mechanism of Markov model as a soft computing technique to analyze English text.Moreover,he extracts the features of the interrelationship among the contexts of the text,utilizes the extracted features as watermark information,and validates it later with the studied English text to detect any tampering.SFASCDW has been implemented using PHP with VS code IDE.The robustness,effectiveness,and applicability of SFASCDW are proved with experiments involving four datasets of various lengths in random locations using the three common attacks,namely insertion,reorder,and deletion.The SFASCDW was found to be effective and could be applicable in detecting any possible tampering. 展开更多
关键词 WATERMARKING soft computing text analysis hidden Markov model content authentication
下载PDF
Arabic Feature-Based Text Watermarking Technique for Sensitive Detecting Tampering Attack 被引量:1
17
作者 Fahd N.Al-Wesabi Huda G.Iskandar +5 位作者 Saleh Alzahrani Abdelzahir Abdelmaboud Mohammed Abdul Nadhem Nemri Mohammad Medani Mohammed Y.Alghamdi 《Computers, Materials & Continua》 SCIE EI 2021年第9期3789-3806,共18页
In this article,a high-sensitive approach for detecting tampering attacks on transmitted Arabic-text over the Internet(HFDATAI)is proposed by integrating digital watermarking and hidden Markov model as a strategy for ... In this article,a high-sensitive approach for detecting tampering attacks on transmitted Arabic-text over the Internet(HFDATAI)is proposed by integrating digital watermarking and hidden Markov model as a strategy for soft computing.The HFDATAI solution technically integrates and senses the watermark without modifying the original text.The alphanumeric mechanism order in the first stage focused on the Markov model key secret is incorporated into an automated,null-watermarking approach to enhance the proposed approach’s efficiency,accuracy,and intensity.The first-level order and alphanumeric Markov model technique have been used as a strategy for soft computing to analyze the text of the Arabic language.In addition,the features of the interrelationship among text contexts and characteristics of watermark information extraction that is used later validated for detecting any tampering of the Arabic-text attacked.The HFDATAI strategy was introduced based on PHP with included IDE of VS code.Experiments of four separate duration datasets in random sites illustrate the fragility,efficacy,and applicability of HFDATAI by using the three common tampering attacks i.e.,insertion,reorder,and deletion.The HFDATAI was found to be effective,applicable,and very sensitive for detecting any possible tampering on Arabic text. 展开更多
关键词 WATERMARKING soft computing text analysis hidden Markov model content authentication
下载PDF
An Optimized English Text Watermarking Method Based on Natural Language Processing Techniques
18
作者 Fahd N.Al-Wesabi 《Computers, Materials & Continua》 SCIE EI 2021年第11期1519-1536,共18页
In this paper,the text analysis-based approach RTADZWA(Reliable Text Analysis and Digital Zero-Watermarking Approach)has been proposed for transferring and receiving authentic English text via the internet.Second leve... In this paper,the text analysis-based approach RTADZWA(Reliable Text Analysis and Digital Zero-Watermarking Approach)has been proposed for transferring and receiving authentic English text via the internet.Second level order of alphanumeric mechanism of hidden Markov model has been used in RTADZWA approach as a natural language processing to analyze the English text and extracts the features of the interrelationship between contexts of the text and utilizes the extracted features as watermark information and then validates it later with attacked English text to detect any tampering occurred on it.Text analysis and text zero-watermarking techniques have been integrated by RTADZWA approach to improving the performance,accuracy,capacity,and robustness issues of the previous literature proposed by the researchers.The RTADZWA approach embeds and detects the watermark logically without altering the original text document to embed a watermark.RTADZWA has been implemented using PHP with VS code IDE.The experimental and simulation results using standard datasets of varying lengths show that the proposed approach can obtain high robustness and better detection accuracy of tampering common random insertion,reorder,and deletion attacks,e.g.,Comparison results with baseline approaches also show the advantages of the proposed approach. 展开更多
关键词 text analysis NLP hidden markov model ZERO-WATERMARKING content authentication tampering detection
下载PDF
An Optimal Text Watermarking Method for Sensitive Detecting of Illegal Tampering Attacks
19
作者 Anwer Mustafa Hilal Fahd N.Al-Wesabi +3 位作者 Mohammed Alamgeer Manar Ahmed Hamza Mohammad Mahzari Murad A.Almekhlafi 《Computers, Materials & Continua》 SCIE EI 2022年第3期5583-5600,共18页
Due to the rapid increase in the exchange of text information via internet networks,the security and authenticity of digital content have become a major research issue.The main challenges faced by researchers are how ... Due to the rapid increase in the exchange of text information via internet networks,the security and authenticity of digital content have become a major research issue.The main challenges faced by researchers are how to hide the information within the text to use it later for authentication and attacks tampering detection without effects on the meaning and size of the given digital text.In this paper,an efficient text-based watermarking method has been proposed for detecting the illegal tampering attacks on theArabic text transmitted online via an Internet network.Towards this purpose,the accuracy of tampering detection and watermark robustness has been improved of the proposed method as compared with the existing approaches.In the proposed method,both embedding and extracting of the watermark are logically implemented,which causes no change in the digital text.This is achieved by using the third level and alphanumeric strategy of the Markov model as a text analysis technique for analyzing the Arabic contents to obtain its features which are considered as the digital watermark.This digital watermark will be used later to detecting any tampering of illegal attack on the received Arabic text.An extensive set of experiments using four data sets of varying lengths proves the effectiveness of our approach in terms of detection accuracy,robustness,and effectiveness under multiple random locations of the common tampering attacks. 展开更多
关键词 text analysis text-watermarking tampering detection text authentication
下载PDF
Analysis of Multiple Dimensions of“Another”in In Another Country
20
作者 黄甜甜 《海外英语》 2021年第4期234-235,共2页
Hemingway’s In Another Country expresses rich ideological connotation with extremely concise language,and reveals the cruelty of war and the huge trauma caused by war to human body and mind.This paper explores the mu... Hemingway’s In Another Country expresses rich ideological connotation with extremely concise language,and reveals the cruelty of war and the huge trauma caused by war to human body and mind.This paper explores the multiple meanings of“an⁃other”in this short story by analyzing the background,environment,character identity,social relationship and personal concept. 展开更多
关键词 in another world text analysis WAR DETACHED ALIENATION
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部