A Novel Method for Cross-Language Retrieval of Chunks Using Monolingual and Bilingual Corpora

Information retrieval (IR) is a crucial area of natural language processing (NLP). One of the fundamental issues in bilingual retrieving of information in search engines seems to be the way and the extent users call for phrases and chunks. The main problem arises when the existing bilingual dictionaries are not able to meet the users’ actual needs for translating such phrases and chunks into an alternative language and the results often are not reliable. In this project a heuristic method for extracting the correct equivalents of source language chunks using monolingual and bilingual linguistic corpora as well as text classification algorithms is to be introduced. Experimental results revealed that our method gained the accuracy rate of 86.13% which seems very encouraging.

[1]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[2]  Stefano Chessa,et al.  Dependable and secure data storage and retrieval in mobile, wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..

[3]  Linlin Ci,et al.  Applying Wireless Sensor Networks to Context-Awareness in Ubiquitous Learning , 2007, Third International Conference on Natural Computation (ICNC 2007).

[4]  Stephen Gardner,et al.  Implementation of Elliptic-Curve Cryptography on Mobile Healthcare Devices , 2007, 2007 IEEE International Conference on Networking, Sensing and Control.

[5]  Prasun Sinha,et al.  On the Potential of Structure-Free Data Aggregation in Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[6]  G. Venkataraman,et al.  A Cluster-Based Approach to Fault Detection and Recovery in Wireless Sensor Networks , 2007, 2007 4th International Symposium on Wireless Communication Systems.

[7]  K. K. Thyagharajan,et al.  Adaptive Content Creation for Personalized e-Learning Using Web Services , 2007 .

[8]  Oscar Garcia Morchon,et al.  Efficient distributed security for wireless medical sensor networks , 2008, 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[9]  Wenjing Lou,et al.  Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance , 2009, IEEE INFOCOM 2009.

[10]  Ahmet M. Kondoz,et al.  Speaker adaptive vector quantisation of LPC parameters of speech , 1988 .

[11]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[12]  Kazuki Yoneyama,et al.  Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures , 2008, ACNS.

[13]  Bishnu S. Atal,et al.  Efficient coding of LPC parameters by temporal decomposition , 1983, ICASSP.

[14]  Tayebeh Mosavi Miangah Constructing a Large-Scale English-Persian Parallel Corpus , 2009 .

[15]  Jin Li,et al.  Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems , 2009, SecureComm.

[16]  Ivan Grech,et al.  Body area network for wireless patient monitoring , 2008, IET Commun..

[17]  Gregory Grefenstette,et al.  Querying across languages: a dictionary-based approach to multilingual information retrieval , 1996, SIGIR '96.

[18]  H. Srimathi,et al.  IDENTIFICATION OF ONTOLOGY BASED LEARNING OBJECT USING INSTRUCTIONAL DESIGN , 2008 .

[19]  Hinrich Schütze,et al.  Introduction to information retrieval , 2008 .

[20]  Koun-Tem Sun,et al.  The Study of Using Sure Stream to Construct Ubiquitous Learning Environment , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[21]  Chien-Ding Lee,et al.  A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations , 2008, IEEE Transactions on Information Technology in Biomedicine.

[22]  David Johnston,et al.  Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.

[23]  Bart R. Zeydel,et al.  Low- and ultra low-power arithmetic units: design and comparison , 2005, 2005 International Conference on Computer Design.

[24]  Vani Perumal,et al.  An Innovative Scheme For Effectual Fingerprint Data Compression Using Bezier Curve Representations , 2009, ArXiv.

[25]  Wenjing Lou,et al.  FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks , 2011 .

[26]  Carla Limongelli,et al.  Adaptive Learning with the LS-Plan System: A Field Evaluation , 2009, IEEE Transactions on Learning Technologies.

[27]  Michael Mitzenmacher,et al.  The Power of Two Choices in Randomized Load Balancing , 2001, IEEE Trans. Parallel Distributed Syst..

[28]  F. Kareal,et al.  Adaptivity in e-learning , 2006 .

[29]  Y. Kawahara,et al.  Building Context-Aware Applications and Probe Space Infrastructure , 2006, 2006 International Symposium on Intelligent Signal Processing and Communications.

[30]  Alireza Khadivi,et al.  FTPASC: A Fault Tolerant Power Aware Protocol with Static Clustering for Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[31]  Antonella De Angeli,et al.  eLSE Methodology: a Systematic Approach to the e-Learning Systems Evaluation , 2006, J. Educ. Technol. Soc..

[32]  Thambipillai Srikanthan,et al.  Energy-efficient cluster-based scheme for failure management in sensor networks , 2008, IET Commun..

[33]  Stephen J. H. Yang,et al.  Context Aware Ubiquitous Learning Environments for Peer-to-Peer Collaborative Learning , 2006, J. Educ. Technol. Soc..