LEADER 00952nam a22002773i 4500 001 991000544709707536 005 20031215141813.0 008 040220s1959 it |||||||||||||||||ita 035 $ab12633719-39ule_inst 035 $aARCHE-063206$9ExL 040 $aDip.to Scienze pedagogiche$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a796.1 100 1 $aNeri, Roberto$0160610 245 10$aGioco e giocattoli /$cRoberto Neri 260 $aBologna :$bG. Malipiero,$c1959 300 $a167 p. ;$c20 cm 440 3$aIl fanciullo nel mondo moderno 650 4$aGioco 650 4$aGiochi infantili 650 4$aGiocattoli 907 $a.b12633719$b02-04-14$c17-03-04 912 $a991000544709707536 945 $aLE022 MP 72 G 7$g1$i2022000067799$lle022$o-$pE0.00$q-$rl$s- $t0$u11$v2$w11$x0$y.i13136045$z17-03-04 996 $aGioco e giocattoli$9277055 997 $aUNISALENTO 998 $ale022$b17-03-04$cm$da $e-$fita$git $h0$i1 LEADER 05646nam 2200709Ia 450 001 9910785604103321 005 20200520144314.0 010 $a1-283-52154-7 010 $a9786613833990 010 $a90-272-7362-6 035 $a(CKB)2670000000240345 035 $a(EBL)979715 035 $a(OCoLC)804665162 035 $a(SSID)ssj0000701031 035 $a(PQKBManifestationID)12260756 035 $a(PQKBTitleCode)TC0000701031 035 $a(PQKBWorkID)10673073 035 $a(PQKB)10278338 035 $a(MiAaPQ)EBC979715 035 $a(Au-PeEL)EBL979715 035 $a(CaPaEBR)ebr10593797 035 $a(CaONFJC)MIL383399 035 $a(PPN)229783376 035 $a(EXLCZ)992670000000240345 100 $a20120423d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aChallenges for Arabic machine translation$b[electronic resource] /$fedited by Abdelhadi Soudi ...[et. al.] 210 $aAmsterdam ;$aPhiladelphia $cJohn Benjamins Pub. Co.$d2012 215 $a1 online resource (165 p.) 225 0 $aNatural language processing ;$vv. 9 300 $aDescription based upon print version of record. 311 $a90-272-4995-4 320 $aIncludes bibliographical references and index. 327 $aChallenges for Arabic Machine Translation; Editorial page; Title page; LCC data; Table of contents; Preface; Introduction; 1. Overview; 2. Challenges of Arabic machine translation; 3. Arabic linguistic resources; 4. Example-based machine translation; 5. Statistical machine translation; 6. Knowledge-based machine translation; 7. Arabic transliteration scheme; References; Linguistic resources for Arabic machine translation; 1. Introduction; 2. LDC's distribution model; 3. Arabic speech collections; 4. Arabic text collections; 4.1 Parallel text; 4.2 NIST resources 327 $a5. Arabic morphological analyzer6. Arabic treebank and parallel English treebank; 7. Arabic-English word alignment; 8. Additional resources; References; Using morphology to improve Example-Based Machine Translation; 1. Introduction; 2. Example-Based Machine Translation: What is it and why use it?; 3. Adding morphology to EBMT for Arabic-to-English translation; 3.1 Generalization and morphological analysis in BAMA; 3.2 Phase 1: Focus on generalization and filtering; 3.2.1 Generalization; 3.2.2 Filtering; 3.2.3 Generalization and filtering are not enough 327 $a3.3 Phase 2: Generalization, filtering and adaptation3.3.1 Generalization; 3.3.2 Filtering and adaptation; 3.3.3 Scoring; 3.3.4 Results; 4. Related work; 5. Summary and conclusions; References; Using semantic equivalents for Arabic-to-English example-based translation; 1. Introduction; 2. Related work; 3. System description; 3.1 Translation corpus; 3.2 Matching; 4. Noun experiment; 4.1 The noun thesaurus; 4.2 Using noun synonyms for translation; 4.3 Experimental results; 5. Verb experiment; 5.1 The verb thesaurus; 5.2 Using synonyms in translation; 5.3 Experimental results; 6. Conclusions 327 $aReferencesArabic Preprocessing for Statistical Machine Translation; 1. Introduction; 2. Related Work; 3. Arabic Linguistic Issues; 3.1 Orthographic Ambiguity; 3.2 Clitics; 3.3 Adjustment Rules; 3.4 Templatic Inflections; 4. Preprocessing: Schemes and Techniques; 4.1 Preprocessing Techniques; 4.1.1 REGEX; 4.1.2 BAMA; 4.1.3 MADA; 4.2 Preprocessing Schemes; 4.3 Comparing Various Schemes; 5 Experiments; 5.1 Portage; 5.2 Experimental data; 5.3 Experimental Results; 5.4 Discussion; 5.5 Genre Variation; 5.6 Phrase Size; 6. Scheme Combination; 6.1 Oracle Experiment; 6.2 Rescoring-only Combination 327 $a6.3 Decoding-plus-Rescoring Combination6.4 Significance Test; 7. Conclusions; Acknowledgments; References; Preprocessing for English-to-Arabic statistical machine translation; 1. Introduction; 2. Morphological preprocessing for English-to-Arabic SMT; 2.1 Morphological segmentation of Arabic; 2.2 Recombination of segmented Arabic; 2.3 Experimental setup; 2.4 Experimental results; 3. Syntactic preprocessing for English-to-Arabic SMT; 3.1 Related work; 3.2 Reordering rules; 3.3 Experimental setup; 3.4 Results; 4. Summary; References; Lexical syntax for Arabic SMT; 1. Introduction 327 $a2. Related work 330 $aThis book is the first volume that focuses on the specific challenges of machine translation with Arabic either as source or target language. It nicely fills a gap in the literature by covering approaches that belong to the three major paradigms of machine translation: Example-based, statistical and knowledge-based. It provides broad but rigorous coverage of the methods for incorporating linguistic knowledge into empirical MT. The book brings together original and extended contributions from a group of distinguished researchers from both academia and industry. It is a welcome and much-needed r 410 0$aNatural Language Processing 606 $aMachine translating 606 $aEnglish language$xTranslating into Arabic 606 $aArabic language$xTranslating into English 606 $aSpeech processing systems 615 0$aMachine translating. 615 0$aEnglish language$xTranslating into Arabic. 615 0$aArabic language$xTranslating into English. 615 0$aSpeech processing systems. 676 $a492.7/8020285635 701 $aSoudi$b Abdelhadi$01536314 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910785604103321 996 $aChallenges for Arabic machine translation$93784994 997 $aUNINA LEADER 06345nam 22006495 450 001 9910634043903321 005 20251113193332.0 010 $a9783031230202 010 $a3031230205 024 7 $a10.1007/978-3-031-23020-2 035 $a(MiAaPQ)EBC7152947 035 $a(Au-PeEL)EBL7152947 035 $a(CKB)25610233200041 035 $a(PPN)26864537X 035 $a(OCoLC)1356408262 035 $a(DE-He213)978-3-031-23020-2 035 $a(EXLCZ)9925610233200041 100 $a20221206d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aNetwork and System Security $e16th International Conference, NSS 2022, Denarau Island, Fiji, December 9?12, 2022, Proceedings /$fedited by Xingliang Yuan, Guangdong Bai, Cristina Alcaraz, Suryadipta Majumdar 205 $a1st ed. 2022. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2022. 215 $a1 online resource (745 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13787 311 08$aPrint version: Yuan, Xingliang Network and System Security Cham : Springer,c2022 9783031230196 320 $aIncludes bibliographical references and index. 327 $aAI for Network Security -- Vulnerability Detection Using Deep Learning Based Function Classification -- RAIDER: Reinforcement-aided Spear Phishing Detector -- Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning -- A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics -- Graph Intelligence Enhanced Bi-Channel Insider Threat Detection -- Network Security -- Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection -- A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches -- Reducing Intrusion Alert Trees to Aid Visualization -- Attacker Attribution Through Characteristics Inference Using Honeypot Data -- Detecting Contradictions from CoAP RFC Based on Knowledge Graph -- Mobile Security -- A First Look at Android Apps? Third-party Resources Loading -- Comprehensive Mobile Traffic Characterization Based on a Large-Scale Mobile Traffic Dataset -- DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices -- A Beyond-5G Authentication and Key Agreement Protocol -- IoT Security -- A Survey on IoT Vulnerability Discovery -- Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks -- An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks -- Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection -- Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset -- Privacy-Preserving Machine Learning Protocols and Systems -- The Force of Compensation, A Multi-stage Incentive Mechanism Model for Federated Learning -- A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication -- An Efficient Clustering-Based Privacy-Preserving Recommender System -- A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks -- Privacy-Preserving Networked Systems and Protocols -- Privacy-Preserving Online Ride-Hailing Matching System with an Untrusted Server -- Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare -- Enabling Secure Deduplication in Encrypted Decentralized Storage -- Geometric Range Searchable Encryption with Forward and Backward Security -- Blockchain Security -- Towards Secure and Trustworthy Flash Loans: A Blockchain-based Trust Management Approach -- Forward Traceability for Product Authenticity Using Ethereum Smart Contracts -- BSB: Bringing Safe Browsing to Blockchain Platform -- Blockchain-Powered Systems -- Practical Anonymous Multi-Hop Locks for Lightning Network Compatible Payment Channel Networks -- Blockchain Based Regulatory Technology Deployment for Real Estate Transaction -- CVallet: a Blockchain-Oriented Application Development for Education and Recruitment -- Decentralized Access Control for Secure Microservices Cooperation with Blockchain -- Blockchain-Based Access Control for Smart Manufacturer Secure Management System -- Attacks -- Driver Locations Harvesting Attack on pRide -- Rebound Attacks on SKINNY Hashing with Automatic Tools -- Combination Reduction Algorithms and its Application to Subversion Attack -- Cryptographic Algorithms and Protocols -- Evaluating the Security of Merkle-Damg?ard Hash Functions and Combiners in Quantum Settings -- An Efficient Lattice-Based Encrypted Search Scheme with Forward Security -- Strengthening the Security of AES Against Differential Fault Attack. 330 $aThis book constitutes the refereed proceedings of the 16th International Conference on Network and System Security, NSS 2022, held in Denarau Island, Fiji, on December 9-12, 2022. The 23 full and 18 short papers presented in this book were carefully reviewed and selected from 83 submissions. They focus on theoretical and practical aspects of network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13787 606 $aCryptography 606 $aData encryption (Computer science) 606 $aApplication software 606 $aData protection 606 $aCryptology 606 $aComputer and Information Systems Applications 606 $aData and Information Security 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aApplication software. 615 0$aData protection. 615 14$aCryptology. 615 24$aComputer and Information Systems Applications. 615 24$aData and Information Security. 676 $a060 676 $a005.8 702 $aYuan$b Xingliang 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910634043903321 996 $aNetwork and system security$92088039 997 $aUNINA