Essays about: "parser"

Showing result 21 - 25 of 64 essays containing the word parser.

  1. 21. Attention Mechanisms for Transition-based Dependency Parsing

    University essay from Uppsala universitet/Institutionen för lingvistik och filologi

    Author : Johannes Gontrum; [2019]
    Keywords : natural language processing; language technology; dependency parsing; transition-based parsing; parsing; attention;

    Abstract : Transition-based dependency parsing is known to compute the syntactic structure of a sentence efficiently, but is less accurate to predict long-distance relations between tokens as it lacks global information about the sentence. Our main contribution is the integration of attention mechanisms to replace the static token selection with a dynamic approach that takes the complete sequence into account. READ MORE

  2. 22. Making ASN.1 (Abstract Syntax Notation One) human-readable : Investigative and practical study to generalize decoding and manual validation of ASN.1 from the cellular network during run time

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Emil Jilläng; [2018]
    Keywords : ASN1; Abstract Syntax Notation One; Human-readable; ANTLR; Telecommunication;

    Abstract : ASN.1 is a powerful formal notation divided into two parts, a specification of the data and the data itself in binary form. Creating decoders for these files can often be tedious. The purpose of this degree work is to extend current tools at Arctic Group to make an application that decodes a range of different ASN. READ MORE

  3. 23. Security Assessment and *nix Package Vulnerabilities

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Per Sandgren; [2018]
    Keywords : *nix; Vulnerabilities; Parsing; IT-security; Mitigation;

    Abstract : Background. Vulnerabilities in software provides attackers with the means to fulfill unlawful behavior. Since software has so much power, gaining control over vulnerabilities can mean that an attacker gains unauthorized powers. Since vulnerabilities are the keys that let attackers attack, vulnerabilities must be discovered and mitigated. READ MORE

  4. 24. Automation of Formative Assessment : Implementation and Evaluation of an Artificial Teaching Assistant

    University essay from KTH/Lärande

    Author : Johan Myrsmeden; [2018]
    Keywords : constructivism; formative assessment; automated assessment; computer-aided education; computer-aided assessment; konstruktivism; formativ bedömning; automatiserad bedömning; datorstödd undervisning; datorstödd bedömning;

    Abstract : The Swedish government has decided to add programming to the Swedish curriculum to strengthen students’ digital skills. The teachers who will teach programming do not always know programming themselves. READ MORE

  5. 25. Additive manufacturing : Optimization of process parameters for fused filament fabrication

    University essay from KTH/Lättkonstruktioner

    Author : Vishal Hayagrivan; [2018]
    Keywords : Additive manufacturing AM ; Fused filament fabrication FFF ; Fused deposition modeling FDM ; Process parameters; Optimization; Tool path reversing; GCode parser; Stiffness prediction; Strength prediction; Inter-layer bonding;

    Abstract : An obstacle to the wide spread use of additive manufacturing (AM) is the difficulty in estimating the effects of process parameters on the mechanical properties of the manufactured part. The complex relationship between the geometry, parameters and mechanical properties makes it impractical to derive an analytical relationship and calls for the use of a numerical model. READ MORE