Write an fst to implement the soundex algorithm

Assignment Help Computer Engineering
Reference no: EM132198944

Write an FST to implement the Soundex algorithm. The Soundex algorithm is a method commonly used in libraries and older Census records for representing people's names.

It has the advantage that versions of the names that are slightly misspelled or otherwise modified (common, for example, in hand-written census records) will still have the same representation as correctly-spelled names.

(e.g., Jurafsky, Jarofsky, Jarovsky, and Jarovski all map to J612).

a. Keep the first letter of the name, and drop all occurrences of non-initial a, e, h, i, o, u, w, y

b. Replace the remaining letters with the following numbers: b, f, p, v ?1 ; c, g, j, k, q, s, x, z ?2 ; d, t ? 3 ; l ? 4 ; m, n ?5 ; r ?6

c. Replace any sequences of identical numbers , only if they derive from two or more letters that were adjacent in the original name, with a single number (i.e., 666? 6).

d. Convert to the form Letter Digit Digit Digit by dropping digits past the third (if necessary) or padding with trailing zeros (if necessary).

Reference no: EM132198944

Questions Cloud

Some implications of national culture for business culture : What is business culture? Does national culture affect business culture? Discuss some implications of national culture for business culture.
Write a function that accepts a pointer to a c-string : Write a function that accepts either a pointer to a C-string as its argument. The function should return the character that appears most frequently.
Who are the stakeholders besides the obvious employee : Find an article from a trusted media source published within the last six months illustrating an ethical issue regarding employer/employee responsibilities.
The path to good ethics starts in human resources : The Path to Good Ethics Starts in Human Resources,
Write an fst to implement the soundex algorithm : Write an FST to implement the Soundex algorithm. The Soundex algorithm is a method commonly used in libraries and older Census records for representing peoples.
How market tightness-wage and total surplus change : Suppose that the government decides to give a subsidy s to firm that hires a new worker. What are the equilibrium effects of this in the.
Custom data solutions for large corporate enterprises : You are the project manager for a company that integrates custom data solutions for large corporate enterprises.
Write a function in c to dynamically allocate a buffer : Write a function in C to dynamically allocate (malloc/calloc) a buffer of a user specified number of double precision numbers.
Scope reduction as means of schedule compression : Compare and contrast fast tracking and scope reduction as means of schedule compression.

Reviews

Write a Review

 

Computer Engineering Questions & Answers

  What are advantages of having the user be a full-time member

What are the advantages and disadvantages of having the user be a full-time member of the systems development project team?

  Develop in accordance with the system development life cycle

Record all tasks, subtasks, resources, and time related to the project. Outline the planning, analysis, design, and implementation phases. Develop in accordance with the systems development life cycle (SDLC).

  Define php and asp.net

What are some of the pros and cons of open source versus proprietary software.

  Write a c program for a hcs12 microcontroller

Write a C program for a HCS12 microcontroller that writes the value, 0x78, to Memory Location VAR1 and then calls a delay function. The delay function should generate a delay of 0.25 milliseconds.

  What is the throughput

Measurements of the slotted ALOHA channel with an infinite number of users show that 10 percent of the slots are idle.

  Is a shift toward dna based identifications a good idea

What are some of the benefits and limitations of using DNA to identify victims of mass causalities. When answering take into account available resources, types of attacks, evidence collection and preservation, etc.

  Convert the class so that the link objects have a single

Convert the class so that the Link objects have a single long instance variable -- call it "data" -- and the Link instance variable..

  Design and demonstrate the finite state machine

Cpr E 281 FINAL PROJECT - Design and demonstrate the finite state machine for the control circuit. Show that it produces the correct output

  Identify the drawbacks for using cloud computing in your bcp

Identify the drawbacks for using cloud computing in your BCP. Identify an area that you initially struggled in and describe how you overcame it.

  Prepare data flow diagrams which use only a few symbols

"It is easier to learn to prepare data flow diagrams, which use only a few symbols, than it is to learn to prepare flowcharts, which use a number of different symbols." Discuss.

  What are the server-side attacks

What are the server-side attacks? What are the techniques a developer can employ to minimize these attacks?

  Recovering passwords from protected files

Recognize the mismatched file headers to the extensions and discuss the techniques you may apply in order to recover the passwords from protected files.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd