Question

In: Computer Science

The application of lexical analysis techniques in information retrieval system You should cover: 1) What is...


The application of lexical analysis techniques in information retrieval system

You should cover:
1) What is the problem?
2) What is the compiler construction techniques used to solve the problem
3) How to solve the problem using the compiling techniques.

Solutions

Expert Solution

A1: A problem is anything you're trying to solve computationally. it typically define an input plus the wanted output which, for greatest models of calculation, will both be finite. Any statement of the form, "Given X, compute/evaluate/find/determine/decide whether/..." is a problem.

A2:As we know in compiling prcess the converting the source code into object code.

Compilor using some teachniques pass code in some phase to compilor program and after compilation the problem will be solved

  1. Lexical analysis
  2. Syntax analysis
  3. Semantic analysis
  4. Intermediate code generator
  5. Code optimizer
  6. Code generator

The compilor first cont lexims and remove comment and lib etc in pogram and also in 2nd chech syntx of the program by checking libarary. In next we check sementic analysis of program by check its parse tree

and then we convert code into three address code aandd optamize it after these 6 phase program will run and the problem will solved by compilor

3 How to solve the problem using the compiling techniques:

The compilor first cont lexims and remove comment and lib etc in pogram and also in 2nd chech syntx of the program by checking libarary. In next we check sementic analysis of program by check its parse tree

and then we convert code into three address code aandd optamize it after these 6 phase program will run and the problem will solved by compilor

Pleasue Thumbs up if you satisfy with Answer

Comment down if any Query


Related Solutions

The application of lexical analysis techniques in text editor You should cover: 1) What is the...
The application of lexical analysis techniques in text editor You should cover: 1) What is the problem? 2) What is the compiler construction techniques used to solve the problem 3) How to solve the problem using the compiling techniques.
The application of lexical analysis techniques in spam email detection You should cover: 1) What is...
The application of lexical analysis techniques in spam email detection You should cover: 1) What is the problem? 2) What is the compiler construction techniques used to solve the problem 3) How to solve the problem using the compiling techniques.
The application of syntax analysis techniques in query processing system such as SQL You should cover:...
The application of syntax analysis techniques in query processing system such as SQL You should cover: 1) What is the problem? 2) What is the compiler construction techniques used to solve the problem 3) How to solve the problem using the compiling techniques.
what are the tools and techniques used in the analysis and interpretation of corporate financial information
what are the tools and techniques used in the analysis and interpretation of corporate financial information
EXERCISE 2: Cost and Benefit Analysis Techniques Assuming economic benefits of an information system at $95,000...
EXERCISE 2: Cost and Benefit Analysis Techniques Assuming economic benefits of an information system at $95,000 at year 1, $125,000 at year 2, and $145,000 at year 3, development costs are $235,000 and operating costs are $15,000 at year 1, $16,000 at year 2, and $18,000 at year 3, a discount rate of 5%, and a 3-year time horizon, net present value (NPV)? ROI? break-even point (BEP)? Please show all work.
What is the difference between an information system and acomputer application?What is the purpose...
What is the difference between an information system and a computer application?What is the purpose of systems analysis? Why is it important?What is the difference between systems analysis and systems design?What is a project?What is the purpose of the system development life cycle (SDLC)?What are the six core processes of the SDLC?What is meant by Agile development and iterative development?What is the purpose of a System Vision Document?What is the difference between a system and a subsystem?What is the purpose...
EDGAR, the Electronic Data Gathering, Analysis, and Retrieval system, performs automated collection, validation, indexing, and forwarding...
EDGAR, the Electronic Data Gathering, Analysis, and Retrieval system, performs automated collection, validation, indexing, and forwarding of submissions by companies and others who are required by law to file forms with the U.S. Securities and Exchange Commission (SEC). All publicly traded domestic companies use EDGAR to make the majority of their filings. (Some foreign companies file voluntarily.) Form 10-K, which includes the annual report, is required to be filed on EDGAR. The SEC makes this information available on the Internet....
Describe how EDGAR (Electronic Data Gathering, Analysis and Retrieval filing system) fits into the registration process...
Describe how EDGAR (Electronic Data Gathering, Analysis and Retrieval filing system) fits into the registration process with the SEC. Do you believe that the disclosure made possible through tools such as EDGAR is worth the costs that are associated with it? Why or why not?
What are the techniques used for business process analysis? Conduct a SWOT analysis of these techniques?...
What are the techniques used for business process analysis? Conduct a SWOT analysis of these techniques? Which techniques is appropriate for your organisation and why? with reference
Forensics Forensics is the application of investigation and analysis techniques to gather and preserve evidence from...
Forensics Forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. It is usually on of the more interesting topics we can discuss. Take the following scenario and map out the chain of custody (in legal contexts, is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT