Results (197)
Search Parameters:
Keyword: SEMA Review of Natural Language Processing Techniques in Under-Resourced Languages
Natural language processing (NLP) techniques have transformed a number of tasks in the modern age of information explosion where millions of gigabytes of data are generated every day. Despite achieving state-of-the-art performance in high-resource languages, current techniques struggle with processing under-resourced languages which are characterized by data scarcity, linguistic diversity, computational limitations, ambiguity of language…
Read MoreGPT-Enhanced Hierarchical Deep Learning Model for Automated ICD Coding
In healthcare, accurate communication is critical, and medical coding, especially coding using the ICD (International Classification of Diseases) standards, plays a vital role in achieving this accuracy. Traditionally, ICD coding has been a time-consuming manual process performed by trained professionals, involving the assignment of codes to patient records, such as doctor’s notes. In this paper,…
Read MoreDual Mode Control of an Inverted Pendulum: Design, Analysis and Experimental Evaluation
We present an inverted pendulum design using readily available V-slot rail components and 3D printing to construct custom parts. To enable the examination of different pendulum characteristics, we constructed three pendulum poles of different lengths. We implemented a brake mechanism to modify sliding friction resistance and built a paddle that can be attached to the…
Read MoreInfrastructure-as-a-Service Ontology for Consumer-Centric Assessment
In the context of adopting cloud Infrastructure-as-a-Service (IaaS), prospective consumers need to consider a wide array of both business and technical factors associated with the service. The development of an intelligent tool to aid in the assessment of IaaS offerings is highly desirable. However, the creation of such a tool requires a robust foundation of…
Read MoreA Circuit Designer’s Perspective to MOSFET Behaviour: Common Questions and Practical Insights
Metal Oxide Semiconductor Field-Effect Transistors are commonly taught in courses for electrical engineers as they are the most common components within integrated circuits. However, despite numerous papers and books on MOSFETs, students still struggle with understanding their behaviour, particularly in the saturation region. This paper presents an expanded explanation of MOSFET behaviour, with a consistent…
Read MoreFuzzy MPPT for PV System Based on Custom Defuzzification
Due to the variations in weather conditions, photovoltaic systems adopt a technique based on maximum power point tracking to extract the maximal power of the solar module. In the literature, there are many different methods classical and intelligent of maximum power point tracking (MPPT). But, due to the semiconductor effect, the current-voltage characteristics of the…
Read MoreHybrid Intrusion Detection Using the AEN Graph Model
The Activity and Event Network (AEN) is a new dynamic knowledge graph that models different network entities and the relationships between them. The graph is generated by processing various network security logs, such as network packets, system logs, and intrusion detection alerts, which allows the graph to capture security-relevant activity and events in the network.…
Read MoreAssociation Rules for Knowledge Discovery From E-News Articles: A Review of Apriori and FP-Growth Algorithms
Owing to technological development, the internet has become the world’s largest platform where an unaccountable amount of e-news information is freely available to use. Most of the time, e-newspaper readers have to examine the massive collection of e-news articles to locate necessary information relevant to them. Massive semi-structured and unstructured texts usually mislead the readers…
Read MoreLong-term Bottom-up Modeling of Renewable Energy Development in Morocco
Renewable energy is an essential source of green growth for countries facing a shortage of fossil fuels. They offer a sustainable, inexhaustible, carbon-free solution to the future energy dependency of nations. Morocco, which has no traditional energy resources, depends entirely on the international primary energy market to meet its growing demand. For this reason, Morocco…
Read MoreOn the Prediction of One-Year Ahead Energy Demand in Turkey using Metaheuristic Algorithms
Estimation of energy demand has important implications for economic and social stability leading to a more secure energy future. One-year-ahead energy demand estimation for Turkey has been proposed in this paper, using the metaheuristics method with GDP, the total population, and the quantities of imports and exports, as inputs variables. The records obtained from historical…
Read MoreNiO Quantum dots Doped Triple Cation Perovskite \(\mathrm{CsMAFAPbI_2Br_2}\) Heterojunction Photodetector with High Responsivity
Optoelectronic devices applications based on Organic–inorganic perovskites are promising and effective low-cost energy materials due to their exceptional physical properties which include high carrier mobility, high optical absorption coefficient, and long carrier diffusion length. In the presented work, a TiO2/NiO+5% Fe quantum dots (QDs)–doped CsMAFAPbI2Br2 perovskite heterojunction broadband photodetector was fabricated on FTO/glass substrate. The…
Read MoreHole-Confined Polar Optical Phonon Interaction in \(\mathrm{Al_{0.35}Ga_{0.65}As/GaAs/Al_{0.25}Ga_{0.75}As}\) Quantum Wells
In Al0.35Ga0.65As/GaAs/Al0.25Ga0.75As quantum wells, the hole-confined polar optical phonon interaction is investigated. To calculate the valence band structure, we use the Luttinger-Kohn Hamiltonian with the k.p method. Within the dielectric continuum model, the hole-confined phonon scattering rates of intrasubband heavy holes in quantum well are calculated. It is found that the scattering rates are governed…
Read MoreLeakage-abuse Attacks Against Forward Private Searchable Symmetric Encryption
Dynamic Searchable Symmetric Encryption (DSSE) methods address the problem of securely outsourcing updating private data into a semi-trusted cloud server. Furthermore, Forward Privacy (FP) notion was introduced to limit data leakage and thwart the related attacks on DSSE approaches. FP schemes ensure previous search queries cannot be linked to future updates and newly added files.…
Read MoreA Unified Visual Saliency Model for Automatic Image Description Generation for General and Medical Images
An enduring vision of Artificial Intelligence is to build robots that can recognize and learn the visual world and who can speak about it in natural language. Automatic image description generation is a demanding problem in Computer Vision and Natural Language Processing. The applications of image description generation systems are in biomedicine, military, commerce, digital…
Read MoreSynthesis and Characterization of CN Thin Films Produced by DC-Pulsed Sputtering in an \(CH_3CH_2OH-N_2\) Atmosphere
This paper reports on the successful deposition of amorphous carbon nitride thin films (a-CNx). Samples were deposited using a DC-pulsed sputtering technique in CH3CH2OH-N2 atmosphere at constant pressure (1 Torr). Raman spectra were collected to investigate the bonding structure of the deposed thin films, while scanning electron microscopy (SEM) and atomic force microscopy (AFM) were…
Read MoreOpinion and Effectiveness of Kahoot! use in Online Distance Learning in Crop Production at Higher Education Level: A Case of Study
Kahoot is one of the most popular learning platforms, with over 2.5 billion players per year worldwide, used mainly for knowledge review through gamification. However, students´ opinion and its effectiveness in online distance learning as well as in another language teaching has been little studied. With these aims, this study was carried out in the…
Read MoreModelling and Testing Services with Continuous Time SRML
The SENSORIA Reference Modeling Language (SRML) aims at modelling composite services at a high level. Continuous time SRML extends SRML so that it can model services whose components can perform both discrete processes and continuous processes. In order to show how continuous time SRML is applied, in this paper, we systematically introduce our study on…
Read MoreAntecedents to Learners’ Satisfaction with Serious Games: An Investigation Using Partial Least Square
Serious games are at the forefront of discussions about the future of learning. Research shows that they can help improve student motivation and knowledge transfer by making learning experiences more pleasurable. Teaching practices are increasingly enhanced or complemented by serious games; skills and knowledge are developed by recreating realistic situations allowing learners to enhance their…
Read MoreLean Six Sigma Implementation in the Food Sector: Nexus between Readiness-Critical Success Factors
Lean Six Sigma (LSS) is a renowned approach for boosting operational excellence and competitive advantage through integrated core objectives of value creation and variation reduction. Despite its proven benefits in many leading companies, LSS implementation in the food sector is still behind compared with other sectors. LSS implementation is costly, and most businesses have failed…
Read MoreLow-Power Primary Cell with Water-Based Electrolyte for Powering of Wireless Sensors
In this work we discuss a special technique for powering of sensor systems, based on a low-power primary cell consisting of two electrodes, made from different metals, with water (lake, rain or tap water) used as an electrolyte. Once placed into an aqueous solution, the primary cell generates a small electric current, which may be…
Read MoreA Task-based Paradigm for Promoting an Alternative Thinking Style in Teaching Mathematics
The article identifies an alternative style of thinking as one of the important components of human intellectual development. It is shown that it can be effectively implemented in mathematics lessons at school. The purpose of this study is to develop and substantiate a strategy for the formation of an alternative style of thinking among students…
Read MoreDevelopment of Miniaturized Monolithic Isolated Gate Driver
Gate driver has been applied in many ways, exemplified by that, by using the DC-isolated and AC-pass characteristics of gate driver’s primary and secondary sides, the problem of floating endpoint in semiconductor power switch can be solved. However, the conventional design of isolated gate driver provides circuit voltage blocking by optically coupled components. Due to…
Read MoreEmotion Mining from Speech in Collaborative Learning
Affective states, a dimension of attitude, have a critical role in the learning process. In the educational setting, affective states are commonly captured by self-report tools or based on sentiment analysis on asynchronous textual chats, discussions, or students’ journals. Drawbacks of such tools include: distracting the learning process, demanding time and commitment from students to…
Read MoreThe Design and Implementation of Intelligent English Learning Chabot based on Transfer Learning Technology
Chatbot operates task-oriented customer services in special and open domains at different mobile devices. Its related products such as knowledge base Question-Answer System also benefit daily activities. Chatbot functions generally include automatic speech recognition (ASR), natural language understanding (NLU), dialogue management (DM), natural language generation (NLG) and speech synthesis (SS). In this paper, we proposed…
Read MoreBusiness Intelligence Budget Implementation in Ministry of Finance (As Chief Operating Officer)
The Ministry of Finance is the state ministry in charge of state financial affairs which has two functions, namely the Chief Financial Officer (CFO) as the State General Treasurer and the Chief Operating Officer (COO) as a Budget User. As COO, the Ministry of Finance is expected to be able to provide information related to…
Read More
