A Comparison of Pre-trained Word Embeddings for Sentiment Analysis Using Deep...
Abstract
The public opinion expressed on review or blogging sites and social networking platforms can be the source for the extraction of very critical information...
The Calculation of Pneumatic Actuator Pipelines
Abstract
The physical properties of compressed air and the peculiarities of its behavior make the analytical calculation of pneumatic drives quite difficult, requiring high qualification...
Proof of Stake for Blockchain Based Distributed Intrusion Detecting System
Abstract
One of the most important component of each corporate network is an intrusion detecting system. But it is a problem to find a mechanism...
Review of Amblyopia and Artificial Intelligence Techniques Used for Its Detection
Abstract
Artificial Intelligence-based models are widely used in health care for prediction, detection and treatment of diseases. The aim of this paper is to study...
Underwater Noise Study Toward Propeller Rotation
Abstract
The public concern about the effect of underwater noise toward marine life has been increasing for years where the main contributor of anthropogenic noise...
Cyber Attack Scenarios in Cooperative Automated Driving
Abstract
As V2X system has developed, some vehicles that are recently released have been designed to meet the requirements of cooperative automated driving technology. Cooperative...
Using Ontologies to Improve New Product Development Process – Case Study
Abstract
Companies are under great pressure to innovate and industrialize new products. In addition, the customization and complexity of good and services as well as...
Wave-Based 5G and Beyond Cellular Networks
bstract
The exponential growth of wireless multimedia services and devices expect more spectrums to support the quality of service (QoS) of the fifth-generation (5G) and...
Landslide Hazard Assessment Along Lahru to Chamba, Himachal Pradesh, India, Using...
Abstract
The disastrous phenomena of landslide is known as downward and outward movement of the materials forming the slope under the influence of gravitational forces...
Vectorization of the Code for Guided Wave Propagation Problems
Abstract
Vectorization of the code for simulation of guided wave propagation problems based on the spectral element method is presented. In the code, flat shell...
Use of FEM for Design of Reinforced Concrete Beams as Per...
Abstract
To design reinforced concrete beams, engineers all over India refer to IS 456-2000. Nowadays finite element software is used for any design rather than...
Stabilization of Chaos Via Strong Nonlinearities: The Lorenz-Malkus Wheel Under Coulomb...
Abstract
In this chapter we consider the modified Lorenz-Malkus water wheel model. Within a novel approach we take into account friction features on the rim...
Critical Information Infrastructure Protection Requirement for the Malaysian Public Sector
Abstract
Malaysian Public Sector (MPS) organizations span laterally within all ten critical sectors outlined in the National Cybersecurity Policy (NCSP). Critical Information Infrastructure Protection (CIIP)...
A Review on Ontology-Based Semantic Web Information Retrieval: Techniques, Weight Functions
Abstract
Query search and its expected results on the web are mostly understood and elucidated by users, not machines. Ontology is a tool that describes the...
Design and Development of 3-DoF Mechanism for the Exoskeleton Hip Joint
Abstract
Exoskeletons find a wide range of applications in medical fields especially for rehabilitation purpose. Exoskeletons also serve as a human-assistive device to perform hard...