1,080 research outputs found
Arabic text classification methods: Systematic literature review of primary studies
Recent research on Big Data proposed and evaluated a number of advanced techniques to gain meaningful information from the complex and large volume of data available on the World Wide Web. To achieve accurate text analysis, a process is usually initiated with a Text Classification (TC) method. Reviewing the very recent literature in this area shows that most studies are focused on English (and other scripts) while attempts on classifying Arabic texts remain relatively very limited. Hence, we intend to contribute the first Systematic Literature Review (SLR) utilizing a search protocol strictly to summarize key characteristics of the different TC techniques and methods used to classify Arabic text, this work also aims to identify and share a scientific evidence of the gap in current literature to help suggesting areas for further research. Our SLR explicitly investigates empirical evidence as a decision factor to include studies, then conclude which classifier produced more accurate results. Further, our findings identify the lack of standardized corpuses for Arabic text; authors compile their own, and most of the work is focused on Modern Arabic with very little done on Colloquial Arabic despite its wide use in Social Media Networks such as Twitter. In total, 1464 papers were surveyed from which 48 primary studies were included and analyzed
‘The language is disgusting and they refer to my disability’: the cyberharassment of disabled people
Disabled people face hostility and harassment in their sociocultural environment. The use of electronic-communications creates an online context that further reshape this discrimination. We explored the experiences of 19 disabled victims of cyberharassment. Five themes emerged from the study: disability and health consequences, family involvement, misrepresentation of self, perceived complexity, and lack of awareness and expertise. Cyberharassment incidents against disabled people were influenced by the pre-existing impairment, perceived hate-targeting, and perpetrators faking disability to get closer to victims online. Our findings highlight a growing issue requiring action and proper support
Web browser artefacts in private and portable modes: a forensic investigation
Web browsers are essential tools for accessing the internet. Extra complexities are added to forensic investigations when recovering browsing artefacts as portable and private browsing are now common and available in popular web browsers. Browsers claim that whilst operating in private mode, no data is stored on the system. This paper investigates whether the claims of web browsers discretion are true by analysing the remnants of browsing left by the latest versions of Internet Explorer, Chrome, Firefox, and Opera when used in a private browsing session, as a portable browser, and when the former is running in private mode. Some of our key findings show how forensic analysis of the file system recovers evidence from IE while running in private mode whereas other browsers seem to maintain better user privacy. We analyse volatile memory and demonstrate how physical memory by means of dump files, hibernate and page files are the key areas where evidence from all browsers will still be recoverable despite their mode or location they run from
Analytical calculation of the longitudinal space charge and resistive wall impedances in a smooth cylindrical pipe
Classification of colloquial Arabic tweets in real-time to detect high-risk floods
Twitter has eased real-time information flow for decision makers, it is also one of the key enablers for Open-source Intelligence (OSINT). Tweets mining has recently been used in the context of incident response to estimate the location and damage caused by hurricanes and earthquakes. We aim to research the detection of a specific type of high-risk natural disasters frequently occurring and causing casualties in the Arabian Peninsula, namely `floods'. Researching how we could achieve accurate classification suitable for short informal (colloquial) Arabic text (usually used on Twitter), which is highly inconsistent and received very little attention in this field. First, we provide a thorough technical demonstration consisting of the following stages: data collection (Twitter REST API), labelling, text pre-processing, data division and representation, and training models. This has been deployed using `R' in our experiment. We then evaluate classifiers' performance via four experiments conducted to measure the impact of different stemming techniques on the following classifiers SVM, J48, C5.0, NNET, NB and k-NN. The dataset used consisted of 1434 tweets in total. Our findings show that Support Vector Machine (SVM) was prominent in terms of accuracy (F1=0.933). Furthermore, applying McNemar's test shows that using SVM without stemming on Colloquial Arabic is significantly better than using stemming techniques
Effective methods to detect metamorphic malware: A systematic review
The succeeding code for metamorphic Malware is routinely rewritten to
remain stealthy and undetected within infected environments. This characteristic is
maintained by means of encryption and decryption methods, obfuscation through
garbage code insertion, code transformation and registry modification which makes
detection very challenging. The main objective of this study is to contribute an
evidence-based narrative demonstrating the effectiveness of recent proposals. Sixteen
primary studies were included in this analysis based on a pre-defined protocol. The
majority of the reviewed detection methods used Opcode, Control Flow Graph (CFG)
and API Call Graph. Key challenges facing the detection of metamorphic malware
include code obfuscation, lack of dynamic capabilities to analyse code and application
difficulty. Methods were further analysed on the basis of their approach, limitation,
empirical evidence and key parameters such as dataset, Detection Rate (DR) and
False Positive Rate (FPR)
A Fractional LC − RC Circuit
Mathematics Subject Classification: 26A33, 30B10, 33B15, 44A10, 47N70, 94C05We suggest a fractional differential equation that combines the simple
harmonic oscillations of an LC circuit with the discharging of an RC circuit.
A series solution is obtained for the suggested fractional differential
equation. When the fractional order α = 0, we get the solution for the RC
circuit, and when α = 1, we get the solution for the LC circuit. For arbitrary
α we get a general solution which shows how the oscillatory behavior
(LC circuit) go over to a decay behavior (RC circuit) as grows from 0 to
1, and vice versa. An explanation of the behavior is proposed based on the
idea of the evolution of a resistive property in the inductor giving a new
value to the inductance that affects the frequency of the oscillator
The Degree of Availability and Utility of Equipments and resources of Pre- Vocational Education Workshops in Irbid Schools from Teachers Perspective
This study aims at exploring The Availability and Utility of Equipments and Supplies of Pre-Vocational Education Workshops in the Schools of Irbid governorate From Teachers Perspective, A questionnaire was used as a method of gathering data. The questionnaire included a list of all the necessary equipments and instruction aids, for pre- vocational education workshops in the General Education stage from 1st to 10th classes . This list covered five engineering domains: agricultural, equipments associated with sewing , weaving, health and public safety. The sample of the study consisted of (121) pre-Vocational Education teachers who were selected through the method of comprehensive survey to the community of the study in Irbid governorate. After gathering the data and statistically analyzed , results showed a low, as well as, insufficient availability and utility of the pre-vocational equipments and instructional aids associated with pre-vocational education workshops in the five domains covered by the study. The domain of engineering came to be more prominent in male schools and the domain of sewing and weaving in female schools. Researchers provided some recommendations in the light of this study : conducting an extensive study to compile the needs of pre-vocational education workshops concerning equipments advised by pre-Vocational Education teachers as necessary to these workshops, and conducting studies about the obstacles of the supply of the equipments and tools of the workshops of pre-vocational education to process them and find suitable alternatives, and working on creating a separate budget for the workshops of pre-vocational education to gradually guarantee the availability of necessary equipments and instructional aids so that all needs are available within convenient time frame. Keywords: Pre- Vocational Education equipments, Pre- Vocational Education workshops, Pre- Vocational Education Instructional Aids, Pre- Vocational Education Teacher
Using MEMS in class D amplifiers for standard GSM carrier
The equivalent circuit of MEMS capacitive switches can be used to analyze a class D power amplifier, operated by a power supply of 3.7V. The system is intended for GSM audio frequency to produce an output power of (0.5-1.0) mW at a load output impedance of (8-10) Q. The system gain must be greater than 33 dBm and the estimated loss (0.5-1) dB. A model for the power amplifier using MEMS passive devices has been developed. The model helps to determine the design parameters that affect the performance and reliability of the system that operate an RF transceiver. The optimization of the amplifier and the MEMS capacitor switching devices and how to integrate the system, will also be discussed. The design and the equivalent circuit were simulated using a PSpice model
Low phase noise performance of VCO using MEMS
The paper presents a monolithic voltage controlled oscillator (VCO) prototype designed with micro-electro-mechanical systems (MEMS) devices. It achieves the stringent performance requirements of various wireless communication applications such as GSM cellular telephony. The VCO meets the low phase noise requirement of -136 dBc/Hz at large offset frequency (3 MHz) over the appropriate frequency range. A model for the simulation of the monolithic VCO is proposed. A suitable topology for the model is the Colpitts oscillator. It is relatively less complicated, which facilitates the practical integration of the LC components. The main components in the configuration are the MEMS variable capacitor and monolithic 3-D coil inductor. These components are suitable for low phase-noise and low power consumption at the application frequencies
- …
