Preferred Language
Articles
/
bsj-9822
Sentiment Analysis on Roman Urdu Students’ Feedback Using Enhanced Word Embedding Technique
...Show More Authors

 

Students’ feedback is crucial for educational institutions to assess the performance of their teachers, most opinions are expressed in their native language, especially for people in south Asian regions. In Pakistan, people use Roman Urdu to express their reviews, and this applied in the education domain where students used Roman Urdu to express their feedback. It is very time-consuming and labor-intensive process to handle qualitative opinions manually. Additionally, it can be difficult to determine sentence semantics in a text that is written in a colloquial style like Roman Urdu. This study proposes an enhanced word embedding technique and investigates the neural word Embedding (Word2Vec and Glove) to determine which performs better for Roman Urdu Sentiment analysis. Our suggested model employs the BiLSTM network to maintain the context in both directions and eventually, results for ternary classification are obtained by using the final softmax output layer. A manually labeled data set was used to evaluate the model, data is collected from the HEIs of Pakistan. Model was empirically evaluated on two datasets of Roman Urdu, the newly developed student’s feedback dataset and RUSA-19 publically available data set of Roman Urdu. Our model performs effectively using the word embedding and BiLSTM layer. The proposed model is compared with the baseline models of CNN, RNN, GRU and classic LSTM. The experimental findings demonstrate the proposed model's efficacy with an F1score of 90%.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Directly Observed Therapy Short Course (DOTs) Program Therapy in Treatment of Tuberculosis in Al-Sader City 2003-2005
...Show More Authors

Objectives: Assessment outcome of DOTS (Directly observed therapy short course) program in Al-Sader City
Sector that was established by the WHO.
Methodology: Three cohorts groups of patients attending Baghdad TB institute and TB center in Al-Sader city
were followed retrospectively. The 1st cohort included (314) patients registered in year (2003), the 2nd cohort
included (327) patients registered in year (2004), the 3rd cohort included (321) patients registered in year
(2005). The collected data were analyzed for case detection, treatment outcomes, retreatment outcomes,
treatment success, and retreatment success in regard to time, age and sex.
Results: The following rates were extracted for the three cohort: Case det

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Advances In Materials Physics And Chemistry
The Role of Cooling Condition on the Superconducting Properties of Tl<sub>2-x</sub>Hg<sub>x</sub>Sr<sub>2</sub>Ca<sub>2</sub>Cu<sub>3</sub>O<sub>10+δ</sub> System
...Show More Authors

View Publication
Crossref
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Engineering
A Spike Neural Controller for Traffic Load Parameter with Priority-Based Rate in Wireless Multimedia Sensor Networks
...Show More Authors

Wireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to   produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffi

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The Integration of international issues in Saudi social studies and citizenship books in the light of international education principles
...Show More Authors

The study aimed to reveal the level to which the international issues are integrated into the books of Saudi public education social studies and citizenship in the light of the principles of international education, and to know the level of continuity and integration of these issues in the books, to build a range and sequence matrix of international issues through it. The study followed the descriptive and analytical method that used the content analysis card as a tool for study when the tool achieved the necessary validity and reliability characteristics. The data of this study has been processed using the SPSS statistical program according to a set of appropriate methods of descriptive and inferential statistics.

 The resu

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 08 2018
Journal Name
Iraqi Journal Of Information Technology
Google Scholar and The scientific originality of the professor
...Show More Authors

The aim of the research is try to answer the questions about the importance of the participation of scientists in the scientific researcher Google Scholar for the professor and the university, and the extent of participation of Iraqi universities, and the rank of the University of Qadisiyah, and the number of participants and teachers of this engine, The research came out with several conclusions, the most important of which is that (21%) of university professors are involved in the google engine and most of the participants did not carry their full research through the site

View Publication Preview PDF
Publication Date
Thu Mar 31 2016
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of Buckling Resistance of Aluminized Long Columns of Stainless Steel AISI 303
...Show More Authors

This paper has investigated experimentally the dynamic buckling behavior of AISI 303 stainless steel Aluminized and as received long columns. These columns, hot-dip aluminized and as received, are tested under dynamic buckling, 22 specimens, without aluminizing (type 1), and 50 specimens, with hot-dip aluminizing at different aluminizing conditions of dipping temperature and dipping time (type 2), are tested under dynamic compression loading and under dynamic combined loading (compression and bending) by using a rotating buckling test machine. The experimental results are compared with Perry Robertson interaction formula that used for long columns. Greenhill formula is used to get a mathematical model that descripts the buckling behavior

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 16 2019
Journal Name
Proceedings Of The 2019 5th International Conference On Computer And Technology Applications
Four Char DNA Encoding for Anomaly Intrusion Detection System
...Show More Authors

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the

... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
DNA Encoding and STR Extraction for Anomaly Intrusion Detection Systems
...Show More Authors

View Publication
Scopus (11)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Wed Jul 31 2019
Journal Name
Journal Of Engineering
Robust Adaptive Sliding Mode Controller for a Nonholonomic Mobile Platform
...Show More Authors

In this paper, a robust adaptive sliding mode controller is designed for a mobile platform trajectory tracking.  The mobile platform is an example of a nonholonomic mechanical system. The presence of holonomic constraints reduces the number of degree of freedom that represents the system model, while the nonholonomic constraints reduce the differentiable degree of freedom. The mathematical model was derived here for the mobile platform, considering the existence of one holonomic and two nonholonomic constraints imposed on system dynamics. The partial feedback linearization method was used to get the input-output relation, where the output is the error functions between the position of a certain point on the platform

... Show More
View Publication Preview PDF
Crossref