The problem at hand is to create a discrimination system specifically for Indian languages, with an emphasis on Automatic Speech Recognition (ASR) implementations. Hate speech poses a serious challenge to online websi...
详细信息
This textbook tackles the matter of contemporary learners’ needs, and introduces modern learning, teaching, and assessment methods. It provides a deeper understanding of these methods so that the students and teacher...
详细信息
ISBN:
(数字)9789811967344
ISBN:
(纸本)9789811967337
This textbook tackles the matter of contemporary learners’ needs, and introduces modern learning, teaching, and assessment methods. It provides a deeper understanding of these methods so that the students and teachers can create teaching and learning opportunities for themselves and others. It explores the meaning of ‘pedagogy’, why it is essential, and how pedagogy has evolved to take 21st-century skills and learning into account. This textbook showcases various modern learning, teaching, and assessment methods for contemporary learners in an increasingly digital environment. Each chapter presents insights and case studies that show how such modern methods can be applied to classrooms, and how they can support the existing curriculum. It shows students, educators, and researchers alike how to effectively make sense of and use modern learning, teaching, and assessment methods in everyday practice.
In this current digital era, the video game is favorite especially among young people. Besides widely known as a form of entertainment, some messages or lessons can be learned from a video game that may affect the pla...
详细信息
We show that the two uni-directional n-cubes, namely UHC1n and UHC2n proposed by Chou and Du (1990) as interconnection schemes are Hamiltonian. In addition, we show that (1) if n is even, both architectures are vertex...
详细信息
Fluorocarbon plasma etching of Si/SiGe heterostructures is demonstrated as a method for fabrication of quantum devices with vertical sidewalls. The heterostructures consist of layers of Si and SiGe, and anisotropic et...
详细信息
One of the most common problems studied in the context of differential privacy for graph data is counting the number of non-induced embeddings of a subgraph in a given graph. These counts have very high global sensiti...
详细信息
The traveling salesman problem (TSP) is a combinatorial optimization problem and a NP-complete problem. It is a well-known problem for comparison of algorithm performance. Many researchers try to solve the TSP by the ...
详细信息
Improvement of data management about weather in Indonesia is very supportive of the need for weather information. Currently, the weather information that is disseminated to the public is only based on sensor location ...
详细信息
Recently,many researchers have concentrated on using neural networks to learn features for Distant Supervised Relation Extraction(DSRE).These approaches generally use a softmax classifier with cross-entropy loss,which...
详细信息
Recently,many researchers have concentrated on using neural networks to learn features for Distant Supervised Relation Extraction(DSRE).These approaches generally use a softmax classifier with cross-entropy loss,which inevitably brings the noise of artificial class NA into classification *** address the shortcoming,the classifier with ranking loss is employed to *** randomly selecting a relation or heuristically selecting the highest score among all incorrect relations are two common methods for generating a negative class in the ranking loss ***,the majority of the generated negative class can be easily discriminated from positive class and will contribute little towards the *** by Generative Adversarial Networks(GANs),we use a neural network as the negative class generator to assist the training of our desired model,which acts as the discriminator in *** the alternating optimization of generator and discriminator,the generator is learning to produce more and more discriminable negative classes and the discriminator has to become better as *** framework is independent of the concrete form of generator and *** this paper,we use a two layers fully-connected neural network as the generator and the Piecewise Convolutional Neural Networks(PCNNs)as the *** results show that our proposed GAN-based method is effective and performs better than state-of-the-art methods.
In the ever-changing field of cybersecurity, conventional defenses that rely on boundaries are no longer adequate to safeguard against sophisticated and persistent assaults. The Zero Trust Architecture (ZTA) paradigm,...
详细信息
暂无评论