This paper discusses the neural network that is used to forecast wind speed and direction by combining methods of three-dimensional convolutional neural networks (3D-CNN), convolutional long short-term memory (CLSTM),...
详细信息
Hidden Markov Models have proved to be a very significant tool for various time-series related problems, especially where context is important. One such problem is Part-of-speech tagging. The work uses a customized HM...
详细信息
In this study, we train different Machine Learning classifiers on male and female samples from The ADReSS Challenge dataset. After testing them on data consisting of both male and female samples as well as on data wit...
详细信息
Text-based emotion identification goes beyond simple sentiment analysis by capturing emotions in a more nuanced way, akin to shades of gray rather than just positive or negative sentiments. This paper details our expe...
详细信息
ISBN:
(数字)9798350361537
ISBN:
(纸本)9798350361544
Text-based emotion identification goes beyond simple sentiment analysis by capturing emotions in a more nuanced way, akin to shades of gray rather than just positive or negative sentiments. This paper details our experiments with emotion analysis on Bangla text. We collected a corpus of user comments from various social media groups discussing socioeconomic and political topics to identify six emotions: sadness, disgust, surprise, fear, anger, and joy. We evaluated the performance of four widely used machine learning algorithms—RF, DT, k-NN, and SVM—alongside three popular deep learning algorithms—CNNs, LSTM, and Transformer Learning—using TF-IDF feature extraction and word embedding techniques. The results showed that among the machine learning algorithms, DT, RF, k-NN, and SVM achieved accuracy scores of 82%, 84%, 73%, and 83%, respectively. In contrast, the deep learning models CNN and LSTM both achieved higher performance with an accuracy of 85% and 86% respectively. These findings highlight the effectiveness of traditional ML and DL approaches in detecting emotions from Bangla social media texts, indicating significant potential for further advancements in this area.
This paper presents a comprehensive framework for assessing the efficacy of Distributed Ledger Technology (DLT) in IoT retail applications. The framework integrates five key algorithms: data Validation Algorithm (DVA)...
详细信息
Montgomery modular multiplication (MMM) in residue number systems (RNS) uses a base extension (BE) technique. This is to avoid division, which is hard, slow and costly in RNS. It is somewhat less costly and faster tha...
详细信息
ISBN:
(数字)9798350384321
ISBN:
(纸本)9798350384338
Montgomery modular multiplication (MMM) in residue number systems (RNS) uses a base extension (BE) technique. This is to avoid division, which is hard, slow and costly in RNS. It is somewhat less costly and faster than the reverse conversion, via Chinese remainder theorem (CRT) and reduction factor method. However, it is used one after the other, for each of the equally large bases. In this work, we modify the conventional RNS-MMM algorithm via replacing the two unparalleled BE undertakings with three parallel CRT-like operations with the same complexity, as BE. As for the reduction factors, we use a special case of the Kawamura’s algorithm that leads to definitive result. The proposed RNS-MMM method allows for squaring the working dynamic range, or halving the bit-width of the balanced residue channels. Moreover, the common practice of dynamically changing the working moduli set in security and crypto applications is less critical due to doubled size of the pool of available moduli. The proposed circuits are simulated, tested and synthesized via Synopsys Design Compiler on the TSMC 65-nm technology, to show 69% less delay and 28% less area-time-product at the cost of 14% more energy consumption, with respect to the most relevant reference work.
The rapid advance in the number of vehicles on the road led to a corresponding growth in demand for parking spaces. However, conventional car parking systems are inefficient and time-consuming. Smart Parking systems a...
详细信息
Online signature verification remains a pivotal component in digital security, ensuring the authenticity of digital transactions and documents. This paper offers a comprehensive overview of prevailing online signature...
详细信息
To manage the high load fluctuations arising from renewable energy integration, the Ministry of Power Govt. of India has launched real-time trading in the energy market. In this paper, we discuss the real-time market ...
详细信息
The advancement of Information Technology has made cloud computing technology an innovative model for offering its consumers services on a rental basis at any time or location. Numerous firms converted to cloud techno...
The advancement of Information Technology has made cloud computing technology an innovative model for offering its consumers services on a rental basis at any time or location. Numerous firms converted to cloud technology by establishing new data centers because of the flexibility of cloud services. However, it has become necessary to ensure successful job execution and effective resource usage. Load balancing (LB) in cloud computing remains a complex challenge, specifically in the Infrastructure as a Service (IaaS) cloud architecture. A server being overloaded or underloaded is a problem that mustn’t happen in the process of cloud access because it would slow down processing or causes a system crash. Hence, to ignore these problems, a suitable resource schedule must be taken, so that system can load balance tasks over all accessible assists. This research suggests effective load-balancing approaches by analyzing the advantages, applications, and disadvantages of conventional LB techniques. The conclusions show that this research provides an exceptional path for researchers to overcome major drawbacks of existing LB techniques and achieves greater efficiency based on makespan, execution and response time, resource usage, efficiency, load balancing and throughput.
暂无评论