Do you want to publish a course? Click here

Word embedding techniques depend heavily on the frequencies of words in the corpus, and are negatively impacted by failures in providing reliable representations for low-frequency words or unseen words during training. To address this problem, we pro pose an algorithm to learn embeddings for rare words based on an Internet search engine and the spatial location relationships. Our algorithm proceeds in two steps. We firstly retrieve webpages corresponding to the rare word through the search engine and parse the returned results to extract a set of most related words. We average the vectors of the related words as the initial vector of the rare word. Then, the location of the rare word in the vector space is iteratively fine-tuned according to the order of its relevances to the related words. Compared to other approaches, our algorithm can learn more accurate representations for a wider range of vocabulary. We evaluate our learned rare-word embeddings on the word relatedness task, and the experimental results show that our algorithm achieves state-of-the-art performance.
IOT sensors use the publish/subscribe model for communication to benefit from its decoupled nature with respect to space, time, and synchronization. Because of the heterogeneity of communicating parties, semantic decoupling is added as a fourth di mension. The added semantic decoupling complicates the matching process and reduces its efficiency. The proposed algorithm clusters subscriptions and events according to topic and performs the matching process within these clusters, which increases the throughput by reducing the matching time . Moreover, the accuracy of matching is improved when subscriptions must be fully approximated . This work shows the benefit of clustering, as well as the improvement in the matching accuracy and efficiency achieved using this approach.
It is clear that the jurisdiction of juvenile court is stated in any crime committed by the juvenile whether it is a traditional crime or a new crime such as informatics crimes. Thus, a question arises about the importance of the Syrian juvenile Law No. 18 of 1974 which was amended by Law 51 of 1979, to be applied on the informatics juvenile delinquency in the absence of specialized judicial bodies concerned with juvenile cases.
مفهوم انترنت الأشياء مكونات انترنت الأشياء كيف يعمل انترنت الأشياء مجالات تطبيق انترنت الأشياء مزايا انترنت الأشياء التحديات التي تواجه انترنت الأشياء الشركات المقدمة لخدمات انترنت الأشياء
This study aims at identifying the extent to which the postgraduate students in the Faculty of Computer Engineering at the University of Damascus possess the skills of using the computer by measuring their ability in using the computer according to the following fields: (Computer skills, computer skills, operating system skills, skills of using ready software, and skills of using the information network and the Internet). A special questionnaire was constructed to achieve the objectives of the study and presented to a group of competent arbitrators with the expertise to verify its validity and consistency. , Where the stability coefficient (0.94) was also used, and the Statistical Package Program (SPSS) was used to analyze the data Finally, the study led to a number of results which, in turn, led to some suggestions that could benefit computer workers, professionals and specialists in college, university and society.
In this paper, we assess the Voice Over Internet Protocol performance by comparing the performance of two protocols used in VOIP such as SIP and H.323. Moreover, we evaluate the quality indicators such as delay and packets loss. For this purpose OPNET simulator is used as suitable simulation technology.
The research aims to identify the degree of use of Damascus University students, members of the research sample for the Internet and its relationship to social their intelligence, as well as knowledge of the differences in the degree of use of the research sample for the web members according to gender, year of study, and formed the research sample of (665) students of University Students Damascus has been chosen randomly stratified way, where they applied researcher measure students use the Internet (the researcher) and a measure of social intelligence (Ahmad Ghoul ,1993) after verifying the validity and reliability.
نقدم من خلال هذا المشروع دراسة عملية عن خدمات البث عبر الشبكة نحاكي من خلالها البث الإذاعي عبر الإنترنت ونتعرف على هذه الخدمة ضمن بيئة Shoutcast Server و تحليل أدائها عبر Wireshark و من ثم إجراء دراسة تقريبية لاستهلاك الطاقة ضمن الهواتف الذكية و بعض الحلول المتبعة للتخفيف من هذه المشكلة . انطلاقاً من التعرف على مفهوم Streaming و أنواع البروتوكولات المستخدمة في هذه العملية و من ثم كيفية تحقيقها عن طريق Shoutcast server و مشغل الموسيقا Winamp وذلك بعد التعرف بشكل نظري مفصل على الـ Shoutcast server ,انتهاءاً باستقبال الخدمة عبر أجهزة استقبال(Mobiles ) . عن طريق برنامج Wireshark نقوم بتحليل بروتوكول الخدمة السابقة وماهي أية عمله وما هو شكل البيانات التي يتعامل معها و من ثم تحليل أداء الخدمة وفق نماذج متعددة تشمل عدة حالات ( مستقبل واحد أو عدة مستقبلين ) مع تحديد قيم بارامترات التأخير والإنتاجية وغيرها من بارامترات جودة الخدمة . في القسم الأخير نقدم دراسة لمفهوم حفظ الطاقة ضمن البيئة المستخدمة من أجل الإضاءة على هذه المشكلة التي تعتبر تحدياً كبيراً أمام الهواتف الذكية عند استعراض Video أو Audio عبر الشبكات اللاسلكية مع تقديم بعض الاستراتيجيات التي تساهم في الحد من استهلاك الطاقة من قبل بطاريات الهواتف الذكية . تجدر الإشارة أن جميع القياسات تمّت ضمن بيئة شبكة حقيقية ( كما سنرى لاحقاً ) وليست عبر برامج محاكاة ، حيث فضلنا اتباع طريقة Measurement في تحليل الخدمة وذلك من أجل تقديم نتائج دقيقة و حقيقية قدر الإمكان .
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا