
Filter by
Filter by
Topic modeling automatically infers the hidden themes in a collection of documents. There are several developed techniques for topic modeling, which are broadly categorized into Algebraic, Probabilistic and Neural. In this paper, we use an Arabic dataset to experiment and compare six models (LDA, NMF, CTM, ETM, and two Bertopic variants). The comparison used evaluation metrics of topic coherence
Alzheimer's disease (AD), also referred to simply as Alzheimer's, is a chronic neurodegenerative disease that usually starts slowly and worsens over time. It is the cause of 60% to 70% of cases of dementia. In 2015, there were approximately 29.8 million people worldwide with AD. It most often begins in people over 65 years of age as it affects about 6% of people 65 years and older, although 4% to
Ransomwares are amongst the most dangerous malwares that face and affect any business by restricting data access or leaking sensitive information over the internet. Ransomwares binary analysis can provide a way to define the relationships between distinct features employed by ransomware families. Malware classification and clustering systems offer an effective malware indexing with search
Advanced Persistent Threat (APT) is classified as a high threat stealthy attack on modern networks. It uses sophisticated techniques, which makes it very challenging to be detected. It can remain undetectable for an extended period by gaining unauthorized access and lateral movements in the target network. Depending on the APT group tools, responding to the initiated attack can be challenging and
For the task of semantic segmentation of 2D or 3D inputs, Transformer architecture suffers limitation in the ability of localization because of lacking low-level details. Also for the Transformer to function well, it has to be pre-trained first. Still pre-training the Transformer is an open area of research. In this work, Transformer is integrated into the U-Net architecture as (Chen et al., 2021)
Ransomware is a strain of malware that disables access to the user’s resources after infiltrating a victim’s system. Ransomware is one of the most dangerous malware organizations face by blocking data access or publishing private data over the internet. The major challenge of any entity is how to decrypt the files encrypted by ransomware. Ransomware’s binary analysis can provide a means to
The lightweight refractory high entropy alloys (RHEAs) can be considered the best alternative to Ni-based superalloys, which has significantly increased the attention of researchers. In this study, the newly designed lightweight (ρ ∼ 6.2 g/cm3) Al0.5Ti2Nb1Zr1WX (X: 0, 0.3, 0.5, 0.7) RHEAs were prepared. Our results evidence that the microstructure of Al0.5Ti2Nb1Zr1W0.5 RHEA has a BCC structure
Recommender Systems (RS) play a crucial role in our lives. As users become continuously connected to the internet, they are less tolerant of obsolete recommendations made by an RS. Online RS has to address three requirements: continuous training and recommendation, handling concept drifts, and the ability to scale. Streaming RS proposed in the literature address the first two requirements only
Robot dynamic modeling and parameter identification are essential for many analyses. High-fidelity multi-body dynamics simulators can model the robot's dynamic behavior, but they can't identify the robot's non-linear dynamic model needed for controller design. This study proposes a three-step machine-learning framework for extracting the dynamic equations of serial manipulators from data. This
The flow inside a solid rocket motor is considered taking into account the fluid-solid interaction between the combustion gases and the burning grain surface. An unsteady flow model is presented for the flow variables while the time-dependent burning surface is captured using the level set method. Then, a hybrid model is presented by coupling the flow model with the interface capturing technique