Aspect-based sentiment analysis is the most important research topic conducted to extract and categorize aspect-terms from online reviews. Recent efforts have shown that topic modelling is vigorously used for this task. In this paper, we integrated word embedding into collapsed Gibbs sampling in Latent Dirichlet Allocation (LDA). Specifically, the conditional distribution in the topic model is improved using the word embedding model that was trained against (customer review) training dataset. Semantic similarity (cosine measure) was leveraged to distribute the aspect-terms to their related aspect-category cognitively. The experiment was conducted to extract and categorize the aspect terms from SemEval 2014 dataset.
This paper includes the estimation of the scale parameter of weighted Rayleigh distribution using well-known methods of estimation (classical and Bayesian). The proposed estimators were compared using Monte Carlo simulation based on mean squared error (MSE) criteria. Then, all the results of simulation and comparisons were demonstrated in tables.
The effect of short range correlations on the inelastic longitudinal
Coulomb form factors for different states of J 4 , T 1with
excitation energies 3.553,7.114, 8.960 and 10.310 MeV in 18O is
analyzed. This effect (which depends on the correlation parameter )
is inserted into the ground state charge density distribution through
the Jastrow type correlation function. The single particle harmonic
oscillator wave function is used with an oscillator size parameter b.
The parameters and b are considered as free parameters, adjusted
for each excited state separately so as to reproduce the experimental
root mean square charge radius of 18O. The model space of 18O does
not contribute to the tra
The growth curves of the children are the most commonly used tools to assess the general welfare of society. Particularity child being one of the pillars to develop society; through these tools, we can path a child's growth physiology. The Centile line is of the important tools to build these curves, which give an accurate interpretation of the information society, also respond with illustration variable age. To build standard growth curves for BMI, we use BMI as an index. LMSP method used for finding the Centile line which depends on four curves represents Median, Coefficient of Variation, Skews, and Kurtosis. These can be obtained by modeling four parameters as nonparametric Smoothing functions for the illustration variable. Ma
... Show MoreIn this paper, Bayes estimators for the shape and scale parameters of Weibull distribution have been obtained using the generalized weighted loss function, based on Exponential priors. Lindley’s approximation has been used effectively in Bayesian estimation. Based on theMonte Carlo simulation method, those estimators are compared depending on the mean squared errors (MSE’s).
Purpose: The research aims to estimate models representing phenomena that follow the logic of circular (angular) data, accounting for the 24-hour periodicity in measurement. Theoretical framework: The regression model is developed to account for the periodic nature of the circular scale, considering the periodicity in the dependent variable y, the explanatory variables x, or both. Design/methodology/approach: Two estimation methods were applied: a parametric model, represented by the Simple Circular Regression (SCR) model, and a nonparametric model, represented by the Nadaraya-Watson Circular Regression (NW) model. The analysis used real data from 50 patients at Al-Kindi Teaching Hospital in Baghdad. Findings: The Mean Circular Erro
... Show MoreThis study includes the preparation of the ferrite nanoparticles CuxCe0.3-XNi0.7Fe2O4 (where: x = 0, 0.05, 0.1, 0.15, 0.2, 0.25, 0.3) using the sol-gel (auto combustion) method, and citric acid was used as a fuel for combustion. The results of the tests conducted by X-ray diffraction (XRD), emitting-field scanning electron microscopy (FE-SEM), energy-dispersive X-ray analyzer (EDX), and Vibration Sample Magnetic Device (VSM) showed that the compound has a face-centered cubic structure, and the lattice constant is increased with increasing Cu ion. On the other hand, the compound has apparent porosity and spherical particles, and t
... Show MoreThis research id entitled "The Prohibition of Perfidy in International Humanitarian Law". International humanitarian law includes some international agreements that aim to regulate hostilities, and the use of tools and means of warfare (The Hague Law), Where there are many international rules that govern the conduct and management of hostilities, there are some provisions that limit the use of certain means and methods during armed conflict, Whether by prohibiting the use of specific methods of fighting, or prohibiting or restricting the use of certain types of weapons, The dedication of these rules to the law of armed conflict comes in implementation of the principle of the law of war, which restricts the authorit
... Show MoreThe main goal of this paper is to study and discuss a new class of meromorphici "functions[ which are multivalent defined by [fractional calculus operators. Coefficients iestimates , radiisi of satarlikeness , convexityi and closed-to-iconvexity are studied. Also distortion iand closure theorems for the classi" , are considered.
In this research we present An idea of setting up same split plots experiments in many locations and many periods by Latin Square Design. This cases represents a modest contribution in area of design and analysis of experiments. we had written (theoretically) the general plans, the mathematical models for these experiments, and finding the derivations of EMS for each component (source) of sources of variation of the analysis of variance tables which uses for the statistical analysis for these expirements
The security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide
... Show More