This document summarizes a prior case study on natural language processing across different domains. It begins with an introduction to natural language processing, describing how it is a branch of artificial intelligence that allows computers to understand human language. It then reviews several existing studies that applied natural language processing techniques such as named entity recognition and text mining to tasks like identifying technical knowledge in resumes, enhancing reading skills for deaf students, and predicting student performance. The document concludes by highlighting some of the challenges in developing new natural language processing models.
Payments Market in India, Mobile Wallet, Mobile Payments , Evolving Payments Ecosystem, Payments Industry , Payments Bank , Payment Gateways , Mobile Market, Payment Methods
Kellton Tech, a global IT conglomerate, is a CMMi Level 3 and ISO 9001:2008 certified organization. We offer customized IT services and solutions in the mobile, web, ERP, security and cloud space. We offer offshore product development, technology consulting and resource augmentation services. The following presentation is our updated corporate profile and portfolio.
Digital wallets allow making payments using a financial product in a simple, secure and convenient manner. Get thorough analysis of digital wallets or e wallets in india. For more on digital wallet or payment system visit https://www.sesameindia.com/digital-payment-solution-eVillage
Payments Market in India, Mobile Wallet, Mobile Payments , Evolving Payments Ecosystem, Payments Industry , Payments Bank , Payment Gateways , Mobile Market, Payment Methods
Kellton Tech, a global IT conglomerate, is a CMMi Level 3 and ISO 9001:2008 certified organization. We offer customized IT services and solutions in the mobile, web, ERP, security and cloud space. We offer offshore product development, technology consulting and resource augmentation services. The following presentation is our updated corporate profile and portfolio.
Digital wallets allow making payments using a financial product in a simple, secure and convenient manner. Get thorough analysis of digital wallets or e wallets in india. For more on digital wallet or payment system visit https://www.sesameindia.com/digital-payment-solution-eVillage
Xbots provides chatbot and conversational AI solutions for businesses, personalizing the customer experience. Businesses have an opportunity to capitalize on the chatbot opportunity, and build a presence where their customers are, messengers.
Visit us: www.xbots.ai
Contact: info@xbots.ai
Ripple Labs @DeveloperWeek: Building the Payments WebRipple Labs
Building the Payments Web is a half-day of discussion and idea-sharing about the movement to re-architect payments for the Internet using math-based currency protocols, so that, for the first time in history, they’re globally inclusive. Attendees will hear from pioneers of the payments space, learn about the Bitcoin and Ripple protocols, and pitch their ideas to compete for XRP prizes. The event is hosted by Ripple Labs, the creators of the Ripple protocol.
E Payment System Introduction Of Large Value Payment SystemHai Vu
- Basic concept of the Inter Bank Payment System.
- Explain on the basics of Real Time Settlement System.
- Payment system in Vietnam.
- Payment system in Nigeria
- Current trend of the Large Value Payment System using other settlement method.
Introduction of E-Wallets, its types, Advantages,Disadvantages, Examples of E-Wallet,Needs of E-Wallet, Top E-Wallets in World and in India, Description of Mobikwik, its Steps, Architecture of transfer between two wallets, About Paytm, How does Paytm Earn, Recharge on PayTm, Steps to use Paytm, Web Technologies of Paytm, Good at Paytm and Bad at it, Our own proposed system to overcome the disadvantage of existing system
Probably you have heard about some cases where chatbots failed miserably in delivering any actual business benefit. Our experience cooperating with the biggest companies in the world like Elisa, Veon, and Swedbank has taught us some interesting aspects we are about to share in this presentation
Originally published at https://mindtitan.com/resources/guides/chatbot/benefits-of-chatbots/
SITEC eCommerce Class 4
Title: Online Payment
Presenter: Chan Kok Long, Executive Director (iPay88)
Date: 11 August 2015
Venue: The Canvas @ Damansara Perdana
System Center Service Manager is a software product by Microsoft to allow organizations to manage incidents and problems. Microsoft states that the product is compliant with industry best practices such as the Microsoft Operations Framework and in the Information Technology Infrastructure Library.
Understanding System Center
https://www.youtube.com/watch?v=4sYqb6F5QKk
Credit Summit 2015 - Nostrum Group presentation by Richard Sunman, Head of Commercial, 26-3-15
An overview of the impact on the lending industry of the advent of digital finance.
This presentation is about a handmade painting selling app. I have thoroughly done the user experience part such as competitive analysis, persona building, customer journey mapping, Task Flow, Scenarios, Wireframing, and Information architecture. Also included the ser interface part such as page mockups.
This project really helped me to strengthen my skills in UX and UI while doing a "UX Fundamentals online course"
Xbots provides chatbot and conversational AI solutions for businesses, personalizing the customer experience. Businesses have an opportunity to capitalize on the chatbot opportunity, and build a presence where their customers are, messengers.
Visit us: www.xbots.ai
Contact: info@xbots.ai
Ripple Labs @DeveloperWeek: Building the Payments WebRipple Labs
Building the Payments Web is a half-day of discussion and idea-sharing about the movement to re-architect payments for the Internet using math-based currency protocols, so that, for the first time in history, they’re globally inclusive. Attendees will hear from pioneers of the payments space, learn about the Bitcoin and Ripple protocols, and pitch their ideas to compete for XRP prizes. The event is hosted by Ripple Labs, the creators of the Ripple protocol.
E Payment System Introduction Of Large Value Payment SystemHai Vu
- Basic concept of the Inter Bank Payment System.
- Explain on the basics of Real Time Settlement System.
- Payment system in Vietnam.
- Payment system in Nigeria
- Current trend of the Large Value Payment System using other settlement method.
Introduction of E-Wallets, its types, Advantages,Disadvantages, Examples of E-Wallet,Needs of E-Wallet, Top E-Wallets in World and in India, Description of Mobikwik, its Steps, Architecture of transfer between two wallets, About Paytm, How does Paytm Earn, Recharge on PayTm, Steps to use Paytm, Web Technologies of Paytm, Good at Paytm and Bad at it, Our own proposed system to overcome the disadvantage of existing system
Probably you have heard about some cases where chatbots failed miserably in delivering any actual business benefit. Our experience cooperating with the biggest companies in the world like Elisa, Veon, and Swedbank has taught us some interesting aspects we are about to share in this presentation
Originally published at https://mindtitan.com/resources/guides/chatbot/benefits-of-chatbots/
SITEC eCommerce Class 4
Title: Online Payment
Presenter: Chan Kok Long, Executive Director (iPay88)
Date: 11 August 2015
Venue: The Canvas @ Damansara Perdana
System Center Service Manager is a software product by Microsoft to allow organizations to manage incidents and problems. Microsoft states that the product is compliant with industry best practices such as the Microsoft Operations Framework and in the Information Technology Infrastructure Library.
Understanding System Center
https://www.youtube.com/watch?v=4sYqb6F5QKk
Credit Summit 2015 - Nostrum Group presentation by Richard Sunman, Head of Commercial, 26-3-15
An overview of the impact on the lending industry of the advent of digital finance.
This presentation is about a handmade painting selling app. I have thoroughly done the user experience part such as competitive analysis, persona building, customer journey mapping, Task Flow, Scenarios, Wireframing, and Information architecture. Also included the ser interface part such as page mockups.
This project really helped me to strengthen my skills in UX and UI while doing a "UX Fundamentals online course"
Natural Language Processing Theory, Applications and Difficultiesijtsrd
The promise of a powerful computing device to help people in productivity as well as in recreation can only be realized with proper human machine communication. Automatic recognition and understanding of spoken language is the first step toward natural human machine interaction. Research in this field has produced remarkable results, leading to many exciting expectations and new challenges. This field is known as Natural language Processing. In this paper the natural language generation and Natural language understanding is discussed. Difficulties in NLU, applications and comparison with structured programming language are also discussed here. Mrs. Anjali Gharat | Mrs. Helina Tandel | Mr. Ketan Bagade "Natural Language Processing Theory, Applications and Difficulties" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd28092.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/28092/natural-language-processing-theory-applications-and-difficulties/mrs-anjali-gharat
Conversational AI Agents have become mainstream today due to significant advancements in the methods required to build accurate models, such as machine learning and deep learning, and, secondly, because they are seen as a natural fit in a wide range of domains, such as healthcare, e-commerce, customer service, tourism, and education, that rely heavily on natural language conversations in day-to-day operations. This rapid increase in demand has been matched by an equally rapid rate of research and development, with new products being introduced on a daily basis.
Learn More:https://bit.ly/3tBkT81
Contact Us:
Website: https://www.phdassistance.com/
UK: +44 7537144372
India No:+91-9176966446
Email: info@phdassistance.com
SENTIMENT ANALYSIS IN MYANMAR LANGUAGE USING CONVOLUTIONAL LSTM NEURAL NETWORKijnlc
In recent years, there has been an increasing use of social media among people in Myanmar and writing review on social media pages about the product, movie, and trip are also popular among people. Moreover, most of the people are going to find the review pages about the product they want to buy before deciding whether they should buy it or not. Extracting and receiving useful reviews over interesting products is very important and time consuming for people. Sentiment analysis is one of the important processes for extracting useful reviews of the products. In this paper, the Convolutional LSTM neural network architecture is proposed to analyse the sentiment classification of cosmetic reviews written in Myanmar Language. The paper also intends to build the cosmetic reviews dataset for deep learning and sentiment lexicon in Myanmar Language.
Sentiment Analysis In Myanmar Language Using Convolutional Lstm Neural Networkkevig
In recent years, there has been an increasing use of social media among people in Myanmar and writing
review on social media pages about the product, movie, and trip are also popular among people. Moreover,
most of the people are going to find the review pages about the product they want to buy before deciding
whether they should buy it or not. Extracting and receiving useful reviews over interesting products is very
important and time consuming for people. Sentiment analysis is one of the important processes for extracting
useful reviews of the products. In this paper, the Convolutional LSTM neural network architecture is
proposed to analyse the sentiment classification of cosmetic reviews written in Myanmar Language. The
paper also intends to build the cosmetic reviews dataset for deep learning and sentiment lexicon in Myanmar
Language.
XAI LANGUAGE TUTOR - A XAI-BASED LANGUAGE LEARNING CHATBOT USING ONTOLOGY AND...ijnlc
In this paper, we proposed a XAI-based Language Learning Chatbot (namely XAI Language Tutor) by using ontology and transfer learning techniques. To facilitate three levels of language learning, XAI Language Tutor consists of three levels for systematically English learning, which includes: 1) phonetics level for speech recognition and pronunciation correction; 2) semantic level for specific domain conversation, and 3) simulation of “free-style conversation” in English - the highest level of language chatbot communication as “free-style conversation agent”. In terms of academic contribution, we implement the ontology graph to explain the performance of free-style conversation, following the concept of XAI (Explainable Artificial Intelligence) to visualize the connections of neural network in bionics, and explain the output sentence from language model. From implementation perspective, our XAI Language Tutor agent integrated the mini-program in WeChat as front-end, and fine-tuned GPT-2 model of transfer learning as back-end to interpret the responses by ontology graph.
All of our source codes have uploaded to GitHub: https://github.com/p930203110/EnglishLanguageRobot
XAI LANGUAGE TUTOR - A XAI-BASED LANGUAGE LEARNING CHATBOT USING ONTOLOGY AND...kevig
In this paper, we proposed a XAI-based Language Learning Chatbot (namely XAI Language Tutor) by using ontology and transfer learning techniques. To facilitate three levels of language learning, XAI Language Tutor consists of three levels for systematically English learning, which includes: 1) phonetics level for speech recognition and pronunciation correction; 2) semantic level for specific domain conversation, and 3) simulation of “free-style conversation” in English - the highest level of language chatbot communication as “free-style conversation agent”. In terms of academic contribution, we implement the ontology graph to explain the performance of free-style conversation, following the concept of XAI (Explainable Artificial Intelligence) to visualize the connections of neural network in bionics, and explain the output sentence from language model. From implementation perspective, our XAI Language Tutor agent integrated the mini-program in WeChat as front-end, and fine-tuned GPT-2 model of transfer learning as back-end to interpret the responses by ontology graph.
ALGORITHM FOR TEXT TO GRAPH CONVERSION AND SUMMARIZING USING NLP: A NEW APPRO...kevig
Text can be analysed by splitting the text and extracting the keywords .These may be represented as summaries, tabular representation, graphical forms, and images. In order to provide a solution to large amount of information present in textual format led to a research of extracting the text and transforming
the unstructured form to a structured format. The paper presents the importance of Natural Language Processing (NLP) and its two interesting applications in Python Language: 1. Automatic text summarization [Domain: Newspaper Articles] 2. Text to Graph Conversion [Domain: Stock news]. The
main challenge in NLP is natural language understanding i.e. deriving meaning from human or natural language input which is done using regular expressions, artificial intelligence and database concepts. Automatic Summarization tool converts the newspaper articles into summary on the basis of frequency
of words in the text. Text to Graph Converter takes in the input as stock article, tokenize them on various index (points and percent) and time and then tokens are mapped to graph. This paper proposes a business solution for users for effective time management.
Text can be analysed by splitting the text and extracting the keywords .These may be represented as summaries, tabular representation, graphical forms, and images. In order to provide a solution to large amount of information present in textual format led to a research of extracting the text and transforming the unstructured form to a structured format. The paper presents the importance of Natural Language Processing (NLP) and its two interesting applications in Python Language: 1. Automatic text summarization [Domain: Newspaper Articles] 2. Text to Graph Conversion [Domain: Stock news]. The main challenge in NLP is natural language understanding i.e. deriving meaning from human or natural
language input which is done using regular expressions, artificial intelligence and database concepts.Automatic Summarization tool converts the newspaper articles into summary on the basis of frequency of words in the text. Text to Graph Converter takes in the input as stock article, tokenize them on various index (points and percent) and time and then tokens are mapped to graph. This paper proposes a business solution for users for effective time management.
A Survey on Speech Recognition with Language Specificationijtsrd
As a cross disciplinary, speech recognition is entirely based on the speech as the survey object. Speech recognition allows the machine to convert the speech signal into text or commands via the process of identification and understanding. Speech recognition involves in various fields of physiology, psychology, linguistics, computer science and signal processing, and is even related to the person’s body language, and its goal is to achieve natural language communication between man and machine. The speech recognition technology is gradually becoming the key technology of the IT man machine interface. This paper describes the development of speech recognition technology and its basic principles, methods, reviewed the classification of speech recognition systems, speech recognition approaches and voice recognition technology, analyzed the problems faced by the speech recognition. Dr. Preeti Savant | Lakshmi Sandhya H "A Survey on Speech Recognition with Language Specification" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49370.pdf Paper URL: https://www.ijtsrd.com/computer-science/speech-recognition/49370/a-survey-on-speech-recognition-with-language-specification/dr-preeti-savant
Development of an intelligent information resource model based on modern na...IJECEIAES
Currently, there is an avalanche-like increase in the need for automatic text processing, respectively, new effective methods and tools for processing texts in natural language are emerging. Although these methods, tools and resources are mostly presented on the internet, many of them remain inaccessible to developers, since they are not systematized, distributed in various directories or on separate sites of both humanitarian and technical orientation. All this greatly complicates their search and practical use in conducting research in computational linguistics and developing applied systems for natural text processing. This paper is aimed at solving the need described above. The paper goal is to develop model of an intelligent information resource based on modern methods of natural language processing (IIR NLP). The main goal of IIR NLP is to render convenient valuable access for specialists in the field of computational linguistics. The originality of our proposed approach is that the developed ontology of the subject area “NLP” will be used to systematize all the above knowledge, data, information resources and organize meaningful access to them, and semantic web standards and technology tools will be used as a software basis.
Suggestion Generation for Specific Erroneous Part in a Sentence using Deep Le...ijtsrd
Natural Language Processing NLP is the one of the major filed of Natural Language Generation NLG . NLG can generate natural language from a machine representation. Generating suggestions for a sentence especially for Indian languages is much difficult. One of the major reason is that it is morphologically rich and the format is just reverse of English language. By using deep learning approach with the help of Long Short Term Memory LSTM layers we can generate a possible set of solutions for erroneous part in a sentence. To effectively generate a bunch of sentences having equivalent meaning as the original sentence using Deep Learning DL approach is to train a model on this task, e.g. we need thousands of examples of inputs and outputs with which to train a model. Veena S Nair | Amina Beevi A ""Suggestion Generation for Specific Erroneous Part in a Sentence using Deep Learning"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23842.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23842/suggestion-generation-for-specific-erroneous-part-in-a-sentence-using-deep-learning/veena-s-nair
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
2. Int J Elec & Comp Eng ISSN: 2088-8708
A prior case study of natural language processing on different domain (Shruthi J.)
4929
knowledge. This can be done for several languages for e.g. English; several challenges incurred when
the information extraction contain paragraph phrasing, metaphors, idioms and rhetoric etc. [6].
Language disambiguation is the art to parse and extract the information in NLP. Analyze
sentence-parsing, words identification using lexicon, Named entity recognition (NER) so on and extraction
are the series of operations to be performed in NLP. Different approaches [7] example: NER, wrappers in
web-corpus, tagging of parts of speech has been explored. The intention of information extraction is to
extract the information for pre-determined blocks for a specific frame [8]. Generic models for NLP exploiting
word joint probability and its tag or label, enhancing to Hidden-Markov approach and trigram markov
approach has been introduced in [9]. It also defines usage of pseudo random words and their functioning for
NLP of unidentified words for small dataset. In [10] Lapata et.al have illustrated about web-based approach
for NLP that provided the knowledge of isolation of compound nouns, disorderly arrangement of adjectives,
web interpolation and mass counts to maximize the flexibility. Thus, NLP falls into the domain of AI with
the aim of understanding and making meaningful information in the human language [11].
Different terminologies are utilized in NL processing such as 1) Morphology: -This is used to
construct a meaningful word from a primitive sentence, 2) Syntax:-utilized for word arrangement which
results a meaningful sentence, 3) Semantics: - concerned with meaningful word and create the meaningful
sentence by combining those words and phrases, 4) Pragmatics: - utilized to know the meaning of sentence
for different situations and how the understanding of sentence is effected [12]. The remaining part of
the study is organized as; section-2 describes the generic process of NLP which diagrammatically represents
the procedural steps of language processing. Section-3 discusses scope and applications of NLP followed by
different techniques and approaches utilized in NLP in section-4. Section-1.2 highlights the existing research
work towards NLP implementation followed by critical challenges in NLP in Section 5. Finally, section-6
provides the conclusion of the research study.
This section discusses some of the existing techniques of implementing NLP. Almada et al. [13],
presents an identifying technical knowledge (TK) in software development. It helps in the hiring of software
engineering positions and talent management. To develop this NLP technique is used and text mining (TM)
is utilized to analyze formless text in resumes and curriculum. By implementing KP GENERATOR, specific
data on resumes is analyzed and significantly reduce the time of work. Pelayo et al. [14] presented an
enhancing hearing impaired-student reading skills in college level. The main objective of this subject is
focused on only deaf students. The analysis of text, images and other information with respect to context
NLP act as main role. Here, the user can imagine the information by gradually increasing the width of words
and can improve understanding.
Khalid et al. [15], presented identifying the multi-word Urdu from a number of corpora.
The improvement of this scheme C-value method and NLP is utilized along with Urdu WordNet.
The outcomes of this method comprises of 735 synsets containing only multi-word- Urdu terms from
Urdu-WordNet. Jimenez et al. [16] have proposed to predict the data or searching information using Big Data
predictive analytics in social media. The result discovered and analyzed present status of the research that has
been urbanized so far by educational background. Elahinia et al. [17], evaluated a prediction of complex and
multidimensional health care problem using NLP technique. The main objective of this study, first analyzed
the most comprehensive element of healthcare data because of many-sided nature of the problem. The output
shows the possibility of patient-non adherence by person generated input-word (PGIW) and combination of
machines.
Slater et al. [18], developed an effective measure of student appointment in tuition or class.
The technique NLP utilized to identify the different linguistic features such as mathematics problems
on students-affective states during work in a mathematic-tutor. The outcome is measured with
a linguistic feature, and student problems on online tutor are evaluated. Calapodescu et al. [19] presented
a semi-automatic de-identification of hospital discharge summaries. The proposed system is achieved with
significant improvements for the annotation of the documents in quantitative, qualitative and homogeneous
results. The work of Broniecki et al. [20] have focused on the upcoming arriving form of data and to make
international practitioners grow. The presenting new data work on large question text and also worked on
specific approaches. The outcomes are stable on human-derived coding and complete on correlate/predict and
achieve the data program.
In the study of Zitnik et al. [21] have concentrated on the various types of applications and tools that
is required for machine learning in Natural language process. A new arrived application called toolkit
provide an end to end text investigation by the using of JavaScript technique based function. The state of
the arts are comes in the terms of the result. The work of Baby et al. [22] have focused on hose control
application in which the user can interface with web application or a newly arrived chatbot tools its control
on all house electrical equipment. The presenting chatbot technique follow the statement of text information
that’s text by user in the form of command and then control the all-electric equipment at house by using
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 4928 - 4936
4930
the motion sensors. The study of Kaushik et al. [23] have focused on issues of NLP in which they discussed
on deep learning which solves the problem of N-language processing. By the effective deep learning
the secret issues like output-vector and input-word are removed. By the adding of Cross-Language future
work is done.The study of Ahmed et al. [24] have concentrated on poetry analyzer on N- language processing
which used different types of language and its consider the computer-based approach. This method considers
all types of literary tested before presenting the final result is obtained.The work of pole et al. [25] have
focused on the new proposed approach for the instruction of grouping documents’ in which search results are
in the terms of better way-group fuzzy apparatus for accurate compilation by the using of weighted method.
In the study of Bartero et al. [26] described anomaly identification problem. To resolve this issue [26]
introduced a Word-embedding method based on Google’s Word2vec algorithm. The results illustrated 90%
accuracy and efficient computation.
Suhaimin et al. [27] described a challenge which occurs in sarcasm detection into the texts.
The outcomes show that a group of prosodic, syntactic and pragmatic structures developed an effective
performance with F-measure result of 0.852. The study carried out by Alami et al. [28] has presented a novel
Semi-automated methodology to develop a sequential structure from user necessities written in Arabic.
The result shows that proposed approach provides an effective Unified Modeling Language (UML) diagrams
from Arabic user requirements. Zhuang et al. [29] presented a Stroke Level approach to influence Chinese
stroke for learning the Chinese word representation. The experimental outcomes show that presented method
is superior for Chinese-Language processing. To reduce this type of problem the Deshmukh et al. [30] has
developed Voice-based application to the users. The outcomes display the proposed system that provides
correct answer to the user. It offers fast processing and maximum response capability to the users.
2. GENERIC PROCESS OF NLP
Generally, there are five steps in NLP i.e., Morphological, Lexical analysis, Syntax analysis,
Programmatics and Discourse. The process of natural language needs knowledge of how utterance are
created, how they turn into clauses and sentences. Additionally, to effectively understand a group of
sentences in the given context, it requires a high level knowledge. Such levels are described as follows;
a. Morphological: It deals with morphological-structure of words, e.g. prefix, suffix, word root, and infixes.
Basically, morpheme is the basic unit of written word which provides the information about word
formation.
b. Lexical Analysis: In this stage, each word is analyzed with their component and other non-words like
punctuations, acronyms and abbreviations are separated from words. This analytical process is
responsible for identifying and analyzes the word structure and separating the whole text into paragraphs,
set of sentences and words.
c. Syntax Analysis: The primary purpose is to find that a words string is well arranged and divide it into
a structural format which represents the relation between the distinct words. It deals with word structure
and validity of sentences. A syntactic analyzer performs this byexploiting a word lexicon and syntax rules
(i.e., Grammar).
d. Semantic Analysis: It provides exact meaning from the given text. The text is verified for meaningfulness.
The analyzer rejects the sentence like ‘Illegal-Law”. The sentence structure created by syntax-analyzer is
assigned meaningfulness.
e. Pragmatics: In a specific context, it deals with the sentences where the sentence structure represents
the actual meaning of that sentence for example: “close the window?” It has been interpreted as appeal
rather than order [31].
f. Discourse: The meaning of specific sentence may depends upon sentence preceding and might be
influence the significance of that sentence. For example: “He wanted it” which depends on existing
discourse context.
3. ESSENTIALS OF NLP
It is well known that, NLP is a branch of AI which has several significant associations between
computer machine and person interaction. In this digital world, NLP plays a significant role which bridging
the communication gap among human and digital world. Furthermore, this section provides scope and
applications of NLP which is utilized in the days to come.
4. Int J Elec & Comp Eng ISSN: 2088-8708
A prior case study of natural language processing on different domain (Shruthi J.)
4931
3.1. Scope of NLP
3.1.1. Machine translation
As the global information is online, the accessibility of information is becoming highly increasing.
The main challenge is to provide access for globalinformation to every person with understandable language
translation. Modern companies, e.g., “Duolingo,” recruit a number of employees to contribute, by concurring
translation work with educating new language. But digital translation provides more scalable alternative
information to corresponding global information. Google is the innovative company that has machine
translation which translates the information based on the proprietary statistical information. The challenge of
machine translation technique is not translating the words but understands and stores the meaning of
the sentences to offer an actual translation.
3.1.2. Automatic summarization
During accessing of specific and significant information from the extensive knowledge,
an information overloading is a complex challenge to retrieve such information. Automatic summarization is
not only relevant to summarize the meaning of the document, but also to understand the emotional meaning
inside the information, e.g., while collecting or accessing information from the social sites. This NLP
application is becoming more useful as a demandable market asset.
3.1.3. Information extraction
During the summarization of some key aspects of specific kind of stories, we use patterns extraction.
For example, the statistics on terrorist attacks can be summarized by seeing place, date, an id of perpetrators,
injuries, and deaths, etc., are expressed, and therefore exploring out that information and explore it into
a predetermined template.
3.1.4. Question answering
At present, QA is becoming more popular for the humans, and thanks to the applications like;
OK-Google, Siri, and chat-boxes. These kinds of applications are capable to answer the human requests.
It can be utilized as a text interface or like a linguistic dialog system. Moreover, this application remains
more challenging especially for search engines, and it is the one of the significant application of NLP
research field.
3.2. NLP techniques
The NLP is used in different a technique which is described below:
3.2.1. Named-entity recognition (NER)
The NER is a type of information/data extraction that goal to recognize and determine phrases or
words in text format into pre-defined classes like as the names of places, persons, expressions, etc. [32].
The named entity (NE) is an order of words that describe real-world object such as Apple Incorporation,
California, etc. In data extraction, the NER is an essential task. The NER contains three universally accepted
types are; Places, Person and Organization. NER doesn’t generate templates, and it is not an event
recognition [33]. There are some methodologies presented which are used in NER processes are:
a. Rule-based Methodology: The Rule-based approach work as a combination of rules either automatically
or manually defined. A rule contains action and a pattern. The Amazigh-named entity recognition (AER)
based on symbolic method uses linguistic rules manually to generate the improvement of gazetteers by
using introduced approach [34]. The NER system is used to improve the new standard Arabic with
the help of the Rule-based method [35].
b. Statistical Learning method: The much Statistical Learning method is based on NER algorithms, and it
treats the work as a Sequence-labeling Problem (SLP). The SLP is a common machine learning (ML)
problem and has been helped to create different NLP works also containing chunking, NER,
and part-of-speech tagging. The Statistical Learning approach includes three modules like Hiddden
Markov models, Maximum entropy Markov models and conditional random fields.
3.2.2. Speech recognition method
The NLP is a method that can minimize the distance between machine and human being. It makes
human to communicate with the device without any complexity. The Speech Recognition has the capability
of a program or machine to detect phrases or words in a verbal language and change them to
a machine-understandable format. It is a technology which allows human communication with devices.
These are beneficial in everyday life because a machine can understand by voice. The NLP performs very
efficiently to create computer-interfaces that make more comfortable to use for humans. The modern NLP
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 4928 - 4936
4932
method allows the use of NL to manifest programming ideas [36]. The Figure 1 shows the whole speech
recognition working and is distributed in four stages. The feature extraction (FE) process is applied by using
Mel frequency cepstral coefficient (MFCC) in which voice features are extracted for every voice samples.
After that, all functions are specified to Pattern training which is trained by hidden markov model (HMM) to
generate HMM for each word. At last the Viterbi decoding is used to choose the one with maximum
probability which is nothing but recognized word [37].
Figure 1. Speech-recognition system
The Speech-recognition system contains following techniques:
a. Dynamic Time Warping (DTW): The DTW method is a Dynamic Programming method where the whole
issue is distributed into a small no. of steps and every step needing a decision to be created based on
the Local-distance measures. The whole decision is depending on small decisions. The conquering and
divide methodology stimulate the DTW. The DTW could find the minimum path distance with the help of
matrix, and also can reduce the computation amount [38].
b. Hidden Markov Models (HMM): In HMM statistical design the system being designed uses Markov
procedure with unknown parameters. The aim is to define the unknown parameters from the observable
information. In HMM, the state is not directly visible, but the variables affected by the state which
are visible.
c. Vector Quantization (VQ): The VQ is a procedure for mapping vectors from a big vector space to
a limited number of cluster/regions in that space. The clustering/mapping the vectors can be achieved by
using a clustering algorithm such as LBG (LindeBuzo and Gray) [39].
d. Ergodic Hidden Markov Models (E-HMM): The HMM is the optimal approach for demonstrating
the voice signal because the HMM is signified in terms of states which is the characteristics of the voice
signal and it is also shown in terms of states. The E-HMM is used for modeling the voice signal. E-HMM
can directly create the order of verbal elements in a sequence [40].
e. Artificial Neural Network (ANN): An ANN is a program, which tries to copy the action of the biological
activity of the human mind. The ANN has been effectual with overlapping, noisy and variable data
streams. It provides effective performance in voice recognition because it delivers a faster communication
as compared to “Text Writing,” it has a hand free ability, beneficial for mentally or physically disabled
peoples [41].
3.2.3. Optical character recognition (OCR) system
The OCR system permits to scan hand or typewritten text and change the scanned picture into
a computer process format. It could be either in a word document or plain text form. The transformed
document can be modified, or used in different documents. Thereby, the documents file becomes editable.
The OCR is used when renewing a similar document file in a page as a document format in electronic form
taking extra time. It is extensively used in transforming books and texts format into the digital form.
Hence, it can be used in text mining, machine translation, character-recognition and electronically search.
The three important techniques for OCR processing [42] are given below:
a. Pre-Processing: The Pre-processing stepis to generate data that are very easy and efficient for the OCR to
operate and perform accurately. The Pre-processing stage is to enhance the picture quality for optimal
recognition by the system. There are few techniques which implement this process are De-Skew,
Binarization, Line-removal, etc.
b. Segmentation: The next OCR processing step is segmentation, where the character picture is segmented
into its sub-component form. It is essential because if once extent enters into a separation of the different
lines in the characters, it affects the recognition-rate.
6. Int J Elec & Comp Eng ISSN: 2088-8708
A prior case study of natural language processing on different domain (Shruthi J.)
4933
c. Post-Processing: The Post-processing doeserror-correction/detection and grouping. It refines OCR
outcomes with the help of spell or grammar check and other specific knowledge-source comparisons.
The result of plain symbol recognition in text form is a group of individual symbols.
3.3. Applications of NLP
In this section, the applications of NLP are discussed.
3.3.1. Role of the NLP in the field of AI applications
An artificial intelligence (AI) is a machine which thinks like a human and it becomes dependent part
of everybody’s life by providing a wide form of services. Various workis still in progress to make AI an
efficient system to interact with human. One of the main techniques in AI system is NLP which plays
a crucial role for the communication task. Without NLP an intelligence system cannot understand
the meaning of words in context. So the NLP can be called as fundamental unit of the artificial intelligence
which enables intelligent system to interact efficiently with humans by performing communication process
such as automated speech and automated text writing by using natural language. Some of the recent
techniques are discussed below:
a. NLP for speech synthesis: In this process NLP is applied for text-to-speech conversion in which text
information is taken as input to the system and after conversion, machine replies into speech. The process
involves various high level modules for performing speech synthesis and the sentence understanding and
segmentation process is done by using decision tree.
b. NLP for speech recognition: In this NLP includes context free grammars to understand the sentences and
phrase in spoken language and then extract meaningful information and transform them to digital pattern
that machine can understand[43].
3.3.2. Role of the NLP in the field of big-data and classification
The text classification has continuously been an interesting topic in the research field of NLP,
and while entering in the age of big data, efficient text classifiers are difficult to obtain NLP for the scientific
data analytics. To provide the high computational performance to text classification in the era of big data [32]
a deep neural network concept is with hybrid outliers in which text classifiers are classified as rules-based
and statistical classification methods. While most of the machine learning techniques such as support
vector machine, decision tree KNN, neural network, kernel learning have applied in the process of text
classification [44].
3.3.3. NLP in the area of business and software management
The field of business process management faces a lot of complexities to provide quality of services
due to the growth of enormous demand and the technology. Many researchers have drawn attention to
redesigning process via NLP to produce better result and performances to the business organization.
A domain model is designed to handle the issue of customer feedback through the support of social
multimedia [39]. An NLP is implemented with geolocation context to achieve efficient interface by using
fuzzy model [41].
3.3.4. NLP for ontology learning
The term “ontology” is considered within different senses in different areas. For an artificial
intelligence, ontology can be defined as a specific concept such as things, events, and relations that are used
to support information exchange between different entities. NLP is closely related to the Ontology’s it can be
used to define essential rules for semantic analysis and question and answering system. Various approaches
such as symbolic, statistical and hybrid have drawn to information extraction, and retrieval from
the knowledge resource and some of these techniques have been taken into consideration for text mining via
ontology learning and which is having an effective result. The symbolic method exploits human natural
language (linguistic information) data to mine useful information from the text. Such as noun phrases are
taken as to lexical idea to denote in an ontology.
3.2.5. NLP in the area of Bioinformatics
Bioinformatics is class of science which uses the computer technology to extract the knowledge or
information from the collection of biological data. The process of information extraction involves
the collection, storage, manipulation, modeling and retrieval for analyzing, predicting and visualizing through
the development of software and the algorithm. Text mining [41] and NLP techniques play the very
important role to recover user preference knowledge from growing databases.
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 4928 - 4936
4934
3.2.6. Text mining approaches to protein research
DNA and protein sequences are the types of genetical language codes in which NLP and text mining
methods are applied to analyze the bioinformatics. A latent semantic analysis was applied to protein remote
homology detection, and analysis of protein spectral originates from the statistical frequency in NLP,
and various web servers were designed to extract knowledge features and grammar rules of protein, DNA,
and RNA sequences. In the field of predicting protein structure, some research works have used machine
learning prediction methods for predication of protein disorder which based on AI and neural network,
maximum entropy, support vector machine and random forest. For prediction of protein function some
another work is carried out in terms of identifying region of sub-cellular protein, protein remote homology
detectionobserving multifunctional enzymes, classifying protein functions and classifying trans-membrane
protein by using machine learning algorithm such as SVM , kernel method, decision-making tree, random
forest, Bayesian network Text processing methods which are as ontology annotation and sample weighting,
are used to detect features and process training data and grammatical analyses hidden Markov model
(HMM) [38, 39].
4. KEY CHALLENGES IN NLP
The key challenges in NLP are:
a. High Scale Information Acquisition: For the prediction of linguistic structure information, knowledge of
idioms, lexical and general patterns recognition, mostly thousands of millions of knowledge information
will be required.
b. Ambiguity Problem: Ambiguity is the most significant challenge in NLP. NLs are riddled with
ambiguities at each level of description, i.e., from phonetic to sociological. Until now, human’s natural
languages, system is unaware of this pervasive ambiguity—it comes to researcher’s attention in the guise
of such misunderstandings, logistical marginal concept and contested libel suits.
c. Language Variability: Human languages are highly rich, and those have different ways to express
a specific meaning like, e.g. “which is the nearest hotel?” & “can you please tell me the address of nearest
hotel?” both sentences have a similar meaning. Thus, NLP approach will figure out those two sentences
mean the same. Therefore, there are several ways to represent the text semantics or to distinguish two
texts.
d. Semantics Problem: The fundamental challenge is that we don’t have the knowledge of humans semantic
structures are like; one significant method is to study that they are very nearer to human syntactic
structures. In this method, a suitable study of semantics is supposed to provide high constraint the level of
interpretations.
e. Knowledge Representation: How do human represent the background world information, by pointing that
it requires to interact with the structure of semantic representation in the language understanding process.
Have to analyze that knowledge and meaning representation is the same, it means that language is
a mirror of mind or mental representation of the world.
f. Learning of language: What are the words, and how they are categorized and what is its pattern structure
(i.e., idioms, syntactic, etc.) and is a very complex task, therefore the role of language learning and
knowledge representation is one of the common challenges in NLP approach.
5. CONCLUSION
From this study can conclude that NLP is a significant approach which has unique features with
excellent communication approach, i.e., NLP is the set of tools and methodology of knowing to achieve
the goals and get results during knowledge discovery. Therefore, the case study provides the necessity of
the NLP in the current computing world along with different approaches and their applications. Also,
it highlights the critical challenges in the development of new NLP model.
REFERENCES
[1] H. Lane, et al., “Natural Language Processing in Action,” Manning Publications, 2018.
[2] S. Singh, “The role of speech technology in biometrics, forensics and man-machine interface,” International
Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 1, pp. 281-288, 2019.
[3] I. El Bazi and N. Laachfoubi, “Arabic Named Entity Recognition Using Deep Learning Approach,” International
Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 3, pp. 2025-2032, 2019.
[4] Pratheek I. and J. Paulose, “Prediction of Answer Keywords using Char-RNN,” International Journal of Electrical
and Computer Engineering (IJECE), vol. 9, no. 3, pp. 2164-2176, 2019.
[5] “Natural Language Processing,” [Online]. Available: https://en.wikipedia.org/wiki/Natural_language_processing.
8. Int J Elec & Comp Eng ISSN: 2088-8708
A prior case study of natural language processing on different domain (Shruthi J.)
4935
[6] “Syntax- English sentence structure,” [Online]. Available: esl.fis.edu/learners/advice/syntax.htm.
[7] Ratinov, Lev, and Dan Roth, “Design challenges and misconceptions in named entity recognition,” In Proceedings
of the Thirteenth Conference on Computational Natural Language Learning (CoNLL-2009), pp. 147-155, 2009.
[8] R. J. Mooney and R. Bunescu, “Mining Knowledge from Text Using Information Extraction,” SIGKDD
Explorations, vol.7, no. 1, pp. 3-10, 2005.
[9] M. Collins, “Chapter 2: Tagging Problems, and Hidden Markov Models,” Course note for NLP, Columbia
University, 2013.
[10] M. Lapata and F. Keller, “Web-based models for Natural Language Processing,” ACM Transactions on speech and
Language Processing, vol. 2, no. 1, pp. 1-30, Feb. 2005.
[11] N. Ranjan, et al., “A Survey on Techniques in NLP,” International Journal of Computer Applications, vol. 134,
no. 8, pp. 6-9, Jan. 2016.
[12] A. Copestake, “Natural Language Processing,” [Online]. Available: http://www.cl.cam.ac.uk/users/aac/.
[13] R. V. Almada, et al., “Natural Language Processing and Text Mining to Identify Knowledge Profiles for Software
Engineering Positions: Generating Knowledge Profiles from Resumes,” 2017 5th International Conference in
Software Engineering Research and Innovation (CONISOFT), Mérida, Mexico, pp. 97-106, 2017.
[14] C. B. Q. Pelayo, et al., “Natural language processing for improving hearing impaired student reading skills,” 2017
International Conference on Information Systems and Computer Science (INCISCOS), Quito, pp. 201-206, 2017.
[15] K. Khalid, et al., “Extension of Semantic Based Urdu Linguistic Resources Using Natural Language Processing,”
2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 15th International
Conference on Pervasive Intelligence and Computing, 3rd International Conference on Big Data Intelligence and
Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), Orlando, FL,
pp. 1322-1325, 2017.
[16] J. L. J. Marquez, et al., “Challenges And Opportunities In Analytic-Predictive Environments Of Big Data And
Natural Language Processing For Social Network Rating Systems,” in IEEE Latin America Transactions, vol. 16,
no. 2, pp. 592-597, Feb. 2018.
[17] H. Elahinia, et al., “Predicting medical nonadherence using natural language processing,” 2017 IEEE MIT
Undergraduate Research Technology Conference (URTC), Cambridge, MA, pp. 1-4, 2017.
[18] S. Slater, et al., “Using natural language processing tools to develop complex models of student engagement,” 2017
Seventh International Conference on Affective Computing and Intelligent Interaction (ACII), San Antonio, TX,
pp. 542-547, 2017.
[19] I. Calapodescu, et al., “Semi-Automatic De-identification of Hospital Discharge Summaries with Natural Language
Processing: A Case-Study of Performance and Real-World Usability,” 2017 IEEE International Conference on
Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber,
Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, pp. 1106-1111, 2017.
[20] P. Broniecki and A. Hanchar, “Data Innovation for International Development: An overview of natural language
processing for qualitative data analysis,” 2017 International Conference on the Frontiers and Advances in Data
Science (FADS), Xi'an, pp. 92-97, 2017.
[21] S. Žitnik, et al., “nutIE—A modern open source natural language processing toolkit,” 2017 25thTelecommunication
Forum (TELFOR), pp. 1-4, 2017.
[22] C. J. Baby, et al., “Home automation using IoT and a chatbot using natural language processing,” 2017 Innovations
inPower and Advanced Computing Technologies (i-PACT), pp. 1-6, 2017.
[23] A. R. Sharma and P. Kaushik, “Literature survey of statistical, deep and reinforcement learning in natural language
processing,” 2017 International Conference on Computing, Communication and Automation (ICCCA),
pp. 350-354, 2017.
[24] M. A. Ahmed and S. Trausan-Matu,“Using natural language processing for analyzing Arabic poetry rhythm,” 2017
16th RoEduNet Conference Networking in Education and Research (RoEduNet), pp. 1-5, 2017.
[25] K. R. Pole and V. R. Mote, “Improvised fuzzy clustering using name entity recognition and natural language
processing,” 2017 1st International Conference on Intelligent Systems and Information Management (ICISIM),
pp. 123-126, 2017.
[26] C. Bertero, et al., “Experience Report: Log Mining Using Natural Language Processing and Application to
Anomaly Detection,”2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE),
Toulouse, pp. 351-360, 2017.
[27] M. S. M. Suhaimin, et al., “Natural language processing based features for sarcasm detection: An investigation
using bilingual social media texts,”2017 8th International Conference on Information Technology (ICIT), Amman,
pp. 703-709, 2017.
[28] N. Alami, et al., “A semi-automated approach for generating sequence diagrams from Arabic user requirements
using a natural language processing tool,”2017 8th International Conference on Information Technology (ICIT),
Amman, pp. 309-314, 2017.
[29] H. Zhuang, et al., “Natural Language Processing Service Based on Stroke-Level Convolutional Networks for
Chinese Text Classification,”2017 IEEE International Conference on Web Services (ICWS), Honolulu, HI,
pp. 404-411, 2017.
[30] S.Deshmukh, et al., “Sia: An interactive medical assistant using natural language processing,”2016 International
Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC),
Jalgaon, pp. 584-586, 2016.
[31] T. Eftimov, et al., “A rule-based named-entity recognition method for knowledge extraction of evidence-based
dietary recommendations,” PloS one, vol. 12, no. 6, pp. e0179488, 2017.
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 5, October 2020 : 4928 - 4936
4936
[32] J. Jiang, “Information Extraction from Text,” in Aggarwal C. and Zhai C. (eds), “Mining Text Data,” Springer,
Boston, MA, pp. 11-41, 2012.
[33] S. Boulaknadel, et al., “Amazighe Named Entity Recognition using a A rule based approach,” 2014 IEEE/ACS 11th
International Conference on Computer Systems and Applications (AICCSA), Doha, pp. 478-484, 2014.
[34] H. Elsayed and T. Elghazaly, “A named entities recognition system for modern standard Arabic using rule-based
approach,” 2015 First International Conference on Arabic Computational Linguistics (ACLing), pp. 51-54, 2015.
[35] Zaykovskiy, Dmitry, “Survey of the speech recognition techniques for mobile devices,” Proc. of DS Publications,
2006.
[36] R. S. Chavan and G. S. Sable, “An Overview of Speech Recognition Using HMM,” International Journal of
Computer Science and Mobile Computing, vol. 2, no. 6, pp. 233-238, 2013.
[37] T. B. Amin and I. Mahmood, “Speech recognition using dynamic time warping,” 2nd International Conference on
Advances in Space Technologies, 2008 (ICAST 2008), pp. 74-79, 2008.
[38] M. Saleem, et al., “Self learning speech recognition model using vector quantization,” 2016 Sixth International
Conference on Innovative Computing Technology (INTECH), Dublin, pp. 199-203, 2016.
[39] S. T. Pan, et al., “Speech recognition via Hidden Markov Model and neural network trained by genetic algorithm,”
2010 International Conference on Machine Learning and Cybernetics, Qingdao, pp. 2950-2955, 2010.
[40] P. P. Patange and J. S. R. Alex, “Implementation of ANN based speech recognition system on an embedded
board,”2017 International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2),
Chennai, pp. 408-412, 2017.
[41] A. Chaudhuri, et al., “Optical Character Recognition Systems for Different Languages with Soft Computing,”
Springer, 2016.
[42] A. Reshamwala, et al., “Review on natural language processing,” IRACST Engineering Science and Technology:
An International Journal (ESTIJ), vol. 3, no. 1, pp. 113-116, 2013.
[43] A. Trilla, “Natural Language Processing techniques in Text-To-Speech synthesis and Automatic Speech
Recognition,” Departament de Tecnologies Media Enginyeria i Arquitectura La Salle (Universitat Ramon Llull),
Barcelona, 2009.
[44] C. Strapparava and R. Mihalcea, “Learning to identifyemotionsintext,” inSAC’08: Proceedings of the 2008 ACM
symposium on Applied computing, New York, pp. 1556-1560, 2008.
BIOGRAPHIES OF AUTHORS
Shruthi J. completed B.E in CSE from VTUin the year2006, and completed Mtech from VTU
in the year 2008. Currently pursuing Ph.D in Computer Science and Engineering, Sir MVIT
under VTU.Currently working as Assistant Professor, Department of CSE, BMSITM,
Bengaluru, with 10 years of teaching experience and also has 01 year of industry experience.
Areas of interest are Speech Processing, Data mining, Big Data, Machine Learning and Natural
Language Processing.
Dr. Suma Swamy completed her B.E in ECE from KBP College of Engineering, Satara under
Shivaji University, and Kolhapur in 1990. She completed Post Graduate Diploma in Advanced
Computer Technology (ASSET) from Aptech, M G Road, Bengaluru in 1996. She completed
her M.Tech in ECE from Sir MVIT, Bengaluru under VTU in 2005. She completed her Ph.D
in Information and Communication Engineering, Anna University Chennai in 2014. She is
currently working as Professor, Department of CSE, Sir MVIT, Bengaluru. She is guiding 6
research scholars under VTU. She has 27+ years of experience in teaching with 2 years of
industry experience. Her areas of interest are Speech Processing, Data mining, Big Data,
Machine Learning, Natural Language Processing, Algorithms, Database Management Systems
and IoT. She has 21 publications in her credit in renowned peer reviewed Journals with good
impact factor and National and International Conferences. She has also authored a book
“PRACTICAL APPLICATIONS OF SPEECH SIGNALS" published by LAP LAMBERT,
Germany. She has 42 citations for her publications with h index of 2 with top h cited research
publication titled “Speaker Independent Digit Recognition System “(18 citations) and RG
score of 1.29. She is reviewer for many IEEE International Journals. She was Session Chair for
many International and National Conferences. She is an Editorial Board member of Science
Publishing Group, USA. She is a Life Member of CSI and ISTE professional bodies.