Kurdistan Region
Syrian army moves east of Aleppo after Kurdish forces withdraw
The Syrian army is moving into areas east of Aleppo city, after Kurdish forces started a withdrawal. Syrian troops have been spotted entering Deir Hafer, a town about 50km (30 miles) from Aleppo. On Friday, the Kurdish Syrian Democratic Forces (SDF) militia announced it would redeploy east of the Euphrates river. This follows talks with US officials, and a pledge from Syrian President Ahmed al-Sharaa to make Kurdish a national language. After deadly clashes last week, the US urged both sides to avoid a confrontation.
- North America > United States (1.00)
- Asia > Middle East > Syria > Aleppo Governorate > Aleppo (0.51)
- North America > Central America (0.15)
- (20 more...)
- Government > Regional Government > North America Government > United States Government (1.00)
- Government > Regional Government > Asia Government > Middle East Government > Syria Government (1.00)
- Government > Military (1.00)
KurdSTS: The Kurdish Semantic Textual Similarity
Abdullah, Abdulhady Abas, Veisi, Hadi, Al, Hussein M.
Semantic Textual Similarity measures the degree of equivalence between the two texts and is important in many Natural Language Processing tasks. While extensive resources have been developed for high - resource languages, unfortunately, low - resource languages, for example, Kurdish, have been neglected. In this paper, the first STS dataset for K urdish has been introduced, which aims to alleviate this gap. This dataset contains 10,000 formal and informal sentence pairs annotated for similarity. To this end, aft er benchmarking several models, such as Sentence Bidirectional Encoder Representations from Transformers (Sentence - BERT) and multilingual Bidirectional Encoder Representations from Transformers (multilingual BERT), among others, which achieved promising results while also showcasing the difficulties presented by the distinctive nature of Kurdish. This work paves the way for future studies in Kurdish semantic research and Natural Language Processing in general for other low - resource languages.
- Asia > Middle East > Iraq > Kurdistan Region (0.14)
- North America > United States > New York (0.04)
- Europe > Switzerland > Basel-City > Basel (0.04)
- (7 more...)
Named Entity Recognition for the Kurdish Sorani Language: Dataset Creation and Comparative Analysis
Abdalla, Bakhtawar, Nabi, Rebwar Mala, Eshkiki, Hassan, Caraffini, Fabio
This work contributes towards balancing the inclusivity and global applicability of natural language processing techniques by proposing the first 'name entity recognition' dataset for Kurdish Sorani, a low-resource and under-represented language, that consists of 64,563 annotated tokens. It also provides a tool for facilitating this task in this and many other languages and performs a thorough comparative analysis, including classic machine learning models and neural systems. The results obtained challenge established assumptions about the advantage of neural approaches within the context of NLP. Conventional methods, in particular CRF, obtain F1-scores of 0.825, outperforming the results of BiLSTM-based models (0.706) significantly. These findings indicate that simpler and more computationally efficient classical frameworks can outperform neural architectures in low-resource settings.
- Asia > Middle East > Iraq > Kurdistan Region (0.14)
- Europe > United Kingdom (0.04)
- Europe > Netherlands (0.04)
- Asia > Indonesia > Bali (0.04)
VLA-Pruner: Temporal-Aware Dual-Level Visual Token Pruning for Efficient Vision-Language-Action Inference
Liu, Ziyan, Chen, Yeqiu, Cai, Hongyi, Lin, Tao, Yang, Shuo, Liu, Zheng, Zhao, Bo
Vision-Language-Action (VLA) models have shown great promise for embodied AI, yet the heavy computational cost of processing continuous visual streams severely limits their real-time deployment. T oken pruning--keeping salient visual tokens and dropping redundant ones--has emerged as an effective approach for accelerating Vision-Language Models (VLMs), offering a solution for efficient VLA. However, these VLM-specific token pruning methods select tokens based solely on semantic salience metrics (e.g., prefill attention), while overlooking the VLA's intrinsic dual-system nature of high-level semantic understanding and low-level action execution. Consequently, these methods bias token retention toward semantic cues, discard critical information for action generation, and significantly degrade VLA performance. T o bridge this gap, we propose VLA-Pruner, a versatile plug-and-play VLA-specific token prune method that aligns with the dual-system nature of VLA models and exploits the temporal continuity in robot manipulation. Specifically, VLA-Pruner adopts a dual-level importance criterion for visual token retention: vision-language prefill attention for semantic-level relevance and action decode attention, estimated via temporal smoothing, for action-level importance. Based on this criterion, VLA-Pruner proposes a novel dual-level token selection strategy that adaptively preserves a compact, informative set of visual tokens for both semantic understanding and action execution under given compute budget. Experiments show that VLA-Pruner achieves state-of-the-art performance across multiple VLA architectures and diverse robotic tasks.
- North America > Trinidad and Tobago > Trinidad > Arima > Arima (0.04)
- Asia > Middle East > Iraq > Kurdistan Region (0.04)
- Asia > China > Shanghai > Shanghai (0.04)
- (2 more...)
Evolution of meta's llama models and parameter-efficient fine-tuning of large language models: a survey
Abdullah, Abdulhady Abas, Zubiaga, Arkaitz, Mirjalili, Seyedali, Gandomi, Amir H., Daneshfar, Fatemeh, Amini, Mohammadsadra, Mohammed, Alan Salam, Veisi, Hadi
This review surveys the rapid evolution of Meta AI's LLaMA (Large Language Model Meta AI) series - from LLaMA 1 through LLaMA 4 and the specialized parameter-efficient fine-tuning (PEFT) methods developed for these models. We first describe the LLaMA family of foundation models (7B-65B to 288B parameters), their architectures (including native multimodal and Mixtureof-Experts variants), and key performance characteristics. We then describe and discuss the concept of PEFT, which adapts large pre-trained models by updating only a small subset of parameters, and review five PEFT methods that have been applied to LLaMA: LoRA (Low-Rank Adaptation), LLaMA-Adapter V1 and V2, LLaMA-Excitor, and QLoRA (Quantized LoRA). We discuss each method's mechanism, parameter savings, and example application to LLaMA (e.g., instruction tuning, multimodal tasks). We provide structured discussion and analysis of model and adapter architectures, parameter counts, and benchmark results (including examples where fine-tuned LLaMA models outperform larger baselines). Finally, we examine real-world use cases where LLaMA-based models and PEFT have been successfully applied (e.g., legal and medical domains), and we discuss ongoing challenges and future research directions (such as scaling to even larger contexts and improving robustness). This survey paper provides a one-stop resource for ML researchers and practitioners interested in LLaMA models and efficient fine-tuning strategies.
- Asia > Middle East > Iraq > Kurdistan Region (0.04)
- Oceania > Australia (0.04)
- North America > United States > Virginia (0.04)
- (2 more...)
- Overview (1.00)
- Research Report > Promising Solution (0.67)
- Law > Statutes (1.00)
- Law > Business Law (1.00)
- Information Technology > Security & Privacy (1.00)
- (5 more...)
- Information Technology > Artificial Intelligence > Natural Language > Large Language Model (1.00)
- Information Technology > Artificial Intelligence > Natural Language > Chatbot (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (1.00)
- Information Technology > Artificial Intelligence > Cognitive Science > Problem Solving (1.00)
From Dialect Gaps to Identity Maps: Tackling Variability in Speaker Verification
Abdullah, Abdulhady Abas, Badawi, Soran, Abdullah, Dana A., Hamad, Dana Rasul
The complexity and difficulties of Kurdish speaker detection among its several dialects are investigated in this work. Because of its great phonetic and lexical differences, Kurdish with several dialects including Kurmanji, Sorani, and Hawrami offers special challenges for speaker recognition systems. The main difficulties in building a strong speaker identification system capable of precisely identifying speakers across several dialects are investigated in this work. To raise the accuracy and dependability of these systems, it also suggests solutions like sophisticated machine learning approaches, data augmentation tactics, and the building of thorough dialect-specific corpus. The results show that customized strategies for every dialect together with cross-dialect training greatly enhance recognition performance.
- Asia > Middle East > Republic of Türkiye (0.05)
- Asia > Middle East > Syria (0.05)
- Asia > Middle East > Iraq > Erbil Governorate > Erbil (0.04)
- (3 more...)
- Government (0.68)
- Information Technology (0.67)
- Information Technology > Artificial Intelligence > Speech > Speech Recognition (1.00)
- Information Technology > Artificial Intelligence > Speech > Acoustic Processing (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Statistical Learning (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (1.00)
Innovative Deep Learning Architecture for Enhanced Altered Fingerprint Recognition
Abdullah, Dana A, Hamad, Dana Rasul, Ibrahim, Bishar Rasheed, Aula, Sirwan Abdulwahid, Ameen, Aso Khaleel, Hamadamin, Sabat Salih
Altered fingerprint recognition (AFR) is challenging for biometric verification in applications such as border control, forensics, and fiscal admission. Adversaries can deliberately modify ridge patterns to evade detection, so robust recognition of altered prints is essential. We present DeepAFRNet, a deep learning recognition model that matches and recognizes distorted fingerprint samples. The approach uses a VGG16 backbone to extract high-dimensional features and cosine similarity to compare embeddings. We evaluate on the SOCOFing Real-Altered subset with three difficulty levels (Easy, Medium, Hard). With strict thresholds, DeepAFRNet achieves accuracies of 96.7 percent, 98.76 percent, and 99.54 percent for the three levels. A threshold-sensitivity study shows that relaxing the threshold from 0.92 to 0.72 sharply degrades accuracy to 7.86 percent, 27.05 percent, and 29.51 percent, underscoring the importance of threshold selection in biometric systems. By using real altered samples and reporting per-level metrics, DeepAFRNet addresses limitations of prior work based on synthetic alterations or limited verification protocols, and indicates readiness for real-world deployments where both security and recognition resilience are critical.
- Asia > Middle East > Iraq > Kurdistan Region > Duhok Governorate > Duhok (0.04)
- Asia > Middle East > Iraq > Erbil Governorate > Erbil (0.04)
- North America > United States > Texas (0.04)
- (7 more...)
- Research Report > New Finding (0.93)
- Research Report > Experimental Study (0.68)
KuBERT: Central Kurdish BERT Model and Its Application for Sentiment Analysis
Awlla, Kozhin muhealddin, Veisi, Hadi, Abdullah, Abdulhady Abas
This paper enhances the study of sentiment analysis for the Central Kurdish language by integrating the Bidirectional Encoder Representations from Transformers (BERT) into Natural Language Processing techniques. Kurdish is a low - resourced language, having a high level of linguistic diversity with minimal computational resources, making sentiment analysis somewhat challenging. Earlier, this was done using a traditional w ord embedding model, such as Word2Vec, but with the emergence of new language models, specifically BERT, there is hope for improvements. The better word embedding capabilities of BERT lend to this study, aiding in the capturing of the nuanced semantic pool and the contextual intricacies of the language under study, the Kurdish language, thus setting a new benchmark for sentiment analysis in low - resource languages. The steps include collecting and normalizing a large corpus of Kurdish texts, pretraining BERT with a special tokenizer for Kurdish, and developing different models for sentiment analysis including Bidirectional Long Short - Term Memory ( BiLSTM), Multi - L ayer Perceptron ( MLP), and finetuning the BERT classifier . The proposed approach consists of 3 cla sses: positive, negative, and neutral sentiment analysis using a sentiment embedding of BERT in four different configurations. The accuracy of the best - performing classifier, BiLSTM, is 74.09%. For the BERT with an MLP classifier model, the maximum accuracy achieved is 73.96%, while the fine - tuned BERT model tops the others with 75.37% accuracy. Additionally, the fine - tuned BERT model demonstrates a vast improvement when focused on t wo 2 - class sentiment analyses positive and negative with an accuracy of 86.
- Asia > Middle East > Iraq > Kurdistan Region (0.14)
- Asia > China (0.14)
- Asia > Middle East > Syria (0.14)
- (4 more...)
- Media (0.68)
- Information Technology (0.46)
- Information Technology > Artificial Intelligence > Natural Language > Information Extraction (1.00)
- Information Technology > Artificial Intelligence > Natural Language > Discourse & Dialogue (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (1.00)
Credit Card Fraud Detection
Popova, Iva, Gardi, Hamza A. A.
Iva Popova Hamza A. A. Gardi ETIT - KIT, Germany IIIT at ETIT - KIT, Germany Abstract Credit card fraud remains a significant challenge due to class imbalance and fraudsters mimicking legitimate behavior. This study evaluates five machine learning models - Logistic Regression, Random Forest, XGBoost, K - Nearest Neighbors (KNN), and Multi - Lay er Perceptron (MLP) on a real - world dataset using undersampling, SMOTE, and a hybrid approach. Our models are evaluated on the original imbalanced test set to better reflect real - world performance. Results show that the hybrid method achieves the best bala nce between recall and precision, especially improving MLP and KNN performance. I ntroduction Financial fraud is a significant issue that has been continuously increasing over the past few years due to the ever - growing volume of online transactions conduc ted with credit cards. Credit card fraud (CCF) refers to a type of fraud in which an individual other than the cardholder unlawfully conducts transactions using a card that is stolen, lost, or otherwise misused [ 1 ]. CCF has resulted in billions of dollars in losses for banks and other online payment platforms. According to the Federal Trade Commission (FTC), there were 449,076 reports of CCF in 2024, representing a 7.8% increase from the previous year [ 2 ]. Given this trend, new methods must be employed to c apture patterns and dependencies in the data.
- Europe > Germany (0.44)
- Asia > Middle East > Iraq > Wasit Governorate (0.04)
- Asia > Middle East > Iraq > Kurdistan Region > Duhok Governorate > Duhok (0.04)
- Law Enforcement & Public Safety > Fraud (1.00)
- Information Technology (1.00)
Prediction, Generation of WWTPs microbiome community structures and Clustering of WWTPs various feature attributes using DE-BP model, SiTime-GAN model and DPNG-EPMC ensemble clustering algorithm with modulation of microbial ecosystem health
Dai, Mingzhi, Cai, Weiwei, Feng, Xiang, Yu, Huiqun, Guo, Weibin, Guo, Miao
Microbiomes not only underpin Earth's biogeochemical cycles but also play crucial roles in both engineered and natural ecosystems, such as the soil, wastewater treatment, and the human gut. However, microbiome engineering faces significant obstacles to surmount to deliver the desired improvements in microbiome control. Here, we use the backpropagation neural network (BPNN), optimized through differential evolution (DE-BP), to predict the microbial composition of activated sludge (AS) systems collected from wastewater treatment plants (WWTPs) located worldwide. Furthermore, we introduce a novel clustering algorithm termed Directional Position Nonlinear Emotional Preference Migration Behavior Clustering (DPNG-EPMC). This method is applied to conduct a clustering analysis of WWTPs across various feature attributes. Finally, we employ the Similar Time Generative Adversarial Networks (SiTime-GAN), to synthesize novel microbial compositions and feature attributes data. As a result, we demonstrate that the DE-BP model can provide superior predictions of the microbial composition. Additionally, we show that the DPNG-EPMC can be applied to the analysis of WWTPs under various feature attributes. Finally, we demonstrate that the SiTime-GAN model can generate valuable incremental synthetic data. Our results, obtained through predicting the microbial community and conducting analysis of WWTPs under various feature attributes, develop an understanding of the factors influencing AS communities.
- Information Technology > Artificial Intelligence > Machine Learning > Evolutionary Systems (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Statistical Learning > Clustering (0.66)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (0.46)