{"title":"Deep Learning Model for Early Weed Detection in Agriculture Application","authors":"A. Salamai, Nouran Ajabnoor, Ali Mohammad Khawaji","doi":"10.54216/ijaaci.020103","DOIUrl":"https://doi.org/10.54216/ijaaci.020103","url":null,"abstract":"One of the current issues in agriculture is the lack of mechanized weed management, which is why weed detection technologies are so crucial. Detecting weeds is useful because it may lead to the elimination of pesticide usage, which in turn improves the surroundings, human health, and the sustainability of agriculture. As novel algorithms are developed and computer capacity increases, deep learning-based approaches are gradually replacing classic machine learning methods for real-time weed detection. Mixed machine learning designs, which combine the best features of existing approaches, are becoming more popular. So, the goal of this study, present the CNN model for early weed detection. The CNN model is applied to the weed dataset. The CNN model achieved 96% accuracy.","PeriodicalId":166689,"journal":{"name":"International Journal of Advances in Applied Computational Intelligence","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128323059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Natural Language Generation and Creative Writing A Systematic Review","authors":"Abdulla M. Alsharhan","doi":"10.54216/ijaaci.010105","DOIUrl":"https://doi.org/10.54216/ijaaci.010105","url":null,"abstract":"Among studies on natural language generation (NLG), computational creativity, and human-computer interaction; there is a vision of witnessing these tools collaborating with humans in generating and authoring creative content. This study aims to systematically review published studies discussing creative writing and story generation during the period of 2016-2021. This work seeks to identify the primary research methods used in NLG and creative writing studies, to locate how these studies are distributed geographically, and finally, to classify the subfields or common keywords primarily used in NLG involving creative writing. The findings suggest that experiment studies and problem-solving were the most common research methods in NLG and creative writing. Major identified themes in the reviewed articles include story generation, language models, and co-creativity, along with some gaps in foreign language translation and humour generation studies. The majority of the studies suggest that NLG tasks had a positive impact on creative writing. Common tasks related to NLG and creative writing are typically using keywords such as story generation, co-creativity, co-writing, user interface and writing tools. In future work, we aim to explore more GPT-3 capabilities in creative writing, in addition to creative writing applications in foreign language translation tasks.","PeriodicalId":166689,"journal":{"name":"International Journal of Advances in Applied Computational Intelligence","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127945075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ranking and Evaluation Risks of Human Error Factors in Uncertain and Imprecision Information","authors":"Shimaa S. Mohamed, A. Abdel-Monem","doi":"10.54216/ijaaci.030103","DOIUrl":"https://doi.org/10.54216/ijaaci.030103","url":null,"abstract":"Reasons for Human Error, the term risk is used to describe the many potential causes of human mistakes. Capabilities, organizational culture, job complexity, and environmental variables are just a few of the many aspects that fall under this category. Accidents, improvements in safety, and gains in productivity may all benefit from a better understanding of and approach to minimizing human error. This paper highlights the necessity for comprehensive methods and actions to limit the effect of human error by providing an overview of the primary human error components and their implications for risk management. Due to various criteria, the concept of multi-criteria decision-making (MCDM) is used to deal with various criteria. This paper used the MCDM tools to rank and evaluate the risks of human error factors. The DEMATEL method is a MCDM tool is used to compute the weights of these factors and rank the risks. The DEMATEL method is integrated with the neutrosophic set to deal with uncertain information. This paper used the single-valued neutrosophic set with three values (truth, indeterminacy, and falsity) values. The twenty risks are identified in this paper and ranked.","PeriodicalId":166689,"journal":{"name":"International Journal of Advances in Applied Computational Intelligence","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126496291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interval Valued Neutrosophic VIKOR Method for Assessment Green Suppliers in Supply Chain","authors":"Shereen .., M. .., Mahmoud M. Ismail","doi":"10.54216/ijaaci.020102","DOIUrl":"https://doi.org/10.54216/ijaaci.020102","url":null,"abstract":"In order to remain competitive, businesses must now invest in developing environmentally responsible green suppliers. The purpose of this article is to determine which vendors should be incorporated into green supplier growth programs in order to enhance their ecological sustainability, as well as the suppliers' current greenenvironmental efficiency. Factor evaluation was used to examine the reliability of the parameters used to assess green suppliers' efficiency and overall quality. To determine which provider offers the greatest ecological performance, the suggested technique uses a hybrid interval-valued neutrosophic set (IVNS) and VIKOR structure to assign relative importance to each criterion. To manage ambiguity while choosing choices, we combine the neutrosophic method with the VIKOR technique. We used 10 criteria and ten vendors in this research to demonstrate the usefulness and effectiveness of the suggested framework. The suggested methodology is applied in the application.","PeriodicalId":166689,"journal":{"name":"International Journal of Advances in Applied Computational Intelligence","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124835806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rose Aljanada, Ghadeer W. Abukhalil, Aseel M. Alfaisal, Raghad M. Alfaisal
{"title":"Adoption of Google Glass technology: PLS-SEM and machine learning analysis","authors":"Rose Aljanada, Ghadeer W. Abukhalil, Aseel M. Alfaisal, Raghad M. Alfaisal","doi":"10.54216/ijaaci.010101","DOIUrl":"https://doi.org/10.54216/ijaaci.010101","url":null,"abstract":"This inclination is caused by the fact that the topic of technology incorporation has not received enough attention. The use of information and communication technology (ICT) like Google Glass has allowed instructors and students to engage in a technology-based educational setting because of the subsequent dramatic transformation. Yet, just a small number of schools and universities have started using Google Glass in their classrooms. This research aims to look at Google Glass adoption in the UAE. We reasoned those educating instructors and students about Google Glass's effective capabilities would help them make up their minds about adopting the device in classrooms. The layout of a framework that connects TAM with other influential factors is discussed in this study. To improve the interaction between instructors and learners in the classroom, this research explored the incorporation of the technology acceptance model (TAM) with the widely acknowledged potent features of the gadget, such as the teaching and learning mediator, Motivation, and trust and information privacy. 750 questionnaires from various universities were acquired in total. According to the student's survey data gathered, the research model was studied using partial least squares-structural equation modeling (PLS-SEM) and machine learning models. The findings showed a significant association between motivation, trust, and privacy, as well as perceived usefulness and perceived ease of use of Google Glass. Moreover, the adoption of Google Glass was substantially correlated with perceived usefulness and perceived ease of use. The perceived ease of use, trust, and privacy are all important factors in the adoption of Google Glass. These results' practical implications for subsequent research were also discussed.","PeriodicalId":166689,"journal":{"name":"International Journal of Advances in Applied Computational Intelligence","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124668771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Learning Defenders: Harnessing Convolutional Networks for Malware Detection","authors":"A. Abdelmonem, Shimaa S. Mohamed","doi":"10.54216/ijaaci.010203","DOIUrl":"https://doi.org/10.54216/ijaaci.010203","url":null,"abstract":"Malware attacks continue to pose a significant threat to computer systems and networks worldwide. Traditional signature-based malware detection methods have proven to be insufficient in detecting the increasing number of sophisticated malware variants. This has led to the exploration of new approaches, including machine learning-based techniques. In this paper, we propose a novel approach to malware detection using residually connect convolutional networks. We demonstrate the effectiveness of our approach by training CNN on a large dataset of malware samples and benign files and evaluating its performance on a separate test set. Extensive experiments on a public dataset of malware images demonstrated that our model could achieve high accuracy in detecting both known and unknown malware samples. The findings suggest that our residual convolution has great potential for improving malware detection and enhancing the security of computer systems and networks.","PeriodicalId":166689,"journal":{"name":"International Journal of Advances in Applied Computational Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128520051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Employees Motivational Factors toward Knowledge Sharing: A Systematic Review","authors":"H. ., Ahmed A. Khamees","doi":"10.54216/ijaaci.010104","DOIUrl":"https://doi.org/10.54216/ijaaci.010104","url":null,"abstract":"Knowledge sharing between employees in positions at different levels in the organization chart is always a big challenge. It is important to study the main factors that affects employees’ knowledge. A number of literature reviews that sheds the light on knowledge management (KM) was conducted, which focuse on the employee knowledge sharing motivations. However, analyzing the knowledge sharing among employees is still questioned and requires further examination. The main objective of this systematic review is to analyze the state-of-the-are KM studies that involved the factors that affect employees’ intention to share their tacit knowledge. In this systematic review, we explored the tacit knowledge sharing and reviewed 115 recent papers. After filtering and reviewing we extracted many factors, then we categorize them into twelve categories: (ordered by most frequent studied), namely: trusting environment, culture, organization encouragement, rewards, Information system, intrinsic motivations, equal opportunities, job security, the community of practice, time pressure, knowledge confidence and accuracy, and years of experience. This systematic review is important to organizations which seek to share, preserve tacit knowledge and experiences, and gain competitive edge.","PeriodicalId":166689,"journal":{"name":"International Journal of Advances in Applied Computational Intelligence","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116790382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Car Sharing Station Choice by using Interval Valued Neutrosophic WASPAS Method","authors":"A. Abdelaziz, Alia N. Mahmoud Nova","doi":"10.54216/ijaaci.020203","DOIUrl":"https://doi.org/10.54216/ijaaci.020203","url":null,"abstract":"Adding car-sharing to existing public transit options is a great idea. However, finding the right location for a car-sharing station is difficult. The car-sharing station choice has many conflicting criteria, so the multi-criteria decision-making idea is used to deal with various conflict criteria. The process of choosing a suitable car-sharing station is containing vague and imprecise information. So, the neutrosophic set (NS) is used to overcome this problem. This paper introduced a framework consisting of the weighted aggregated sum product assessment (WASPAS) method with the NS. The WASPAS is an MCDM method. The WASPAS is used to compute the importance of criteria and the importance of alternatives. The WASPAS is a hybrid with interval-valued neutrosophic sets (IVNS). The suggested framework is applied to select car-sharing stations. This paper can help decision-makers in selecting the location to install a car sharing station.","PeriodicalId":166689,"journal":{"name":"International Journal of Advances in Applied Computational Intelligence","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116929979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extreme Gradient Boosting (XGBoost) and Support Vector Machine (SVM) models for Hepatitis C Prediction","authors":"Alber Aziz, Haitham Rizk Fadlallah","doi":"10.54216/ijaaci.030202","DOIUrl":"https://doi.org/10.54216/ijaaci.030202","url":null,"abstract":"Hepatitis C Virus (HCV) is a worldwide epidemic. The World Health Organization estimates that annually between 3 and 4 million instances of HCV are recorded. People with HCV would benefit from knowing their illness stage earlier thanks to accurate and timely prognoses. Different noninvasive blood biochemical indicators and patient clinical data have been utilized to determine the disease phase. As a substitute for the invasive and sometimes harmful liver biopsy, machine learning approaches have shown useful in diagnosing each phase of this chronic liver disease. To accurately estimate HCV using sparse weather information, this work offers two machine learning (ML) methods: The Support Vector Machine (SVM) and a simple tree-based ensemble approach called Extreme Gradient Boosting (XGBoost). The two models are applied to real-world data on HCV. The dataset contains 13 variables and 615 cases. The results showed the SVM achieved more accuracy than the XGBoost. The SVM gets 93.5% accuracy and XGBoost gets 90.23% accuracy.","PeriodicalId":166689,"journal":{"name":"International Journal of Advances in Applied Computational Intelligence","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132794082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wind Turbine Prediction using Deep Learning and Long Short Term Memory (LSTM)","authors":"Myvizhi. M., A. Abdel-Monem","doi":"10.54216/ijaaci.030205","DOIUrl":"https://doi.org/10.54216/ijaaci.030205","url":null,"abstract":"Accurate forecasting is essential for the long-term success of adding wind energy to the national power system. In this study, we look at forecasting wind turbine using a LSTM deep learning model. To forecast potential outcomes for a time series, it is sufficient to initially obtain pertinent details from past data. While many methods struggle with understanding the long-term dependencies encoded in data sets, LSTM options, an instance of the strategy in deep learning, show potential for efficiently overcoming this challenge. An overview of LSTM's architecture and forward propagation method is provided initially. LSTM network is applied to the wind turbine prediction dataset. This dataset has 9 features and 6575 records. There are four performance matrices used to test the model. The four matrices are mean squared error (MSE), mean absolute error (MAE), mean absolute percentage error (MAPE), and root mean squared error (RMSE). MAPE obtained the least error.","PeriodicalId":166689,"journal":{"name":"International Journal of Advances in Applied Computational Intelligence","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134369678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}