{"title":"Artificial Intelligence (AI): What are the Impacts for Medicine?","authors":"Doepp Manfred","doi":"10.47363/jaicc/2023(2)117","DOIUrl":"https://doi.org/10.47363/jaicc/2023(2)117","url":null,"abstract":"AI is our destiny, no one can prevent it anymore, just as it was with the Industrial Revolution of about 200 years ago or the introduction of computers a few decades ago. Nevertheless, there are many warning voices not to allow its eventual domination over humanity and its abuse. This issue also arises in medicine, where AI is in many ways superior to physicians. This concerns their extreme memory for information, their speed, their flexibility, and their ability to combine information. What can medicine do? Medical personnel should extend the qualities that are unique to humans: caring, empathy, intuition, inspiration, and above all, love. Those who have a narrowed consciousness and can be manipulated will be replaced by AI. Those who have a wide and open consciousness can become partners of the AI. This, by the way, concerns the whole humanity, whose division into these two groups is going on at present. The establishment of the AI is thus an immense but necessary challenge for all of us.","PeriodicalId":407351,"journal":{"name":"Journal of Artificial Intelligence & Cloud Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133577937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Logic of Nature Seen in Particle Properties, in the Rise of the Universe and Consequences for the Structure of Complex Systems","authors":"H. Morsch","doi":"10.47363/jaicc/2023(2)113","DOIUrl":"https://doi.org/10.47363/jaicc/2023(2)113","url":null,"abstract":"To push realistic learning processes and simulations to extremes far beyond present artificial intelligence, they must be conform with nature and have to follow mathematical logic. To see in full strength the logic structure of nature, the study of basic systems - as hadrons and leptons - is best suited, because ambiguities due a large complexity are reduced to a minimum. To describe such systems, a new quantum theory has been derived recently, in which in addition to the usual treatment of fermions bosons are considered also to fulfill energy and momentum conservation explicitly. With negative binding energies of fermions and positive ones of bosons, the total energy is zero, giving rise to a quantitative description of hadron and lepton properties with uncertainties < 1/1000. In addition, this formalism provides a mechanism, by which particles could be created out of the vacuum, indicating that the universe emerged out of nothing (the vacuum). This leads finally to a realistic view of the cosmic evolution. Further, the present theory can be taken as basis for the description of complex systems in gravity, heavy atoms, molecules, materials and even biological structures.","PeriodicalId":407351,"journal":{"name":"Journal of Artificial Intelligence & Cloud Computing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114778665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Re-imagining Debt Recovery Process with Conversational AI","authors":"Saibal Samaddar, Tanushree Halder","doi":"10.47363/jaicc/2023(2)111","DOIUrl":"https://doi.org/10.47363/jaicc/2023(2)111","url":null,"abstract":"","PeriodicalId":407351,"journal":{"name":"Journal of Artificial Intelligence & Cloud Computing","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124067444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reduction between Aristotelian Modal Syllogisms Based on the Syllogism ◊I�A◊I-3","authors":"Cheng Zhang, Xiaojun Zhang","doi":"10.47363/jaicc/2023(2)112","DOIUrl":"https://doi.org/10.47363/jaicc/2023(2)112","url":null,"abstract":"In order to provide a consistent explanation for Aristotelian modal syllogistic, this paper reveals the reductions between the Aristotelian modal syllogism ◊I�A◊I-3 and the other valid modal syllogisms. Specifically, on the basis of formalizing Aristotelian modal syllogisms, this paper proves the validity of ◊I�A◊I-3 by means of the truth value definition of (modal) categorical propositions. Then in line with the symmetry of Aristotelian quantifiers some and no, the definition of inner and outer negations of Aristotelian quantifiers, and some rules in classical propositional logic, this paper deduces the other 47 valid Aristotelian modal syllogisms from the modal syllogism ◊I�A◊I-3. The reason why these syllogisms are reducible is that: (1) any of Aristotelian quantifier can be defined by the other three Aristotelian quantifiers; (2) the Aristotelian quantifiers some and no have symmetry; (3) the possible modality ◊ and necessary modality £ can be mutually defined. This formal study of Aristotelian modal syllogistic not only conforms to the needs of formalization transformation of various information in the era of artificial intelligence, but also provides a unified mathematical research paradigm for other kinds of syllogistic.","PeriodicalId":407351,"journal":{"name":"Journal of Artificial Intelligence & Cloud Computing","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126740640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prediction of Heart Disease Using Voted Perceptron","authors":"Safia Naveed S","doi":"10.47363/jaicc/2022(1)110","DOIUrl":"https://doi.org/10.47363/jaicc/2022(1)110","url":null,"abstract":"Heart Disease is the most dominating disease which is taking a large number of deaths every year. A report from WHO in 2016 portrayed that every year at least 17 million people die of heart disease. This number is gradually increasing day by day and WHO estimated that this death toll will reach the summit of 75 million by 2030. Despite having modern technology and health care system predicting heart disease is still beyond limitations. As the Machine Learning algorithm is a vital source predicting data from available data sets we have used a machine learning approach to predict heart disease. We have collected data from the UCI repository. In our study, we have used Random Forest, Zero R, Voted Perceptron, K star classifier. We have got the best result through the Random Forest classifier with an accuracy of 97.69.","PeriodicalId":407351,"journal":{"name":"Journal of Artificial Intelligence & Cloud Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122782562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rules-based Expert System to Assist Physicians in Pre-laboratory Screening for the Diagnosis of Pulmonary Tuberculosis Disease in Rural Areas","authors":"Humberto Cuteso Matumueni","doi":"10.47363/jaicc/2022(1)108","DOIUrl":"https://doi.org/10.47363/jaicc/2022(1)108","url":null,"abstract":"Worldwide more than 1.5 to 2 million deaths from tuberculosis occur each year. Healthcare professionals face many challenges in delivering good healthcare with unattended automation in hospitals where multiple patients require physician attention. The expert system we have built is designed to help medical experts in the process of pre-laboratory screening for pulmonary tuberculosis. The architecture consists of a rule base, a patient knowledge base. These units interact with the inference engine, which receives patient data through a user interface. The result of the usability rating reveals that the system has a usability rating of 5.6 on a scale of 1-7. This is an indication of above average system performance. Our Tuberculosis Diagnosis Expert System is an effective solution for implementing a rule-based expert system designed with Exsys Corvid.","PeriodicalId":407351,"journal":{"name":"Journal of Artificial Intelligence & Cloud Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129713561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward an Appropriate Approach for Intelligent Intrusion and Detection Systems","authors":"C. Leghris, Ouafae Elaeraj","doi":"10.47363/jaicc/2022(1)109","DOIUrl":"https://doi.org/10.47363/jaicc/2022(1)109","url":null,"abstract":"Now a days, the company’s information security become among a main priority. Indeed, the more the attack force on the network develops, the more it is necessary to develop the security and the network surveillance. The data is to be exchanged between the internal company network and the outside one such as Internet. It is therefore necessary to be protected against malicious intrusions into the company's network, but also to monitor the traffic inside the network in order to prevent possible internal attacks. Currently, security and reliability have become the major concerns of an individual or organization. A rule-based intrusion detection system (IDS) called Snort is an open-source software used as a network protection tool that can only detect recognized attacks. In order to detect advanced network attacks and detect fraudulent network traffic, this research paper proposes an advanced and more intelligent approach by applying machine learning. To find the best algorithm to use with Snort to improve its detection, the support vector machine (SVM) was chosen based on its accuracy. The proposed system has produced efficient detection rates versus other proposed approaches in the security intrusions detection field.","PeriodicalId":407351,"journal":{"name":"Journal of Artificial Intelligence & Cloud Computing","volume":"2007 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129595897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Method of Probabilistic Nodes Combination in Handwritten Character Reconstruction","authors":"D. Jakóbczak","doi":"10.47363/jaicc/2022(1)105","DOIUrl":"https://doi.org/10.47363/jaicc/2022(1)105","url":null,"abstract":"Proposed method, called Probabilistic Nodes Combination (PNC), is the method of 2D curve modeling and handwriting identification by using the set of key points. Nodes are treated as characteristic points of signature or handwriting for modeling and writer recognition. Identification of handwritten letters or symbols need modeling and the model of each individual symbol or character is built by a choice of probability distribution function and nodes combination. PNC modeling via nodes combination and parameter γ as probability distribution function enables curve parameterization and interpolation for each specific letter or symbol. Two-dimensional curve is modeled and interpolated via nodes combination and different functions as continuous probability distribution functions: polynomial, sine, cosine, tangent, cotangent, logarithm, exponent, arc sin, arc cos, arc tan, arc cot or power function.","PeriodicalId":407351,"journal":{"name":"Journal of Artificial Intelligence & Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130837912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Computing – An Overview","authors":"V. Velmurugan","doi":"10.47363/jaicc/2022(1)106","DOIUrl":"https://doi.org/10.47363/jaicc/2022(1)106","url":null,"abstract":"Distributed computing has grown up since Amazon's rollout of the first of its sort of cloud benefits in 2006. It is especially important to Hong Kong as a result of the gigantic measures of information that are being handled here day by day in different divisions, and there are signs that membership to cloud benefits by the nearby organizations will soon be on a skyrocket course, regardless of a moderate begin in earlier years. The expression \"distributed computing\" is a current trendy expression in the IT world. Behind this favor idyllic expression there lays a genuine photo without bounds of processing for both in specialized viewpoint and social point of view. Despite the fact that the expression \"Distributed computing\" is later however concentrating calculation and capacity in circulated server farms kept up by outsider organizations isn't new yet it returned in path in 1990s alongside dispersed registering approaches like framework processing. Distributed computing is gone for giving IT as a support of the cloud client’s on-request premise with more prominent flexibility, accessibility, dependability and adaptability with utility registering model.","PeriodicalId":407351,"journal":{"name":"Journal of Artificial Intelligence & Cloud Computing","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134409009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber-Security in Nigeria. A Case Study of Surveillance and Prevention of Digital Crime by Lorliam. A Review beyond Mere Digital Surveillance","authors":"J. Nwankwo","doi":"10.47363/jaicc/2022(1)104","DOIUrl":"https://doi.org/10.47363/jaicc/2022(1)104","url":null,"abstract":"This article explores the technological sophistication associated with cyber related crimes and how it has significantly raked in trillions for the actors involved. This is a review of Lorliam’s stance on digital surveillance software. Comparative arguments are presented as to the Nigerian, African, US and European postulations as to these cyber related crimes. Statistics shows the shift in cyber-attack trends from the usual spamming to the use of ransomewares and cloud. This article entails a presentation of new perspectives to cyber-crime activities and argues in favor of its recognition as a stand-alone economy with state actors as supports.","PeriodicalId":407351,"journal":{"name":"Journal of Artificial Intelligence & Cloud Computing","volume":"15 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131957499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}