{"title":"The Method of Probabilistic Nodes Combination in Handwritten Character Reconstruction","authors":"D. Jakóbczak","doi":"10.47363/jaicc/2022(1)105","DOIUrl":"https://doi.org/10.47363/jaicc/2022(1)105","url":null,"abstract":"Proposed method, called Probabilistic Nodes Combination (PNC), is the method of 2D curve modeling and handwriting identification by using the set of key points. Nodes are treated as characteristic points of signature or handwriting for modeling and writer recognition. Identification of handwritten letters or symbols need modeling and the model of each individual symbol or character is built by a choice of probability distribution function and nodes combination. PNC modeling via nodes combination and parameter γ as probability distribution function enables curve parameterization and interpolation for each specific letter or symbol. Two-dimensional curve is modeled and interpolated via nodes combination and different functions as continuous probability distribution functions: polynomial, sine, cosine, tangent, cotangent, logarithm, exponent, arc sin, arc cos, arc tan, arc cot or power function.","PeriodicalId":407351,"journal":{"name":"Journal of Artificial Intelligence & Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130837912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Computing – An Overview","authors":"V. Velmurugan","doi":"10.47363/jaicc/2022(1)106","DOIUrl":"https://doi.org/10.47363/jaicc/2022(1)106","url":null,"abstract":"Distributed computing has grown up since Amazon's rollout of the first of its sort of cloud benefits in 2006. It is especially important to Hong Kong as a result of the gigantic measures of information that are being handled here day by day in different divisions, and there are signs that membership to cloud benefits by the nearby organizations will soon be on a skyrocket course, regardless of a moderate begin in earlier years. The expression \"distributed computing\" is a current trendy expression in the IT world. Behind this favor idyllic expression there lays a genuine photo without bounds of processing for both in specialized viewpoint and social point of view. Despite the fact that the expression \"Distributed computing\" is later however concentrating calculation and capacity in circulated server farms kept up by outsider organizations isn't new yet it returned in path in 1990s alongside dispersed registering approaches like framework processing. Distributed computing is gone for giving IT as a support of the cloud client’s on-request premise with more prominent flexibility, accessibility, dependability and adaptability with utility registering model.","PeriodicalId":407351,"journal":{"name":"Journal of Artificial Intelligence & Cloud Computing","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134409009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber-Security in Nigeria. A Case Study of Surveillance and Prevention of Digital Crime by Lorliam. A Review beyond Mere Digital Surveillance","authors":"J. Nwankwo","doi":"10.47363/jaicc/2022(1)104","DOIUrl":"https://doi.org/10.47363/jaicc/2022(1)104","url":null,"abstract":"This article explores the technological sophistication associated with cyber related crimes and how it has significantly raked in trillions for the actors involved. This is a review of Lorliam’s stance on digital surveillance software. Comparative arguments are presented as to the Nigerian, African, US and European postulations as to these cyber related crimes. Statistics shows the shift in cyber-attack trends from the usual spamming to the use of ransomewares and cloud. This article entails a presentation of new perspectives to cyber-crime activities and argues in favor of its recognition as a stand-alone economy with state actors as supports.","PeriodicalId":407351,"journal":{"name":"Journal of Artificial Intelligence & Cloud Computing","volume":"15 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131957499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial Intelligence in Healthcare and Biotechnology: A Review of the Saudi Experience","authors":"Fatema Dabdoub, Margaretta Colangelo, M. AlJumah","doi":"10.47363/jaicc/2022(1)107","DOIUrl":"https://doi.org/10.47363/jaicc/2022(1)107","url":null,"abstract":"Whether in analyzing laboratory and imaging results, devising vaccination plans in a pandemic, or predicting patient prognosis, artificial intelligence [AI] was shown to be an indispensable tool in the field of healthcare. Saudi Arabia is no stranger to the many benefits of AI in medicine. In this paper, we expand on the past, ongoing, and future applications of AI in the Saudi healthcare sector.","PeriodicalId":407351,"journal":{"name":"Journal of Artificial Intelligence & Cloud Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121965265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reduce the Effort and Time in Calculating the Absenteeism Percentage of Students","authors":"M. B. H. Aga, Luay Abdulwahid Shihab","doi":"10.47363/jaicc/2022(1)103","DOIUrl":"https://doi.org/10.47363/jaicc/2022(1)103","url":null,"abstract":"This study started from some of the problems that took from our institution a lot of time to solve, this study included two parts, and the first part is Image discrimination problems are usually difficult to solve using unprocessed data. To improve the discrimination process Characteristic extraction is often needed to represent data in a space of distinction. Pattern recognition aims to find or recognize specific patterns or structures in digital images (signal). To identify a pattern or an object in an image, you must first obtaining direct preliminary and statistical information about the image that must be digital in order to be able to deal with it by computer. The information in the image must also be classified to facilitate subsequent operations on the image, such as Debriefing The second part is to calculate the absences of students with an electronic system based on two languages where VB.Net language was adopted to accomplish the program interfaces in addition to the special code to find the percentage of absences, SQL was adopted for the purpose of creating a database in the program and storing data. The process of finding a mechanism to link the VB.Net program with the Internet for sending an e-mail message to the person concerned with the program (the student) for informing the percentage of absences in the study materials when exceeded the ratio approved in the program. The program has also been linked to a local network to be used on more than one computer at the same time and on a single database.","PeriodicalId":407351,"journal":{"name":"Journal of Artificial Intelligence & Cloud Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124624494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physical Universe as Mathematical Machine","authors":"B. Erdeni","doi":"10.47363/jaicc/2022(1)102","DOIUrl":"https://doi.org/10.47363/jaicc/2022(1)102","url":null,"abstract":"This is an introduction to the absolute geometry of space, time and matter which automatically leads to the superunified field theory.","PeriodicalId":407351,"journal":{"name":"Journal of Artificial Intelligence & Cloud Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121833556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}