Kainat Fatima, Jawad Ali Abbasi, Muhammad Talha Khalid, Sidra Sultana
{"title":"Modeling and Verification of Trainify","authors":"Kainat Fatima, Jawad Ali Abbasi, Muhammad Talha Khalid, Sidra Sultana","doi":"10.54938/ijemdcsai.2022.01.2.89","DOIUrl":"https://doi.org/10.54938/ijemdcsai.2022.01.2.89","url":null,"abstract":"Safety and correctness can be assured in a system by applying numerous testing techniques. We have used formal modeling and verification for our work given it allows us to thoroughly test the app by going through all its real time aspects. In this paper we have modelled and verified a tennis training app, Trainify, to prevent wrong play in tennis and to also ensure that our tennis athletes or beginners do not hurt themselves in the process of learning or playing tennis. We found several modules which could compromise the safety pf the players and created their modules in Uppaal by modelling and then verified them using Uppaal’s verifier feeding it the different properties to be tested to ensure no such bad state occurs for our users. A detailed simulation of the model is presented and described.","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129731323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Hybrid Bi-LSTM Attention Model for Claims Extraction from Research Articles through Deep Learning","authors":"Salman Asif, Aiman Khan","doi":"10.54938/ijemdcsai.2022.01.2.85","DOIUrl":"https://doi.org/10.54938/ijemdcsai.2022.01.2.85","url":null,"abstract":"The research literature is growing rapidly. A research article contains massive amounts of textual information. Claims are the most significant information in a research article that needs to be retrieved to understand the gist of the research work. A research article contains a number of claims in different sections (abstract, introduction, results, and discussion) of an article. A literature review shows that a few studies of claim extraction have been conducted and they are limited to extracting claims from the abstract section of the article only. In existing studies claims are classified either on the basis of the keywords or all the words. In existing works semantics and context are ignored, and Bag of Words (BoW) representation is used. Deep learning architectures such as Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) have the potential to produce better results through the use of deep learning. Attention mechanism and Bidirectional Long Short-Term Memory (Bi-LSTM) have been used for multiple tasks in Natural Language Processing (NLP) and give effective results. In this work, we propose a hybrid Bi-LSTM attention model. Bi-LSTM model captures the long-term sequences of words and the attention mechanism highlights the important words or keywords in text. A number of experiments have been performed on research articles claim and standard IBM datasets. We verified our proposed model on two datasets for claim/non-claim classification and our model gives 96.7% and 95% on both datasets. The results show that our proposed model through deep learning outperforms existing models.","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122700758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards an Embedded Trust Blockchain Architecture for 6G Networks","authors":"A. Azmi, F. Alavi, S. Arif","doi":"10.54938/ijemdcsai.2022.01.2.142","DOIUrl":"https://doi.org/10.54938/ijemdcsai.2022.01.2.142","url":null,"abstract":"In recent years, blockchain technology has received considerable attention from academia, financiers and governments. Blockchain is considered to be a key disruptive technology for the 21st Century, with a very wide array of application domains that impact all areas of our lives. That such a technology exists just as the world is transitioning towards 6G mobile networks that will offer unprecedented levels of performance, but will come an attendant set of ethical and other implications, is highly fortuitous. We offer in this paper a proposal to integrate blockchain technology into the anticipated 6G feature set to address the problem of ensuring and automating Trust to a high degree.","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132742285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Child-Friendly Authentication (CFA)","authors":"Nada Alrisi, Fatma AL-Badi","doi":"10.54938/ijemdcsai.2022.01.1.70","DOIUrl":"https://doi.org/10.54938/ijemdcsai.2022.01.1.70","url":null,"abstract":"A child-friendly authentication system that uses graphic images is an excellent solution to avoid potential electronic risks to children from attackers. This report provides a summary of building a child-friendly authentication system by replacing the traditional text-based authentication method with an image-based authentication method. Where some studies and authors’ research have presented the benefits of using images as passwords and that it is considered the best compared to the text password, on the grounds that the human mind has more ability to remember images faster than text. In addition, this report included some of the applications and examples of using this technology in advance for adults. This report covered many critical points related to building a graphical authentication system for children. The results of previous research have added valuable information to this report. Finally, this report contains the challenges we may encounter while applying this technique, and how to avoid them.","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114463237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdul Sami Mohammed, A. Damdam, Ahmed S. Alanazi, Yousef A. Alhamad
{"title":"Review of Anomaly Detection and Removal Techniques from Autonomous Car Data","authors":"Abdul Sami Mohammed, A. Damdam, Ahmed S. Alanazi, Yousef A. Alhamad","doi":"10.54938/ijemdcsai.2022.01.1.76","DOIUrl":"https://doi.org/10.54938/ijemdcsai.2022.01.1.76","url":null,"abstract":"Artificial Intelligence and the development of computers has brought a huge change in our daily lives. Simple tasks that required humans to use precious time and energy are now being done by computers. One aspect of this is using AI in self-driving cars. By introducing such technologies in the world, it can be said that travelling has become a whole new experience. However, Artificial Intelligence cannot be considered perfect. It has its own faults and these faults can lead to undesired circumstances such as car accidents. One of the major faults in Artificial Intelligence is the presence of anomalies in data. Anomalies are values that are either too extreme to be considered, or are just not needed. Detecting these anomalies is a major task and requires algorithms that efficiently extract them. This paper discusses a few of these techniques and further highlights which ones can be used in autonomous self-driving cars.","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127975320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensuring Quality Education for Out-of-School-Children using AI Based ROFSET Framework","authors":"I. Haq","doi":"10.54938/ijemdcsai.2022.01.1.77","DOIUrl":"https://doi.org/10.54938/ijemdcsai.2022.01.1.77","url":null,"abstract":"It is estimated that there are over 300 million out-of-school children (OOSC) worldwide. The United Nations Sustainable Development Goal (UNSDG) 4 aims to significantly reduce this number by the year 2030. A tremendous amount of effort and resources are being directed by national and international organizations to meet the UN SDG 4. Unfortunately, in some countries, the donated money for the OOSC goes into setting up fake schools often referred to as ghost schools. A large amount of the donated money is also being spent on monitoring and evaluation (ME) as well as other checks and balances to ensure transparency and accountability. But, unfortunately, the ME methods and the accuracy of information obtained are highly questionable. When such doubt arises, the money donated to such causes is stopped. In this paper, we present a radically new approach to ensure equity, quality, and accountability in education using a new ROFSET Framework. The ROFSET Framework allows us to introduce for the first time automation and artificial intelligence techniques for ME of teaching and learning effectiveness. It is cost-effective, easily deployable, and scalable. It is believed that the ROFSET Framework will make a significant impact on achieving the UNSDG 4 by 2030.","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131112311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Bangyal, Adnan Ashraf, R. Shakir, Najeeb Ur Rehaman
{"title":"A Review on Consumer Behavior Towards Online Shopping using Machine Learning","authors":"W. Bangyal, Adnan Ashraf, R. Shakir, Najeeb Ur Rehaman","doi":"10.54938/ijemdcsai.2022.01.1.84","DOIUrl":"https://doi.org/10.54938/ijemdcsai.2022.01.1.84","url":null,"abstract":"Study of consumer behavior in online shopping, as a rule, manages identification of consumers and their purchasing behavior. The purpose of such studies is to verify who purchases where, what, when, and how. The analysis of such consumer behavior is useful to get the buyer's prerequisites and requirements for their future aims towards the product. Through this review, E-commerce organizations can follow the utilization and sentiments appended to their items and adopt suitable promoting strategies to give a customized shopping experience to their buyers, consequently expanding their hierarchical benefit. This paper purpose to utilize information-driven promoting models, for example, information perception, natural language processing, and AI models that help in getting the demographics of an association. Additionally, make recommender frameworks through cooperative filtering, sentiment analysis, and neural networks.","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122311980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating Coarse-Grained FPGAs having Hard Blocks Placed in Columns","authors":"H. Parvez","doi":"10.54938/ijemdcsai.2022.01.1.80","DOIUrl":"https://doi.org/10.54938/ijemdcsai.2022.01.1.80","url":null,"abstract":"This work uses a coarse-grained FPGA architecture exploration environment to compare a column-based FPGA architecture with a non-column based architecture. Different groups of netlists are collected and a single floor-planning is optimized for all the netlists in a group. It has been found that the coarse-grained architectures that do not limit their hard-blocks to columns give much better placement costs and routing channel usage than the architectures that limit their hard-blocks to columns. Though a column based architecture can give a more compact layout as compared to a noncolumn based architecture; but the latter gives higher gains in the channel width requirements and can result in overall area gain.","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126558874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Innovative Software Tool for Effectively Measuring Teaching and Learning Effectiveness","authors":"KhaliK Khan, Muhammad Ammar Naveed","doi":"10.54938/ijemdcsai.2022.01.1.82","DOIUrl":"https://doi.org/10.54938/ijemdcsai.2022.01.1.82","url":null,"abstract":"Every one seek to aspire to gain quality education. The biggest stake holders are students who labor through years acquiring knowledge and skill to help them prepare for their career. Parents spend fortune on their children’s education. Companies spend billions developing new education products and services. Quality education is the golden key to prosperity for the individual and the nation. However, education standards are continuously deteriorating and it has become a global phenomenon. Unfortunately, teaching is often described as a ‘popularity contest’ and those teachers who are usually popular with students are often those who compromise teaching to appease students. Some teachers also ‘teach-to-the-test ensuring high test scores. Such teachers hence, receive good student ratings. Teachers who are conscientious, rigorous and thorough are often the victims of good appraisal. Government and researchers are trying to capture the characteristics of a good teacher, but the results are vague and inconclusive. At present, there is no objective way to measure teaching effectiveness. We present an innovative method to objectively measure teaching effectiveness using a new Teaching Tool (TSquare). The TSquare used in the study is practical, easy to use, cost-effective and requires no special equipment to implement","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126636720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Wind Power Blades Using off-the-Shelf Software","authors":"A. Buali, A. Al-Jaafari, Ali H. Alsaffar","doi":"10.54938/ijemdcsai.2022.01.1.83","DOIUrl":"https://doi.org/10.54938/ijemdcsai.2022.01.1.83","url":null,"abstract":"In the simulation there are different things you can change like the length of the windmill and the position of the windmill on ground, hills, and near the sea you can also change the blade design in this simulation you can change blade length, blade pitch, blade twist, tip shape, and air foil shape. In addition, there were different types of pieces you can add to the windmill it can improve the efficiency of the windmill however, there are some parts that will decrease the efficiency of the windmill. After you finish making your windmill in the simulation it is going to show you the results of it like how many watts of electricity has been generated and how many houses it powered.","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122898068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}