International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence最新文献

筛选
英文 中文
Modeling and Verification of Trainify Trainify的建模与验证
Kainat Fatima, Jawad Ali Abbasi, Muhammad Talha Khalid, Sidra Sultana
{"title":"Modeling and Verification of Trainify","authors":"Kainat Fatima, Jawad Ali Abbasi, Muhammad Talha Khalid, Sidra Sultana","doi":"10.54938/ijemdcsai.2022.01.2.89","DOIUrl":"https://doi.org/10.54938/ijemdcsai.2022.01.2.89","url":null,"abstract":"Safety and correctness can be assured in a system by applying numerous testing techniques. We have used formal modeling and verification for our work given it allows us to thoroughly test the app by going through all its real time aspects. In this paper we have modelled and verified a tennis training app, Trainify, to prevent wrong play in tennis and to also ensure that our tennis athletes or beginners do not hurt themselves in the process of learning or playing tennis. We found several modules which could compromise the safety pf the players and created their modules in Uppaal by modelling and then verified them using Uppaal’s verifier feeding it the different properties to be tested to ensure no such bad state occurs for our users. A detailed simulation of the model is presented and described.","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129731323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Hybrid Bi-LSTM Attention Model for Claims Extraction from Research Articles through Deep Learning 一种基于深度学习的高效混合Bi-LSTM注意力模型
Salman Asif, Aiman Khan
{"title":"An Efficient Hybrid Bi-LSTM Attention Model for Claims Extraction from Research Articles through Deep Learning","authors":"Salman Asif, Aiman Khan","doi":"10.54938/ijemdcsai.2022.01.2.85","DOIUrl":"https://doi.org/10.54938/ijemdcsai.2022.01.2.85","url":null,"abstract":"The research literature is growing rapidly. A research article contains massive amounts of textual information. Claims are the most significant information in a research article that needs to be retrieved to understand the gist of the research work. A research article contains a number of claims in different sections (abstract, introduction, results, and discussion) of an article. A literature review shows that a few studies of claim extraction have been conducted and they are limited to extracting claims from the abstract section of the article only. In existing studies claims are classified either on the basis of the keywords or all the words. In existing works semantics and context are ignored, and Bag of Words (BoW) representation is used. Deep learning architectures such as Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) have the potential to produce better results through the use of deep learning. Attention mechanism and Bidirectional Long Short-Term Memory (Bi-LSTM) have been used for multiple tasks in Natural Language Processing (NLP) and give effective results. In this work, we propose a hybrid Bi-LSTM attention model. Bi-LSTM model captures the long-term sequences of words and the attention mechanism highlights the important words or keywords in text. A number of experiments have been performed on research articles claim and standard IBM datasets. We verified our proposed model on two datasets for claim/non-claim classification and our model gives 96.7% and 95% on both datasets. The results show that our proposed model through deep learning outperforms existing models.","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122700758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards an Embedded Trust Blockchain Architecture for 6G Networks 面向6G网络的嵌入式信任区块链架构
A. Azmi, F. Alavi, S. Arif
{"title":"Towards an Embedded Trust Blockchain Architecture for 6G Networks","authors":"A. Azmi, F. Alavi, S. Arif","doi":"10.54938/ijemdcsai.2022.01.2.142","DOIUrl":"https://doi.org/10.54938/ijemdcsai.2022.01.2.142","url":null,"abstract":"In recent years, blockchain technology has received considerable attention from academia, financiers and governments. Blockchain is considered to be a key disruptive technology for the 21st Century, with a very wide array of application domains that impact all areas of our lives. That such a technology exists just as the world is transitioning towards 6G mobile networks that will offer unprecedented levels of performance, but will come an attendant set of ethical and other implications, is highly fortuitous. We offer in this paper a proposal to integrate blockchain technology into the anticipated 6G feature set to address the problem of ensuring and automating Trust to a high degree.","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132742285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Child-Friendly Authentication (CFA) 儿童友好认证(CFA)
‪Nada Alrisi‬‏, Fatma AL-Badi
{"title":"Child-Friendly Authentication (CFA)","authors":"‪Nada Alrisi‬‏, Fatma AL-Badi","doi":"10.54938/ijemdcsai.2022.01.1.70","DOIUrl":"https://doi.org/10.54938/ijemdcsai.2022.01.1.70","url":null,"abstract":"A child-friendly authentication system that uses graphic images is an excellent solution to avoid potential electronic risks to children from attackers. This report provides a summary of building a child-friendly authentication system by replacing the traditional text-based authentication method with an image-based authentication method. Where some studies and authors’ research have presented the benefits of using images as passwords and that it is considered the best compared to the text password, on the grounds that the human mind has more ability to remember images faster than text. In addition, this report included some of the applications and examples of using this technology in advance for adults. This report covered many critical points related to building a graphical authentication system for children. The results of previous research have added valuable information to this report. Finally, this report contains the challenges we may encounter while applying this technique, and how to avoid them.","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114463237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Anomaly Detection and Removal Techniques from Autonomous Car Data 自动驾驶汽车数据异常检测与去除技术综述
Abdul Sami Mohammed, A. Damdam, Ahmed S. Alanazi, Yousef A. Alhamad
{"title":"Review of Anomaly Detection and Removal Techniques from Autonomous Car Data","authors":"Abdul Sami Mohammed, A. Damdam, Ahmed S. Alanazi, Yousef A. Alhamad","doi":"10.54938/ijemdcsai.2022.01.1.76","DOIUrl":"https://doi.org/10.54938/ijemdcsai.2022.01.1.76","url":null,"abstract":"Artificial Intelligence and the development of computers has brought a huge change in our daily lives. Simple tasks that required humans to use precious time and energy are now being done by computers. One aspect of this is using AI in self-driving cars. By introducing such technologies in the world, it can be said that travelling has become a whole new experience. However, Artificial Intelligence cannot be considered perfect. It has its own faults and these faults can lead to undesired circumstances such as car accidents. One of the major faults in Artificial Intelligence is the presence of anomalies in data. Anomalies are values that are either too extreme to be considered, or are just not needed. Detecting these anomalies is a major task and requires algorithms that efficiently extract them. This paper discusses a few of these techniques and further highlights which ones can be used in autonomous self-driving cars.","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127975320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensuring Quality Education for Out-of-School-Children using AI Based ROFSET Framework 利用基于人工智能的ROFSET框架确保失学儿童的优质教育
I. Haq
{"title":"Ensuring Quality Education for Out-of-School-Children using AI Based ROFSET Framework","authors":"I. Haq","doi":"10.54938/ijemdcsai.2022.01.1.77","DOIUrl":"https://doi.org/10.54938/ijemdcsai.2022.01.1.77","url":null,"abstract":"It is estimated that there are over 300 million out-of-school children (OOSC) worldwide. The United Nations Sustainable Development Goal (UNSDG) 4 aims to significantly reduce this number by the year 2030. A tremendous amount of effort and resources are being directed by national and international organizations to meet the UN SDG 4. Unfortunately, in some countries, the donated money for the OOSC goes into setting up fake schools often referred to as ghost schools. A large amount of the donated money is also being spent on monitoring and evaluation (ME) as well as other checks and balances to ensure transparency and accountability. But, unfortunately, the ME methods and the accuracy of information obtained are highly questionable. When such doubt arises, the money donated to such causes is stopped. In this paper, we present a radically new approach to ensure equity, quality, and accountability in education using a new ROFSET Framework. The ROFSET Framework allows us to introduce for the first time automation and artificial intelligence techniques for ME of teaching and learning effectiveness. It is cost-effective, easily deployable, and scalable. It is believed that the ROFSET Framework will make a significant impact on achieving the UNSDG 4 by 2030.","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131112311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review on Consumer Behavior Towards Online Shopping using Machine Learning 使用机器学习的消费者在线购物行为综述
W. Bangyal, Adnan Ashraf, R. Shakir, Najeeb Ur Rehaman
{"title":"A Review on Consumer Behavior Towards Online Shopping using Machine Learning","authors":"W. Bangyal, Adnan Ashraf, R. Shakir, Najeeb Ur Rehaman","doi":"10.54938/ijemdcsai.2022.01.1.84","DOIUrl":"https://doi.org/10.54938/ijemdcsai.2022.01.1.84","url":null,"abstract":"Study of consumer behavior in online shopping, as a rule, manages identification of consumers and their purchasing behavior. The purpose of such studies is to verify who purchases where, what, when, and how. The analysis of such consumer behavior is useful to get the buyer's prerequisites and requirements for their future aims towards the product. Through this review, E-commerce organizations can follow the utilization and sentiments appended to their items and adopt suitable promoting strategies to give a customized shopping experience to their buyers, consequently expanding their hierarchical benefit. This paper purpose to utilize information-driven promoting models, for example, information perception, natural language processing, and AI models that help in getting the demographics of an association. Additionally, make recommender frameworks through cooperative filtering, sentiment analysis, and neural networks.","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122311980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating Coarse-Grained FPGAs having Hard Blocks Placed in Columns 评估在列中放置硬块的粗粒度fpga
H. Parvez
{"title":"Evaluating Coarse-Grained FPGAs having Hard Blocks Placed in Columns","authors":"H. Parvez","doi":"10.54938/ijemdcsai.2022.01.1.80","DOIUrl":"https://doi.org/10.54938/ijemdcsai.2022.01.1.80","url":null,"abstract":"This work uses a coarse-grained FPGA architecture exploration environment to compare a column-based FPGA architecture with a non-column based architecture. Different groups of netlists are collected and a single floor-planning is optimized for all the netlists in a group. It has been found that the coarse-grained architectures that do not limit their hard-blocks to columns give much better placement costs and routing channel usage than the architectures that limit their hard-blocks to columns. Though a column based architecture can give a more compact layout as compared to a noncolumn based architecture; but the latter gives higher gains in the channel width requirements and can result in overall area gain.","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126558874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovative Software Tool for Effectively Measuring Teaching and Learning Effectiveness 有效测量教学效果的创新软件工具
KhaliK Khan, Muhammad Ammar Naveed
{"title":"Innovative Software Tool for Effectively Measuring Teaching and Learning Effectiveness","authors":"KhaliK Khan, Muhammad Ammar Naveed","doi":"10.54938/ijemdcsai.2022.01.1.82","DOIUrl":"https://doi.org/10.54938/ijemdcsai.2022.01.1.82","url":null,"abstract":"Every one seek to aspire to gain quality education. The biggest stake holders are students who labor through years acquiring knowledge and skill to help them prepare for their career. Parents spend fortune on their children’s education. Companies spend billions developing new education products and services. Quality education is the golden key to prosperity for the individual and the nation. However, education standards are continuously deteriorating and it has become a global phenomenon. Unfortunately, teaching is often described as a ‘popularity contest’ and those teachers who are usually popular with students are often those who compromise teaching to appease students. Some teachers also ‘teach-to-the-test ensuring high test scores. Such teachers hence, receive good student ratings. Teachers who are conscientious, rigorous and thorough are often the victims of good appraisal.  Government and researchers are trying to capture the characteristics of a good teacher, but the results are vague and inconclusive. At present, there is no objective way to measure teaching effectiveness. We present an innovative method to objectively measure teaching effectiveness using a new Teaching Tool (TSquare). The TSquare used in the study is practical, easy to use, cost-effective and requires no special equipment to implement","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126636720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Wind Power Blades Using off-the-Shelf Software 基于现成软件的风电叶片设计
A. Buali, A. Al-Jaafari, Ali H. Alsaffar
{"title":"Design of Wind Power Blades Using off-the-Shelf Software","authors":"A. Buali, A. Al-Jaafari, Ali H. Alsaffar","doi":"10.54938/ijemdcsai.2022.01.1.83","DOIUrl":"https://doi.org/10.54938/ijemdcsai.2022.01.1.83","url":null,"abstract":"In the simulation there are different things you can change like the length of the windmill and the position of the windmill on ground, hills, and near the sea you can also change the blade design in this simulation you can change blade length, blade pitch, blade twist, tip shape, and air foil shape. In addition, there were different types of pieces you can add to the windmill it can improve the efficiency of the windmill however, there are some parts that will decrease the efficiency of the windmill. After you finish making your windmill in the simulation it is going to show you the results of it like how many watts of electricity has been generated and how many houses it powered.","PeriodicalId":448083,"journal":{"name":"International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122898068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信