Mohammed Salem Alsubai'e, Maritime Transport, Saad Abdullah Alshatti
{"title":"Evaluating Performance of Utilizing Onshore Wind Turbines Specifically the Farm Turbines in Kuwait","authors":"Mohammed Salem Alsubai'e, Maritime Transport, Saad Abdullah Alshatti","doi":"10.18034/AJASE.V7I2.234","DOIUrl":"https://doi.org/10.18034/AJASE.V7I2.234","url":null,"abstract":"Renewable energy is considered one of the most important and clean sources; since it does not produce any type of emission or pollution. In Kuwait, the energy of wind is existing in three main locations, which are; Ras Jal Aliyah, Bubian in addition to Subiyah, where the characteristics of wind have been evaluated in this paper based on the data generated from the meteorological measurements at 10m height. Also, different studies have been performed in this paper in order to analyze the impact of height on the parameters of wind energy, wind density, in addition to wind speed. Jal Aliyah location has been studied in this paper and the results showed that there is a proportional relation between the wind speed and power, where the maximum power is potential if the speed is equal to 29.1 m/s, and the maximum averaged flux of wind power is equal to 725.54 W/m2. Where both Bubidan Island and Ras Subiyah showed the wind direction in the North-East quadrant with speed is greater than 10 m/s. But, the higher polarized distribution of Jal Aliyah was in the north direction. Based on the obtained results, it can be concluded that this paper provides and suggests a proper design of the wind turbines for designers.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":"5 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90076914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Theoretical Approaches of Machine Learning to Schizophrenia","authors":"N. Bynagari, Takudzwa Fadziso","doi":"10.18034/ei.v6i2.568","DOIUrl":"https://doi.org/10.18034/ei.v6i2.568","url":null,"abstract":"Machine learning techniques have been successfully used to analyze neuroimaging data in the context of disease diagnosis in recent years. In this study, we present an overview of contemporary support vector machine-based methods developed and used in psychiatric neuroimaging for schizophrenia research. We focus in particular on our group's algorithms, which have been used to categorize schizophrenia patients and healthy controls, and compare their accuracy findings to those of other recently published studies. First, we'll go over some basic pattern recognition and machine learning terms. Then, for each study, we describe and discuss it independently, emphasizing the key characteristics that distinguish each approach. Finally, conclusions are reached as a result of comparing the data obtained using the various methodologies presented to determine how beneficial automatic categorization systems are in understanding the molecular underpinnings of schizophrenia. The primary implications of applying these approaches in clinical practice are then discussed.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":"182 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2018-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85067205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Security - A Semantic Approach in End to End Security Compliance","authors":"Vns Surendra Chimakurthi","doi":"10.18034/ei.v5i2.586","DOIUrl":"https://doi.org/10.18034/ei.v5i2.586","url":null,"abstract":"Many firms are seeing the benefits of moving to the cloud. For the sake of their customers' data, cloud service providers are required by law to maintain the highest levels of data security and privacy. Most cloud service providers employ a patchwork of security and privacy safeguards while industry standards are being created. The upshot is that customers of cloud services are unsure whether or not the security protections supplied by these services are enough to meet their specific security and compliance requirements. In this article, we have discussed the many threats cloud users face and emphasized the compliance frameworks and security processes that should be in place to minimize the risk. To categorize cloud security measures, risks, and compliance requirements, we developed an ontology. We needed to design software to identify the high-level policy rules that must be applied in response to each danger as part of this initiative. Additionally, the program provides a list of cloud service providers that now satisfy specific security requirements. Even if they aren't familiar with the underlying technology, cloud users may utilize our system to build up their security policy and identify compatible providers.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":"48 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75157860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Commercial Applications of Blockchain and Distributed Ledger Technology","authors":"Sai Srujan Gutlapalli","doi":"10.18034/ei.v4i2.653","DOIUrl":"https://doi.org/10.18034/ei.v4i2.653","url":null,"abstract":"Blockchains are distributed ledgers. Distributed ledgers replace centralized ledgers. Distributed ledgers use nodes—computers—to record, share, and synchronize transactions in their electronic ledgers. The paper examines how blockchain data is arranged into blocks and how an append-only mode chain links them. Distributed ledger technology (DLT) encrypts and consensuses immutable and sequential transaction records. Bitcoin pioneered blockchain. Since then, many blockchains with decentralization, encryption, consensus, and immutability have been developed for diverse uses. Blockchain technology is most typically used in transaction settlement, digital currency banks, and supply chain applications to solve problems quickly. The study examines how blockchain and DLTs might improve information management and build new technologies like the Internet of Things. The study shows how legal issues encourage blockchain technology despite limited international and federal restrictions. However, data privacy and security must be addressed immediately.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":"27 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73094560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software as a Service (SaaS) as Cloud Computing: Security and Risk vs. Technological Complexity","authors":"Sandesh Achar","doi":"10.18034/ei.v4i2.633","DOIUrl":"https://doi.org/10.18034/ei.v4i2.633","url":null,"abstract":"The software delivery model known as Software as a service (SaaS) has evolved from cutting-edge innovation to an essential technology for many companies. However, due to the extensive range of cloud services that companies offer as part of their SaaS offerings, it is indispensable to thoroughly comprehend the dangers associated with using these services. This article describes those dangers and recommendations for the most effective methods of control that are open to managers. This study's objective is to investigate the factors of Technological Complexity, Security and Risk, and Technical Support within an organization to determine how these factors can influence an organization's end-use intention regarding cloud technology. The availability of technical support, the complexity of use, and the organization's training have been highlighted as the most crucial factors of this aim. The findings suggest that complexity negatively influences intention to use, although training and assistance are vital, with a similar weight. Shared or collective knowledge is essential in the adoption of cloud computing technologies.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":"177 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79932191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning and Artificial Intelligence in Online Fake Transaction Alerting","authors":"N. Bynagari","doi":"10.18034/ei.v3i2.566","DOIUrl":"https://doi.org/10.18034/ei.v3i2.566","url":null,"abstract":"Artificial Intelligence (AI) is one of the most promising and intriguing innovations of modernity. Its potential is virtually unlimited, from smart music selection in personal gadgets to intelligent analysis of big data and real-time fraud detection and aversion. At the core of the AI philosophy lies an assumption that once a computer system is provided with enough data, it can learn based on that input. The more data is provided, the more sophisticated its learning ability becomes. This feature has acquired the name \"machine learning\" (ML). The opportunities explored with ML are plentiful today, and one of them is an ability to set up an evolving security system learning from the past cyber-fraud experiences and developing more rigorous fraud detection mechanisms. Read on to learn more about ML, the types and magnitude of fraud evidenced in modern banking, e-commerce, and healthcare, and how ML has become an innovative, timely, and efficient fraud prevention technology.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":"94 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2015-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86743591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enabling Trustworthiness in Artificial Intelligence - A Detailed Discussion","authors":"Siddhartha Vadlamudi","doi":"10.18034/ei.v3i2.519","DOIUrl":"https://doi.org/10.18034/ei.v3i2.519","url":null,"abstract":"Artificial intelligence (AI) delivers numerous chances to add to the prosperity of people and the stability of economies and society, yet besides, it adds up a variety of novel moral, legal, social, and innovative difficulties. Trustworthy AI (TAI) bases on the possibility that trust builds the establishment of various societies, economies, and sustainable turn of events, and that people, organizations, and societies can along these lines just at any point understand the maximum capacity of AI, if trust can be set up in its development, deployment, and use. The risks of unintended and negative outcomes related to AI are proportionately high, particularly at scale. Most AI is really artificial narrow intelligence, intended to achieve a specific task on previously curated information from a certain source. Since most AI models expand on correlations, predictions could fail to sum up to various populations or settings and might fuel existing disparities and biases. As the AI industry is amazingly imbalanced, and experts are as of now overpowered by other digital devices, there could be a little capacity to catch blunders. With this article, we aim to present the idea of TAI and its five essential standards (1) usefulness, (2) non-maleficence, (3) autonomy, (4) justice, and (5) logic. We further draw on these five standards to build up a data-driven analysis for TAI and present its application by portraying productive paths for future research, especially as to the distributed ledger technology-based acknowledgment of TAI.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":"37 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2015-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78350922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning as a New Search Engine Interface: An Overview","authors":"Taposh Kumar Neogy, Harish Paruchuri","doi":"10.18034/ei.v2i2.539","DOIUrl":"https://doi.org/10.18034/ei.v2i2.539","url":null,"abstract":"The essence of a web page is an inherently predisposed issue, one that is built on behaviors, interests, and intelligence. There are relatively a ton of reasons web pages are critical to the new world, as the matter cannot be overemphasized. The meteoric growth of the internet is one of the most potent factors making it hard for search engines to provide actionable results. With classified directories, search engines store web pages. To store these pages, some of the engines rely on the expertise of real people. Most of them are enabled and classified using automated means but the human factor is dominant in their success. From experimental results, we can deduce that the most effective and critical way to automate web pages for search engines is via the integration of machine learning.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":"21 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85470205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reinforcement Learning in Robotics","authors":"Mani Manavalan, Apoorva Ganapathy","doi":"10.18034/ei.v2i2.572","DOIUrl":"https://doi.org/10.18034/ei.v2i2.572","url":null,"abstract":"Reinforcement learning has been found to offer to robotics the valid tools and techniques for the redesign of valuable and sophisticated designs for robotics. There are multiple challenges related to the prime problems related to the value added in the reinforcement of the new learning. The study has found the linkages between different subjects related to science in particular. We have attempted to make and establish the links that have been found between the two research communities in order to provide a survey-related task in reinforcement learning for behavior in terms of the generation that are found in the study. Many issues have been highlighted in the robot learning process that is used in their learning as well as various key programming tools and methods. We discuss how contributions that aimed towards taming the complexity of the domain of the study and determining representations and goals of RL. There has been a particular focus that is based on the goals of reinforcement learning that can provide the value-added function approaches and challenges in robotic reinforcement learning. The analysis has been conducted and has strived to demonstrate the value of reinforcement learning that has to be applied to different circumstances.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":"1 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78168350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}