Artificial Intelligence Advances
Latest Publications


TOTAL DOCUMENTS

29
(FIVE YEARS 29)

H-INDEX

2
(FIVE YEARS 2)

Published By Bilingual Publishing Co.

2661-3220

2021 ◽  
Vol 3 (2) ◽  
Author(s):  
Xinhua Wang ◽  
Weikang Wu

AI processor, which can run artificial intelligence algorithms, is a state-of-the-art accelerator,in essence, to perform special algorithm in various applications. In particular,these are four AI applications: VR/AR smartphone games, high-performance computing, Advanced Driver Assistance Systems and IoT. Deep learning using convolutional neural networks (CNNs) involves embedding intelligence into applications to perform tasks and has achieved unprecedented accuracy [1]. Usually, the powerful multi-core processors and the on-chip tensor processing accelerator unit are prominent hardware features of deep learning AI processor. After data is collected by sensors, tools such as image processing technique, voice recognition and autonomous drone navigation, are adopted to pre-process and analyze data. In recent years, plenty of technologies associating with deep learning Al processor including cognitive spectrum sensing, computer vision and semantic reasoning become a focus in current research.


2021 ◽  
Vol 3 (2) ◽  
Author(s):  
Febronie Nambajemariya ◽  
Yongshun Wang ◽  
Twizerane Jean D’Amour ◽  
Kwizera Niyigena Vincent DePaul ◽  
Yao Hu

With the deployment of Connected and Automated Vehicles in the coming decades, road transportation will experience a significant upheaval. CAVs (Connected and Autonomous Vehicles) have been a main emphasis of Transportation and the automotive sector, and the future of transportation system analysis is widely anticipated. The examination and future development of CAVs technology has been the subject of numerous researches. However, as three essential kinds of road users, pedestrians, bicyclists, and motorcyclists have experienced little to no handling. We explored the influence of CAVs on non-motorized mobility in this article and seven various issues that CAVs face in the environment.


2021 ◽  
Vol 3 (2) ◽  
Author(s):  
A.G. Reshetnikov ◽  
S.V. Ulyanov

The technology of knowledge base remote design of the smart fuzzy controllers with the application of the "Soft / quantum computing optimizer" toolkit software developed. The possibility of the transmission and communication the knowledge base using remote connection to the control object considered. Transmission and communication of the fuzzy controller’s knowledge bases implemented through the remote connection with the control object in the online mode apply the Bluetooth or WiFi technologies. Remote transmission of knowledge bases allows designing many different built-in intelligent controllers to implement a variety of control strategies under conditions of uncertainty and risk. As examples, two different models of robots described (mobile manipulator and (“cart-pole” system) inverted pendulum). A comparison of the control quality between fuzzy controllers and quantum fuzzy controller in various control modes is presented. The ability to connect and work with a physical model of control object without using than mathematical model demonstrated. The implemented technology of knowledge base design sharing in a swarm of intelligent robots with quantum controllers. It allows to achieve the goal of control and to gain additional knowledge by creating a new quantum hidden information source based on the synergetic effect of combining knowledge. Development and implementation of intelligent robust controller’s prototype for the intelligent quantum control system of mega-science project NICA (at the first stage for the cooling system of superconducted magnets) is discussed. The results of the experiments demonstrate the possibility of the ensured achievement of the control goal of a group of robots using soft / quantum computing technologies in the design of knowledge bases of smart fuzzy controllers in quantum intelligent control systems. The developed software toolkit allows to design and setup complex ill-defined and weakly formalized technical systems on line.


2021 ◽  
Vol 3 (2) ◽  
Author(s):  
Sergey Victorovich Ulyanov

The quantum self-organization algorithm model of wise knowledge base design for intelligent fuzzy controllers with required robust level considered. Background of the model is a new model of quantum inference based on quantum genetic algorithm. Quantum genetic algorithm applied on line for the quantum correlation’s type searching between unknown solutions in quantum superposition of imperfect knowledge bases of intelligent controllers designed on soft computing. Disturbance conditions of analytical information-thermodynamic trade-off interrelations between main control quality measures (as new design laws) discussed in Part I. The smart control design with guaranteed achievement of these tradeoff interrelations is main goal for quantum self-organization algorithm of imperfect KB. Sophisticated synergetic quantum information effect in Part I (autonomous robot in unpredicted control situations) and II (swarm robots with imperfect KB exchanging between “master - slaves”) introduced: a new robust smart controller on line designed from responses on unpredicted control situations of any imperfect KB applying quantum hidden information extracted from quantum correlation. Within the toolkit of classical intelligent control, the achievement of the similar synergetic information effect is impossible. Benchmarks of intelligent cognitive robotic control applications considered.


2021 ◽  
Vol 3 (2) ◽  
Author(s):  
Falah Al-akashi ◽  
Diana Inkpen

What is a real time agent, how does it remedy ongoing daily frustrations for users, and how does it improve the retrieval performance in World Wide Web? These are the main question we focus on this manuscript. In many distributed information retrieval systems, information in agents should be ranked based on a combination of multiple criteria. Linear combination of ranks has been the dominant approach due to its simplicity and effectiveness. Such a combination scheme in distributed infrastructure requires that the ranks in resources or agents are comparable to each other before combined. The main challenge is transforming the raw rank values of different criteria appropriately to make them comparable before any combination. Different ways for ranking agents make this strategy difficult. In this research, we will demonstrate how to rank Web documents based on resource-provided information how to combine several resources raking schemas in one time. The proposed system was implemented specifically in data provided by agents to create a comparable combination for different attributes. The proposed approach was tested on the queries provided by Text Retrieval Conference (TREC). Experimental results showed that our approach is effective and robust compared with offline search platforms.


2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Konstantinos Ilias Kotis ◽  
Konstantina Zachila ◽  
Evaggelos Paparidis

Remarkable progress in research has shown the efficiency of Knowledge Graphs (KGs) in extracting valuable external knowledge in various domains. A Knowledge Graph (KG) can illustrate high-order relations that connect two objects with one or multiple related attributes. The emerging Graph Neural Networks (GNN) can extract both object characteristics and relations from KGs. This paper presents how Machine Learning (ML) meets the Semantic Web and how KGs are related to Neural Networks and Deep Learning. The paper also highlights important aspects of this area of research, discussing open issues such as the bias hidden in KGs at different levels of graph representation.


2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Mohammed Daffalla Elradi ◽  
Mohamed Hashim Mohamed ◽  
Mohammed Elradi Ali

Ransomware attacks have been spreading broadly in the last few years, where attackers deny users’ access to their systems and encrypt their files until they pay a ransom, usually in Bitcoin. Of course, that is the worst thing that can happen; especially for organizations having sensitive information. In this paper we proposed a cyber security awareness program intended to provide end-users with a rescue checklist in case of being attacked with a ransomware as well as preventing the attack and ways to recover from it. The program aimed at providing cyber security knowledge to 15 employees in a Sudanese trading and investment company. According to their cyber behaviour before the program, the participants showed a low level cyber security awareness that with 72% they are likely of being attacked by a ransomware from a phishing email, which is well known for spreading ransomware attacks. The results revealed that the cyber security awareness program greatly diminished the probability of being attacked by a ransomware with an average of 28%. This study can be used as a real-life ransomware attack rescue plan.


2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Wai Kit Wong ◽  
Chi Jie Tan ◽  
Thu Soe Min ◽  
Eng Kiong Wong

Visually impaired persons have difficulty in business that dealing with banknote. This paper proposed a Malaysian banknotes detection system using image processing technology and fuzzy logic algorithm for the visually impaired. The Malaysian banknote reader will first capture the inserted banknote image, sending it to the cloud server for image processing via Wi-Fi medium. The cloud server is established to receive the banknote image sending from the banknote reader, processing them using perceptual hashing based image searching and fuzzy logic algorithm, then return the detected banknote’s value results back to the banknote reader. The banknote reader will display the results in terms of voice message played on the mini speaker attached on it, to allow visually impaired persons knowing the banknote’s value. This hardware mechanism reduces the size and costs for the banknote reader carried by the visually impaired persons. Experimental results showed that this Malaysian banknotes detection system reached an accuracy beyond 95% by running test on 600 different worn, torn and new Malaysian banknotes. After the banknote image being taken by the banknote reader’s camera, the system able to detect the banknote value in about 480 mili-seconds to 560 mili-seconds for a single sided banknote recognition. The banknotes detection speed was also comparable with human observers reading banknotes, with the response of 1.0908 second per banknote slight difference reading time. The IoT and image processing concepts were successfully blended and it provides an alternative to aid the visually impaired person their daily business transaction activities in a better way.


2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Navid Moshtaghi Yazdani

In the present paper, a method for reliable estimation of defect profile in CK45 steel structures is presented using an eddy current testing based measurement system and post-processing system based on deep learning technique. So a deep learning method is used to determine the defect characteristics in metallic structures by magnetic field C-scan images obtained by an anisotropic magneto-resistive sensor. Having designed and adjusting the deep convolution neural network and applied it to C-scan images obtained from the measurement system, the performance of deep learning method proposed is compared with conventional artificial neural network methods such as multilayer perceptron and radial basis function on a number of metallic specimens with different defects. The results confirm the superiority of the proposed method for characterizing defects compared to other classical training-oriented methods.


2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Debanik Roy

Realizing media independence in today’s communication system remains an open problem by and large. Information retrieval, mostly through the Internet, is becoming the most demanding feature in technological progress and this web-based data access should ideally be in user-selective form. While blind-folded access of data through the World Wide Web is quite streamlined, the counter-half of the facet, namely, seamless access of information database pertaining to a specific end-device, e.g. robotic systems, is still in a formative stage. This paradigm of access as well as systematic query-based retrieval of data, related to the physical enddevice is very crucial in designing the Internet-based network control of the same in real-time. Moreover, this control of the end-device is directly linked up to the characteristics of three coupled metrics, namely, ‘multiple databases’, ‘multiple servers’ and ‘multiple inputs’ (to each server). This triad, viz. database-input-server (DIS) plays a significant role in overall performance of the system, the background details of which is still very sketchy in global research community. This work addresses the technical issues associated with this theology, with specific reference to formalism of a customized DIS considering real-time delay analysis. The present paper delineates the developmental paradigms of novel multi-input multioutput communication semantics for retrieving web-based information from physical devices, namely, two representative robotic sub-systems in a coherent and homogeneous mode. The developed protocol can be entrusted for use in real-time in a complete user-friendly manner.


Sign in / Sign up

Export Citation Format

Share Document