keyboard_arrow_up
Accepted Papers
Effects Of Green Production On Effective Exchange Rate In Iran: PARTICULAR Swarm Optimization Algorithm

Saeed Iranmanesh, PHD student, Department of Economics, Faculty of Management and Economics, Shahid Bahonar University of Kerman, Kerman, Iran

ABSTRACT

In this paper macroeconomic data related to the Islamic Republic of Iran have been analyzed and analyzed. These data have been obtained from the World Bank. Raw data related to the Islamic Republic of Iran for the period (1993-2017). The purpose of this paper is to obtain effective exchange rate data in the Islamic Republic of Iran that is affected by green production. For this purpose, a series of indicators is needed to estimate the effective exchange rate data analysis model. The models are indicators of the degree of openness of the economy, the size of the government, and green production as variables that process data. The raw data used in this article are: effective exchange rate, export, import, government expenditure, production. GDP, foreign direct investment, carbon dioxide (CO2) emissions and inflation have been used. Effective exchange rates have the potential to be used in future foreign exchange market research. In addition, effective exchange rates that are influenced by green production can have environmental implications for a countrys foreign exchange market.

KEYWORDS

Effective Exchange Rate, Green Production, Particle Swarm Optimization Algorithm, Optimization.


The Future of Online Learning using Artificial Intelligence

Yew Kee Wong, School of Information Engineering, HuangHuai University, Henan, China

ABSTRACT

Online learning is the emerging technique in education and learning during the COVID-19 pandemic period. Traditional learning is a complex process as learning patterns, approach, skills and performance varies from person to person. Adaptive online learning focuses on understanding the learner’s performance, skills and adapts to it. The use of advanced technology also provides a means to analyse the behavioural learning pattern. As it provides the detailed skill mapping and performance which enables the learner to understand the areas needs to be improved. The information can also be used by assessors to improve the teaching approach. Advanced online learning system using artificial intelligence is an emerging concept in the coming years. In this new concept, the classes are not taken face-to-face in a classroom but through an electronic medium as a substitute. These virtual learning approach are gaining importance every day and very soon they are going to be an integral part of our world. Taking up these virtual learning through an electronic medium is termed as online learning. We proposed two new models which are powered by artificial intelligence (AI) tools. A number of examples of using these new models are presented.

KEYWORDS

Analysis Algorithm, Artificial Intelligence, Hybrid Integrated Model, Online Learning, Progressive Response Learning.


On the K-Nearest Neighbor Rule for Classification of Curves under Spatial Dependence

Ahmad Younso, Department of mathematical statistics, Faculty of sciences, Damascus University/Syria

ABSTRACT

The classical k-nearest neighbor (k-NN) rule of classification for spatially dependent functional data (curves) will be considered. The (strong consistency ) consistency of the classifier will be established based on training data drawn from (β-) α-mixing random field. The results of this paper extend some previous results to the spatial case.

KEYWORDS

Bayes rule; training data; k-NN rule; random field, smoothing parameter; consistency.


Plate Number Recognition using Segmented Method with Artificial Neural Network

Auwal Salisu Yunusa and Cafer Bal, Fırat University, Faculty of Technology, Department of Mechatronics, Machine Learning, TR-23119 Elazığ, Turkey

ABSTRACT

Plate number recognition is a system designed to read information of vehicle plate number automatically from digital images for many purposes; such as over speed control, parking areas, traffic control, and top governmental agencies etc. This system can be categories into 3 stages: license plate detection, character segmentation, and character recognition. In order to have successful recognition of characters, a license plate number has to be segmented. Segmentation is a process of partition an image into smaller parts. Character recognition is the last stage, were the license plate characters were read from the segmented characters. Three different type of networks were used in this article, (pattern net, perceptron and multi-layer neural network). Simulation result indicated that pattern net has a very good performance in recognizing the license plate image compared to other two types of networks. Also, has an advantage of less training time compared to other types of neural networks.

KEYWORDS

license plate number, neural network, image processing, machine learning.


Performance Evaluation Tools in Wireless Sensor Networks

Souhila Silmi1,2, Zouina Doukha1, Samira Moussaoui1, 1Department of Computer Science, USTHB University, RIMAA Lab., B P N°32 El Alia, 16000 Bab Ezzouar, Algiers, Algeria, 2Department of Computer Science,Higher Normal School Elbachir El-ibrahimi-Kouba,B P N°92 16308 Vieux-Kouba, Algiers, Algeria

ABSTRACT

The growing need to integrate new technologies into Wireless Sensor Networks (WSNs) has led to the increasing requirement for development and implementation. From the current systems, it can be seen that several research have been made since several years ago, but the WSN deployment still a challenging task. Yet, this is done by real deployment withtestbeds or bysimulation tools when real deployment could be costly and time-consuming. Each kind of deployment has advantages and limits. With this in mind, the purpose of this paper is to review the implementation and evaluationprocess in WSNs. So, we describe relevant testbeds and simulation tools, and their features. Lastly, we conduct an experimentationstudy using these testbeds and simulations to highlight their pro and cons. To display how we obtained our results, we implement a localization protocol as a use case. The aim of this work is to give more clarity to future-work for better implementation in order to improve reliability, accuracy and time consumed. Hence, researchers will be able to choice the appropriate tools in the process of development and deployment for each new proposal in this fields.

KEYWORDS

Wireless Sensor Network, Testbeds, Experimentation platform, Simulation Tools.


The use of Big Data in Machine Learning Algorithm

Yew Kee Wong, School of Information Engineering, HuangHuai University, Henan, China

ABSTRACT

In the information era, enormous amounts of data have become available on hand to decision makers. Big data refers to datasets that are not only big, but also high in variety and velocity, which makes them difficult to handle using traditional tools and techniques. Due to the rapid growth of such data, solutions need to be studied and provided in order to handle and extract value and knowledge from these datasets. Machine learning is a method of data analysis that automates analytical model building. It is a branch of artificial intelligence based on the idea that systems can learn from data, identify patterns and make decisions with minimal human intervention. Such minimal human intervention can be provided using big data analytics, which is the application of advanced analytics techniques on big data. This paper aims to analyse some of the different machine learning algorithms and methods which can be applied to big data analysis, as well as the opportunities provided by the application of big data analytics in various decision making domains.

KEYWORDS

Artificial Intelligence, Big Data Analysis, Machine Learning.


Bert_Se: A Pre-Trained Language Representation Model for Software Engineering

Eliane Maria De Bortoli Fávero and Dalcimar Casanova, Department of Informatics, Technological University of Paraná, Curitiba, Brazil

ABSTRACT

The application of Natural Language Processing (NLP) has achieved a high level of relevance in several areas. In the field of software engineering (SE), NLP applications are based on the classification of similar texts (e.g. software requirements), applied in tasks of estimating software effort, selection of human resources, etc. Classifying software requirements has been a complex task, considering the informality and complexity inherent in the texts produced during the software development process. The pre-trained embedding models are shown as a viable alternative when considering the low volume of textual data labeled in the area of software engineering, as well as the lack of quality of these data. Although there is much research around the application of word embedding in several areas, to date, there is no knowledge of studies that have explored its application in the creation of a specific model for the domain of the SE area. Thus, this article presents the proposal for a contextualized embedding model, called BERT_SE, which allows the recognition of specific and relevant terms in the context of SE. The assessment of BERT_SE was performed using the software requirements classification task, demonstrating that this model has an average improvement rate of 13% in relation to the BERT_base model, made available by the authors of BERT. The code and pre-trained models are available at https://github.com/...

KEYWORDS

Word embedding, Software engineering, Domain-specific Model, Contextualized pre-trained model, BERT.


Universal Sinhala Library: Encryption Platform for Sinhala Language

Dinindu Koliya Harshanath Webadu Wedanage and S Thelijjagoda, Faculty of Computing, Sri Lanka Institute of Information Technology, Sri Lanka

ABSTRACT

Security has become a significant challenge in the modern world. Number science and mathematics opened up a vast path to work with programming models to create innovative mechanisms which improve text encryption. Universal Sinhala Library is a Sinhala language-specific text encryption platform. Platform architecture has been designed to demonstrate every possible combination of the Sinhala alphabet, including comma, space and period. The hypothetical architecture includes each and every book that ever has been written in Sinhala, and every book that ever could be, including every poem, every scientific paper and every piece of document in Sinhala. The main goal of the research is to create an encryption mechanism for the Sinhala language. Linear congruential generator and extended euclidean algorithm have been used along with the Hull–Dobell Theorem to outline the backbone of the encryption platform. At present, it contains all possible combinations of Sinhala characters virtually. Sinhala text to be encrypted should be searched in the platform, and it will return the location of that particular text in the virtual library architecture, which is the encrypted text string for the searched Sinhala text. It is helpful to the people who are using or working with the Sinhala language, moreover for sharing and transferring Sinhala context securely.

KEYWORDS

Text encryption, Sinhala language, Security, Language specific encryption, Virtual architecture.


An Intelligent System to Improve Athlete Depression and Eating Disorder using Artificial Intelligence and Big Data Analysis

Xuannuo Chen1 and Yu Sun2, 1Linfield Christian, 31950 Pauba Road, Temecula, CA,92592, 2California State Polytechnic University, Pomona, CA, 91768

ABSTRACT

The inspiration for the creation of this app stemmed from the deeply rooted history of eating disorders in sports, particularly in sports that emphasize appearance and muscularity which often includes gymnastics, figure skating, dance, and diving [1]. All three sports require rapid rotation in the air which automatically results in the necessity of a more stringent weight requirement. Eating disorders can also be aggravated by sports who focus on individual performances rather than team-oriented like basketball or soccer [5]. According to research, up to thirteen percent of all athletes have, or are currently suffering from a form of eating disorder such as anorexia [2] and bulimia [3]. In the National Collegiate Athletic Association, it is estimated that up to sixteen percent of male athletes and forty- five percent of female athletes have been diagnosed with an eating disorder.

KEYWORDS

Data Mining, Mobile APP, Machine Learning.


An Improved Framework for C-v2X Systems with Data Integration and Identity-Based Authentication

Rui Huang, Lianyungang Jierui Electronics Co., Ltd., city: Lianyungang, zip code: 222061

ABSTRACT

Current trends of autonomous driving apply the hybrid of on-vehicle and roadside smart devices to perform collaborative data sensing and computing, so as to achieve a comprehensive and stable decision making. The integrated system is usually named as C-V2X. However, several challenges have significantly hindered the development and adoption of such systems. For example, the difficulty of accessing multiple data protocols of multiple devices at the bottom layer, and the centralized deployment of computing arithmetic power. Therefore, this work proposes a novel framework for the design of C-V2X systems. First, a highly aggregated architecture is designed with fully integration on multiple traffic data resources. Then a multi-level information fusion model is designed based on multi-sensors in vehicle-road coordination. The model can fit different detection environments, detection mechanisms, and time frames. Finally, a lightweight and efficient identity-based authentication method is given. The method can realize bidirectional authentication between end devices and edge gateways.

KEYWORDS

Network Protocols, Wireless Network, Mobile Network, Virus, Worms &Trojon.


Increasing Degrees of Freedom for Leading the Journey Towards User-Centric, ‘Ultimate Mobility’: Seamless Connectivity Anywhere

Muzaffar U. Khurram, Senior Principal, Accenture New Jersey, USA

ABSTRACT

In the world of multiple heterogeneous network access technologies having varying network service quality with ever-increasing demands on bandwidth, capacity and expectation of achieving reduced latencies, an end user expects true user-centric seamless connectivity at an optimally decreasing cost derived from emerging & maturing technologies integration. This is a journey that started long ago but now it seems increasingly possible in coming years.

KEYWORDS

Seamless connectivity, degrees of freedom, ‘Spectrum as Service’, eSIM, device cloud, UAV/drone, private networks.


A Comparative Study of Semantic Textual Similarity Models

Reshma Ram, Sanjay Raghavendra, Shruthi Srinarasi, Annapurna P Patil*, Ramaiah Institute of Technology, MSRIT Post, M S Ramaiah Nagar, MSR Nagar, Bengaluru, Karnataka, India 560054

ABSTRACT

Semantic textual similarity (STS) involves the process of determining the extent of similarity between two pieces of text. A score (usually from 1 to 5) is assigned to each pair of texts as a measure of their semantic similarity. The proposed work is aimed at comparing the state-of-the-art models dealing with sentence similarity, a subpart of semantic textual similarity. These models are categorized based on whether they consider contextual similarity. On fixing the hyper-parameters involved, we provide a comprehensive review of the pre-existing STS models and conclude with how this work can be utilized to optimize the sentence similarity scores.

KEYWORDS

Semantic textual similarity, Sentence similarity, Natural Language Processing, Pearson coefficient, Cosine similarity.


Mitigation Techniques to Overcome Data Harm in Model Building for ML

AyseKok Arslan, Silicon Valley researcher, Oxford Alumni- Northern California

ABSTRACT

Given the impact of Machine Learning (ML) on individuals and the society, understanding how harm might be occur throughout the ML life cycle becomes critical more than ever. By offering a framework to determine distinct potential sources of downstream harm in ML pipeline, the paper demonstrates the importance of choices throughout distinct phases of data collection, development, and deployment that extend far beyond just model training. By covering examples ranging from historical context to the process of benchmarking models application-appropriate solutions are suggested for being used instead of merely relying on generic notions of what counts as fairness.

KEYWORDS

fairness in machine learning, societal implications of machine learning, algorithmic bias, AI ethics, allocative harm, representational harm.


menu
Reach Us

emailaiaa@cndc2021.org


emailaiaaconference@yahoo.com

close