The intervention of computer technology began the era of a more intelligent and independent instrumentation system based on intelligent methods such as artificial neural networks, fuzzy logic, and genetic algorithm. On the other hand, processor with artificial cognitive ability has also been discovered in 2016. The architecture of the processor was designed based on knowledge growing system (KGS) algorithm, a new concept in artificial intelligence (AI) which is focused on the emulation of the process of the growing of knowledge in human brain after getting new information from human sensory organs. KGS is considered as the main method of a new perspective in AI called as cognitive artificial intelligence (CAI). The design is to obtain the architecture of the data path of the processor. We found that the complexity of the processor circuit is determined by the number of combinations of sensors and hypotheses as the main inputs to the processor. This paper addresses the development of an intelligence processor based on cognitive AI in order to realize an Intelligence Instrumentation System. The processor is implemented in field programmable gate array (FPGA) and able to perform human thinking emulation by using KGS algorithm.
Architecture design for a multi-sensor information fusion processorTELKOMNIKA JOURNAL
This paper discusses the design of the architecture of an information fusion processor. This processor emulates the way of human thinking, namely by drawing conclusions from the obtained collection of information. Architecture design for this processor is based on Knowledge Growing System (KGS) algorithm. KGS is a novelty in Artificial Intelligence field. Compared to other AI methods, KGS focuses on the observation of the process of the knowledge growth within human brain based on information received from the surrounding environment. By using KGS algorithm, this processor works by receiving inputs from a set of sensors and possible hypotheses obtained after the processing of the information. The processor generates a value which is called as Degree of Certainty (DoC), which show the most possible hypothesis among all alternative ones. The Processor Elements which are used to perform KGS algorithm is designed based on systolic array architecture. The design of this processor is realized with VHSIC Hardware Design Language (VHDL) and synthesized by using FPGA Quartus II.13.1. The results show that the data path which has been design is able to perform the mechanism of KGS computation
This document provides details of an industrial training presentation on artificial intelligence, machine learning, and deep learning that was delivered at the Centre for Advanced Studies in Lucknow, India from July 15th to August 14th, 2020. The presentation covered theoretical background on AI, machine learning, and deep learning. It was divided into 4 modules that discussed topics such as what machine learning is, supervised vs unsupervised learning, classification vs clustering, neural networks, activation functions, and applications of deep learning. The conclusion discussed how AI is impacting many industries and emerging technologies and will continue to be a driver of innovation.
This document provides an overview of deep learning including definitions, architectures, types of deep learning networks, and applications. It defines deep learning as a branch of machine learning that uses neural networks with multiple hidden layers to perform feature extraction and transformation without being explicitly programmed. The main architectures discussed are deep neural networks, deep belief networks, and recurrent neural networks. The types of deep learning networks covered include feedforward neural networks, recurrent neural networks, convolutional neural networks, restricted Boltzmann machines, and autoencoders. Finally, the document discusses several applications of deep learning across industries such as self-driving cars, natural language processing, virtual assistants, and healthcare.
4 technologies including AI, IoT, blockchain, and virtual reality will revolutionize the maritime sector. AI and blockchain will have many applications including supply chain visibility, data science, voyage optimization, and diagnosis systems. Training seafarers for an AI-based future will require changes to curriculum, including teaching mathematics, programming, cybersecurity, and manual operation skills. Ensuring safe return to port capabilities with redundancy will also be important as autonomy increases.
This document is a resume for Manoj Alwani providing his contact information, education history, professional experience, skills, projects, publications, and courses. It details that he has a M.S. in Computer Science from Stony Brook University and a B.Tech from India. His professional experience includes research roles at Element Inc and Stony Brook University focused on deep learning and computer vision. His skills and projects involve areas such as deep learning, computer vision, parallel computing, robotics, and natural language processing.
This document outlines advances in deep learning and neural networks. It discusses challenges in machine learning like feature extraction. It describes how neuroscience experiments showed the brain's ability to learn new tasks. Neural networks aim to mimic the brain through techniques like backpropagation to train multi-layer models. Breakthroughs like pre-training and convolutional networks helped scale networks to many layers. Deep learning is now used in speech translation, image recognition, handwriting recognition and more.
This presentation is part of the webinar. Here is the link for the webinar recording https://www.anymeeting.com/geospatialworld/E955DA81854C39
Presentation Credits: NVIDIA & Geospatial Media
Architecture design for a multi-sensor information fusion processorTELKOMNIKA JOURNAL
This paper discusses the design of the architecture of an information fusion processor. This processor emulates the way of human thinking, namely by drawing conclusions from the obtained collection of information. Architecture design for this processor is based on Knowledge Growing System (KGS) algorithm. KGS is a novelty in Artificial Intelligence field. Compared to other AI methods, KGS focuses on the observation of the process of the knowledge growth within human brain based on information received from the surrounding environment. By using KGS algorithm, this processor works by receiving inputs from a set of sensors and possible hypotheses obtained after the processing of the information. The processor generates a value which is called as Degree of Certainty (DoC), which show the most possible hypothesis among all alternative ones. The Processor Elements which are used to perform KGS algorithm is designed based on systolic array architecture. The design of this processor is realized with VHSIC Hardware Design Language (VHDL) and synthesized by using FPGA Quartus II.13.1. The results show that the data path which has been design is able to perform the mechanism of KGS computation
This document provides details of an industrial training presentation on artificial intelligence, machine learning, and deep learning that was delivered at the Centre for Advanced Studies in Lucknow, India from July 15th to August 14th, 2020. The presentation covered theoretical background on AI, machine learning, and deep learning. It was divided into 4 modules that discussed topics such as what machine learning is, supervised vs unsupervised learning, classification vs clustering, neural networks, activation functions, and applications of deep learning. The conclusion discussed how AI is impacting many industries and emerging technologies and will continue to be a driver of innovation.
This document provides an overview of deep learning including definitions, architectures, types of deep learning networks, and applications. It defines deep learning as a branch of machine learning that uses neural networks with multiple hidden layers to perform feature extraction and transformation without being explicitly programmed. The main architectures discussed are deep neural networks, deep belief networks, and recurrent neural networks. The types of deep learning networks covered include feedforward neural networks, recurrent neural networks, convolutional neural networks, restricted Boltzmann machines, and autoencoders. Finally, the document discusses several applications of deep learning across industries such as self-driving cars, natural language processing, virtual assistants, and healthcare.
4 technologies including AI, IoT, blockchain, and virtual reality will revolutionize the maritime sector. AI and blockchain will have many applications including supply chain visibility, data science, voyage optimization, and diagnosis systems. Training seafarers for an AI-based future will require changes to curriculum, including teaching mathematics, programming, cybersecurity, and manual operation skills. Ensuring safe return to port capabilities with redundancy will also be important as autonomy increases.
This document is a resume for Manoj Alwani providing his contact information, education history, professional experience, skills, projects, publications, and courses. It details that he has a M.S. in Computer Science from Stony Brook University and a B.Tech from India. His professional experience includes research roles at Element Inc and Stony Brook University focused on deep learning and computer vision. His skills and projects involve areas such as deep learning, computer vision, parallel computing, robotics, and natural language processing.
This document outlines advances in deep learning and neural networks. It discusses challenges in machine learning like feature extraction. It describes how neuroscience experiments showed the brain's ability to learn new tasks. Neural networks aim to mimic the brain through techniques like backpropagation to train multi-layer models. Breakthroughs like pre-training and convolutional networks helped scale networks to many layers. Deep learning is now used in speech translation, image recognition, handwriting recognition and more.
This presentation is part of the webinar. Here is the link for the webinar recording https://www.anymeeting.com/geospatialworld/E955DA81854C39
Presentation Credits: NVIDIA & Geospatial Media
Image Recognition Expert System based on deep learningPRATHAMESH REGE
The document summarizes literature on image recognition expert systems and deep learning. It discusses two papers:
1. The Low-Power Image Recognition Challenge which established a benchmark for comparing low-power image recognition solutions based on both accuracy and energy efficiency using datasets like ILSVRC.
2. The role of knowledge-based systems and expert systems in automatic interpretation of aerial images. It discusses techniques like semantic networks, frames and logical inference used to solve ill-defined problems with limited information. Frameworks like the blackboard model, ACRONYM and SIGMA are discussed.
MILA: Low-cost BCI framework for acquiring EEG data with IoTTELKOMNIKA JOURNAL
The brain is a vital organ in the human body that acts as the center of the human nervous system. Brain-computer interface (BCI) uses electroencephalography (EEG) signals as information on brain activity. Hospitals usually use EEG as a diagnosis of brain disease. Combining EEG as part of IoT (Internet of Things) with high mobility is challenging research. This research tries to make a low-cost BCI framework for motorcycle riders. Analysis of brain activity from EEG data when motorcycle riders turn left or turn right. Therefore, the method of further installation must produce the right features to obtain precise and accurate brainwave characteristics from EEG signals. This research uses the concept of IoT with software engineering to recording human brain waves so that it becomes a practical device for the wearer. The purpose of this study is to create a low-cost BCI framework for obtaining EEG Data.
Iirdem a biometric based approach for three dimension bio sensor implanted in...Iaetsd Iaetsd
This paper proposes a biometric sensor network implanted in the human brain to monitor for issues like brain tumors or paralysis. The sensors would send data wirelessly to be viewed on an iPhone or iPad without needing scans or x-rays. The network uses public/private key cryptography to securely transmit sensor data. A 3D visualization is proposed to effectively display the sensor data. The goal is to remotely monitor patients' brain health using this implanted sensor network and mobile devices.
The Dawn of the Age of Artificially Intelligent NeuroprostheticsSagar Hingal
A summary or an overview of the existing technologies that encapsulate the concepts of NeuroScience and Bio-Technology using the enhanced methods of Artificial-intelligence.
In this review paper, there are several case studies and methodologies of implementations of neuroprosthetics as well as how A.I (Artificial Intelligence) is evolved over the period of time and what is next on the future.....
This document provides information about a case study report submitted by Rushita Beladiya on the topic of brain fingerprinting. It includes sections on introduction, abstract, history, technical aspects, background/terminology, current uses/research, limitations, future applications/research, and conclusion. Rushita conducted this case study under the guidance of her professor Seema Joshi for her Information Technology department.
The adaptive mechanisms include the following AI paradigms that exhibit an ability to learn or adapt to new environments:
Swarm Intelligence (SI),
Artificial Neural Networks (ANN),
Evolutionary Computation (EC),
Artificial Immune Systems (AIS), and
Fuzzy Systems (FS).
This presentation deals with the basics of AI and it's connection with neural network. Additionally, it explains the pros and cons of AI along with the applications.
Prospects of Deep Learning in Medical ImagingGodswll Egegwu
A SEMINAR Presentation on the Prospects of Deep Learning in Medical Imaging Presented to the Department of Computer Science, Nasarawa State Polytechnic, Lafia.
BY:
EGEGWU, GODSWILL
08166643792
http://facebook.com/godswill.egegwu
http://egegwugodswill.name.ng
This document provides an overview of expert systems and applications of artificial intelligence. It discusses how expert systems use knowledge and reasoning to solve complex problems, and how they are widely used today in fields like science, engineering, business, and medicine. The document also explores several current uses of AI technologies, including using expert systems to optimize power system stabilizers, for network intrusion protection, improving medical diagnosis and treatment, and enhancing computer games.
Forecasting number of vulnerabilities using long short-term neural memory net...IJECEIAES
Cyber-attacks are launched through the exploitation of some existing vulnerabilities in the software, hardware, system and/or network. Machine learning algorithms can be used to forecast the number of post release vulnerabilities. Traditional neural networks work like a black box approach; hence it is unclear how reasoning is used in utilizing past data points in inferring the subsequent data points. However, the long short-term memory network (LSTM), a variant of the recurrent neural network, is able to address this limitation by introducing a lot of loops in its network to retain and utilize past data points for future calculations. Moving on from the previous finding, we further enhance the results to predict the number of vulnerabilities by developing a time series-based sequential model using a long short-term memory neural network. Specifically, this study developed a supervised machine learning based on the non-linear sequential time series forecasting model with a long short-term memory neural network to predict the number of vulnerabilities for three vendors having the highest number of vulnerabilities published in the national vulnerability database (NVD), namely microsoft, IBM and oracle. Our proposed model outperforms the existing models with a prediction result root mean squared error (RMSE) of as low as 0.072.
Neural networks in business forecastingAmir Shokri
The document discusses the use of neural networks for business forecasting. It begins with an abstract and introduction about neural networks and their applications. It then provides details on how neural networks work, including their structure of interconnected nodes that learn patterns from data. The document discusses how neural networks can be used as a forecasting tool and provides examples of their use in areas like marketing and finance. It also provides a table listing other business forecasting applications reported in literature. The conclusion emphasizes that neural networks have been successfully used for business forecasting but that each application requires careful modeling and consideration of issues. No single method like neural networks is always best, and combining methods may improve performance.
IRJET- Deep Learning Techniques for Object DetectionIRJET Journal
The document discusses deep learning techniques for object detection in images. It provides an overview of convolutional neural networks (CNNs), the most popular deep learning approach for computer vision tasks. The document describes the basic architecture of CNNs, including convolutional layers, pooling layers, and fully connected layers. It then discusses several state-of-the-art CNN models for object detection, including ResNet, R-CNN, SSD, and YOLO. The document aims to help newcomers understand the key deep learning techniques and models used for object detection in computer vision.
Challenges in deep learning methods for medical imaging - PubricaPubrica
1. Broad between association cooperation.
2. Need to Capitalize Big Image Data.
3. Progression in Deep Learning Methods.
4. Black-Box and Its Acceptance by Health Professional.
5. Security and moral issues.
6. Wrapping up.
Continue Reading: https://bit.ly/37zT2ur
Reference: https://pubrica.com/services/physician-writing-services/clinical-litearture-review-for-an-evidence-based-medicine/
Why Pubrica?
When you order our services, Plagiarism free|on Time|outstanding customer support|Unlimited Revisions support|High-quality Subject Matter Experts.
Contact us :
Web: https://pubrica.com/
Blog: https://pubrica.com/academy/
Email: sales@pubrica.com
WhatsApp : +91 9884350006
United Kingdom: +44- 74248 10299
IRJET- A Cloud based Virtual Brain Connectivity with EEG Sensor using Interne...IRJET Journal
This document describes a cloud-based virtual brain connectivity system using an EEG sensor and the Internet of Things. It uses an EEG sensor to measure brain activity, an Arduino microcontroller to process the EEG signals, an ESP8266 WiFi module to connect to the cloud, and a touchscreen display. The system can determine if the brain is alive or dead by analyzing the EEG signals. If any abnormal activity is detected, it will send alerts by SMS and email. The goal is to monitor brain activity and store the data in the cloud for analysis. This could help with conditions like autism or detect forgery. The system aims to scale up processing of large brain datasets in the future.
IRJET- Factoid Question and Answering SystemIRJET Journal
This document describes a factoid question answering system that uses neural networks and the Tensorflow framework. The system takes in a text document and question as input. It then processes the input using techniques like gated recurrent units and support vector machines to classify the question. The system calculates attention between facts and the question, modifies its memory, and identifies the word closest to the answer to output as the response. Key aspects of the system include training a question answering engine with Tensorflow, storing and retrieving data, and generating the final answer.
The presentation briefly answers the questions:
1. What is Machine Learning?
2. Ideas behind Neural Networks?
3. What is Deep Learning? How different is it from NN?
4. Practical examples of applications.

For more information:
https://www.quora.com/How-does-deep-learning-work-and-how-is-it-different-from-normal-neural-networks-and-or-SVM
http://stats.stackexchange.com/questions/114385/what-is-the-difference-between-convolutional-neural-networks-restricted-boltzma
https://www.youtube.com/watch?v=n1ViNeWhC24 - presentation by Ng
http://techtalks.tv/talks/deep-learning/58122/ - deep learning tutorial and slides - http://www.cs.nyu.edu/~yann/talks/lecun-ranzato-icml2013.pdf
Deep learning for NLP - http://www.socher.org/index.php/DeepLearningTutorial/DeepLearningTutorial
papers: http://www.cs.toronto.edu/~hinton/science.pdf
http://machinelearning.wustl.edu/mlpapers/paper_files/AISTATS2010_ErhanCBV10.pdf
http://arxiv.org/pdf/1206.5538v3.pdf
http://arxiv.org/pdf/1404.7828v4.pdf
More recommendations - https://www.quora.com/What-are-the-best-resources-to-learn-about-deep-learning
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...IRJET Journal
This paper proposes a convolutional neural network model to recognize handwritten digits using the MNIST dataset. The model is built using TensorFlow and consists of convolutional, pooling and fully connected layers. The model is trained on 60,000 images and tested on 10,000 images, achieving 98% accuracy on the training set and classifying digits with low error of 0.03% on the test set. Previous methods for handwritten digit recognition are discussed and the CNN approach is shown to provide superior performance with faster training times compared to other models.
Security System for Data Using Steganography and Cryptography (SSDSC) csandit
1) The document describes a Security System for Data using Steganography and Cryptography (SSDSC) that encrypts documents using AES encryption, hides the encrypted data in an image using LEAST SIGNIFICANT BIT steganography, and transmits the image over the internet while keeping the document contents secure.
2) It detects objects in the cover image that are suitable for hiding data, hides the encrypted data in the least significant bits of pixels in the selected regions, and extracts and decrypts the data on the receiving end.
3) Testing showed the hidden and cover images were nearly identical with only small pixel differences, and over 97% similarity, demonstrating the effectiveness of the system in concealing
Embedded artificial intelligence system using deep learning and raspberrypi f...IAESIJAI
Melanoma is a kind of skin cancer that originates in melanocytes responsible for producing melanin, it can be a severe and potentially deadly form of cancer because it can metastasize to other regions of the body if not detected and treated early. To facilitate this process, Recently, various computer-assisted low-cost, reliable, and accurate diagnostic systems have been proposed based on artificial intelligence (AI) algorithms, particularly deep learning techniques. This work proposed an innovative and intelligent system that combines the internet of things (IoT) with a Raspberry Pi connected to a camera and a deep learning model based on the deep convolutional neural network (CNN) algorithm for real-time detection and classification of melanoma cancer lesions. The key stages of our model before serializing to the Raspberry Pi: Firstly, the preprocessing part contains data cleaning, data transformation (normalization), and data augmentation to reduce overfitting when training. Then, the deep CNN algorithm is used to extract the features part. Finally, the classification part with applied Sigmoid Activation Function. The experimental results indicate the efficiency of our proposed classification system as we achieved an accuracy rate of 92%, a precision of 91%, a sensitivity of 91%, and an area under the curve- receiver operating characteristics (AUC-ROC) of 0.9133.
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOijccsa
Complex event processing systems have gained importance since recent developments in communication
and integrated circuits technologies. Developers can easily develop many smart space systems by
connecting various sensors to an Arduino as an internet of thing device. These systems are useful for many
places such as factories, greenhouses (plant house) and smart-homes. Especially in plant houses when the
desired humidity, temperature, light and soil moisture drops the certain level, the users should be notified
through their smartphones. The sensor information is sent to a central server over the internet via an
access point. The collected sensor data needs to be processed online to check whether an event is occurred
or not. The event processing system based on a complex event processing tool is created on the central
server. It is also an important issue to inform mobile users whenever an event occurs. A publish-subscribe
event based system is implemented on the central server. A mobile user is subscribed to the desired event
topic. When an event occurred, which is related with a specific topic, an alarm notification is sent to the
mobile users about the event information so as to take necessary precautions.
Complex Event Processing Using IOT Devices Based on Arduinoneirew J
Complex event processing systems have gained importance since recent developments in communication
and integrated circuits technologies. Developers can easily develop many smart space systems by
connecting various sensors to an Arduino as an internet of thing device. These systems are useful for many
places such as factories, greenhouses (plant house) and smart-homes. Especially in plant houses when the
desired humidity, temperature, light and soil moisture drops the certain level, the users should be notified
through their smartphones. The sensor information is sent to a central server over the internet via an
access point. The collected sensor data needs to be processed online to check whether an event is occurred
or not. The event processing system based on a complex event processing tool is created on the central
server. It is also an important issue to inform mobile users whenever an event occurs. A publish-subscribe
event based system is implemented on the central server. A mobile user is subscribed to the desired event
topic. When an event occurred, which is related with a specific topic, an alarm notification is sent to the
mobile users about the event information so as to take necessary precautions.
Image Recognition Expert System based on deep learningPRATHAMESH REGE
The document summarizes literature on image recognition expert systems and deep learning. It discusses two papers:
1. The Low-Power Image Recognition Challenge which established a benchmark for comparing low-power image recognition solutions based on both accuracy and energy efficiency using datasets like ILSVRC.
2. The role of knowledge-based systems and expert systems in automatic interpretation of aerial images. It discusses techniques like semantic networks, frames and logical inference used to solve ill-defined problems with limited information. Frameworks like the blackboard model, ACRONYM and SIGMA are discussed.
MILA: Low-cost BCI framework for acquiring EEG data with IoTTELKOMNIKA JOURNAL
The brain is a vital organ in the human body that acts as the center of the human nervous system. Brain-computer interface (BCI) uses electroencephalography (EEG) signals as information on brain activity. Hospitals usually use EEG as a diagnosis of brain disease. Combining EEG as part of IoT (Internet of Things) with high mobility is challenging research. This research tries to make a low-cost BCI framework for motorcycle riders. Analysis of brain activity from EEG data when motorcycle riders turn left or turn right. Therefore, the method of further installation must produce the right features to obtain precise and accurate brainwave characteristics from EEG signals. This research uses the concept of IoT with software engineering to recording human brain waves so that it becomes a practical device for the wearer. The purpose of this study is to create a low-cost BCI framework for obtaining EEG Data.
Iirdem a biometric based approach for three dimension bio sensor implanted in...Iaetsd Iaetsd
This paper proposes a biometric sensor network implanted in the human brain to monitor for issues like brain tumors or paralysis. The sensors would send data wirelessly to be viewed on an iPhone or iPad without needing scans or x-rays. The network uses public/private key cryptography to securely transmit sensor data. A 3D visualization is proposed to effectively display the sensor data. The goal is to remotely monitor patients' brain health using this implanted sensor network and mobile devices.
The Dawn of the Age of Artificially Intelligent NeuroprostheticsSagar Hingal
A summary or an overview of the existing technologies that encapsulate the concepts of NeuroScience and Bio-Technology using the enhanced methods of Artificial-intelligence.
In this review paper, there are several case studies and methodologies of implementations of neuroprosthetics as well as how A.I (Artificial Intelligence) is evolved over the period of time and what is next on the future.....
This document provides information about a case study report submitted by Rushita Beladiya on the topic of brain fingerprinting. It includes sections on introduction, abstract, history, technical aspects, background/terminology, current uses/research, limitations, future applications/research, and conclusion. Rushita conducted this case study under the guidance of her professor Seema Joshi for her Information Technology department.
The adaptive mechanisms include the following AI paradigms that exhibit an ability to learn or adapt to new environments:
Swarm Intelligence (SI),
Artificial Neural Networks (ANN),
Evolutionary Computation (EC),
Artificial Immune Systems (AIS), and
Fuzzy Systems (FS).
This presentation deals with the basics of AI and it's connection with neural network. Additionally, it explains the pros and cons of AI along with the applications.
Prospects of Deep Learning in Medical ImagingGodswll Egegwu
A SEMINAR Presentation on the Prospects of Deep Learning in Medical Imaging Presented to the Department of Computer Science, Nasarawa State Polytechnic, Lafia.
BY:
EGEGWU, GODSWILL
08166643792
http://facebook.com/godswill.egegwu
http://egegwugodswill.name.ng
This document provides an overview of expert systems and applications of artificial intelligence. It discusses how expert systems use knowledge and reasoning to solve complex problems, and how they are widely used today in fields like science, engineering, business, and medicine. The document also explores several current uses of AI technologies, including using expert systems to optimize power system stabilizers, for network intrusion protection, improving medical diagnosis and treatment, and enhancing computer games.
Forecasting number of vulnerabilities using long short-term neural memory net...IJECEIAES
Cyber-attacks are launched through the exploitation of some existing vulnerabilities in the software, hardware, system and/or network. Machine learning algorithms can be used to forecast the number of post release vulnerabilities. Traditional neural networks work like a black box approach; hence it is unclear how reasoning is used in utilizing past data points in inferring the subsequent data points. However, the long short-term memory network (LSTM), a variant of the recurrent neural network, is able to address this limitation by introducing a lot of loops in its network to retain and utilize past data points for future calculations. Moving on from the previous finding, we further enhance the results to predict the number of vulnerabilities by developing a time series-based sequential model using a long short-term memory neural network. Specifically, this study developed a supervised machine learning based on the non-linear sequential time series forecasting model with a long short-term memory neural network to predict the number of vulnerabilities for three vendors having the highest number of vulnerabilities published in the national vulnerability database (NVD), namely microsoft, IBM and oracle. Our proposed model outperforms the existing models with a prediction result root mean squared error (RMSE) of as low as 0.072.
Neural networks in business forecastingAmir Shokri
The document discusses the use of neural networks for business forecasting. It begins with an abstract and introduction about neural networks and their applications. It then provides details on how neural networks work, including their structure of interconnected nodes that learn patterns from data. The document discusses how neural networks can be used as a forecasting tool and provides examples of their use in areas like marketing and finance. It also provides a table listing other business forecasting applications reported in literature. The conclusion emphasizes that neural networks have been successfully used for business forecasting but that each application requires careful modeling and consideration of issues. No single method like neural networks is always best, and combining methods may improve performance.
IRJET- Deep Learning Techniques for Object DetectionIRJET Journal
The document discusses deep learning techniques for object detection in images. It provides an overview of convolutional neural networks (CNNs), the most popular deep learning approach for computer vision tasks. The document describes the basic architecture of CNNs, including convolutional layers, pooling layers, and fully connected layers. It then discusses several state-of-the-art CNN models for object detection, including ResNet, R-CNN, SSD, and YOLO. The document aims to help newcomers understand the key deep learning techniques and models used for object detection in computer vision.
Challenges in deep learning methods for medical imaging - PubricaPubrica
1. Broad between association cooperation.
2. Need to Capitalize Big Image Data.
3. Progression in Deep Learning Methods.
4. Black-Box and Its Acceptance by Health Professional.
5. Security and moral issues.
6. Wrapping up.
Continue Reading: https://bit.ly/37zT2ur
Reference: https://pubrica.com/services/physician-writing-services/clinical-litearture-review-for-an-evidence-based-medicine/
Why Pubrica?
When you order our services, Plagiarism free|on Time|outstanding customer support|Unlimited Revisions support|High-quality Subject Matter Experts.
Contact us :
Web: https://pubrica.com/
Blog: https://pubrica.com/academy/
Email: sales@pubrica.com
WhatsApp : +91 9884350006
United Kingdom: +44- 74248 10299
IRJET- A Cloud based Virtual Brain Connectivity with EEG Sensor using Interne...IRJET Journal
This document describes a cloud-based virtual brain connectivity system using an EEG sensor and the Internet of Things. It uses an EEG sensor to measure brain activity, an Arduino microcontroller to process the EEG signals, an ESP8266 WiFi module to connect to the cloud, and a touchscreen display. The system can determine if the brain is alive or dead by analyzing the EEG signals. If any abnormal activity is detected, it will send alerts by SMS and email. The goal is to monitor brain activity and store the data in the cloud for analysis. This could help with conditions like autism or detect forgery. The system aims to scale up processing of large brain datasets in the future.
IRJET- Factoid Question and Answering SystemIRJET Journal
This document describes a factoid question answering system that uses neural networks and the Tensorflow framework. The system takes in a text document and question as input. It then processes the input using techniques like gated recurrent units and support vector machines to classify the question. The system calculates attention between facts and the question, modifies its memory, and identifies the word closest to the answer to output as the response. Key aspects of the system include training a question answering engine with Tensorflow, storing and retrieving data, and generating the final answer.
The presentation briefly answers the questions:
1. What is Machine Learning?
2. Ideas behind Neural Networks?
3. What is Deep Learning? How different is it from NN?
4. Practical examples of applications.

For more information:
https://www.quora.com/How-does-deep-learning-work-and-how-is-it-different-from-normal-neural-networks-and-or-SVM
http://stats.stackexchange.com/questions/114385/what-is-the-difference-between-convolutional-neural-networks-restricted-boltzma
https://www.youtube.com/watch?v=n1ViNeWhC24 - presentation by Ng
http://techtalks.tv/talks/deep-learning/58122/ - deep learning tutorial and slides - http://www.cs.nyu.edu/~yann/talks/lecun-ranzato-icml2013.pdf
Deep learning for NLP - http://www.socher.org/index.php/DeepLearningTutorial/DeepLearningTutorial
papers: http://www.cs.toronto.edu/~hinton/science.pdf
http://machinelearning.wustl.edu/mlpapers/paper_files/AISTATS2010_ErhanCBV10.pdf
http://arxiv.org/pdf/1206.5538v3.pdf
http://arxiv.org/pdf/1404.7828v4.pdf
More recommendations - https://www.quora.com/What-are-the-best-resources-to-learn-about-deep-learning
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...IRJET Journal
This paper proposes a convolutional neural network model to recognize handwritten digits using the MNIST dataset. The model is built using TensorFlow and consists of convolutional, pooling and fully connected layers. The model is trained on 60,000 images and tested on 10,000 images, achieving 98% accuracy on the training set and classifying digits with low error of 0.03% on the test set. Previous methods for handwritten digit recognition are discussed and the CNN approach is shown to provide superior performance with faster training times compared to other models.
Security System for Data Using Steganography and Cryptography (SSDSC) csandit
1) The document describes a Security System for Data using Steganography and Cryptography (SSDSC) that encrypts documents using AES encryption, hides the encrypted data in an image using LEAST SIGNIFICANT BIT steganography, and transmits the image over the internet while keeping the document contents secure.
2) It detects objects in the cover image that are suitable for hiding data, hides the encrypted data in the least significant bits of pixels in the selected regions, and extracts and decrypts the data on the receiving end.
3) Testing showed the hidden and cover images were nearly identical with only small pixel differences, and over 97% similarity, demonstrating the effectiveness of the system in concealing
Embedded artificial intelligence system using deep learning and raspberrypi f...IAESIJAI
Melanoma is a kind of skin cancer that originates in melanocytes responsible for producing melanin, it can be a severe and potentially deadly form of cancer because it can metastasize to other regions of the body if not detected and treated early. To facilitate this process, Recently, various computer-assisted low-cost, reliable, and accurate diagnostic systems have been proposed based on artificial intelligence (AI) algorithms, particularly deep learning techniques. This work proposed an innovative and intelligent system that combines the internet of things (IoT) with a Raspberry Pi connected to a camera and a deep learning model based on the deep convolutional neural network (CNN) algorithm for real-time detection and classification of melanoma cancer lesions. The key stages of our model before serializing to the Raspberry Pi: Firstly, the preprocessing part contains data cleaning, data transformation (normalization), and data augmentation to reduce overfitting when training. Then, the deep CNN algorithm is used to extract the features part. Finally, the classification part with applied Sigmoid Activation Function. The experimental results indicate the efficiency of our proposed classification system as we achieved an accuracy rate of 92%, a precision of 91%, a sensitivity of 91%, and an area under the curve- receiver operating characteristics (AUC-ROC) of 0.9133.
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOijccsa
Complex event processing systems have gained importance since recent developments in communication
and integrated circuits technologies. Developers can easily develop many smart space systems by
connecting various sensors to an Arduino as an internet of thing device. These systems are useful for many
places such as factories, greenhouses (plant house) and smart-homes. Especially in plant houses when the
desired humidity, temperature, light and soil moisture drops the certain level, the users should be notified
through their smartphones. The sensor information is sent to a central server over the internet via an
access point. The collected sensor data needs to be processed online to check whether an event is occurred
or not. The event processing system based on a complex event processing tool is created on the central
server. It is also an important issue to inform mobile users whenever an event occurs. A publish-subscribe
event based system is implemented on the central server. A mobile user is subscribed to the desired event
topic. When an event occurred, which is related with a specific topic, an alarm notification is sent to the
mobile users about the event information so as to take necessary precautions.
Complex Event Processing Using IOT Devices Based on Arduinoneirew J
Complex event processing systems have gained importance since recent developments in communication
and integrated circuits technologies. Developers can easily develop many smart space systems by
connecting various sensors to an Arduino as an internet of thing device. These systems are useful for many
places such as factories, greenhouses (plant house) and smart-homes. Especially in plant houses when the
desired humidity, temperature, light and soil moisture drops the certain level, the users should be notified
through their smartphones. The sensor information is sent to a central server over the internet via an
access point. The collected sensor data needs to be processed online to check whether an event is occurred
or not. The event processing system based on a complex event processing tool is created on the central
server. It is also an important issue to inform mobile users whenever an event occurs. A publish-subscribe
event based system is implemented on the central server. A mobile user is subscribed to the desired event
topic. When an event occurred, which is related with a specific topic, an alarm notification is sent to the
mobile users about the event information so as to take necessary precautions.
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYCynthia King
Artificial intelligence techniques can help address challenges in cyber security that are difficult for humans to handle alone. Neural networks have proven effective for tasks like pattern recognition and classification that are well-suited to their speed of operation. Expert systems allow codifying security expertise to help with tasks like intrusion detection and response. As cyber threats evolve rapidly, applying learning approaches from artificial intelligence can help security systems adapt dynamically instead of relying only on fixed algorithms. Overall, artificial intelligence shows promise for enhancing cyber security capabilities by accelerating the intelligence of security systems.
Artificial Intelligence Techniques for Cyber SecurityIRJET Journal
This document discusses how artificial intelligence techniques can help address challenges in cyber security. It describes how expert systems, neural networks, and intelligent agents are currently being used or could be used to improve intrusion detection, malware detection, and response times to cyber attacks. While AI shows promise in enhancing cyber security capabilities, the document also notes that AI systems have limitations and still require human guidance and training to effectively respond to intelligent adversaries. Overall, the document advocates for a combined human-AI approach to cyber security to take advantage of the capabilities of both.
This document discusses how artificial intelligence techniques can help address challenges in cyber security. It describes how expert systems, neural networks, and intelligent agents are currently being used or could be used to improve intrusion detection, malware detection, and response times to cyber attacks. While AI shows promise in enhancing cyber security abilities, the author notes it is not a complete solution on its own and still requires human guidance and training to address evolving security threats. Overall, the integration of AI and human experts is posited as a promising approach for cyber security.
IRJET- Human Activity Recognition using Flex SensorsIRJET Journal
This document discusses a system for human activity recognition using flex sensors. Flex sensors are attached to the body and can detect movements. The flex sensor data is fed into a neural network model to recognize activities. The model is trained using flex sensor data from various human activities. The trained model can then accurately recognize activities based on new flex sensor input data. The system is meant to help elderly people or those with disabilities by allowing them to control devices with body movements detected by flex sensors. It aims to provide a modular system that can adapt to new users and disabilities. Flex sensors make the system customizable while neural networks enable accurate activity recognition.
Qadri et Al., en su trabajo “The Future of Healthcare Internet of Things (H-IoT): A Survey of Emerging Technologies” propone como uno de los desafíos del H-IoT:
Monitoreo de Desórdenes neurológicos
Ambient Assisted Living (AAL)
Fitness Tracking
Uso de técnicas de Big Data
Uso de Edge Computing
Internet of Nano-Things
This document describes a system that uses a neural network to control external devices based on fingerprint recognition. The system takes a fingerprint as input to the neural network. If the fingerprint is recognized, it will activate connected devices and output a welcome message. If not recognized, an alarm will sound and a denial message will display. The system was designed and implemented using MATLAB for the neural network and an interface circuit to drive the external devices. The neural network was trained on five fingerprint samples and successfully identified input fingerprints matching the targets.
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadehnabati
1. The document discusses a proposed system that uses smart virtualized objects and Sensor Web Enablement (SWE) standards to improve worker safety in industrial environments through increased monitoring capabilities.
2. Smart objects equipped with sensors would collect and share data through a Sensor Observation Service to provide real-time awareness of worker locations and conditions.
3. A use case demonstrates how the system could detect potential collisions between lift trucks in a factory and alert drivers in time to avoid accidents through cloud-based processing of sensor data.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...IRJET Journal
This document discusses how artificial intelligence methods can help curb cyber assaults. It reviews various AI techniques including expert systems, artificial neural networks, and intelligent agents that have been implemented or could potentially be implemented for cyber security purposes. For example, expert systems have been used to analyze risk levels on e-commerce sites and identify system vulnerabilities. Artificial neural networks have been applied for intrusion detection and classification of attacks. Intelligent agents are well-suited for combating cyber crimes due to their mobility, flexibility, and cooperative nature. The document concludes that while AI is already being used in various ways for cyber security, hackers may also start using AI techniques, presenting new challenges going forward.
This document provides an overview of Mahdi Hosseini Moghaddam's background and work applying machine learning and cognitive computing for intrusion detection. It discusses his education in computer science and engineering and awards. It then outlines the goals of the presentation to discuss real-world applications of machine learning rather than scientific details. The document proceeds to discuss problems with current intrusion detection systems, introduce concepts in machine learning and cognitive computing, and describe Mahdi's methodology and architecture for a hardware-based machine learning system using a cognitive processor to enable fast intrusion detection.
Toddler monitoring system in vehicle using single shot detector-mobilenet and...IAESIJAI
Road vehicles are today’s primary form of transportation; the safety of children passengers must take precedence. Numerous reports of toddler death in road vehicles, include heatstroke and accidents caused by negligent parents. In this research, we report a system developed to monitor and detect a toddler's presence in a vehicle and to classify the toddler's seatbelt status. The objective of the toddler monitoring system is to monitor the child's conditions to ensure the toddler's safety. The device senses the toddler's seatbelt status and warns the driver if the child is left in the car after the vehicle is powered off. The vision-based monitoring system employs deep learning algorithms to recognize infants and seatbelts, in the interior vehicle environment. Due to its superior performance, the Nvidia Jetson Nano was selected as the computational unit. Deep learning algorithms such as faster region-based convolutional neural network (R-CNN), single shot detector (SSD)- MobileNet, and single shot detector (SSD)-Inception was utilized and compared for detection and classification. From the results, the object detection algorithms using Jetson Nano achieved 80 FPS, with up to 82.98% accuracy, making it feasible for online and real-time in-vehicle monitoring with low power requirements.
A survey of Network Intrusion Detection using soft computing Techniqueijsrd.com
with the impending era of internet, the network security has become the key foundation for lot of financial and business application. Intrusion detection is one of the looms to resolve the problem of network security. An Intrusion Detection System (IDS) is a program that analyses what happens or has happened during an execution and tries to find indications that the computer has been misused. Here we propose a new approach by utilizing neuro fuzzy and support vector machine with fuzzy genetic algorithm for higher rate of detection.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This paper demonstrates a framework that entails a bottom-up approach to
accelerate research, development, and verification of neuro-inspired sensing
devices for real-life applications. Previous work in neuromorphic
engineering mostly considered application-specific designs which is a strong
limitation for researchers to develop novel applications and emulate the true
behaviour of neuro-inspired systems. Hence to enable the fully parallel
brain-like computations, this paper proposes a methodology where a spiking
neuron model was emulated in software and electronic circuits were then
implemented and characterized. The proposed approach offers a unique
perspective whereby experimental measurements taken from a fabricated
device allowing empirical models to be developed. This technique acts as a
bridge between the theoretical and practical aspects of neuro-inspired
devices. It is shown through software simulations and empirical modelling
that the proposed technique is capable of replicating neural dynamics and
post-synaptic potentials. Retrospectively, the proposed framework offers a
first step towards open-source neuro-inspired hardware for a range of
applications such as healthcare, applied machine learning and the internet of
things (IoT).
The document describes a study that uses deep learning to predict the severity of Parkinson's disease. Researchers developed a deep neural network model using voice data from 42 Parkinson's patients. The model takes 16 biomedical voice measures as input and predicts either the total UPDRS score or motor UPDRS score as output. When predicting total UPDRS, the model achieved 62.7% test accuracy, higher than a previous study. When predicting motor UPDRS, it achieved 81.7% test accuracy, also higher than previous work. The study demonstrates that deep learning can effectively predict Parkinson's severity from voice data.
A pre-trained model vs dedicated convolution neural networks for emotion reco...IJECEIAES
Facial expression recognition (FER) is one of the most important methods influencing human-machine interaction (HMI). In this paper, a comparison was made between two models, a model that was built from scratch and trained on FER dataset only, and a model previously trained on a data set containing various images, which is the VGG16 model, then the model was reset and trained using FER dataset. The FER+ data set was augmented to be used in training phases using the two proposed models. The models will be evaluated (extra validation) by using images from the internet in order to find the best model for identifying human emotions, where Dlib detector and OpenCV libraries are used for face detection. The results showed that the proposed emotion recognition convolutional neural networks (ERCNN) model dedicated to identifying human emotions significantly outperformed the pre-trained model in terms of accuracy, speed, and performance, which was 87.133% in the public test and 82.648% in the private test. While it was 71.685% in the public test and 67.338% in the private test using the proposed VGG16 pre-trained model.
Auscultation training devices are needed by teachers and students in health schools to practice auscultation techniques. In this paper, a low-cost IoTbased auscultation training device has been developed using NodeMCU, four proximity sensors, metal as a stethoscope, a switch, an android smartphone, an earphone, and a phantom doll. The message queuing telemetry transport (MQTT) protocol has been used for data communication between NodeMCU and smartphones, therefore an auscultation training hardware can be used by many students who have auscultation training application on their smartphones that subscribe to topics. The results showed that an auscultation training device was able to detect a stethoscope. Auscultation training application on a smartphone successfully plays normal and abnormal breathing sounds based on subscribed topics. With a production cost of less than 15 USD, we offer an inexpensive IoT-based auscultation training device.
Similar to Towards cognitive artificial intelligence device: an intelligent processor based on human thinking emulation (20)
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
This document describes using a snake optimization algorithm to tune the gains of an enhanced proportional-integral controller for congestion avoidance in a TCP/AQM system. The controller aims to maintain a stable and desired queue size without noise or transmission problems. A linearized model of the TCP/AQM system is presented. An enhanced PI controller combining nonlinear gain and original PI gains is proposed. The snake optimization algorithm is then used to tune the parameters of the enhanced PI controller to achieve optimal system performance and response. Simulation results are discussed showing the proposed controller provides a stable and robust behavior for congestion control.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMHODECEDSIET
Time Division Multiplexing (TDM) is a method of transmitting multiple signals over a single communication channel by dividing the signal into many segments, each having a very short duration of time. These time slots are then allocated to different data streams, allowing multiple signals to share the same transmission medium efficiently. TDM is widely used in telecommunications and data communication systems.
### How TDM Works
1. **Time Slots Allocation**: The core principle of TDM is to assign distinct time slots to each signal. During each time slot, the respective signal is transmitted, and then the process repeats cyclically. For example, if there are four signals to be transmitted, the TDM cycle will divide time into four slots, each assigned to one signal.
2. **Synchronization**: Synchronization is crucial in TDM systems to ensure that the signals are correctly aligned with their respective time slots. Both the transmitter and receiver must be synchronized to avoid any overlap or loss of data. This synchronization is typically maintained by a clock signal that ensures time slots are accurately aligned.
3. **Frame Structure**: TDM data is organized into frames, where each frame consists of a set of time slots. Each frame is repeated at regular intervals, ensuring continuous transmission of data streams. The frame structure helps in managing the data streams and maintaining the synchronization between the transmitter and receiver.
4. **Multiplexer and Demultiplexer**: At the transmitting end, a multiplexer combines multiple input signals into a single composite signal by assigning each signal to a specific time slot. At the receiving end, a demultiplexer separates the composite signal back into individual signals based on their respective time slots.
### Types of TDM
1. **Synchronous TDM**: In synchronous TDM, time slots are pre-assigned to each signal, regardless of whether the signal has data to transmit or not. This can lead to inefficiencies if some time slots remain empty due to the absence of data.
2. **Asynchronous TDM (or Statistical TDM)**: Asynchronous TDM addresses the inefficiencies of synchronous TDM by allocating time slots dynamically based on the presence of data. Time slots are assigned only when there is data to transmit, which optimizes the use of the communication channel.
### Applications of TDM
- **Telecommunications**: TDM is extensively used in telecommunication systems, such as in T1 and E1 lines, where multiple telephone calls are transmitted over a single line by assigning each call to a specific time slot.
- **Digital Audio and Video Broadcasting**: TDM is used in broadcasting systems to transmit multiple audio or video streams over a single channel, ensuring efficient use of bandwidth.
- **Computer Networks**: TDM is used in network protocols and systems to manage the transmission of data from multiple sources over a single network medium.
### Advantages of TDM
- **Efficient Use of Bandwidth**: TDM all
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
Towards cognitive artificial intelligence device: an intelligent processor based on human thinking emulation
1. TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 3, June 2020, pp. 1475~1482
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i3.14835 1475
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
Towards cognitive artificial intelligence device:
an intelligent processor based on human thinking emulation
Catherine Olivia Sereati1
, Arwin Datumaya Wahyudi Sumari2
, Trio Adiono3
,
Adang Suwandi Ahmad4
1
Department of Electrical Engineering, Universitas Katolik Indonesia Atma Jaya Jakarta, Indonesia
2
Department of Electrical Engineering, State Polytechnic of Malang, Indonesia
2
Faculty of Defense Technology, Indonesia Defense University, Indonesia
3,4
School of Electrical Engineering and Informatics, Institut Teknologi Bandung, Indonesia
Article Info ABSTRACT
Article history:
Received Aug 15, 2019
Revised Jan 20, 2020
Accepted Feb 23, 2020
The intervention of computer technology began the era of a more intelligent
and independent instrumentation system based on intelligent methods such as
artificial neural networks, fuzzy logic, and genetic algorithm. On the other
hand, processor with artificial cognitive ability has also been discovered in
2016. The architecture of the processor was designed based on knowledge
growing system (KGS) algorithm, a new concept in artificial intelligence (AI)
which is focused on the emulation of the process of the growing of knowledge
in human brain after getting new information from human sensory organs.
KGS is considered as the main method of a new perspective in AI called as
cognitive artificial intelligence (CAI). The design is to obtain the architecture
of the data path of the processor. We found that the complexity of the processor
circuit is determined by the number of combinations of sensors and hypotheses
as the main inputs to the processor. This paper addresses the development of
an intelligence processor based on cognitive AI in order to realize an
Intelligence Instrumentation System. The processor is implemented in field
programmable gate array (FPGA) and able to perform human thinking
emulation by using KGS algorithm.
Keywords:
Cognitive artificial intelligence
Human thinking emulation
Intelligent instrumentation
Intelligent processor
Knowledge growing system
This is an open access article under the CC BY-SA license.
Corresponding Author:
Catherine Olivia Sereati,
Department of Electrical Engineering,
Universitas Katolik Indonesia Atma Jaya.
Jenderal Sudirman St. Kav 51, Jakarta, Indonesia
Email: catherine.olivia@atmajaya.ac.id
1. INTRODUCTION
The demands of intelligent instrumentation system are increasing. One of the system’s capability is
autonomous calibration, where sensors independently carry out calibration due to the measurement results of
drifts that are affected by the environment [1]. Changes in analog systems to digital ones increasingly improve
the precision of instrumentation systems. The development of artificial intelligence (AI) adds the complexity of
instrumentation systems but presents smarter ones and opens wide opportunities for more specialized use and
autonomous instrumentation [2]. The development of CAI was triggered by the discovery of cognitive
characteristic shows by the brain when generating new knowledge. We call this mechanism as knowledge
growing (KG) where the knowledge is obtained after the brain extracted new inferencing from the fusion
of information delivered from sensory organs after carrying out interaction to the world. Therefore, we call a
2. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 3, June 2020: 1475 - 1482
1476
system that has ability to grow its own knowledge as knowledge growing system (KGS) along with its
computational mehod.
The development of KGS as the main engine of CAI opens the opportunity to create an intelligent
instrumentation system where its intelligence is shown with the cognitive ability put in it. This kind of intelligent
instrumentation system can be realized by embedding a processor that has cognitive properties, as the main
controller of the system. By implementing it, we are sure that a processor which has cognitive ability namely,
emulating the way of human thinks can be realized. The cognitive-based processor then will be used to support
the development intelligent instrumentation system in various fields [3–8]. Emulating the way of human thinks
into a software computer was already a big challenge, and it was even a bigger challenge to implement it into a
hardware [9–11]. Other researchers have also mentioned that the cognitive processor system design is expected
to contribute to the development of artificial intelligence-based processor designs [12, 13]. In this paper we
delivered the technique to implement KGS computation method to create a human thinking emulation processor
called as CAI processor or simply cognitive processor, an intelligent device for intelligent system.
2. RESEARCH METHOD
Current conventional computing methods based on AI mostly obtain knowledge based on past data or
experiences and not yet equipped with the ability to generate knowledge from brand new data obtained from
directly interacting with the world, in this case a phenomenon being observed. In addition, the knowledge
generated by the existing AI methods are still limited by using existing data to produce specific goals (supervised
learning) or by providing a set of data to see the form of its output (unsupervised learning) [14, 15]. This means
that the current AI computational methods are currently not equipped with a feature which gives them an ability
to learn something new from the information obtained from their sensory organs that perform interactions to a
phenomenon. KGS computation is inspired by the way of the human brain draws conclusions based on
information received from the environment [16, 17]. The basic concept of KGS is to emulate the way of
human’s brain develops new knowledge from the information delivered by human sensory organs gathered
from the phenomenon the human interacts with as illustrated in Figure 1 [18]. The process to gain new
knowledge is started by sensing the phenomenon and receiving the information regarding it from all sensory
organs. This can only be done by making interactions with the observed phenomenon using one or more sensory
organs. Mostly, information from only one sensors can only give a little knowledge regarding the phenomenon.
By getting more information from various sensory organs, then human can have more knowledge and be able
to explain what the phenomenon being interacted with.
Information
Fusion
INFORMATION
FUSION S1
OBSERVATION FROM
SENSORY ORGANS
INFORMATION
FUSION S2
INFORMATION
FUSION S3
INFORMATION
FUSION S4
INFORMATION
FUSION S5
INFORMATION
INFERENCING
EACH SENSORS
INFORMATION
INFERENCING
FUSION: S1 & S2
INFORMATION
INFERENCING
FUSION: S1 & S3
INFORMATION
INFERENCING
FUSION: S1 & S2&S4
INFORMATION
INFERENCING FUSION:
ALL SENSORS
DoC
New
KnowledgeKnowledge Data
Base (Prior
Knowledge)
Knowledge
Inferencing Fusion
Ultimate
Knowledge
tn
tn
tn
tn
Figure 1. KGS mechanism in growing knowledge
3. TELKOMNIKA Telecommun Comput El Control
Towards cognitive artificial intelligence device: an intelligent processor based .... (Catherine Olivia Sereati)
1477
The information delivered from the sensory organs is fused to obtain comprehensive information.
Each fused information will its own probability value or DoC which represents the knowledge obtained by
KGS about the phenomenon. Each comprehensive information’s probability value then becomes new
knowledge which is measured with DoC. DoC represents the value of certainty for each new knowledge
depending on the sensory organs’ information that has been fused. DoC also shows the best combination of
sensor data and hypotheses that may occur related to the observed phenomenon. The process of KGS is
described by two formulas namely ASSA2010 (Arwin Sumari-Suwandi Ahmad 2010) method for single
observation time, and OM-ASSA2010 (observation multi time Arwin Sumari-Suwandi Ahmad 2010) for
multiple observation time as shown in (1). The results are in the form of new knowledge probability
distribution (NKPD) namely, the list of knowledge of the system regarding the observed phenomenon based
on the observed data from the sensory organs[19]. NKPD is knowledge obtained from single observation time
while NKPD over time (NKPDT) is the ultimate knowledge of the system after performing a computation to
information from multiple times of observation.
1
( )
( )
i
t
t
t
P
P
=
=
(1)
where:
𝜏 = the number of times in multiple observation, 𝜏 is replaced with n for single observation time;
𝑃(𝜓𝑡
𝑖) = the best value of the combination of sensor-data and hypothesis at each observation time;
𝑃( 𝜃𝑡) = the best combination of sensor-data and hypothesis value at whole observation time.
The ultimate knowledge which the best combination of sensor-data and hypothesis that is obtained
from several observation times will also be calculated using DoC with the mathematics formula in (2).
( )
max[ ( ) ]j
DoC P estimate
P
=
=
(2)
where P()estimate is the value of DoC which is commonly the greatest value of the combination of sensor-data
and hypotheses resulted from the OM-ASSA2010 formula computation. This mechanism will be implemented
in hardware which is, in this case, is field programmable gate array (FPGA).
Before implemented in FPGA and based on the preliminary designs of the data path, the VHDL design
for CAI or simply cognitive processor was successfully made [20]. Figure 2 shows the flowchart of the KGS
algorithm as the basis for designing the data path for the cognitive processor. The process is started with the
retrieval of data from sensors which is called an indication, namely information regarding the observed
phenomenon. The number of hypotheses is also set up according to the number of sensors used by the system.
The number of hypotheses is computed by using (3), where is the maximum number of possible hypotheses
and is the number of the sensor.
( )2 1
= − −
(3)
The system will check whether each sensor can observe every condition of the existing hypothesis
and put a binary value 0 or 1 depending on the result of the sensor’s observation. If all sensor data is already
completely received and each value of the combination of sensor data and hypotheses is already filled in, then
the next process is the carry out the information fusion and obtain comprehensive information for each
combination of sensor-data dan hypothesis. The comprehensive information becomes the inferencing of each
combination of sensor-data and hypothesis which will have a variety of probability values depending on the
values of all sensor-data and hypotheses for each hypothesis. The inferencing will become a new knowledge
of the system. This mechanism is carried out by using (1) and the amount of knowledge obtained at this point
is measured with DoC using (2).
This mechanism will continue time by time as long as the system is still making the interaction with
the phenomenon, sensing to obtain information, and perceiving it. There is a confirmation whether all
inferencing has already been done from t1 to t. DoC of each observation time is stored to be fused with the
next inferencing if the DoC at this point cannot recognize the observed phenomenon. The components of a
cognitive processor that are designed are based on OM-ASSA2010 formula which becomes the algorithm of
4. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 3, June 2020: 1475 - 1482
1478
KGS. To implement this equation into hardware, we had to form a series of systolic arrays [21–23], with the
matrix equation as shown in (4), and it becomes the basis for forming a dependence graph to determine the
cognitive processor component as shown in Figure 3. From this dependence graph, the cognitive processor
elements are depicted in Figure 4.
1
1
1 11 12 13 1 1
1
2 21 22 23 2 2
2
j 1 2 3 i
1
( )
P ...
( )
P ..,
... .. .. .. .. .. ...
...
P .. w
( )
t
i
t
i
j j j ji
t
n
P
t
v v v v w
P
v v v v w
t
v v v v
P
t
−
−
−
= +
(4)
where w1 = w2 =… = wi = w
Figure 2. The flowchart of the KGS algorithm as the basis for the design of cognitive processor data-path
5. TELKOMNIKA Telecommun Comput El Control
Towards cognitive artificial intelligence device: an intelligent processor based .... (Catherine Olivia Sereati)
1479
1
3
2
...
i
Pw1
Pwj
Pw2
j
j
V11 V12
...
V1i
V21 V22
...
V2i
............
Vj1
...
VjiVj2
• • • •
• • • •
• • • •
• • • •
w1 w2 wi
...
NKPDH1 (t-1)
1 2 ... i
NKPDH2 (t-1)
NKPDH3 (t-1)
NKPDHj (t-1)
NKPDH2 (t-1)
NKPDH3 (t-1)
NKPDHj (t-1)
NKPDH1 (t-1)
NKPDH2 (t-1)
NKPDH3 (t-1)
NKPDHj (t-1)
NKPDH1 (t-1)
Figure 3. Dependence graph for cognitive processor
X
+
v11v12 .. v1i
D
X
P(w) t
1
1/T
NKPDH1t-1
X
+
v11v12 .. v1i
D
X
P(w) t
1
1/T
X
+
v11v12 .. v1i
D
X
P(w) t
1
1/T
X
+
v11v12 .. v1i
D
X
P(w) t
1
1/T
w
PE 1 PE 2 PE 3 PE j
PE 1 PE 2 PE 3 PE j
NKPDH3t-1
NKPDHjt-1NKPDH2t-1
Figure 4. The elements of the cognitive processor
In Figure 4, it can be seen that the OM-ASSA2010 computational circuits consist of multiplication
and adder components. The D-Latch register is used to store the calculation results from the adder and
multiplication components. In this processor architecture design, the number of adder components is influenced
by the number of hypotheses. The number of sensors affects computing time. As an example, a cognitive
processor with 4 sensors with 13 possible hypotheses, but we allocated only 8 hypotheses or possible events,
it will take 8 adders with a computational time length of 4 timing stages.
3. RESULTS AND ANALYSIS
The testbench simulation for CAI processor is shown in Figure 5, where the system successfully
produced DoC values at the 4th
computation time. Based on the results of the modeling and the designing
cognitive processor, its circuit is implemented in FPGA module [24, 25]. We used Cyclone IVE EPCE6F17C6
which has a total I/O of 180, to implement the designed processor where in this experiment we used
4 hypotheses or probable answers. The results of FPGA implementation for cognitive processor is shown in
Figure 6, and the synthesis results of the simulation are given in Figure 7. From the synthesis results, it can be
seen that cognitive processor with 4 hypotheses requires 527 logic elements, and 86 pins consisting of 3 pins
for the timing element (clock, reset, and enable), 4x4 pin for input register, 7 pins for display counter, and
17x4 pin for output register. The implementation of the cognitive processor in FPGA has also been carried out
for a combination of 4 sensor inputs and 8 hypotheses. The implementation results for this configuration show
that the required logic elements are 2.162, and 170 pins consist of 2 pins for the timing (clock and reset)
elements, 4x8 pin for input register, and 17x8 pin for output register. From the implementation results, it can
be seen that the number of hypotheses affects the circuit complexity of the cognitive processor. The more
possible events that are set up then the wider the data path should be set up and the higher the number of logic
elements will be used. From the experiment results, double the number of hypotheses fourfolds the number of
logic elements, from 527 for 4 hypotheses to 2.162 for 8 hypotheses or there is a 310% increase. On the other
hand, the number of pins increases from 86 pins to 170 pins or there is a 98% increase.
6. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 3, June 2020: 1475 - 1482
1480
Figure 5. Testbench simulation for the cognitive processor
Figure 6. The hardware implementation of the cognitive processor with 4 hypotheses
Figure 7. The synthesis results of CAI processor
4. CONCLUSION
From our experiments, it can be seen that we have successfully implemented the KGS algorithm into
FPGA and also carried out a simulation to show that it works well. Synthesizing its hardware implementation,
7. TELKOMNIKA Telecommun Comput El Control
Towards cognitive artificial intelligence device: an intelligent processor based .... (Catherine Olivia Sereati)
1481
we found that the complexity of the cognitive processor increases as the number of hypotheses increases which
are affected the number of sensors. As can be seen from (3) that the number of sensors automatically affects
the maximum number of hypotheses or possible events that can be formed from the computation. It is an
analogy to humans, the more sensory organs use to observe a phenomenon then the more probable answers
that can be obtained and more knowledge that can be acquired to challenge is how to reduce the number of
logic elements increase as the number of hypotheses increase. One of the ways is to find a method to determine
the number of the most probable hypotheses for a number of sensors for observing a phenomenon.
From the perspective of hardware implementation, we continue our research in designing a much
better cognitive processor based on the KGS algorithm. We believe that our cognitive processor if it is ready
in the form of system on chip (SoC), it would be the main supporter for the autonomous mobile electronic
instrumentation system. The implementation of a CAI-based processor can improve the performance of the
intelligence instrumentation system because of its ability to increase its own knowledge as time passes based
on the inputs it receives from the phenomenon in its surroundings, as it is done naturally by humans in their
daily life.
ACKNOWLEDGMENTS
The author would like to express sincere thanks to the CAIRG Laboratory for its support so that this
research can be carried out and completed.
REFERENCES
[1] W. Shi, M. B. Alawieh, X. Li, and H. Yu, “Algorithm and hardware implementation for visual perception system in
autonomous vehicle: A survey,” Integration,the VLSI Journal, vol. 59. pp. 148–156, 2017, doi: 10.1016/j.vlsi.2017.07.007.
[2] T. Sutikno, M. Facta, and G. A. M. Markadeh, “Progress in Artificial Intelligence Techniques: from Brain to
Emotion,” TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 9, no. 2, pp. 201–201, 2011.
[3] K. O. Bachri, A. D. W. Sumari, B. A. Soedjarno, and A. S. Ahmad, “The implementation of A3S information fusion
algorithm for interpreting Dissolved Gas Analysis (DGA) based on Doernenburg Ratio,” in 2017 International
Symposium on Electronics and Smart Devices, ISESD 2017, 2018, doi: 10.1109/ISESD.2017.8253360.
[4] H. R. A. Talompo, A. S. Ahmad, Y. S. Gondokaryono, and S. Sutikno, “NAIDS design using ChiMIC-KGS,” in 2017
International Symposium on Electronics and Smart Devices, ISESD 2017, 2018, doi: 10.1109/ISESD.2017.8253362.
[5] S. D. Putra, A. S. Ahmad, and S. Sutikno, “DPA-countermeasure with knowledge growing system,” 2016
International Symposium on Electronics and Smart Devices, ISESD 2016, 2017, doi: 10.1109/ISESD.2016.7886757.
[6] W. Adiprawita, A. S. Ahmad, J. Sembiring, and B. R. Trilaksono, “New resampling algorithm for particle filter
localization for mobile robot with 3 ultrasonic sonar sensor,” in Proceedings of the 2011 International Conference
on Electrical Engineering and Informatics, ICEEI 2011, 2011, doi: 10.1109/ICEEI.2011.6021733.
[7] M. N. Wibisono and A. S. Ahmad, “Weather forecasting using Knowledge Growing System (KGS),” Proceedings
2017 2nd International Conferences on Information Technology, Information Systems and Electrical Engineering,
ICITISEE 2017, 2018, doi: 10.1109/ICITISEE.2017.8285526.
[8] K. O. Bachri, U. Khayam, B. A. Soedjarno, A. D. W. Sumari, and A. S. Ahmad, “Cognitive artificial-intelligence for
doernenburg dissolved gas analysis interpretation,” TELKOMNIKA Telecommunication Computing Electronics and
Control, vol. 17, no. 1, pp. 268-274, 2019, doi: 10.12928/telkomnika.v17i1.11612.
[9] T. Kasakawa et al., “An Artificial Neural Network at Device Level Using Simplified Architecture and Thin-Film
Transistors,” Electron Devices, IEEE Trans., 2010, doi: 10.1109/ted.2010.2056991.
[10] G. M. Lozito, A. Laudani, F. Riganti-Fulginei, and A. Salvini, “FPGA implementations of feed forward neural network by
using floating point hardware accelerators,” Adv. Electr. Electron. Eng., 2014, doi: 10.15598/aeee.v12i1.831.
[11] C.-F. Chang and B. J. Sheu, “Digital VLSI multiprocessor design for neurocomputers,” [Proceedings 1992] IJCNN
Int. Jt. Conf. Neural Networks, vol. 2, pp. 1–6, 1992, doi: 10.1109/IJCNN.1992.226993.
[12] P. Langley, J. E. Laird, and S. Rogers, “Cognitive architectures: Research issues and challenges,” Cogn. Syst. Res.,
2009, doi: 10.1016/j.cogsys.2006.07.004.
[13] C. (US) Tuan A. Duong, Glendora and C. (US) Vu A. Duong, Rosemead, “System and method for cognitive
processing for data fusion,” 2012.
[14] Y. Chen, E. Argentinis, and G. Weber, “IBM Watson: How Cognitive Computing Can Be Applied to Big Data Challenges
in Life Sciences Research,” Clinical Therapeutics, vol. 38, no. 4. pp. 688–701, 2016, doi: 10.1016/j.clinthera.2015.12.001.
[15] C. Megha, A. Madura, and Y. Sneha, “Cognitive Computing and its Applications,” International Conference on
Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017), pp. 1168–1172, 2017.
[16] A. D. W. Sumari, A. S. Ahmad, A. I. Wuryandari, and J. Sembiring, : “Brain-inspired Knowledge Growing-System:
Towards A True Cognitive Agent,” Int. J. Comput. Sci. Artif. Intell., vol. 2, no. 1, pp. 23–26, 2012.
[17] S. K. Card, T. P. Moran, and A. Newell, “The model human processor: an engineering model for human
performance,” Handbook of perception and human performance. 1986, doi: 10.1177/107118138102500180.
[18] A. D. W. Sumari, A. S. Ahmad, A. I. Wuryandari, and J. Sembiring, “A new information-inferencing fusion method
for intelligent agents,” Proceedings of the 2009 International Conference on Electrical Engineering and Informatics,
ICEEI 2009, 2009, doi: 10.1109/ICEEI.2009.5254810.
8. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 3, June 2020: 1475 - 1482
1482
[19] A. D. W. Sumari and A. S. Ahmad, “Design and Implementation of Multi Agent-based Information Fusion System
for Supporting Decision Making (a Case Study on Military Operation),” ITB J. Inf. Commun. Technol., vol. 2, no. 1,
pp. 42–63, 2008.
[20] C. O. Sereati, A. D.W. Sumari, T. Adiono, and A. S. Ahmad, “Architecture Design for A Multi-Sensor Information Fusion
Processor,” TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 17, no. 1, pp. 101–108, 2019.
[21] S. B. V. Gamm et al., “Towards nanomagnetic logic systems: A programmable arithmetic logic unit for systolic
array-based computing (Invited),” 2015 IEEE Nanotechnology Materials and Devices Conference, NMDC 2015,
2016, doi: 10.1109/NMDC.2015.7439269.
[22] R. Martinez-Alonso, K. Mino, and D. Torres-Lucio, “Array processors designed with VHDL for solution of linear
equation systems implemented in a FPGA,” in Proceedings - 2010 IEEE Electronics, Robotics and Automotive
Mechanics Conference, CERMA 2010, 2010, doi: 10.1109/CERMA.2010.85.
[23] C. Cheng and K. K. Parhi, “A Novel Systolic Array Structure for DCT,” IEEE Trans. Circuits Syst. II Express Briefs,
2005, doi: 10.1109/TCSII.2005.850432.
[24] A. Kumar, S. Fernando, Y. Ha, B. Mesman, and H. Corporaal, “Multiprocessor systems synthesis for multiple use-cases
of multiple applications on FPGA,” ACM Trans. Des. Autom. Electron. Syst., 2008, doi: 10.1145/1367045.1367049.
[25] B. J. Leiner, V. Q. Lorena, T. M. Cesar, and M. V. Lorenzo, “Hardware architecture for FPGA implementation of a
neural network and its application in images processing,” Proceedings - Electronics, Robotics and Automotive
Mechanics Conference, CERMA 2008, 2008, doi: 10.1109/CERMA.2008.32.
BIOGRAPHIES OF AUTHORS
Catherine Olivia Sereati got Bachelor degree of electrical engineering (EE) from Brawijaya
University Malang, then pursued Master of Technology and Doctor in Electrical Engineering, both
from Institut Teknologi Bandung (ITB). Now Catherine is a lecturer and researcher at Universitas
Katolik Indonesia Atma Jaya. Her interest subject of researches are electronic instrumentation
system and system on chip (SoC). She was also involved in several research projects to design
cognitive instrumentation systems. Some of them are a building a software cognitive interpretation
of ship movements, for Indonesian marine security purposes, and cognitive electro cardiograph
(ECG) design. Currently her research project is focusing to designing the architecture of
cognitive processor.
Colonel Arwin Datumaya Wahyudi Sumari is 1991 Indonesian Air Force Academy graduate.
He received Sarjana Teknik (S.T.) in Electronics Engineering (1996), Magister Teknik (M.T.) in
Computer Engineering (2008), and Doktor (Dr.) in Electrical Engineering and Informatics (2010)
from Institut Teknologi Bandung, Indonesia. In 2009, he along with Prof. Dr.ing. Adang Suwandi
Ahmad invented knowledge growing system which is the foundation of Cognitive Artificial
Intelligence. Currently, Arwin is Senior Electrical Engineer Officer at Abdulrachman Saleh AFB,
Malang. He is also Assistant Professor at Faculty of Defense Technology, Indonesia Defense
University and Adjunct Professor at Department of Electrical Engineering, State Polytechnic of
Malang. He has been developing and enhancing cognitive artificial intelligence for various field
especially for Defense and Security.
Adang Suwandi Ahmad received his engineering degree in Electrical Engineering from
ITB, Diplome Etude Approfondi Signaux et Bruits (DEA) option Electronique, and Docteur
Ingenieur Signaux et Bruits option Electronique (Dr.- ing) from Universite des Sciences du
Languedoc Montpellier, France became Institut Teknologi Bandung’s Professor in Intelligent
Electronics Instrumentation System in 2000. Adang’s past researches were in Electronics
Instrumentation systems and intelligent electronics systems/artificial intelligence. He has also
expanded his research in bioinformatics computation, information sciences, intelligent
computations, and intelligent-based instrumentation systems. In 2009 - 2018 Adang Suwandi
Ahmad has developed Cognitive Artificial Intelligence as a new method of artificial intelligence.