SlideShare a Scribd company logo
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 3, June 2020, pp. 1475~1482
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i3.14835  1475
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
Towards cognitive artificial intelligence device:
an intelligent processor based on human thinking emulation
Catherine Olivia Sereati1
, Arwin Datumaya Wahyudi Sumari2
, Trio Adiono3
,
Adang Suwandi Ahmad4
1
Department of Electrical Engineering, Universitas Katolik Indonesia Atma Jaya Jakarta, Indonesia
2
Department of Electrical Engineering, State Polytechnic of Malang, Indonesia
2
Faculty of Defense Technology, Indonesia Defense University, Indonesia
3,4
School of Electrical Engineering and Informatics, Institut Teknologi Bandung, Indonesia
Article Info ABSTRACT
Article history:
Received Aug 15, 2019
Revised Jan 20, 2020
Accepted Feb 23, 2020
The intervention of computer technology began the era of a more intelligent
and independent instrumentation system based on intelligent methods such as
artificial neural networks, fuzzy logic, and genetic algorithm. On the other
hand, processor with artificial cognitive ability has also been discovered in
2016. The architecture of the processor was designed based on knowledge
growing system (KGS) algorithm, a new concept in artificial intelligence (AI)
which is focused on the emulation of the process of the growing of knowledge
in human brain after getting new information from human sensory organs.
KGS is considered as the main method of a new perspective in AI called as
cognitive artificial intelligence (CAI). The design is to obtain the architecture
of the data path of the processor. We found that the complexity of the processor
circuit is determined by the number of combinations of sensors and hypotheses
as the main inputs to the processor. This paper addresses the development of
an intelligence processor based on cognitive AI in order to realize an
Intelligence Instrumentation System. The processor is implemented in field
programmable gate array (FPGA) and able to perform human thinking
emulation by using KGS algorithm.
Keywords:
Cognitive artificial intelligence
Human thinking emulation
Intelligent instrumentation
Intelligent processor
Knowledge growing system
This is an open access article under the CC BY-SA license.
Corresponding Author:
Catherine Olivia Sereati,
Department of Electrical Engineering,
Universitas Katolik Indonesia Atma Jaya.
Jenderal Sudirman St. Kav 51, Jakarta, Indonesia
Email: catherine.olivia@atmajaya.ac.id
1. INTRODUCTION
The demands of intelligent instrumentation system are increasing. One of the system’s capability is
autonomous calibration, where sensors independently carry out calibration due to the measurement results of
drifts that are affected by the environment [1]. Changes in analog systems to digital ones increasingly improve
the precision of instrumentation systems. The development of artificial intelligence (AI) adds the complexity of
instrumentation systems but presents smarter ones and opens wide opportunities for more specialized use and
autonomous instrumentation [2]. The development of CAI was triggered by the discovery of cognitive
characteristic shows by the brain when generating new knowledge. We call this mechanism as knowledge
growing (KG) where the knowledge is obtained after the brain extracted new inferencing from the fusion
of information delivered from sensory organs after carrying out interaction to the world. Therefore, we call a
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 3, June 2020: 1475 - 1482
1476
system that has ability to grow its own knowledge as knowledge growing system (KGS) along with its
computational mehod.
The development of KGS as the main engine of CAI opens the opportunity to create an intelligent
instrumentation system where its intelligence is shown with the cognitive ability put in it. This kind of intelligent
instrumentation system can be realized by embedding a processor that has cognitive properties, as the main
controller of the system. By implementing it, we are sure that a processor which has cognitive ability namely,
emulating the way of human thinks can be realized. The cognitive-based processor then will be used to support
the development intelligent instrumentation system in various fields [3–8]. Emulating the way of human thinks
into a software computer was already a big challenge, and it was even a bigger challenge to implement it into a
hardware [9–11]. Other researchers have also mentioned that the cognitive processor system design is expected
to contribute to the development of artificial intelligence-based processor designs [12, 13]. In this paper we
delivered the technique to implement KGS computation method to create a human thinking emulation processor
called as CAI processor or simply cognitive processor, an intelligent device for intelligent system.
2. RESEARCH METHOD
Current conventional computing methods based on AI mostly obtain knowledge based on past data or
experiences and not yet equipped with the ability to generate knowledge from brand new data obtained from
directly interacting with the world, in this case a phenomenon being observed. In addition, the knowledge
generated by the existing AI methods are still limited by using existing data to produce specific goals (supervised
learning) or by providing a set of data to see the form of its output (unsupervised learning) [14, 15]. This means
that the current AI computational methods are currently not equipped with a feature which gives them an ability
to learn something new from the information obtained from their sensory organs that perform interactions to a
phenomenon. KGS computation is inspired by the way of the human brain draws conclusions based on
information received from the environment [16, 17]. The basic concept of KGS is to emulate the way of
human’s brain develops new knowledge from the information delivered by human sensory organs gathered
from the phenomenon the human interacts with as illustrated in Figure 1 [18]. The process to gain new
knowledge is started by sensing the phenomenon and receiving the information regarding it from all sensory
organs. This can only be done by making interactions with the observed phenomenon using one or more sensory
organs. Mostly, information from only one sensors can only give a little knowledge regarding the phenomenon.
By getting more information from various sensory organs, then human can have more knowledge and be able
to explain what the phenomenon being interacted with.
Information
Fusion
INFORMATION
FUSION S1
OBSERVATION FROM
SENSORY ORGANS
INFORMATION
FUSION S2
INFORMATION
FUSION S3
INFORMATION
FUSION S4
INFORMATION
FUSION S5
INFORMATION
INFERENCING
EACH SENSORS
INFORMATION
INFERENCING
FUSION: S1 & S2
INFORMATION
INFERENCING
FUSION: S1 & S3
INFORMATION
INFERENCING
FUSION: S1 & S2&S4
INFORMATION
INFERENCING FUSION:
ALL SENSORS
DoC
New
KnowledgeKnowledge Data
Base (Prior
Knowledge)
Knowledge
Inferencing Fusion
Ultimate
Knowledge
tn
tn
tn
tn
Figure 1. KGS mechanism in growing knowledge
TELKOMNIKA Telecommun Comput El Control 
Towards cognitive artificial intelligence device: an intelligent processor based .... (Catherine Olivia Sereati)
1477
The information delivered from the sensory organs is fused to obtain comprehensive information.
Each fused information will its own probability value or DoC which represents the knowledge obtained by
KGS about the phenomenon. Each comprehensive information’s probability value then becomes new
knowledge which is measured with DoC. DoC represents the value of certainty for each new knowledge
depending on the sensory organs’ information that has been fused. DoC also shows the best combination of
sensor data and hypotheses that may occur related to the observed phenomenon. The process of KGS is
described by two formulas namely ASSA2010 (Arwin Sumari-Suwandi Ahmad 2010) method for single
observation time, and OM-ASSA2010 (observation multi time Arwin Sumari-Suwandi Ahmad 2010) for
multiple observation time as shown in (1). The results are in the form of new knowledge probability
distribution (NKPD) namely, the list of knowledge of the system regarding the observed phenomenon based
on the observed data from the sensory organs[19]. NKPD is knowledge obtained from single observation time
while NKPD over time (NKPDT) is the ultimate knowledge of the system after performing a computation to
information from multiple times of observation.
1
( )
( )
i
t
t
t
P
P




=
=

(1)
where:
𝜏 = the number of times in multiple observation, 𝜏 is replaced with n for single observation time;
𝑃(𝜓𝑡
𝑖) = the best value of the combination of sensor-data and hypothesis at each observation time;
𝑃( 𝜃𝑡) = the best combination of sensor-data and hypothesis value at whole observation time.
The ultimate knowledge which the best combination of sensor-data and hypothesis that is obtained
from several observation times will also be calculated using DoC with the mathematics formula in (2).
( )
max[ ( ) ]j
DoC P estimate
P


=
=
(2)
where P()estimate is the value of DoC which is commonly the greatest value of the combination of sensor-data
and hypotheses resulted from the OM-ASSA2010 formula computation. This mechanism will be implemented
in hardware which is, in this case, is field programmable gate array (FPGA).
Before implemented in FPGA and based on the preliminary designs of the data path, the VHDL design
for CAI or simply cognitive processor was successfully made [20]. Figure 2 shows the flowchart of the KGS
algorithm as the basis for designing the data path for the cognitive processor. The process is started with the
retrieval of data from sensors which is called an indication, namely information regarding the observed
phenomenon. The number of hypotheses is also set up according to the number of sensors used by the system.
The number of hypotheses is computed by using (3), where  is the maximum number of possible hypotheses
and  is the number of the sensor.
( )2 1
 = − −
(3)
The system will check whether each sensor can observe every condition of the existing hypothesis
and put a binary value 0 or 1 depending on the result of the sensor’s observation. If all sensor data is already
completely received and each value of the combination of sensor data and hypotheses is already filled in, then
the next process is the carry out the information fusion and obtain comprehensive information for each
combination of sensor-data dan hypothesis. The comprehensive information becomes the inferencing of each
combination of sensor-data and hypothesis which will have a variety of probability values depending on the
values of all sensor-data and hypotheses for each hypothesis. The inferencing will become a new knowledge
of the system. This mechanism is carried out by using (1) and the amount of knowledge obtained at this point
is measured with DoC using (2).
This mechanism will continue time by time as long as the system is still making the interaction with
the phenomenon, sensing to obtain information, and perceiving it. There is a confirmation whether all
inferencing has already been done from t1 to t. DoC of each observation time is stored to be fused with the
next inferencing if the DoC at this point cannot recognize the observed phenomenon. The components of a
cognitive processor that are designed are based on OM-ASSA2010 formula which becomes the algorithm of
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 3, June 2020: 1475 - 1482
1478
KGS. To implement this equation into hardware, we had to form a series of systolic arrays [21–23], with the
matrix equation as shown in (4), and it becomes the basis for forming a dependence graph to determine the
cognitive processor component as shown in Figure 3. From this dependence graph, the cognitive processor
elements are depicted in Figure 4.
1
1
1 11 12 13 1 1
1
2 21 22 23 2 2
2
j 1 2 3 i
1
( )
P ...
( )
P ..,
... .. .. .. .. .. ...
...
P .. w
( )
t
i
t
i
j j j ji
t
n
P
t
v v v v w
P
v v v v w
t
v v v v
P
t






−
−
−
 
 
     
     
     = +      
              
 
 
 
(4)
where w1 = w2 =… = wi = w
Figure 2. The flowchart of the KGS algorithm as the basis for the design of cognitive processor data-path
TELKOMNIKA Telecommun Comput El Control 
Towards cognitive artificial intelligence device: an intelligent processor based .... (Catherine Olivia Sereati)
1479
1
3
2
...
i
Pw1
Pwj
Pw2
j
j
V11 V12
...
V1i
V21 V22
...
V2i
............
Vj1
...
VjiVj2
• • • •
• • • •
• • • •
• • • •
w1 w2 wi
...
NKPDH1 (t-1)
1 2 ... i
NKPDH2 (t-1)
NKPDH3 (t-1)
NKPDHj (t-1)
NKPDH2 (t-1)
NKPDH3 (t-1)
NKPDHj (t-1)
NKPDH1 (t-1)
NKPDH2 (t-1)
NKPDH3 (t-1)
NKPDHj (t-1)
NKPDH1 (t-1)
Figure 3. Dependence graph for cognitive processor
X
+
v11v12 .. v1i
D
X
P(w) t
1
1/T
NKPDH1t-1
X
+
v11v12 .. v1i
D
X
P(w) t
1
1/T
X
+
v11v12 .. v1i
D
X
P(w) t
1
1/T
X
+
v11v12 .. v1i
D
X
P(w) t
1
1/T
w
PE 1 PE 2 PE 3 PE j
PE 1 PE 2 PE 3 PE j
NKPDH3t-1
NKPDHjt-1NKPDH2t-1
Figure 4. The elements of the cognitive processor
In Figure 4, it can be seen that the OM-ASSA2010 computational circuits consist of multiplication
and adder components. The D-Latch register is used to store the calculation results from the adder and
multiplication components. In this processor architecture design, the number of adder components is influenced
by the number of hypotheses. The number of sensors affects computing time. As an example, a cognitive
processor with 4 sensors with 13 possible hypotheses, but we allocated only 8 hypotheses or possible events,
it will take 8 adders with a computational time length of 4 timing stages.
3. RESULTS AND ANALYSIS
The testbench simulation for CAI processor is shown in Figure 5, where the system successfully
produced DoC values at the 4th
computation time. Based on the results of the modeling and the designing
cognitive processor, its circuit is implemented in FPGA module [24, 25]. We used Cyclone IVE EPCE6F17C6
which has a total I/O of 180, to implement the designed processor where in this experiment we used
4 hypotheses or probable answers. The results of FPGA implementation for cognitive processor is shown in
Figure 6, and the synthesis results of the simulation are given in Figure 7. From the synthesis results, it can be
seen that cognitive processor with 4 hypotheses requires 527 logic elements, and 86 pins consisting of 3 pins
for the timing element (clock, reset, and enable), 4x4 pin for input register, 7 pins for display counter, and
17x4 pin for output register. The implementation of the cognitive processor in FPGA has also been carried out
for a combination of 4 sensor inputs and 8 hypotheses. The implementation results for this configuration show
that the required logic elements are 2.162, and 170 pins consist of 2 pins for the timing (clock and reset)
elements, 4x8 pin for input register, and 17x8 pin for output register. From the implementation results, it can
be seen that the number of hypotheses affects the circuit complexity of the cognitive processor. The more
possible events that are set up then the wider the data path should be set up and the higher the number of logic
elements will be used. From the experiment results, double the number of hypotheses fourfolds the number of
logic elements, from 527 for 4 hypotheses to 2.162 for 8 hypotheses or there is a 310% increase. On the other
hand, the number of pins increases from 86 pins to 170 pins or there is a 98% increase.
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 3, June 2020: 1475 - 1482
1480
Figure 5. Testbench simulation for the cognitive processor
Figure 6. The hardware implementation of the cognitive processor with 4 hypotheses
Figure 7. The synthesis results of CAI processor
4. CONCLUSION
From our experiments, it can be seen that we have successfully implemented the KGS algorithm into
FPGA and also carried out a simulation to show that it works well. Synthesizing its hardware implementation,
TELKOMNIKA Telecommun Comput El Control 
Towards cognitive artificial intelligence device: an intelligent processor based .... (Catherine Olivia Sereati)
1481
we found that the complexity of the cognitive processor increases as the number of hypotheses increases which
are affected the number of sensors. As can be seen from (3) that the number of sensors automatically affects
the maximum number of hypotheses or possible events that can be formed from the computation. It is an
analogy to humans, the more sensory organs use to observe a phenomenon then the more probable answers
that can be obtained and more knowledge that can be acquired to challenge is how to reduce the number of
logic elements increase as the number of hypotheses increase. One of the ways is to find a method to determine
the number of the most probable hypotheses for a number of sensors for observing a phenomenon.
From the perspective of hardware implementation, we continue our research in designing a much
better cognitive processor based on the KGS algorithm. We believe that our cognitive processor if it is ready
in the form of system on chip (SoC), it would be the main supporter for the autonomous mobile electronic
instrumentation system. The implementation of a CAI-based processor can improve the performance of the
intelligence instrumentation system because of its ability to increase its own knowledge as time passes based
on the inputs it receives from the phenomenon in its surroundings, as it is done naturally by humans in their
daily life.
ACKNOWLEDGMENTS
The author would like to express sincere thanks to the CAIRG Laboratory for its support so that this
research can be carried out and completed.
REFERENCES
[1] W. Shi, M. B. Alawieh, X. Li, and H. Yu, “Algorithm and hardware implementation for visual perception system in
autonomous vehicle: A survey,” Integration,the VLSI Journal, vol. 59. pp. 148–156, 2017, doi: 10.1016/j.vlsi.2017.07.007.
[2] T. Sutikno, M. Facta, and G. A. M. Markadeh, “Progress in Artificial Intelligence Techniques: from Brain to
Emotion,” TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 9, no. 2, pp. 201–201, 2011.
[3] K. O. Bachri, A. D. W. Sumari, B. A. Soedjarno, and A. S. Ahmad, “The implementation of A3S information fusion
algorithm for interpreting Dissolved Gas Analysis (DGA) based on Doernenburg Ratio,” in 2017 International
Symposium on Electronics and Smart Devices, ISESD 2017, 2018, doi: 10.1109/ISESD.2017.8253360.
[4] H. R. A. Talompo, A. S. Ahmad, Y. S. Gondokaryono, and S. Sutikno, “NAIDS design using ChiMIC-KGS,” in 2017
International Symposium on Electronics and Smart Devices, ISESD 2017, 2018, doi: 10.1109/ISESD.2017.8253362.
[5] S. D. Putra, A. S. Ahmad, and S. Sutikno, “DPA-countermeasure with knowledge growing system,” 2016
International Symposium on Electronics and Smart Devices, ISESD 2016, 2017, doi: 10.1109/ISESD.2016.7886757.
[6] W. Adiprawita, A. S. Ahmad, J. Sembiring, and B. R. Trilaksono, “New resampling algorithm for particle filter
localization for mobile robot with 3 ultrasonic sonar sensor,” in Proceedings of the 2011 International Conference
on Electrical Engineering and Informatics, ICEEI 2011, 2011, doi: 10.1109/ICEEI.2011.6021733.
[7] M. N. Wibisono and A. S. Ahmad, “Weather forecasting using Knowledge Growing System (KGS),” Proceedings
2017 2nd International Conferences on Information Technology, Information Systems and Electrical Engineering,
ICITISEE 2017, 2018, doi: 10.1109/ICITISEE.2017.8285526.
[8] K. O. Bachri, U. Khayam, B. A. Soedjarno, A. D. W. Sumari, and A. S. Ahmad, “Cognitive artificial-intelligence for
doernenburg dissolved gas analysis interpretation,” TELKOMNIKA Telecommunication Computing Electronics and
Control, vol. 17, no. 1, pp. 268-274, 2019, doi: 10.12928/telkomnika.v17i1.11612.
[9] T. Kasakawa et al., “An Artificial Neural Network at Device Level Using Simplified Architecture and Thin-Film
Transistors,” Electron Devices, IEEE Trans., 2010, doi: 10.1109/ted.2010.2056991.
[10] G. M. Lozito, A. Laudani, F. Riganti-Fulginei, and A. Salvini, “FPGA implementations of feed forward neural network by
using floating point hardware accelerators,” Adv. Electr. Electron. Eng., 2014, doi: 10.15598/aeee.v12i1.831.
[11] C.-F. Chang and B. J. Sheu, “Digital VLSI multiprocessor design for neurocomputers,” [Proceedings 1992] IJCNN
Int. Jt. Conf. Neural Networks, vol. 2, pp. 1–6, 1992, doi: 10.1109/IJCNN.1992.226993.
[12] P. Langley, J. E. Laird, and S. Rogers, “Cognitive architectures: Research issues and challenges,” Cogn. Syst. Res.,
2009, doi: 10.1016/j.cogsys.2006.07.004.
[13] C. (US) Tuan A. Duong, Glendora and C. (US) Vu A. Duong, Rosemead, “System and method for cognitive
processing for data fusion,” 2012.
[14] Y. Chen, E. Argentinis, and G. Weber, “IBM Watson: How Cognitive Computing Can Be Applied to Big Data Challenges
in Life Sciences Research,” Clinical Therapeutics, vol. 38, no. 4. pp. 688–701, 2016, doi: 10.1016/j.clinthera.2015.12.001.
[15] C. Megha, A. Madura, and Y. Sneha, “Cognitive Computing and its Applications,” International Conference on
Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017), pp. 1168–1172, 2017.
[16] A. D. W. Sumari, A. S. Ahmad, A. I. Wuryandari, and J. Sembiring, : “Brain-inspired Knowledge Growing-System:
Towards A True Cognitive Agent,” Int. J. Comput. Sci. Artif. Intell., vol. 2, no. 1, pp. 23–26, 2012.
[17] S. K. Card, T. P. Moran, and A. Newell, “The model human processor: an engineering model for human
performance,” Handbook of perception and human performance. 1986, doi: 10.1177/107118138102500180.
[18] A. D. W. Sumari, A. S. Ahmad, A. I. Wuryandari, and J. Sembiring, “A new information-inferencing fusion method
for intelligent agents,” Proceedings of the 2009 International Conference on Electrical Engineering and Informatics,
ICEEI 2009, 2009, doi: 10.1109/ICEEI.2009.5254810.
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 3, June 2020: 1475 - 1482
1482
[19] A. D. W. Sumari and A. S. Ahmad, “Design and Implementation of Multi Agent-based Information Fusion System
for Supporting Decision Making (a Case Study on Military Operation),” ITB J. Inf. Commun. Technol., vol. 2, no. 1,
pp. 42–63, 2008.
[20] C. O. Sereati, A. D.W. Sumari, T. Adiono, and A. S. Ahmad, “Architecture Design for A Multi-Sensor Information Fusion
Processor,” TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 17, no. 1, pp. 101–108, 2019.
[21] S. B. V. Gamm et al., “Towards nanomagnetic logic systems: A programmable arithmetic logic unit for systolic
array-based computing (Invited),” 2015 IEEE Nanotechnology Materials and Devices Conference, NMDC 2015,
2016, doi: 10.1109/NMDC.2015.7439269.
[22] R. Martinez-Alonso, K. Mino, and D. Torres-Lucio, “Array processors designed with VHDL for solution of linear
equation systems implemented in a FPGA,” in Proceedings - 2010 IEEE Electronics, Robotics and Automotive
Mechanics Conference, CERMA 2010, 2010, doi: 10.1109/CERMA.2010.85.
[23] C. Cheng and K. K. Parhi, “A Novel Systolic Array Structure for DCT,” IEEE Trans. Circuits Syst. II Express Briefs,
2005, doi: 10.1109/TCSII.2005.850432.
[24] A. Kumar, S. Fernando, Y. Ha, B. Mesman, and H. Corporaal, “Multiprocessor systems synthesis for multiple use-cases
of multiple applications on FPGA,” ACM Trans. Des. Autom. Electron. Syst., 2008, doi: 10.1145/1367045.1367049.
[25] B. J. Leiner, V. Q. Lorena, T. M. Cesar, and M. V. Lorenzo, “Hardware architecture for FPGA implementation of a
neural network and its application in images processing,” Proceedings - Electronics, Robotics and Automotive
Mechanics Conference, CERMA 2008, 2008, doi: 10.1109/CERMA.2008.32.
BIOGRAPHIES OF AUTHORS
Catherine Olivia Sereati got Bachelor degree of electrical engineering (EE) from Brawijaya
University Malang, then pursued Master of Technology and Doctor in Electrical Engineering, both
from Institut Teknologi Bandung (ITB). Now Catherine is a lecturer and researcher at Universitas
Katolik Indonesia Atma Jaya. Her interest subject of researches are electronic instrumentation
system and system on chip (SoC). She was also involved in several research projects to design
cognitive instrumentation systems. Some of them are a building a software cognitive interpretation
of ship movements, for Indonesian marine security purposes, and cognitive electro cardiograph
(ECG) design. Currently her research project is focusing to designing the architecture of
cognitive processor.
Colonel Arwin Datumaya Wahyudi Sumari is 1991 Indonesian Air Force Academy graduate.
He received Sarjana Teknik (S.T.) in Electronics Engineering (1996), Magister Teknik (M.T.) in
Computer Engineering (2008), and Doktor (Dr.) in Electrical Engineering and Informatics (2010)
from Institut Teknologi Bandung, Indonesia. In 2009, he along with Prof. Dr.ing. Adang Suwandi
Ahmad invented knowledge growing system which is the foundation of Cognitive Artificial
Intelligence. Currently, Arwin is Senior Electrical Engineer Officer at Abdulrachman Saleh AFB,
Malang. He is also Assistant Professor at Faculty of Defense Technology, Indonesia Defense
University and Adjunct Professor at Department of Electrical Engineering, State Polytechnic of
Malang. He has been developing and enhancing cognitive artificial intelligence for various field
especially for Defense and Security.
Adang Suwandi Ahmad received his engineering degree in Electrical Engineering from
ITB, Diplome Etude Approfondi Signaux et Bruits (DEA) option Electronique, and Docteur
Ingenieur Signaux et Bruits option Electronique (Dr.- ing) from Universite des Sciences du
Languedoc Montpellier, France became Institut Teknologi Bandung’s Professor in Intelligent
Electronics Instrumentation System in 2000. Adang’s past researches were in Electronics
Instrumentation systems and intelligent electronics systems/artificial intelligence. He has also
expanded his research in bioinformatics computation, information sciences, intelligent
computations, and intelligent-based instrumentation systems. In 2009 - 2018 Adang Suwandi
Ahmad has developed Cognitive Artificial Intelligence as a new method of artificial intelligence.

More Related Content

What's hot

Image Recognition Expert System based on deep learning
Image Recognition Expert System based on deep learningImage Recognition Expert System based on deep learning
Image Recognition Expert System based on deep learning
PRATHAMESH REGE
 
MILA: Low-cost BCI framework for acquiring EEG data with IoT
MILA: Low-cost BCI framework for acquiring EEG data with IoTMILA: Low-cost BCI framework for acquiring EEG data with IoT
MILA: Low-cost BCI framework for acquiring EEG data with IoT
TELKOMNIKA JOURNAL
 
Iirdem a biometric based approach for three dimension bio sensor implanted in...
Iirdem a biometric based approach for three dimension bio sensor implanted in...Iirdem a biometric based approach for three dimension bio sensor implanted in...
Iirdem a biometric based approach for three dimension bio sensor implanted in...
Iaetsd Iaetsd
 
The Dawn of the Age of Artificially Intelligent Neuroprosthetics
The Dawn of the Age of Artificially Intelligent NeuroprostheticsThe Dawn of the Age of Artificially Intelligent Neuroprosthetics
The Dawn of the Age of Artificially Intelligent Neuroprosthetics
Sagar Hingal
 
Rushita beladiya.pdf
Rushita beladiya.pdfRushita beladiya.pdf
Rushita beladiya.pdf
rushi beladiya
 
CI image processing mns
CI image processing mnsCI image processing mns
CI image processing mns
Meenakshi Sood
 
Artificial intelligence and Neural Network
Artificial intelligence and Neural NetworkArtificial intelligence and Neural Network
Artificial intelligence and Neural Network
Abdullah Saghir Ahmad
 
Prospects of Deep Learning in Medical Imaging
Prospects of Deep Learning in Medical ImagingProspects of Deep Learning in Medical Imaging
Prospects of Deep Learning in Medical Imaging
Godswll Egegwu
 
Ai applications study
Ai applications  studyAi applications  study
Ai applications study
Kavita Rastogi
 
Artificial Intelligence, Machine Learning and Deep Learning with CNN
Artificial Intelligence, Machine Learning and Deep Learning with CNNArtificial Intelligence, Machine Learning and Deep Learning with CNN
Artificial Intelligence, Machine Learning and Deep Learning with CNN
mojammel43
 
Forecasting number of vulnerabilities using long short-term neural memory net...
Forecasting number of vulnerabilities using long short-term neural memory net...Forecasting number of vulnerabilities using long short-term neural memory net...
Forecasting number of vulnerabilities using long short-term neural memory net...
IJECEIAES
 
Neural networks in business forecasting
Neural networks in business forecastingNeural networks in business forecasting
Neural networks in business forecasting
Amir Shokri
 
IRJET- Deep Learning Techniques for Object Detection
IRJET-  	  Deep Learning Techniques for Object DetectionIRJET-  	  Deep Learning Techniques for Object Detection
IRJET- Deep Learning Techniques for Object Detection
IRJET Journal
 
Challenges in deep learning methods for medical imaging - Pubrica
Challenges in deep learning methods for medical imaging - PubricaChallenges in deep learning methods for medical imaging - Pubrica
Challenges in deep learning methods for medical imaging - Pubrica
Pubrica
 
IRJET- A Cloud based Virtual Brain Connectivity with EEG Sensor using Interne...
IRJET- A Cloud based Virtual Brain Connectivity with EEG Sensor using Interne...IRJET- A Cloud based Virtual Brain Connectivity with EEG Sensor using Interne...
IRJET- A Cloud based Virtual Brain Connectivity with EEG Sensor using Interne...
IRJET Journal
 
IRJET- Factoid Question and Answering System
IRJET-  	  Factoid Question and Answering SystemIRJET-  	  Factoid Question and Answering System
IRJET- Factoid Question and Answering System
IRJET Journal
 
Deep learning - what is it and why now?
Deep learning - what is it and why now?Deep learning - what is it and why now?
Deep learning - what is it and why now?
Natalia Konstantinova
 
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET Journal
 
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC)
csandit
 

What's hot (19)

Image Recognition Expert System based on deep learning
Image Recognition Expert System based on deep learningImage Recognition Expert System based on deep learning
Image Recognition Expert System based on deep learning
 
MILA: Low-cost BCI framework for acquiring EEG data with IoT
MILA: Low-cost BCI framework for acquiring EEG data with IoTMILA: Low-cost BCI framework for acquiring EEG data with IoT
MILA: Low-cost BCI framework for acquiring EEG data with IoT
 
Iirdem a biometric based approach for three dimension bio sensor implanted in...
Iirdem a biometric based approach for three dimension bio sensor implanted in...Iirdem a biometric based approach for three dimension bio sensor implanted in...
Iirdem a biometric based approach for three dimension bio sensor implanted in...
 
The Dawn of the Age of Artificially Intelligent Neuroprosthetics
The Dawn of the Age of Artificially Intelligent NeuroprostheticsThe Dawn of the Age of Artificially Intelligent Neuroprosthetics
The Dawn of the Age of Artificially Intelligent Neuroprosthetics
 
Rushita beladiya.pdf
Rushita beladiya.pdfRushita beladiya.pdf
Rushita beladiya.pdf
 
CI image processing mns
CI image processing mnsCI image processing mns
CI image processing mns
 
Artificial intelligence and Neural Network
Artificial intelligence and Neural NetworkArtificial intelligence and Neural Network
Artificial intelligence and Neural Network
 
Prospects of Deep Learning in Medical Imaging
Prospects of Deep Learning in Medical ImagingProspects of Deep Learning in Medical Imaging
Prospects of Deep Learning in Medical Imaging
 
Ai applications study
Ai applications  studyAi applications  study
Ai applications study
 
Artificial Intelligence, Machine Learning and Deep Learning with CNN
Artificial Intelligence, Machine Learning and Deep Learning with CNNArtificial Intelligence, Machine Learning and Deep Learning with CNN
Artificial Intelligence, Machine Learning and Deep Learning with CNN
 
Forecasting number of vulnerabilities using long short-term neural memory net...
Forecasting number of vulnerabilities using long short-term neural memory net...Forecasting number of vulnerabilities using long short-term neural memory net...
Forecasting number of vulnerabilities using long short-term neural memory net...
 
Neural networks in business forecasting
Neural networks in business forecastingNeural networks in business forecasting
Neural networks in business forecasting
 
IRJET- Deep Learning Techniques for Object Detection
IRJET-  	  Deep Learning Techniques for Object DetectionIRJET-  	  Deep Learning Techniques for Object Detection
IRJET- Deep Learning Techniques for Object Detection
 
Challenges in deep learning methods for medical imaging - Pubrica
Challenges in deep learning methods for medical imaging - PubricaChallenges in deep learning methods for medical imaging - Pubrica
Challenges in deep learning methods for medical imaging - Pubrica
 
IRJET- A Cloud based Virtual Brain Connectivity with EEG Sensor using Interne...
IRJET- A Cloud based Virtual Brain Connectivity with EEG Sensor using Interne...IRJET- A Cloud based Virtual Brain Connectivity with EEG Sensor using Interne...
IRJET- A Cloud based Virtual Brain Connectivity with EEG Sensor using Interne...
 
IRJET- Factoid Question and Answering System
IRJET-  	  Factoid Question and Answering SystemIRJET-  	  Factoid Question and Answering System
IRJET- Factoid Question and Answering System
 
Deep learning - what is it and why now?
Deep learning - what is it and why now?Deep learning - what is it and why now?
Deep learning - what is it and why now?
 
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
 
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC)
 

Similar to Towards cognitive artificial intelligence device: an intelligent processor based on human thinking emulation

Embedded artificial intelligence system using deep learning and raspberrypi f...
Embedded artificial intelligence system using deep learning and raspberrypi f...Embedded artificial intelligence system using deep learning and raspberrypi f...
Embedded artificial intelligence system using deep learning and raspberrypi f...
IAESIJAI
 
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOCOMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
ijccsa
 
Complex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on ArduinoComplex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on Arduino
neirew J
 
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
Cynthia King
 
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityArtificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber Security
IRJET Journal
 
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET Journal
 
IRJET- Human Activity Recognition using Flex Sensors
IRJET- Human Activity Recognition using Flex SensorsIRJET- Human Activity Recognition using Flex Sensors
IRJET- Human Activity Recognition using Flex Sensors
IRJET Journal
 
⭐⭐⭐⭐⭐ LECCIÓN SISTEMAS EMBEBIDOS, 2do Parcial (2020 PAO 1) C6
⭐⭐⭐⭐⭐ LECCIÓN SISTEMAS EMBEBIDOS, 2do Parcial (2020 PAO 1)  C6⭐⭐⭐⭐⭐ LECCIÓN SISTEMAS EMBEBIDOS, 2do Parcial (2020 PAO 1)  C6
⭐⭐⭐⭐⭐ LECCIÓN SISTEMAS EMBEBIDOS, 2do Parcial (2020 PAO 1) C6
Victor Asanza
 
B05211012
B05211012B05211012
B05211012
IOSR-JEN
 
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadehSmart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
nabati
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
Eswar Publications
 
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET Journal
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
Mahdi Hosseini Moghaddam
 
Toddler monitoring system in vehicle using single shot detector-mobilenet and...
Toddler monitoring system in vehicle using single shot detector-mobilenet and...Toddler monitoring system in vehicle using single shot detector-mobilenet and...
Toddler monitoring system in vehicle using single shot detector-mobilenet and...
IAESIJAI
 
A survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing TechniqueA survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing Technique
ijsrd.com
 
J04302076081
J04302076081J04302076081
J04302076081
ijceronline
 
OSPEN: an open source platform for emulating neuromorphic hardware
OSPEN: an open source platform for emulating neuromorphic hardwareOSPEN: an open source platform for emulating neuromorphic hardware
OSPEN: an open source platform for emulating neuromorphic hardware
International Journal of Reconfigurable and Embedded Systems
 
grover2018.pdf
grover2018.pdfgrover2018.pdf
grover2018.pdf
wallvedha
 
A pre-trained model vs dedicated convolution neural networks for emotion reco...
A pre-trained model vs dedicated convolution neural networks for emotion reco...A pre-trained model vs dedicated convolution neural networks for emotion reco...
A pre-trained model vs dedicated convolution neural networks for emotion reco...
IJECEIAES
 
A low-cost IoT-based auscultation training device
A low-cost IoT-based auscultation training deviceA low-cost IoT-based auscultation training device
A low-cost IoT-based auscultation training device
nooriasukmaningtyas
 

Similar to Towards cognitive artificial intelligence device: an intelligent processor based on human thinking emulation (20)

Embedded artificial intelligence system using deep learning and raspberrypi f...
Embedded artificial intelligence system using deep learning and raspberrypi f...Embedded artificial intelligence system using deep learning and raspberrypi f...
Embedded artificial intelligence system using deep learning and raspberrypi f...
 
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOCOMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
 
Complex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on ArduinoComplex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on Arduino
 
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
 
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityArtificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber Security
 
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
 
IRJET- Human Activity Recognition using Flex Sensors
IRJET- Human Activity Recognition using Flex SensorsIRJET- Human Activity Recognition using Flex Sensors
IRJET- Human Activity Recognition using Flex Sensors
 
⭐⭐⭐⭐⭐ LECCIÓN SISTEMAS EMBEBIDOS, 2do Parcial (2020 PAO 1) C6
⭐⭐⭐⭐⭐ LECCIÓN SISTEMAS EMBEBIDOS, 2do Parcial (2020 PAO 1)  C6⭐⭐⭐⭐⭐ LECCIÓN SISTEMAS EMBEBIDOS, 2do Parcial (2020 PAO 1)  C6
⭐⭐⭐⭐⭐ LECCIÓN SISTEMAS EMBEBIDOS, 2do Parcial (2020 PAO 1) C6
 
B05211012
B05211012B05211012
B05211012
 
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadehSmart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
 
Toddler monitoring system in vehicle using single shot detector-mobilenet and...
Toddler monitoring system in vehicle using single shot detector-mobilenet and...Toddler monitoring system in vehicle using single shot detector-mobilenet and...
Toddler monitoring system in vehicle using single shot detector-mobilenet and...
 
A survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing TechniqueA survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing Technique
 
J04302076081
J04302076081J04302076081
J04302076081
 
OSPEN: an open source platform for emulating neuromorphic hardware
OSPEN: an open source platform for emulating neuromorphic hardwareOSPEN: an open source platform for emulating neuromorphic hardware
OSPEN: an open source platform for emulating neuromorphic hardware
 
grover2018.pdf
grover2018.pdfgrover2018.pdf
grover2018.pdf
 
A pre-trained model vs dedicated convolution neural networks for emotion reco...
A pre-trained model vs dedicated convolution neural networks for emotion reco...A pre-trained model vs dedicated convolution neural networks for emotion reco...
A pre-trained model vs dedicated convolution neural networks for emotion reco...
 
A low-cost IoT-based auscultation training device
A low-cost IoT-based auscultation training deviceA low-cost IoT-based auscultation training device
A low-cost IoT-based auscultation training device
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
TELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
TELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
TELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
TELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
TELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
TELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
TELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
TELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
TELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 

Towards cognitive artificial intelligence device: an intelligent processor based on human thinking emulation

  • 1. TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol. 18, No. 3, June 2020, pp. 1475~1482 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v18i3.14835  1475 Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA Towards cognitive artificial intelligence device: an intelligent processor based on human thinking emulation Catherine Olivia Sereati1 , Arwin Datumaya Wahyudi Sumari2 , Trio Adiono3 , Adang Suwandi Ahmad4 1 Department of Electrical Engineering, Universitas Katolik Indonesia Atma Jaya Jakarta, Indonesia 2 Department of Electrical Engineering, State Polytechnic of Malang, Indonesia 2 Faculty of Defense Technology, Indonesia Defense University, Indonesia 3,4 School of Electrical Engineering and Informatics, Institut Teknologi Bandung, Indonesia Article Info ABSTRACT Article history: Received Aug 15, 2019 Revised Jan 20, 2020 Accepted Feb 23, 2020 The intervention of computer technology began the era of a more intelligent and independent instrumentation system based on intelligent methods such as artificial neural networks, fuzzy logic, and genetic algorithm. On the other hand, processor with artificial cognitive ability has also been discovered in 2016. The architecture of the processor was designed based on knowledge growing system (KGS) algorithm, a new concept in artificial intelligence (AI) which is focused on the emulation of the process of the growing of knowledge in human brain after getting new information from human sensory organs. KGS is considered as the main method of a new perspective in AI called as cognitive artificial intelligence (CAI). The design is to obtain the architecture of the data path of the processor. We found that the complexity of the processor circuit is determined by the number of combinations of sensors and hypotheses as the main inputs to the processor. This paper addresses the development of an intelligence processor based on cognitive AI in order to realize an Intelligence Instrumentation System. The processor is implemented in field programmable gate array (FPGA) and able to perform human thinking emulation by using KGS algorithm. Keywords: Cognitive artificial intelligence Human thinking emulation Intelligent instrumentation Intelligent processor Knowledge growing system This is an open access article under the CC BY-SA license. Corresponding Author: Catherine Olivia Sereati, Department of Electrical Engineering, Universitas Katolik Indonesia Atma Jaya. Jenderal Sudirman St. Kav 51, Jakarta, Indonesia Email: catherine.olivia@atmajaya.ac.id 1. INTRODUCTION The demands of intelligent instrumentation system are increasing. One of the system’s capability is autonomous calibration, where sensors independently carry out calibration due to the measurement results of drifts that are affected by the environment [1]. Changes in analog systems to digital ones increasingly improve the precision of instrumentation systems. The development of artificial intelligence (AI) adds the complexity of instrumentation systems but presents smarter ones and opens wide opportunities for more specialized use and autonomous instrumentation [2]. The development of CAI was triggered by the discovery of cognitive characteristic shows by the brain when generating new knowledge. We call this mechanism as knowledge growing (KG) where the knowledge is obtained after the brain extracted new inferencing from the fusion of information delivered from sensory organs after carrying out interaction to the world. Therefore, we call a
  • 2.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 3, June 2020: 1475 - 1482 1476 system that has ability to grow its own knowledge as knowledge growing system (KGS) along with its computational mehod. The development of KGS as the main engine of CAI opens the opportunity to create an intelligent instrumentation system where its intelligence is shown with the cognitive ability put in it. This kind of intelligent instrumentation system can be realized by embedding a processor that has cognitive properties, as the main controller of the system. By implementing it, we are sure that a processor which has cognitive ability namely, emulating the way of human thinks can be realized. The cognitive-based processor then will be used to support the development intelligent instrumentation system in various fields [3–8]. Emulating the way of human thinks into a software computer was already a big challenge, and it was even a bigger challenge to implement it into a hardware [9–11]. Other researchers have also mentioned that the cognitive processor system design is expected to contribute to the development of artificial intelligence-based processor designs [12, 13]. In this paper we delivered the technique to implement KGS computation method to create a human thinking emulation processor called as CAI processor or simply cognitive processor, an intelligent device for intelligent system. 2. RESEARCH METHOD Current conventional computing methods based on AI mostly obtain knowledge based on past data or experiences and not yet equipped with the ability to generate knowledge from brand new data obtained from directly interacting with the world, in this case a phenomenon being observed. In addition, the knowledge generated by the existing AI methods are still limited by using existing data to produce specific goals (supervised learning) or by providing a set of data to see the form of its output (unsupervised learning) [14, 15]. This means that the current AI computational methods are currently not equipped with a feature which gives them an ability to learn something new from the information obtained from their sensory organs that perform interactions to a phenomenon. KGS computation is inspired by the way of the human brain draws conclusions based on information received from the environment [16, 17]. The basic concept of KGS is to emulate the way of human’s brain develops new knowledge from the information delivered by human sensory organs gathered from the phenomenon the human interacts with as illustrated in Figure 1 [18]. The process to gain new knowledge is started by sensing the phenomenon and receiving the information regarding it from all sensory organs. This can only be done by making interactions with the observed phenomenon using one or more sensory organs. Mostly, information from only one sensors can only give a little knowledge regarding the phenomenon. By getting more information from various sensory organs, then human can have more knowledge and be able to explain what the phenomenon being interacted with. Information Fusion INFORMATION FUSION S1 OBSERVATION FROM SENSORY ORGANS INFORMATION FUSION S2 INFORMATION FUSION S3 INFORMATION FUSION S4 INFORMATION FUSION S5 INFORMATION INFERENCING EACH SENSORS INFORMATION INFERENCING FUSION: S1 & S2 INFORMATION INFERENCING FUSION: S1 & S3 INFORMATION INFERENCING FUSION: S1 & S2&S4 INFORMATION INFERENCING FUSION: ALL SENSORS DoC New KnowledgeKnowledge Data Base (Prior Knowledge) Knowledge Inferencing Fusion Ultimate Knowledge tn tn tn tn Figure 1. KGS mechanism in growing knowledge
  • 3. TELKOMNIKA Telecommun Comput El Control  Towards cognitive artificial intelligence device: an intelligent processor based .... (Catherine Olivia Sereati) 1477 The information delivered from the sensory organs is fused to obtain comprehensive information. Each fused information will its own probability value or DoC which represents the knowledge obtained by KGS about the phenomenon. Each comprehensive information’s probability value then becomes new knowledge which is measured with DoC. DoC represents the value of certainty for each new knowledge depending on the sensory organs’ information that has been fused. DoC also shows the best combination of sensor data and hypotheses that may occur related to the observed phenomenon. The process of KGS is described by two formulas namely ASSA2010 (Arwin Sumari-Suwandi Ahmad 2010) method for single observation time, and OM-ASSA2010 (observation multi time Arwin Sumari-Suwandi Ahmad 2010) for multiple observation time as shown in (1). The results are in the form of new knowledge probability distribution (NKPD) namely, the list of knowledge of the system regarding the observed phenomenon based on the observed data from the sensory organs[19]. NKPD is knowledge obtained from single observation time while NKPD over time (NKPDT) is the ultimate knowledge of the system after performing a computation to information from multiple times of observation. 1 ( ) ( ) i t t t P P     = =  (1) where: 𝜏 = the number of times in multiple observation, 𝜏 is replaced with n for single observation time; 𝑃(𝜓𝑡 𝑖) = the best value of the combination of sensor-data and hypothesis at each observation time; 𝑃( 𝜃𝑡) = the best combination of sensor-data and hypothesis value at whole observation time. The ultimate knowledge which the best combination of sensor-data and hypothesis that is obtained from several observation times will also be calculated using DoC with the mathematics formula in (2). ( ) max[ ( ) ]j DoC P estimate P   = = (2) where P()estimate is the value of DoC which is commonly the greatest value of the combination of sensor-data and hypotheses resulted from the OM-ASSA2010 formula computation. This mechanism will be implemented in hardware which is, in this case, is field programmable gate array (FPGA). Before implemented in FPGA and based on the preliminary designs of the data path, the VHDL design for CAI or simply cognitive processor was successfully made [20]. Figure 2 shows the flowchart of the KGS algorithm as the basis for designing the data path for the cognitive processor. The process is started with the retrieval of data from sensors which is called an indication, namely information regarding the observed phenomenon. The number of hypotheses is also set up according to the number of sensors used by the system. The number of hypotheses is computed by using (3), where  is the maximum number of possible hypotheses and  is the number of the sensor. ( )2 1  = − − (3) The system will check whether each sensor can observe every condition of the existing hypothesis and put a binary value 0 or 1 depending on the result of the sensor’s observation. If all sensor data is already completely received and each value of the combination of sensor data and hypotheses is already filled in, then the next process is the carry out the information fusion and obtain comprehensive information for each combination of sensor-data dan hypothesis. The comprehensive information becomes the inferencing of each combination of sensor-data and hypothesis which will have a variety of probability values depending on the values of all sensor-data and hypotheses for each hypothesis. The inferencing will become a new knowledge of the system. This mechanism is carried out by using (1) and the amount of knowledge obtained at this point is measured with DoC using (2). This mechanism will continue time by time as long as the system is still making the interaction with the phenomenon, sensing to obtain information, and perceiving it. There is a confirmation whether all inferencing has already been done from t1 to t. DoC of each observation time is stored to be fused with the next inferencing if the DoC at this point cannot recognize the observed phenomenon. The components of a cognitive processor that are designed are based on OM-ASSA2010 formula which becomes the algorithm of
  • 4.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 3, June 2020: 1475 - 1482 1478 KGS. To implement this equation into hardware, we had to form a series of systolic arrays [21–23], with the matrix equation as shown in (4), and it becomes the basis for forming a dependence graph to determine the cognitive processor component as shown in Figure 3. From this dependence graph, the cognitive processor elements are depicted in Figure 4. 1 1 1 11 12 13 1 1 1 2 21 22 23 2 2 2 j 1 2 3 i 1 ( ) P ... ( ) P .., ... .. .. .. .. .. ... ... P .. w ( ) t i t i j j j ji t n P t v v v v w P v v v v w t v v v v P t       − − −                      = +                            (4) where w1 = w2 =… = wi = w Figure 2. The flowchart of the KGS algorithm as the basis for the design of cognitive processor data-path
  • 5. TELKOMNIKA Telecommun Comput El Control  Towards cognitive artificial intelligence device: an intelligent processor based .... (Catherine Olivia Sereati) 1479 1 3 2 ... i Pw1 Pwj Pw2 j j V11 V12 ... V1i V21 V22 ... V2i ............ Vj1 ... VjiVj2 • • • • • • • • • • • • • • • • w1 w2 wi ... NKPDH1 (t-1) 1 2 ... i NKPDH2 (t-1) NKPDH3 (t-1) NKPDHj (t-1) NKPDH2 (t-1) NKPDH3 (t-1) NKPDHj (t-1) NKPDH1 (t-1) NKPDH2 (t-1) NKPDH3 (t-1) NKPDHj (t-1) NKPDH1 (t-1) Figure 3. Dependence graph for cognitive processor X + v11v12 .. v1i D X P(w) t 1 1/T NKPDH1t-1 X + v11v12 .. v1i D X P(w) t 1 1/T X + v11v12 .. v1i D X P(w) t 1 1/T X + v11v12 .. v1i D X P(w) t 1 1/T w PE 1 PE 2 PE 3 PE j PE 1 PE 2 PE 3 PE j NKPDH3t-1 NKPDHjt-1NKPDH2t-1 Figure 4. The elements of the cognitive processor In Figure 4, it can be seen that the OM-ASSA2010 computational circuits consist of multiplication and adder components. The D-Latch register is used to store the calculation results from the adder and multiplication components. In this processor architecture design, the number of adder components is influenced by the number of hypotheses. The number of sensors affects computing time. As an example, a cognitive processor with 4 sensors with 13 possible hypotheses, but we allocated only 8 hypotheses or possible events, it will take 8 adders with a computational time length of 4 timing stages. 3. RESULTS AND ANALYSIS The testbench simulation for CAI processor is shown in Figure 5, where the system successfully produced DoC values at the 4th computation time. Based on the results of the modeling and the designing cognitive processor, its circuit is implemented in FPGA module [24, 25]. We used Cyclone IVE EPCE6F17C6 which has a total I/O of 180, to implement the designed processor where in this experiment we used 4 hypotheses or probable answers. The results of FPGA implementation for cognitive processor is shown in Figure 6, and the synthesis results of the simulation are given in Figure 7. From the synthesis results, it can be seen that cognitive processor with 4 hypotheses requires 527 logic elements, and 86 pins consisting of 3 pins for the timing element (clock, reset, and enable), 4x4 pin for input register, 7 pins for display counter, and 17x4 pin for output register. The implementation of the cognitive processor in FPGA has also been carried out for a combination of 4 sensor inputs and 8 hypotheses. The implementation results for this configuration show that the required logic elements are 2.162, and 170 pins consist of 2 pins for the timing (clock and reset) elements, 4x8 pin for input register, and 17x8 pin for output register. From the implementation results, it can be seen that the number of hypotheses affects the circuit complexity of the cognitive processor. The more possible events that are set up then the wider the data path should be set up and the higher the number of logic elements will be used. From the experiment results, double the number of hypotheses fourfolds the number of logic elements, from 527 for 4 hypotheses to 2.162 for 8 hypotheses or there is a 310% increase. On the other hand, the number of pins increases from 86 pins to 170 pins or there is a 98% increase.
  • 6.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 3, June 2020: 1475 - 1482 1480 Figure 5. Testbench simulation for the cognitive processor Figure 6. The hardware implementation of the cognitive processor with 4 hypotheses Figure 7. The synthesis results of CAI processor 4. CONCLUSION From our experiments, it can be seen that we have successfully implemented the KGS algorithm into FPGA and also carried out a simulation to show that it works well. Synthesizing its hardware implementation,
  • 7. TELKOMNIKA Telecommun Comput El Control  Towards cognitive artificial intelligence device: an intelligent processor based .... (Catherine Olivia Sereati) 1481 we found that the complexity of the cognitive processor increases as the number of hypotheses increases which are affected the number of sensors. As can be seen from (3) that the number of sensors automatically affects the maximum number of hypotheses or possible events that can be formed from the computation. It is an analogy to humans, the more sensory organs use to observe a phenomenon then the more probable answers that can be obtained and more knowledge that can be acquired to challenge is how to reduce the number of logic elements increase as the number of hypotheses increase. One of the ways is to find a method to determine the number of the most probable hypotheses for a number of sensors for observing a phenomenon. From the perspective of hardware implementation, we continue our research in designing a much better cognitive processor based on the KGS algorithm. We believe that our cognitive processor if it is ready in the form of system on chip (SoC), it would be the main supporter for the autonomous mobile electronic instrumentation system. The implementation of a CAI-based processor can improve the performance of the intelligence instrumentation system because of its ability to increase its own knowledge as time passes based on the inputs it receives from the phenomenon in its surroundings, as it is done naturally by humans in their daily life. ACKNOWLEDGMENTS The author would like to express sincere thanks to the CAIRG Laboratory for its support so that this research can be carried out and completed. REFERENCES [1] W. Shi, M. B. Alawieh, X. Li, and H. Yu, “Algorithm and hardware implementation for visual perception system in autonomous vehicle: A survey,” Integration,the VLSI Journal, vol. 59. pp. 148–156, 2017, doi: 10.1016/j.vlsi.2017.07.007. [2] T. Sutikno, M. Facta, and G. A. M. Markadeh, “Progress in Artificial Intelligence Techniques: from Brain to Emotion,” TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 9, no. 2, pp. 201–201, 2011. [3] K. O. Bachri, A. D. W. Sumari, B. A. Soedjarno, and A. S. Ahmad, “The implementation of A3S information fusion algorithm for interpreting Dissolved Gas Analysis (DGA) based on Doernenburg Ratio,” in 2017 International Symposium on Electronics and Smart Devices, ISESD 2017, 2018, doi: 10.1109/ISESD.2017.8253360. [4] H. R. A. Talompo, A. S. Ahmad, Y. S. Gondokaryono, and S. Sutikno, “NAIDS design using ChiMIC-KGS,” in 2017 International Symposium on Electronics and Smart Devices, ISESD 2017, 2018, doi: 10.1109/ISESD.2017.8253362. [5] S. D. Putra, A. S. Ahmad, and S. Sutikno, “DPA-countermeasure with knowledge growing system,” 2016 International Symposium on Electronics and Smart Devices, ISESD 2016, 2017, doi: 10.1109/ISESD.2016.7886757. [6] W. Adiprawita, A. S. Ahmad, J. Sembiring, and B. R. Trilaksono, “New resampling algorithm for particle filter localization for mobile robot with 3 ultrasonic sonar sensor,” in Proceedings of the 2011 International Conference on Electrical Engineering and Informatics, ICEEI 2011, 2011, doi: 10.1109/ICEEI.2011.6021733. [7] M. N. Wibisono and A. S. Ahmad, “Weather forecasting using Knowledge Growing System (KGS),” Proceedings 2017 2nd International Conferences on Information Technology, Information Systems and Electrical Engineering, ICITISEE 2017, 2018, doi: 10.1109/ICITISEE.2017.8285526. [8] K. O. Bachri, U. Khayam, B. A. Soedjarno, A. D. W. Sumari, and A. S. Ahmad, “Cognitive artificial-intelligence for doernenburg dissolved gas analysis interpretation,” TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 17, no. 1, pp. 268-274, 2019, doi: 10.12928/telkomnika.v17i1.11612. [9] T. Kasakawa et al., “An Artificial Neural Network at Device Level Using Simplified Architecture and Thin-Film Transistors,” Electron Devices, IEEE Trans., 2010, doi: 10.1109/ted.2010.2056991. [10] G. M. Lozito, A. Laudani, F. Riganti-Fulginei, and A. Salvini, “FPGA implementations of feed forward neural network by using floating point hardware accelerators,” Adv. Electr. Electron. Eng., 2014, doi: 10.15598/aeee.v12i1.831. [11] C.-F. Chang and B. J. Sheu, “Digital VLSI multiprocessor design for neurocomputers,” [Proceedings 1992] IJCNN Int. Jt. Conf. Neural Networks, vol. 2, pp. 1–6, 1992, doi: 10.1109/IJCNN.1992.226993. [12] P. Langley, J. E. Laird, and S. Rogers, “Cognitive architectures: Research issues and challenges,” Cogn. Syst. Res., 2009, doi: 10.1016/j.cogsys.2006.07.004. [13] C. (US) Tuan A. Duong, Glendora and C. (US) Vu A. Duong, Rosemead, “System and method for cognitive processing for data fusion,” 2012. [14] Y. Chen, E. Argentinis, and G. Weber, “IBM Watson: How Cognitive Computing Can Be Applied to Big Data Challenges in Life Sciences Research,” Clinical Therapeutics, vol. 38, no. 4. pp. 688–701, 2016, doi: 10.1016/j.clinthera.2015.12.001. [15] C. Megha, A. Madura, and Y. Sneha, “Cognitive Computing and its Applications,” International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017), pp. 1168–1172, 2017. [16] A. D. W. Sumari, A. S. Ahmad, A. I. Wuryandari, and J. Sembiring, : “Brain-inspired Knowledge Growing-System: Towards A True Cognitive Agent,” Int. J. Comput. Sci. Artif. Intell., vol. 2, no. 1, pp. 23–26, 2012. [17] S. K. Card, T. P. Moran, and A. Newell, “The model human processor: an engineering model for human performance,” Handbook of perception and human performance. 1986, doi: 10.1177/107118138102500180. [18] A. D. W. Sumari, A. S. Ahmad, A. I. Wuryandari, and J. Sembiring, “A new information-inferencing fusion method for intelligent agents,” Proceedings of the 2009 International Conference on Electrical Engineering and Informatics, ICEEI 2009, 2009, doi: 10.1109/ICEEI.2009.5254810.
  • 8.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 3, June 2020: 1475 - 1482 1482 [19] A. D. W. Sumari and A. S. Ahmad, “Design and Implementation of Multi Agent-based Information Fusion System for Supporting Decision Making (a Case Study on Military Operation),” ITB J. Inf. Commun. Technol., vol. 2, no. 1, pp. 42–63, 2008. [20] C. O. Sereati, A. D.W. Sumari, T. Adiono, and A. S. Ahmad, “Architecture Design for A Multi-Sensor Information Fusion Processor,” TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 17, no. 1, pp. 101–108, 2019. [21] S. B. V. Gamm et al., “Towards nanomagnetic logic systems: A programmable arithmetic logic unit for systolic array-based computing (Invited),” 2015 IEEE Nanotechnology Materials and Devices Conference, NMDC 2015, 2016, doi: 10.1109/NMDC.2015.7439269. [22] R. Martinez-Alonso, K. Mino, and D. Torres-Lucio, “Array processors designed with VHDL for solution of linear equation systems implemented in a FPGA,” in Proceedings - 2010 IEEE Electronics, Robotics and Automotive Mechanics Conference, CERMA 2010, 2010, doi: 10.1109/CERMA.2010.85. [23] C. Cheng and K. K. Parhi, “A Novel Systolic Array Structure for DCT,” IEEE Trans. Circuits Syst. II Express Briefs, 2005, doi: 10.1109/TCSII.2005.850432. [24] A. Kumar, S. Fernando, Y. Ha, B. Mesman, and H. Corporaal, “Multiprocessor systems synthesis for multiple use-cases of multiple applications on FPGA,” ACM Trans. Des. Autom. Electron. Syst., 2008, doi: 10.1145/1367045.1367049. [25] B. J. Leiner, V. Q. Lorena, T. M. Cesar, and M. V. Lorenzo, “Hardware architecture for FPGA implementation of a neural network and its application in images processing,” Proceedings - Electronics, Robotics and Automotive Mechanics Conference, CERMA 2008, 2008, doi: 10.1109/CERMA.2008.32. BIOGRAPHIES OF AUTHORS Catherine Olivia Sereati got Bachelor degree of electrical engineering (EE) from Brawijaya University Malang, then pursued Master of Technology and Doctor in Electrical Engineering, both from Institut Teknologi Bandung (ITB). Now Catherine is a lecturer and researcher at Universitas Katolik Indonesia Atma Jaya. Her interest subject of researches are electronic instrumentation system and system on chip (SoC). She was also involved in several research projects to design cognitive instrumentation systems. Some of them are a building a software cognitive interpretation of ship movements, for Indonesian marine security purposes, and cognitive electro cardiograph (ECG) design. Currently her research project is focusing to designing the architecture of cognitive processor. Colonel Arwin Datumaya Wahyudi Sumari is 1991 Indonesian Air Force Academy graduate. He received Sarjana Teknik (S.T.) in Electronics Engineering (1996), Magister Teknik (M.T.) in Computer Engineering (2008), and Doktor (Dr.) in Electrical Engineering and Informatics (2010) from Institut Teknologi Bandung, Indonesia. In 2009, he along with Prof. Dr.ing. Adang Suwandi Ahmad invented knowledge growing system which is the foundation of Cognitive Artificial Intelligence. Currently, Arwin is Senior Electrical Engineer Officer at Abdulrachman Saleh AFB, Malang. He is also Assistant Professor at Faculty of Defense Technology, Indonesia Defense University and Adjunct Professor at Department of Electrical Engineering, State Polytechnic of Malang. He has been developing and enhancing cognitive artificial intelligence for various field especially for Defense and Security. Adang Suwandi Ahmad received his engineering degree in Electrical Engineering from ITB, Diplome Etude Approfondi Signaux et Bruits (DEA) option Electronique, and Docteur Ingenieur Signaux et Bruits option Electronique (Dr.- ing) from Universite des Sciences du Languedoc Montpellier, France became Institut Teknologi Bandung’s Professor in Intelligent Electronics Instrumentation System in 2000. Adang’s past researches were in Electronics Instrumentation systems and intelligent electronics systems/artificial intelligence. He has also expanded his research in bioinformatics computation, information sciences, intelligent computations, and intelligent-based instrumentation systems. In 2009 - 2018 Adang Suwandi Ahmad has developed Cognitive Artificial Intelligence as a new method of artificial intelligence.