Home / Journals / JAI / Vol.6, No.1, 2024
Special Issues
  • Open AccessOpen Access

    REVIEW

    A Comprehensive Overview and Comparative Analysis on Deep Learning Models

    Farhad Mortezapour Shiri*, Thinagaran Perumal, Norwati Mustapha, Raihani Mohamed
    Journal on Artificial Intelligence, Vol.6, pp. 301-360, 2024, DOI:10.32604/jai.2024.054314 - 20 November 2024
    Abstract Deep learning (DL) has emerged as a powerful subset of machine learning (ML) and artificial intelligence (AI), outperforming traditional ML methods, especially in handling unstructured and large datasets. Its impact spans across various domains, including speech recognition, healthcare, autonomous vehicles, cybersecurity, predictive analytics, and more. However, the complexity and dynamic nature of real-world problems present challenges in designing effective deep learning models. Consequently, several deep learning models have been developed to address different problems and applications. In this article, we conduct a comprehensive survey of various deep learning models, including Convolutional Neural Network (CNN), Recurrent… More >

  • Open AccessOpen Access

    ARTICLE

    An Optimisation Strategy for Electric Vehicle Charging Station Layout Incorporating Mini Batch K-Means and Simulated Annealing Algorithms

    Haojie Yang, Xiang Wen, Peng Geng*
    Journal on Artificial Intelligence, Vol.6, pp. 283-300, 2024, DOI:10.32604/jai.2024.056303 - 18 October 2024
    Abstract To enhance the rationality of the layout of electric vehicle charging stations, meet the actual needs of users, and optimise the service range and coverage efficiency of charging stations, this paper proposes an optimisation strategy for the layout of electric vehicle charging stations that integrates Mini Batch K-Means and simulated annealing algorithms. By constructing a circle-like service area model with the charging station as the centre and a certain distance as the radius, the maximum coverage of electric vehicle charging stations in the region and the influence of different regional environments on charging demand are… More >

  • Open AccessOpen Access

    ARTICLE

    Optimizing Internet of Things Device Security with a Globalized Firefly Optimization Algorithm for Attack Detection

    Arkan Kh Shakr Sabonchi*
    Journal on Artificial Intelligence, Vol.6, pp. 261-282, 2024, DOI:10.32604/jai.2024.056552 - 18 October 2024
    Abstract The phenomenal increase in device connectivity is making the signaling and resource-based operational integrity of networks at the node level increasingly prone to distributed denial of service (DDoS) attacks. The current growth rate in the number of Internet of Things (IoT) attacks executed at the time of exchanging data over the Internet represents massive security hazards to IoT devices. In this regard, the present study proposes a new hybrid optimization technique that combines the firefly optimization algorithm with global searches for use in attack detection on IoT devices. We preprocessed two datasets, CICIDS and UNSW-NB15,… More >

  • Open AccessOpen Access

    ARTICLE

    Hybrid Task Scheduling Algorithm for Makespan Optimisation in Cloud Computing: A Performance Evaluation

    Abdulrahman M. Abdulghani*
    Journal on Artificial Intelligence, Vol.6, pp. 241-259, 2024, DOI:10.32604/jai.2024.056259 - 16 October 2024
    Abstract Cloud computing has rapidly evolved into a critical technology, seamlessly integrating into various aspects of daily life. As user demand for cloud services continues to surge, the need for efficient virtualization and resource management becomes paramount. At the core of this efficiency lies task scheduling, a complex process that determines how tasks are allocated and executed across cloud resources. While extensive research has been conducted in the area of task scheduling, optimizing multiple objectives simultaneously remains a significant challenge due to the NP (Non-deterministic Polynomial) Complete nature of the problem. This study aims to address… More >

  • Open AccessOpen Access

    ARTICLE

    Representation of HRTF Based on Common-Pole/Zero Modeling and Principal Component Analysis

    Wei Chen1,*, Xiaogang Wei2,*, Hongxu Zhang2, Wenpeng He2
    Journal on Artificial Intelligence, Vol.6, pp. 225-240, 2024, DOI:10.32604/jai.2024.052366 - 16 August 2024
    Abstract The Head-Related Transfer Function (HRTF) describes the effects of sound reflection and scattering caused by the environment and the human body when sound signals are transmitted from a source to the human ear. It contains a significant amount of auditory cue information used for sound localization. Consequently, HRTF renders 3D audio accurately in numerous immersive multimedia applications. Because HRTF is high-dimensional, complex, and nonlinear, it is a relatively large and intricate dataset, typically consisting of hundreds of thousands of samples. Storing HRTF requires a significant amount of storage space in practical applications. Based on this, More >

  • Open AccessOpen Access

    ARTICLE

    Leveraging Pre-Trained Word Embedding Models for Fake Review Identification

    Glody Muka1,*, Patrick Mukala1,2,*
    Journal on Artificial Intelligence, Vol.6, pp. 211-223, 2024, DOI:10.32604/jai.2024.049685 - 07 August 2024
    Abstract Reviews have a significant impact on online businesses. Nowadays, online consumers rely heavily on other people's reviews before purchasing a product, instead of looking at the product description. With the emergence of technology, malicious online actors are using techniques such as Natural Language Processing (NLP) and others to generate a large number of fake reviews to destroy their competitors’ markets. To remedy this situation, several researches have been conducted in the last few years. Most of them have applied NLP techniques to preprocess the text before building Machine Learning (ML) or Deep Learning (DL) models… More >

  • Open AccessOpen Access

    ARTICLE

    A Hybrid Query-Based Extractive Text Summarization Based on K-Means and Latent Dirichlet Allocation Techniques

    Sohail Muhammad1, Muzammil Khan2, Sarwar Shah Khan2,3,*
    Journal on Artificial Intelligence, Vol.6, pp. 193-209, 2024, DOI:10.32604/jai.2024.052099 - 07 August 2024
    Abstract Retrieving information from evolving digital data collection using a user’s query is always essential and needs efficient retrieval mechanisms that help reduce the required time from such massive collections. Large-scale time consumption is certain to scan and analyze to retrieve the most relevant textual data item from all the documents required a sophisticated technique for a query against the document collection. It is always challenging to retrieve a more accurate and fast retrieval from a large collection. Text summarization is a dominant research field in information retrieval and text processing to locate the most appropriate… More >

  • Open AccessOpen Access

    ARTICLE

    Enhancing Exam Preparation through Topic Modelling and Key Topic Identification

    Rudraneel Dutta*, Shreya Mohanty
    Journal on Artificial Intelligence, Vol.6, pp. 177-192, 2024, DOI:10.32604/jai.2024.050706 - 19 July 2024
    Abstract Traditionally, exam preparation involves manually analyzing past question papers to identify and prioritize key topics. This research proposes a data-driven solution to automate this process using techniques like Document Layout Segmentation, Optical Character Recognition (OCR), and Latent Dirichlet Allocation (LDA) for topic modelling. This study aims to develop a system that utilizes machine learning and topic modelling to identify and rank key topics from historical exam papers, aiding students in efficient exam preparation. The research addresses the difficulty in exam preparation due to the manual and labour-intensive process of analyzing past exam papers to identify… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning: A Theoretical Framework with Applications in Cyberattack Detection

    Kaveh Heidary*
    Journal on Artificial Intelligence, Vol.6, pp. 153-175, 2024, DOI:10.32604/jai.2024.050563 - 18 July 2024
    Abstract This paper provides a detailed mathematical model governing the operation of feedforward neural networks (FFNN) and derives the backpropagation formulation utilized in the training process. Network protection systems must ensure secure access to the Internet, reliability of network services, consistency of applications, safeguarding of stored information, and data integrity while in transit across networks. The paper reports on the application of neural networks (NN) and deep learning (DL) analytics to the detection of network traffic anomalies, including network intrusions, and the timely prevention and mitigation of cyberattacks. Among the most prevalent cyber threats are R2L,… More >

  • Open AccessOpen Access

    ARTICLE

    Cardiovascular Disease Prediction Using Risk Factors: A Comparative Performance Analysis of Machine Learning Models

    Adil Hussain1,*, Ayesha Aslam2
    Journal on Artificial Intelligence, Vol.6, pp. 129-152, 2024, DOI:10.32604/jai.2024.050277 - 21 May 2024
    Abstract The diagnosis and prognosis of cardiovascular diseases are critical medical responsibilities that assist cardiologists in correctly classifying patients and treating them accordingly. The utilization of machine learning in the medical domain has witnessed a notable surge due to its ability to discern patterns from vast amounts of data. Machine learning algorithms that can categorize cases of cardiovascular illness may help doctors reduce the number of wrong diagnoses. This research investigates the efficacy of different machine learning algorithms in predicting cardiovascular disease in accordance with risk factors. This study utilizes a variety of machine learning models, More >

  • Open AccessOpen Access

    ARTICLE

    Design Pattern and Challenges of Federated Learning with Applications in Industrial Control System

    Hina Batool1, Jiuyun Xu1,*, Ateeq Ur Rehman2, Habib Hamam3,4,5,6
    Journal on Artificial Intelligence, Vol.6, pp. 105-128, 2024, DOI:10.32604/jai.2024.049912 - 06 May 2024
    Abstract Federated Learning (FL) appeared as an encouraging approach for handling decentralized data. Creating a FL system needs both machine learning (ML) knowledge and thinking about how to design system software. Researchers have focused a lot on the ML side of FL, but have not paid enough attention to designing the software architecture. So, in this survey, a set of design patterns is described to tackle the design issues. Design patterns are like reusable solutions for common problems that come up when designing software architecture. This paper focuses on (1) design patterns such as architectures, frameworks,… More >

  • Open AccessOpen Access

    ARTICLE

    Detection of Student Engagement in E-Learning Environments Using EfficientnetV2-L Together with RNN-Based Models

    Farhad Mortezapour Shiri1,*, Ehsan Ahmadi2, Mohammadreza Rezaee1, Thinagaran Perumal1
    Journal on Artificial Intelligence, Vol.6, pp. 85-103, 2024, DOI:10.32604/jai.2024.048911 - 24 April 2024
    Abstract Automatic detection of student engagement levels from videos, which is a spatio-temporal classification problem is crucial for enhancing the quality of online education. This paper addresses this challenge by proposing four novel hybrid end-to-end deep learning models designed for the automatic detection of student engagement levels in e-learning videos. The evaluation of these models utilizes the DAiSEE dataset, a public repository capturing student affective states in e-learning scenarios. The initial model integrates EfficientNetV2-L with Gated Recurrent Unit (GRU) and attains an accuracy of 61.45%. Subsequently, the second model combines EfficientNetV2-L with bidirectional GRU (Bi-GRU), yielding More >

  • Open AccessOpen Access

    ARTICLE

    A Deep Learning Model for Insurance Claims Predictions

    Umar Isa Abdulkadir*, Anil Fernando*
    Journal on Artificial Intelligence, Vol.6, pp. 71-83, 2024, DOI:10.32604/jai.2024.045332 - 22 April 2024
    Abstract One of the significant issues the insurance industry faces is its ability to predict future claims related to individual policyholders. As risk varies from one policyholder to another, the industry has faced the challenge of using various risk factors to accurately predict the likelihood of claims by policyholders using historical data. Traditional machine-learning models that use neural networks are recognized as exceptional algorithms with predictive capabilities. This study aims to develop a deep learning model using sequential deep regression techniques for insurance claim prediction using historical data obtained from Kaggle with 1339 cases and eight… More >

  • Open AccessOpen Access

    ARTICLE

    Causality-Driven Common and Label-Specific Features Learning

    Yuting Xu1,*, Deqing Zhang1, Huaibei Guo2, Mengyue Wang1
    Journal on Artificial Intelligence, Vol.6, pp. 53-69, 2024, DOI:10.32604/jai.2024.049083 - 05 April 2024
    Abstract In multi-label learning, the label-specific features learning framework can effectively solve the dimensional catastrophe problem brought by high-dimensional data. The classification performance and robustness of the model are effectively improved. Most existing label-specific features learning utilizes the cosine similarity method to measure label correlation. It is well known that the correlation between labels is asymmetric. However, existing label-specific features learning only considers the private features of labels in classification and does not take into account the common features of labels. Based on this, this paper proposes a Causality-driven Common and Label-specific Features Learning, named CCSF More >

  • Open AccessOpen Access

    ARTICLE

    A Real-Time Localization Algorithm for Unmanned Aerial Vehicle Based on Continuous Images Processing

    Peng Geng1,*, Annan Yang2, Yan Liu3
    Journal on Artificial Intelligence, Vol.6, pp. 43-52, 2024, DOI:10.32604/jai.2024.047642 - 28 March 2024
    Abstract This article presents a real-time localization method for Unmanned Aerial Vehicles (UAVs) based on continuous image processing. The proposed method employs the Scale Invariant Feature Transform (SIFT) algorithm to identify key points in multi-scale space and generate descriptor vectors to match identical objects across multiple images. These corresponding points in the image provide pixel positions, which can be combined with transformation equations, allow for the calculation of the UAV’s actual ground position. Additionally, the physical coordinates of matching points in the image can be obtained, corresponding to the UAV’s physical coordinates. The method achieves real-time More >

  • Open AccessOpen Access

    ARTICLE

    Opinion Mining on Movie Reviews Based on Deep Learning Models

    Mian Muhammad Danyal1, Muhammad Haseeb1, Sarwar Shah Khan2,*, Bilal Khan1, Subhan Ullah1
    Journal on Artificial Intelligence, Vol.6, pp. 23-42, 2024, DOI:10.32604/jai.2023.045617 - 31 January 2024
    Abstract Movies reviews provide valuable insights that can help people decide which movies are worth watching and avoid wasting their time on movies they will not enjoy. Movie reviews may contain spoilers or reveal significant plot details, which can reduce the enjoyment of the movie for those who have not watched it yet. Additionally, the abundance of reviews may make it difficult for people to read them all at once, classifying all of the movie reviews will help in making this decision without wasting time reading them all. Opinion mining, also called sentiment analysis, is the… More >

  • Open AccessOpen Access

    ARTICLE

    A Performance Analysis of Machine Learning Techniques for Credit Card Fraud Detection

    Ayesha Aslam1, Adil Hussain2,*
    Journal on Artificial Intelligence, Vol.6, pp. 1-21, 2024, DOI:10.32604/jai.2024.047226 - 31 January 2024
    Abstract With the increased accessibility of global trade information, transaction fraud has become a major worry in global banking and commerce security. The incidence and magnitude of transaction fraud are increasing daily, resulting in significant financial losses for both customers and financial professionals. With improvements in data mining and machine learning in computer science, the capacity to detect transaction fraud is becoming increasingly attainable. The primary goal of this research is to undertake a comparative examination of cutting-edge machine-learning algorithms developed to detect credit card fraud. The research looks at the efficacy of these machine learning… More >

Per Page:

Share Link