Vol.28, No.1, 2021-Table of Contents
  • Artificial Intelligence Based Language Translation Platform
  • Abstract The use of computer-based technologies by non-native Arabic-speaking teachers for teaching native Arabic-speaking students can result in higher learner engagement. In this study, a machine translation (MT) system is developed as a learning technology. The proposed system can be linked to a digital podium and projector to reduce multitasking. A total of 25 students from Prince Sattam Bin Abdulaziz University, Saudi Arabia participated in our experiment and survey related to the use of the proposed technology-enhanced MT system. An important reason for using this framework is to exploit the high service bandwidth (up to several bandwidths) made available for interactive… More
  •   Views:718       Downloads:431        Download PDF
  • Building Information Modeling Based Automated Building Regulation Compliance Checking Asp.net Web Software
  • Abstract Building regulations used in the architecture, engineering, and construction sectors are legal documents prepared under the control of local authorities for use by individuals. These regulations determine the conditions for ensuring performance and quality throughout the entire construction process. The building regulation inspection process conducted with the traditional manual method is time-consuming and error-prone for architects, engineers, and local authorities. It is known that most of these inspections are carried out with municipalities by local authorities. The mutual interview study and literature review shows that there is no standard rule for the legal auditing process and the same services are… More
  •   Views:705       Downloads:584        Download PDF
  • Multifactorial Disease Detection Using Regressive Multi-Array Deep Neural Classifier
  • Abstract Comprehensive evaluation of common complex diseases associated with common gene mutations is currently a hot area of human genome research into causative new developments. A multi-fractal analysis of the genome is performed by placing the entire DNA sequence into smaller fragments and using the chaotic game representation and systematic methods to calculate the general dimensional spectrum of each fragment. This is a time consuming process as it uses floating point to represent large data sets and requires processing time. The proposed Regressive Multi-Array Deep Neural Classifier (RMDNC) system is implemented to reduce the computation time, it is called a polymorphic… More
  •   Views:738       Downloads:390        Download PDF
  • Automatic Sleep Staging Based on EEG-EOG Signals for Depression Detection
  • Abstract In this paper, an automatic sleep scoring system based on electroencephalogram (EEG) and electrooculogram (EOG) signals was proposed for sleep stage classification and depression detection. Our automatic sleep stage classification method contained preprocessing based on independent component analysis, feature extraction including spectral features, spectral edge frequency features, absolute spectral power, statistical features, Hjorth features, maximum-minimum distance and energy features, and a modified ReliefF feature selection. Finally, a support vector machine was employed to classify four states (awake, light sleep [LS], slow-wave sleep [SWS] and rapid eye movement [REM]). The overall accuracy of the Sleep-EDF database reached 90.10 ± 2.68% with… More
  •   Views:629       Downloads:558        Download PDF
  • Constructional Cyber Physical System: An Integrated Model
  • Abstract Artificial intelligence, machine learning, and deep learning have achieved great success in the fields of computer vision and natural language processing, and then extended to various fields, such as biology, chemistry, and civil engineering, including big data in the field of logistics. Therefore, many logistics companies move towards the integration of intelligent transportation systems. Only virtual and physical development can support the sustainable development of the logistics industry. This study aims to: 1.) collect timely information from the block chain, 2.) use deep learning to build a customer database so that sales staff in physical stores can grasp customer preferences,… More
  •   Views:692       Downloads:462        Download PDF
  • Filter-Based Feature Selection and Machine-Learning Classification of Cancer Data
  • Abstract Microarray cancer data poses many challenges for machine-learning (ML) classification including noisy data, small sample size, high dimensionality, and imbalanced class labels. In this paper, we propose a framework to address these problems by properly utilizing feature-selection techniques. The most important features of the cancer datasets were extracted with Logistic Regression (LR), Chi-2, Random Forest (RF), and LightGBM. These extracted features served as input columns in an applied classification task. This framework’s main advantages are reducing time complexity and the number of irrelevant features for the dataset. For evaluation, the proposed method was compared to models using Support Vector Machine… More
  •   Views:582       Downloads:414        Download PDF
  • Soil Moisture Prediction in Peri-urban Beijing, China: Gene Expression Programming Algorithm
  • Abstract Soil moisture is an important indicator for agricultural planting and agricultural water management. People have been trying to guide crop cultivation, formulate irrigation systems, and develop intelligent agriculture by knowing exactly what the soil moisture is in real time. This paper considers the impact of meteorological parameters on soil-moisture change and proposes a soil-moisture prediction method based on the Gene Expression Programming (GEP) algorithm. The prediction model is tested on datasets from Shunyi, Yanqing and Daxing agricultural farms, Beijing. The results show that the GEP model can predict soil moisture with a maximum correlation coefficient of 0.98, and the root-mean-square… More
  •   Views:454       Downloads:326        Download PDF
  • Sentiment Analysis for Arabic Social Media News Polarity
  • Abstract In recent years, the use of social media has rapidly increased and developed significant influence on its users. In the study of the behavior, reactions, approval, and interactions of social media users, detecting the polarity (positive, negative, neutral) of news posts is of considerable importance. This proposed research aims to collect data from Arabic social media pages, with the posts comprising the main unit in the dataset, and to build a corpus of manually-processed data for training and testing. Applying Natural Language Processing to the data is crucial for the computer to understand and easily manipulate the data. Therefore, Stop-Word… More
  •   Views:517       Downloads:385        Download PDF
  • Oral English Speech Recognition Based on Enhanced Temporal Convolutional Network
  • Abstract In oral English teaching in China, teachers usually improve students’ pronunciation by their subjective judgment. Even to the same student, the teacher gives different suggestions at different times. Students’ oral pronunciation features can be obtained from the reconstructed acoustic and natural language features of speech audio, but the task is complicated due to the embedding of multimodal sentences. To solve this problem, this paper proposes an English speech recognition based on enhanced temporal convolution network. Firstly, a suitable UNet network model is designed to extract the noise of speech signal and achieve the purpose of speech enhancement. Secondly, a network… More
  •   Views:583       Downloads:397        Download PDF
  • Automatic BIM Indoor Modelling from Unstructured Point Clouds Using a Convolutional Neural Network
  • Abstract The automated reconstruction of building information modeling (BIM) objects from unstructured point cloud data for indoor as-built modeling is still a challenging task and the subject of much ongoing research. The most important part of the process is to detect the wall geometry clearly. A popular method is first to segment and classify point clouds, after which the identified segments should be clustered according to their corresponding objects, such as walls and clutter. To perform this process, a major problem is low-quality point clouds that are noisy, cluttered and that contain missing parts in the data. Moreover, the size of… More
  •   Views:551       Downloads:449        Download PDF
  • Hybrid Deep Learning Modeling for Water Level Prediction in Yangtze River
  • Abstract Accurate prediction of water level in inland waterway has been an important issue for helping flood control and vessel navigation in a proactive manner. In this research, a deep learning approach called long short-term memory network combined with discrete wavelet transform (WA-LSTM) is proposed for daily water level prediction. The wavelet transform is applied to decompose time series into details and approximation components for a better understanding of temporal properties, and a novel LSTM network is used to learn generic water level features through layer-by-layer feature granulation with a greedy layer wise unsupervised learning algorithm. Six representative reaches in Yangtze… More
  •   Views:587       Downloads:475        Download PDF
  • Assessing User’s Susceptibility and Awareness of Cybersecurity Threats
  • Abstract Cybersecurity threats, including those involving machine learning, malware, phishing, and cryptocurrency, have become more sophisticated. They target sensitive information and put institutions, governments, and individuals in a continual state of risk. In 2019, phishing attacks became one of the most common and dangerous cyber threats. Such attacks attempt to steal sensitive data, such as login and payment card details, from financial, social, and educational websites. Many universities have suffered data breaches, serving as a prime example of victims of attacks on educational websites. Owing to advances in phishing tactics, strategies, and technologies, the end-user is the main victim of an… More
  •   Views:757       Downloads:552        Download PDF
  • Managing Software Security Risks through an Integrated Computational Method
  • Abstract Security risk evaluation of web-based healthcare applications is important from a design perspective. The developers as well as the users need to make sure that the applications must be secure. Citing the disastrous effects of unsecured web applications, Accuntix Online states that the IT industry has lost millions of dollars due to security theft and malware attacks. Protecting the integrity of patients’ health data is of utmost importance. Thus, assessing the security risk of web-based healthcare applications should be accorded the highest priority while developing the web applications. To fulfill the security requirements, the developers must meticulously follow the Multi-Criteria… More
  •   Views:700       Downloads:356        Download PDF
  • Mixed Re-Sampled Class-Imbalanced Semi-Supervised Learning for Skin Lesion Classification
  • Abstract Skin cancer is one of the most common types of cancer in the world, melanoma is considered to be the deadliest type among other skin cancers. Quite recently, automated skin lesion classification in dermoscopy images has become a hot and challenging research topic due to its essential way to improve diagnostic performance, thus reducing melanoma deaths. Convolution Neural Networks (CNNs) are at the heart of this promising performance among a variety of supervised classification techniques. However, these successes rely heavily on large amounts of class-balanced clearly labeled samples, which are expensive to obtain for skin lesion classification in the real… More
  •   Views:518       Downloads:410        Download PDF
  • Infrared and Visible Image Fusion Based on NSST and RDN
  • Abstract Within the application of driving assistance systems, the detection of driver’s facial features in the cab for a spectrum of luminosities is mission critical. One method that addresses this concern is infrared and visible image fusion. Its purpose is to generate an aggregate image which can granularly and systematically illustrate scene details in a range of lighting conditions. Our study introduces a novel approach to this method with marked improvements. We utilize non-subsampled shearlet transform (NSST) to obtain the low and high frequency sub-bands of infrared and visible imagery. For the low frequency sub-band fusion, we incorporate the local average… More
  •   Views:455       Downloads:378        Download PDF
  • Design and Validation of a Route Planner for Logistic UAV Swarm
  • Abstract Unmanned Aerial Vehicles (UAV) are widely used in different fields of aviation today. The efficient delivery of packages by drone may be one of the most promising applications of this technology. In logistic UAV missions, due to the limited capacities of power supplies, such as fuel or batteries, it is almost impossible for one unmanned vehicle to visit multiple wide areas. Thus, multiple unmanned vehicles with well-planned routes become necessary to minimize the unnecessary consumption of time, distance, and energy while carrying out the delivery missions. The aim of the present study was to develop a multiple-vehicle mission dispatch system… More
  •   Views:606       Downloads:416        Download PDF
  • Analysis of Iterative Process for Nauru Voting System
  • Abstract Game theory is a popular area of artificial intelligence in which the voter acknowledges his own desires and favors the person he wants to be his representative. In multi-agent systems, social choice functions help aggregate agents’ different preferences over alternatives into a single choice. Since all voting rules are susceptible to manipulation, the analysis of elections is complicated by the possibility of voter manipulation attempts. One approach to understanding elections is to treat them as an iterative process and see if we can reach an equilibrium point. Meir et al. proposed an iterative process to reach a stable outcome, i.e.,… More
  •   Views:430       Downloads:350        Download PDF
  • A Technology Enabled Learning Model in Healthcare during COVID-19
  • Abstract The World Health Organization has warned about the spread of communicable and non-communicable diseases especially in the developing countries. The COVID–19 has also emerged as one of the most challengeable pandemics of the whole world. In current medical emergency, the virtual health education is much vital for handling alerts and outbreaks of diseases for a community of users. The Information and Communication Technology provide an opportunity to deal with the challenges related to handling alerts and outbreaks of diseases. The technology infrastructure in the developing countries is surging rise and can be used to develop Technology Enabled Learning Solutions for… More
  •   Views:866       Downloads:402        Download PDF
  • A K-means++ Based User Classification Method for Social E-commerce
  • Abstract At present, the research on the classification of e-commerce users is relatively mature, but with the rise of mobile social networks, the combination of social networks and e-commerce networks has become a trend and is developing rapidly. Traditional e-commerce user classification methods are not suitable for social e-commerce users. Therefore, based on the research on traditional e-commerce user classification methods, according to the characteristics of social e-commerce users, we improved data preprocessing and parameter tuning methods, and proposed a clustering method of social e-commerce users based on the K-means++ algorithm. The test on the actual data of social e-commerce users… More
  •   Views:660       Downloads:391        Download PDF