View Vol. 3 ,  Iss. 1 (April 2021)

Artificial Intelligence Advances

ISSN: 2661-3220 (Online)

Vol. 3 , Iss. 1 (April 2021)

Articles

  • Development of a Novel Media-independent Communication Theology for Accessing Local & Web-based Data: Case Study with Robotic Subsystems

    Debanik Roy
    1-35

    Article ID: 2920
    313  (Abstract) 50  (Download)
    Realizing media independence in today’s communication system remains an open problem by and large. Information retrieval, mostly through the Internet, is becoming the most demanding feature in technological progress and this web-based data access should ideally be in user-selective form. While blind-folded access of data through the World Wide Web is quite streamlined, the counter-half...
  • Application of LSTM and CONV1D LSTM Network in Stock Forecasting Model

    Qiaoyu Wang, Kai Kang, Zhihan Zhang, Demou Cao
    36-43

    Article ID: 2790
    495  (Abstract) 79  (Download)

    Predicting the direction of the stock market has always been a huge challenge. Also, the way of forecasting the stock market reduces the risk in the financial market, thus ensuring that brokers can make normal returns. Despite the complexities of the stock market, the challenge has been increasingly addressed by experts in a variety of...

  • Fuzzy Logic Based Perceptual Image Hashing Algorithm in Malaysian Banknotes Detection System for the Visually Impaired

    Wai Kit Wong, Chi Jie Tan, Thu Soe Min, Eng Kiong Wong
    44-56

    Article ID: 3249
    386  (Abstract) 55  (Download)
    Visually impaired persons have difficulty in business that dealing with banknote. This paper proposed a Malaysian banknotes detection system using image processing technology and fuzzy logic algorithm for the visually impaired. The Malaysian banknote reader will first capture the inserted banknote image, sending it to the cloud server for image processing via Wi-Fi medium. The...
  • Ransomware Attack: Rescue-checklist Cyber Security Awareness Program

    Mohammed Daffalla Elradi, Mohamed Hashim Mohamed, Mohammed Elradi Ali
    57-62

    Article ID: 3162
    568  (Abstract) 71  (Download)
    Ransomware attacks have been spreading broadly in the last few years, where attackers deny users’ access to their systems and encrypt their files until they pay a ransom, usually in Bitcoin. Of course, that is the worst thing that can happen; especially for organizations having sensitive information. In this paper we proposed a cyber security...
  • Machine Learning Meets the Semantic Web

    Konstantinos Ilias Kotis, Konstantina Zachila, Evaggelos Paparidis
    63-70

    Article ID: 3178
    673  (Abstract) 141  (Download)
    Remarkable progress in research has shown the efficiency of Knowledge Graphs (KGs) in extracting valuable external knowledge in various domains. A Knowledge Graph (KG) can illustrate high-order relations that connect two objects with one or multiple related attributes. The emerging Graph Neural Networks (GNN) can extract both object characteristics and relations from KGs. This paper...