Pub Date : 1900-01-01DOI: 10.23977/jaip.2022.050208
Quan Hao
: With fast progress of deep learning technology, breakthroughs are achieved in many industries by virtue of efficient artificial intelligence models. In addition, computer hardware is cheaper, which makes it easier to acquire an excellent deep learning model. However, output of a model with good generalization rests with not only powerful hardware computing speed, but also quality of dataset involved in the calculation. Unfortunately, high-quality dataset is probably more expensive than high-end hardware, and this forces deep learning engineers or practitioners to use lower-quality dataset. Anyway, it doesn’t mean excellent deep learning programs can’t be created by such dataset. In particular, dataset preprocessing is equally important, and even engineers need to spend most of time elaborately formulating preprocessing strategies. This study mainly analyzes data and formulates preprocessing schemes of low-quality rock datasets. It aims to make deep learning programs more efficient and general-purpose at the lowest possible cost.
{"title":"On Data Analysis and Design and Implementation of Data Preprocessing Scheme Based on Low-quality Rock Datasets","authors":"Quan Hao","doi":"10.23977/jaip.2022.050208","DOIUrl":"https://doi.org/10.23977/jaip.2022.050208","url":null,"abstract":": With fast progress of deep learning technology, breakthroughs are achieved in many industries by virtue of efficient artificial intelligence models. In addition, computer hardware is cheaper, which makes it easier to acquire an excellent deep learning model. However, output of a model with good generalization rests with not only powerful hardware computing speed, but also quality of dataset involved in the calculation. Unfortunately, high-quality dataset is probably more expensive than high-end hardware, and this forces deep learning engineers or practitioners to use lower-quality dataset. Anyway, it doesn’t mean excellent deep learning programs can’t be created by such dataset. In particular, dataset preprocessing is equally important, and even engineers need to spend most of time elaborately formulating preprocessing strategies. This study mainly analyzes data and formulates preprocessing schemes of low-quality rock datasets. It aims to make deep learning programs more efficient and general-purpose at the lowest possible cost.","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129758855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.23977/jaip.2023.060401
Lijun Han, A. Weay, S. Palaniappan
: This research first intuitively shows the implementation diagram of a MIMO system, and then introduces transmission diversity and space-time coding technology, with space-time coding technology belonging to the category of spatial diversity technology. The earliest and most classical Alamouti space-time coding scheme is then applied to MIMO wireless communication systems. The principle of the Alamouti space-time coding scheme is demonstrated, and a theoretical demonstration is carried out in a MIMO diversity system with two transmitters and one receiver. Finally, the Alamouti space-time coding scheme is simulated using MATLAB, and it is verified that the diversity gain and coding gain are obtained by using the Alamouti space-time coding scheme in the MIMO system.
{"title":"Application and Performance of Space Time Coding in MIMO System—Analysis of Alamouti Space Time Coding Scheme","authors":"Lijun Han, A. Weay, S. Palaniappan","doi":"10.23977/jaip.2023.060401","DOIUrl":"https://doi.org/10.23977/jaip.2023.060401","url":null,"abstract":": This research first intuitively shows the implementation diagram of a MIMO system, and then introduces transmission diversity and space-time coding technology, with space-time coding technology belonging to the category of spatial diversity technology. The earliest and most classical Alamouti space-time coding scheme is then applied to MIMO wireless communication systems. The principle of the Alamouti space-time coding scheme is demonstrated, and a theoretical demonstration is carried out in a MIMO diversity system with two transmitters and one receiver. Finally, the Alamouti space-time coding scheme is simulated using MATLAB, and it is verified that the diversity gain and coding gain are obtained by using the Alamouti space-time coding scheme in the MIMO system.","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117105452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.23977/jaip.2023.060207
{"title":"Discussion of Practical Application of Virtualization Technology in Computer System","authors":"","doi":"10.23977/jaip.2023.060207","DOIUrl":"https://doi.org/10.23977/jaip.2023.060207","url":null,"abstract":"","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117295198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.23977/jaip.2023.060409
L. Jia, Cai Fenglin, Zhu Qitao, Yang Tongxin, Zhang Qian
: Based on SEResNet neural network algorithm, the inversion model of damage incentives of inland high-piled wharf is constructed. The stress data of pile foundation under the action of damage incentives of high-piled wharf are obtained by using solid element finite element model calculation and indoor model test methods. The parameterized finite element calculation model of high-piled wharf is established by using subprocess in Python program to call MANSYS module, and verified with solid element model. The parameterized simplified finite element model meets the needs of inversion calculation. Based on the stress data samples of the pile foundation of the high-piled wharf obtained from the model test, the inversion analysis of single and multiple damage incentives is carried out. The model can identify the location, size and type of injury causative agent with good generalization ability.
{"title":"Study on Inversion of Damage Incentives of High Pile Wharf in Inland River Based on SEResNet","authors":"L. Jia, Cai Fenglin, Zhu Qitao, Yang Tongxin, Zhang Qian","doi":"10.23977/jaip.2023.060409","DOIUrl":"https://doi.org/10.23977/jaip.2023.060409","url":null,"abstract":": Based on SEResNet neural network algorithm, the inversion model of damage incentives of inland high-piled wharf is constructed. The stress data of pile foundation under the action of damage incentives of high-piled wharf are obtained by using solid element finite element model calculation and indoor model test methods. The parameterized finite element calculation model of high-piled wharf is established by using subprocess in Python program to call MANSYS module, and verified with solid element model. The parameterized simplified finite element model meets the needs of inversion calculation. Based on the stress data samples of the pile foundation of the high-piled wharf obtained from the model test, the inversion analysis of single and multiple damage incentives is carried out. The model can identify the location, size and type of injury causative agent with good generalization ability.","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122797694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.23977/jaip.2023.060108
{"title":"Development and Application of Campus Sports Competition System","authors":"","doi":"10.23977/jaip.2023.060108","DOIUrl":"https://doi.org/10.23977/jaip.2023.060108","url":null,"abstract":"","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122856839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.23977/jaip.2023.060303
{"title":"A rapid simulation development platform for autonomous driving based on CARLA and ROS","authors":"","doi":"10.23977/jaip.2023.060303","DOIUrl":"https://doi.org/10.23977/jaip.2023.060303","url":null,"abstract":"","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122509586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.23977/jaip.2023.060404
S. Turgay, Suat Erdoğan
: Everyday using of the big data, machine learning algorithms, and related studies, ensuring data privacy and security have become a critical necessity. These features make them more vulnerable to cyber-attacks. The security of the stored data is also critical, and evaluating the processing of information in the autonomous network management of these systems. The criteria considers the account in the processing and security of data entering every field from the widespread industry examined. It is necessary to increase their awareness of negative and attack problems while these systems are working. Applications such as traditional machine learning and the use of cloud computing also involve risks regarding data security and personal data leakage. Cooperative learning pays due attention to the confidentiality of sensitive information by keeping the original training data hidden. By collecting, combining, and integrating heterogeneous data with collaborative learning together with a federated learning structure, data produced and stored. This study discusses the effect of federated and transfer learning on autonomous network management analyzes the security status parameters. The fuzzy DEMATEL method was preferred in exploring the parameters affecting the system state according to the degree of importance. Situational scenarios evaluated by considering the structure in which the features of cyber-physical systems examined together with federated learning. Data security factors discussed with the fuzzy DEMATEL
{"title":"Security Impact of Federated and Transfer Learning on Network Management Systems with Fuzzy DEMATEL Approach","authors":"S. Turgay, Suat Erdoğan","doi":"10.23977/jaip.2023.060404","DOIUrl":"https://doi.org/10.23977/jaip.2023.060404","url":null,"abstract":": Everyday using of the big data, machine learning algorithms, and related studies, ensuring data privacy and security have become a critical necessity. These features make them more vulnerable to cyber-attacks. The security of the stored data is also critical, and evaluating the processing of information in the autonomous network management of these systems. The criteria considers the account in the processing and security of data entering every field from the widespread industry examined. It is necessary to increase their awareness of negative and attack problems while these systems are working. Applications such as traditional machine learning and the use of cloud computing also involve risks regarding data security and personal data leakage. Cooperative learning pays due attention to the confidentiality of sensitive information by keeping the original training data hidden. By collecting, combining, and integrating heterogeneous data with collaborative learning together with a federated learning structure, data produced and stored. This study discusses the effect of federated and transfer learning on autonomous network management analyzes the security status parameters. The fuzzy DEMATEL method was preferred in exploring the parameters affecting the system state according to the degree of importance. Situational scenarios evaluated by considering the structure in which the features of cyber-physical systems examined together with federated learning. Data security factors discussed with the fuzzy DEMATEL","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125203126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.23977/jaip.2023.060204
{"title":"Improved Method for Pedestrian Recognition Based on Generative Adversarial Networks","authors":"","doi":"10.23977/jaip.2023.060204","DOIUrl":"https://doi.org/10.23977/jaip.2023.060204","url":null,"abstract":"","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123915034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.23977/jaip.2023.060405
Ilker Ilter, S. Turgay
: With the development of technology, the use of big data is spreading at an increasing rate. The issues of storing, analysing and securing data have brought along the methods that need to be developed. Ensuring data privacy and data security is the case of partial separation and processing of data with the perturbation method of data with the block chain approach. Within the scope of this study, data analysis performed using normalization, geometric rotation, linear regression and scalar data multiplication and comparative classification in precision data mining.
{"title":"Privacy Enhancement with Perturbation Method for Multidimensional Grid","authors":"Ilker Ilter, S. Turgay","doi":"10.23977/jaip.2023.060405","DOIUrl":"https://doi.org/10.23977/jaip.2023.060405","url":null,"abstract":": With the development of technology, the use of big data is spreading at an increasing rate. The issues of storing, analysing and securing data have brought along the methods that need to be developed. Ensuring data privacy and data security is the case of partial separation and processing of data with the perturbation method of data with the block chain approach. Within the scope of this study, data analysis performed using normalization, geometric rotation, linear regression and scalar data multiplication and comparative classification in precision data mining.","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122395627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.23977/jaip.2023.060406
Yubin Li
: This article discusses the significance and scope of application of the principle of legality for crimes and punishments in China. With the development of China's reform and opening up, as well as the socialist market economy, and the strengthening of the foundation of the market economy, it is necessary to further establish and improve the principle of legality in criminal law from the perspective of protecting human rights and limiting the country's punishment power.
{"title":"The significance and scope of application of the principle of legality in criminal law","authors":"Yubin Li","doi":"10.23977/jaip.2023.060406","DOIUrl":"https://doi.org/10.23977/jaip.2023.060406","url":null,"abstract":": This article discusses the significance and scope of application of the principle of legality for crimes and punishments in China. With the development of China's reform and opening up, as well as the socialist market economy, and the strengthening of the foundation of the market economy, it is necessary to further establish and improve the principle of legality in criminal law from the perspective of protecting human rights and limiting the country's punishment power.","PeriodicalId":293823,"journal":{"name":"Journal of Artificial Intelligence Practice","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122687213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}