Pub Date : 2023-03-17DOI: 10.1109/iCoMET57998.2023.10099381
Muhammad Waqar, M. Ishaq, M. Afzal, Shahzaib Iqbal
Intelligent transportation systems (ITS) are the future of inter- and intra-city mobility. ITS has several features, and vehicle detection is a crucial system component. This research paper implements the You Only Look Once (YOLO) algorithm, which is a neural network-based technique for detecting vehicles on roads and streets. The algorithm detects vehicles rapidly and accurately. The YOLO implementation of this study confirms the efficacy of this algorithm, detecting vehicles successfully in various scenarios. Vehicles are detected and displayed separately within boundary boxes. Our implementation of this method is limited to detecting up to five vehicles on a single road or street. The vehicles could be parked or waiting at a traffic signal for it to turn green. Vehicle tracking has increased the effectiveness of the system because it follows the vehicle's path until it disappears from the CCTV image. MATLAB simulations are used to validate the results of this study.
智能交通系统(ITS)是城市间和城市内交通的未来。ITS有几个特点,车辆检测是一个关键的系统组成部分。该研究论文实现了You Only Look Once (YOLO)算法,这是一种基于神经网络的技术,用于检测道路和街道上的车辆。该算法快速准确地检测车辆。本研究的YOLO实现验证了该算法的有效性,在各种场景下成功检测车辆。检测车辆并在边界框内单独显示。我们对这种方法的实施仅限于在一条道路或街道上检测最多五辆车。这些车辆可能正在停车或等待交通信号变绿。车辆跟踪增加了系统的有效性,因为它跟随车辆的路径,直到它从闭路电视图像中消失。通过MATLAB仿真验证了本文的研究结果。
{"title":"Vehicle Detection using Artificial Intelligence based Algorithm in Intelligent Transportation Systems","authors":"Muhammad Waqar, M. Ishaq, M. Afzal, Shahzaib Iqbal","doi":"10.1109/iCoMET57998.2023.10099381","DOIUrl":"https://doi.org/10.1109/iCoMET57998.2023.10099381","url":null,"abstract":"Intelligent transportation systems (ITS) are the future of inter- and intra-city mobility. ITS has several features, and vehicle detection is a crucial system component. This research paper implements the You Only Look Once (YOLO) algorithm, which is a neural network-based technique for detecting vehicles on roads and streets. The algorithm detects vehicles rapidly and accurately. The YOLO implementation of this study confirms the efficacy of this algorithm, detecting vehicles successfully in various scenarios. Vehicles are detected and displayed separately within boundary boxes. Our implementation of this method is limited to detecting up to five vehicles on a single road or street. The vehicles could be parked or waiting at a traffic signal for it to turn green. Vehicle tracking has increased the effectiveness of the system because it follows the vehicle's path until it disappears from the CCTV image. MATLAB simulations are used to validate the results of this study.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132492967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-17DOI: 10.1109/iCoMET57998.2023.10099113
Kholiddinov Ilkhombek Khosiljonovich, A. Saleem, A. Iqbal, Kholiddinova Mashkhurakhon Mutalibjon qizi, Eraliev Khojiakbar, M. Mateen
The objective of this research paper is to presents a new approach for calculating the coefficient of asymmetry in the negative sequence. Power supply failures caused by the coefficient of asymmetry in negative sequences is analyzed. In addition, due to the failure of power supplies the resulting economic damages in domestic and foreign practice are given. The analysis is based on the existing methods of calculating the coefficient of asymmetry of the negative sequence, and also the use of domestic devices for monitoring the quality of electricity of a separate power system is proposed. The results of measurements of distribution transformer of the Zangiata district are presented. The acquired results validate the proposed approach technique.
{"title":"Novel Method of Calculating the Coefficient of Asymmetry in the Negative Sequence","authors":"Kholiddinov Ilkhombek Khosiljonovich, A. Saleem, A. Iqbal, Kholiddinova Mashkhurakhon Mutalibjon qizi, Eraliev Khojiakbar, M. Mateen","doi":"10.1109/iCoMET57998.2023.10099113","DOIUrl":"https://doi.org/10.1109/iCoMET57998.2023.10099113","url":null,"abstract":"The objective of this research paper is to presents a new approach for calculating the coefficient of asymmetry in the negative sequence. Power supply failures caused by the coefficient of asymmetry in negative sequences is analyzed. In addition, due to the failure of power supplies the resulting economic damages in domestic and foreign practice are given. The analysis is based on the existing methods of calculating the coefficient of asymmetry of the negative sequence, and also the use of domestic devices for monitoring the quality of electricity of a separate power system is proposed. The results of measurements of distribution transformer of the Zangiata district are presented. The acquired results validate the proposed approach technique.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134642820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-17DOI: 10.1109/iCoMET57998.2023.10099132
Taimoor Hassan, Abrar Ahmed, Mehmood Anwar, Muhammad Basit Ali Gilani, Muaz Ahmad Qureshi
Most enterprises adopted social media for marketing purposes. Traditional media resources about one decade ago are now a day's costly and less productive than social media. Companies that are using social media like Facebook to provide different services and therefore to interact with customers, users produce a valuable content which is available on Facebook free of cost. To enhance market capitalization, expand value and effectiveness analyze competitor business strengths and value. Businesses must monitor social media sites of their own to see customer's response on their products and their competitor's social media to analyze behavior of customers. To help Enterprises to evaluate social media large amount of user generated content into knowledgeable information, decision making and future planning and targets. In this article case study, we are presenting is based on text mining to analyze content on Facebook in the well know top Five laptop brands named HP, Dell, Microsoft Surface, Toshiba, and Lenovo. The outcome showed the power, analysis of social media and text mining value to enhance business from the data available on social media freely. There are also some suggestions and recommendations to help organizations to plan and develop their strategy for social media to enhance business.
{"title":"Social Media Competitive Analysis: A Case Study of Laptop Brands","authors":"Taimoor Hassan, Abrar Ahmed, Mehmood Anwar, Muhammad Basit Ali Gilani, Muaz Ahmad Qureshi","doi":"10.1109/iCoMET57998.2023.10099132","DOIUrl":"https://doi.org/10.1109/iCoMET57998.2023.10099132","url":null,"abstract":"Most enterprises adopted social media for marketing purposes. Traditional media resources about one decade ago are now a day's costly and less productive than social media. Companies that are using social media like Facebook to provide different services and therefore to interact with customers, users produce a valuable content which is available on Facebook free of cost. To enhance market capitalization, expand value and effectiveness analyze competitor business strengths and value. Businesses must monitor social media sites of their own to see customer's response on their products and their competitor's social media to analyze behavior of customers. To help Enterprises to evaluate social media large amount of user generated content into knowledgeable information, decision making and future planning and targets. In this article case study, we are presenting is based on text mining to analyze content on Facebook in the well know top Five laptop brands named HP, Dell, Microsoft Surface, Toshiba, and Lenovo. The outcome showed the power, analysis of social media and text mining value to enhance business from the data available on social media freely. There are also some suggestions and recommendations to help organizations to plan and develop their strategy for social media to enhance business.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133892128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-17DOI: 10.1109/iCoMET57998.2023.10099339
Hafsa Shakeel, Hana Sharif, Faisal Rehman, Bilal Rasool, Azher Mahmood, Hadia Maqsood, Hina Kirn, C. Ali, Muhammad Bilal
The use of computer-based intelligence in business applications is growing. There have been numerous arrangements previously executed, and numerous more are being discovered. The global financial crisis has heightened the significance of risk management in banks, and there has been a persistent emphasis on how risks are perceived, evaluated, and taken. For the most part, the industry has concentrated on the improvement in financial bets and current difficulties. This paper has shown that the use of artificial intelligence (AI) in the administration of banking risk, grocery store risk, check card risk, and cash risk has been found. In any case, it doesn't appear to have much to do with the ongoing business sector-level discussions centered on both executive gambling and artificial intelligence. In different regions of bank risk, executives might see a significant advantage from an investigation of how, at any point, AI can be applied to individual issues.
{"title":"Machine Learning in Banking Risk Management - A Brief Overview","authors":"Hafsa Shakeel, Hana Sharif, Faisal Rehman, Bilal Rasool, Azher Mahmood, Hadia Maqsood, Hina Kirn, C. Ali, Muhammad Bilal","doi":"10.1109/iCoMET57998.2023.10099339","DOIUrl":"https://doi.org/10.1109/iCoMET57998.2023.10099339","url":null,"abstract":"The use of computer-based intelligence in business applications is growing. There have been numerous arrangements previously executed, and numerous more are being discovered. The global financial crisis has heightened the significance of risk management in banks, and there has been a persistent emphasis on how risks are perceived, evaluated, and taken. For the most part, the industry has concentrated on the improvement in financial bets and current difficulties. This paper has shown that the use of artificial intelligence (AI) in the administration of banking risk, grocery store risk, check card risk, and cash risk has been found. In any case, it doesn't appear to have much to do with the ongoing business sector-level discussions centered on both executive gambling and artificial intelligence. In different regions of bank risk, executives might see a significant advantage from an investigation of how, at any point, AI can be applied to individual issues.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131794020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-17DOI: 10.1109/iCoMET57998.2023.10099318
N. Ahmed, M. Nasir, Muhammad Arslan Saleem, Salman Murtaza, Shaheer Abdullah, Ejaz Kamal
Brisk increase in the demand of hydrocarbon-based fuels to generate electricity is contaminating the environment, which is increasing the quest for pure and clean resources for electricity generation. Wind energy is one of the highly used renewable energy resources (RES) in the new millennium. Therefore, a lot of research efforts are conducted in the last few years concerning the forecasting, sizing, and control of wind energy (WE). However, the present body of knowledge is still lacking the robust and intelligent control of small-scale wind energy. Therefore, the current paper is presenting artificial neural networks (ANN) based intelligent control of permanent magnet DC generator (PMDC) followed by the DC/DC converter to provide the stable DC voltage at the output side. The simulation model comprises of a small-scale wind generator system of 10KW rating which is developed in MATLAB-Simulink, and it is observed that the proposed control method is resulting in a balanced and smooth DC output.
{"title":"Artificial neural network based control of wind powered small scale DC generator","authors":"N. Ahmed, M. Nasir, Muhammad Arslan Saleem, Salman Murtaza, Shaheer Abdullah, Ejaz Kamal","doi":"10.1109/iCoMET57998.2023.10099318","DOIUrl":"https://doi.org/10.1109/iCoMET57998.2023.10099318","url":null,"abstract":"Brisk increase in the demand of hydrocarbon-based fuels to generate electricity is contaminating the environment, which is increasing the quest for pure and clean resources for electricity generation. Wind energy is one of the highly used renewable energy resources (RES) in the new millennium. Therefore, a lot of research efforts are conducted in the last few years concerning the forecasting, sizing, and control of wind energy (WE). However, the present body of knowledge is still lacking the robust and intelligent control of small-scale wind energy. Therefore, the current paper is presenting artificial neural networks (ANN) based intelligent control of permanent magnet DC generator (PMDC) followed by the DC/DC converter to provide the stable DC voltage at the output side. The simulation model comprises of a small-scale wind generator system of 10KW rating which is developed in MATLAB-Simulink, and it is observed that the proposed control method is resulting in a balanced and smooth DC output.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125737315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-17DOI: 10.1109/iCoMET57998.2023.10099295
Muskan Adeel, Umar Fayyaz, U. Rafi, Muhammad Umar Farooq
Efficient buck converters are crucial for achieving optimal performance, reliability, and cost-effectiveness in a wide range of electronic devices and systems. Buck converters are widely used in a variety of applications where a stable, low-voltage DC output is required. Designing an efficient buck converter requires a careful balance of trade-offs between cost, performance, size, weight, and other factors. In this paper, the efficiency of the Buck converter is increased through the PI controller using an operational amplifier (Op-Amp), also known as an analog PI controller. The performance of the proposed model of the analog PI controller is further compared with the digital buck converter. The stable control system is applied on the Buck converter to decrease output voltage up to 50% w.r.t input voltage. Pulse width modulation (PWM) is used in the proposed model to control variations in waves. The design has been simulated at SIMULINK and PROTEUS8 with the same results.
{"title":"Design of a Buck Converter with an Analogue PI Controller for Wide Load Range Applications","authors":"Muskan Adeel, Umar Fayyaz, U. Rafi, Muhammad Umar Farooq","doi":"10.1109/iCoMET57998.2023.10099295","DOIUrl":"https://doi.org/10.1109/iCoMET57998.2023.10099295","url":null,"abstract":"Efficient buck converters are crucial for achieving optimal performance, reliability, and cost-effectiveness in a wide range of electronic devices and systems. Buck converters are widely used in a variety of applications where a stable, low-voltage DC output is required. Designing an efficient buck converter requires a careful balance of trade-offs between cost, performance, size, weight, and other factors. In this paper, the efficiency of the Buck converter is increased through the PI controller using an operational amplifier (Op-Amp), also known as an analog PI controller. The performance of the proposed model of the analog PI controller is further compared with the digital buck converter. The stable control system is applied on the Buck converter to decrease output voltage up to 50% w.r.t input voltage. Pulse width modulation (PWM) is used in the proposed model to control variations in waves. The design has been simulated at SIMULINK and PROTEUS8 with the same results.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117157834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-17DOI: 10.1109/icomet57998.2023.10099254
{"title":"iCoMET 2023 Organizer","authors":"","doi":"10.1109/icomet57998.2023.10099254","DOIUrl":"https://doi.org/10.1109/icomet57998.2023.10099254","url":null,"abstract":"","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126775754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-17DOI: 10.1109/iCoMET57998.2023.10099088
M. Ehsan, M. Rafiq, A. Raza
The transmission dynamics of computer viruses in a network can be modeled as a system of nonlinear differential equations. These nonlinear systems are usually complex to solve analytically. A competitive numerical method is always needed to handle such problems. This paper deals with designing and implementing a reliable numerical analysis to investigate the behavior of a malicious virus in a computer network. The proposed numerical procedure is intended to preserve the actual dynamics of computer viruses in all situations and for every choice of parameter value. The present work is also compared with existing techniques, which do not behave well in specific scenarios.
{"title":"A Competitive Numerical Model for Virus Transmission in a Computer Network","authors":"M. Ehsan, M. Rafiq, A. Raza","doi":"10.1109/iCoMET57998.2023.10099088","DOIUrl":"https://doi.org/10.1109/iCoMET57998.2023.10099088","url":null,"abstract":"The transmission dynamics of computer viruses in a network can be modeled as a system of nonlinear differential equations. These nonlinear systems are usually complex to solve analytically. A competitive numerical method is always needed to handle such problems. This paper deals with designing and implementing a reliable numerical analysis to investigate the behavior of a malicious virus in a computer network. The proposed numerical procedure is intended to preserve the actual dynamics of computer viruses in all situations and for every choice of parameter value. The present work is also compared with existing techniques, which do not behave well in specific scenarios.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129584473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-17DOI: 10.1109/iCoMET57998.2023.10099142
Ali Hussain, Hana Sharif, Faisal Rehman, Hina Kirn, Ashina Sadiq, M. Khan, Amjad Riaz, C. Ali, Adil Hussain Chandio
The rapid expansion of IoT technologies like smart sensors and home appliances is likely to have far-reaching consequences. Connectivity, ubiquitous presence, and low computational power are the hallmarks of IoT gadgets. The global tally of Internet of Things gadgets is on the rise. There has been an increase in IoT -based cyber-attack incidents due to the proliferation of these devices, which is much easier to do than with desktop computers. New methods of identifying attacks launched from compromised IoT devices are needed to help address this issue. In this scenario, the most effective method of detective control against attacks originating from IoT devices is the application of ML and DL techniques. The main aim of this research is to provide an overview of intrusion detection models as well as a comprehensive review of threats to IoT systems caused by compromised IoT devices.
{"title":"A Systematic Review of Intrusion Detection Systems in Internet of Things Using ML and DL","authors":"Ali Hussain, Hana Sharif, Faisal Rehman, Hina Kirn, Ashina Sadiq, M. Khan, Amjad Riaz, C. Ali, Adil Hussain Chandio","doi":"10.1109/iCoMET57998.2023.10099142","DOIUrl":"https://doi.org/10.1109/iCoMET57998.2023.10099142","url":null,"abstract":"The rapid expansion of IoT technologies like smart sensors and home appliances is likely to have far-reaching consequences. Connectivity, ubiquitous presence, and low computational power are the hallmarks of IoT gadgets. The global tally of Internet of Things gadgets is on the rise. There has been an increase in IoT -based cyber-attack incidents due to the proliferation of these devices, which is much easier to do than with desktop computers. New methods of identifying attacks launched from compromised IoT devices are needed to help address this issue. In this scenario, the most effective method of detective control against attacks originating from IoT devices is the application of ML and DL techniques. The main aim of this research is to provide an overview of intrusion detection models as well as a comprehensive review of threats to IoT systems caused by compromised IoT devices.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129113610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This comparative study examines various solutions to Russel's Paradox, a well-known problem in set theory first identified by Bertrand Russell in 1901. The paradox arises from the question of whether a set can be a member of itself. This study compares and contrasts the different solutions proposed by various mathematicians and logicians, including Theory of Types, Zermelo-Fraenkel set theory, von Neumann-Bernays-Gödel set theory, and Paraconsistent set theory and Fuzzy set theory. The study also examines the pros and cons of each of these proposed solutions and suggests the reason why Zermelo- Frankael Set theory seems to be the simplest and most-suited solution to Russel's paradox as compared to others.
{"title":"A Comparative Survey of Solutions to Russel's Paradox","authors":"Fizza Rubab, Shamsa Hafeez, Muhammad Hasham Qazi, Mujtaba Hassan Syed, Badar Irfan Azeemi, Aeyaz Jamil Kayani","doi":"10.1109/iCoMET57998.2023.10099262","DOIUrl":"https://doi.org/10.1109/iCoMET57998.2023.10099262","url":null,"abstract":"This comparative study examines various solutions to Russel's Paradox, a well-known problem in set theory first identified by Bertrand Russell in 1901. The paradox arises from the question of whether a set can be a member of itself. This study compares and contrasts the different solutions proposed by various mathematicians and logicians, including Theory of Types, Zermelo-Fraenkel set theory, von Neumann-Bernays-Gödel set theory, and Paraconsistent set theory and Fuzzy set theory. The study also examines the pros and cons of each of these proposed solutions and suggests the reason why Zermelo- Frankael Set theory seems to be the simplest and most-suited solution to Russel's paradox as compared to others.","PeriodicalId":369792,"journal":{"name":"2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124424020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}