首页 > 最新文献

Nuclear Engineering International最新文献

英文 中文
Evaluating Performance of Utilizing Onshore Wind Turbines Specifically the Farm Turbines in Kuwait 评估利用陆上风力涡轮机的性能,特别是科威特的农场涡轮机
IF 0.6 4区 工程技术 Q4 Engineering Pub Date : 2019-06-30 DOI: 10.18034/AJASE.V7I2.234
Mohammed Salem Alsubai'e, Maritime Transport, Saad Abdullah Alshatti
Renewable energy is considered one of the most important and clean sources; since it does not produce any type of emission or pollution. In Kuwait, the energy of wind is existing in three main locations, which are; Ras Jal Aliyah, Bubian in addition to Subiyah, where the characteristics of wind have been evaluated in this paper based on the data generated from the meteorological measurements at 10m height. Also, different studies have been performed in this paper in order to analyze the impact of height on the parameters of wind energy, wind density, in addition to wind speed. Jal Aliyah location has been studied in this paper and the results showed that there is a proportional relation between the wind speed and power, where the maximum power is potential if the speed is equal to 29.1 m/s, and the maximum averaged flux of wind power is equal to 725.54 W/m2. Where both Bubidan Island and Ras Subiyah showed the wind direction in the North-East quadrant with speed is greater than 10 m/s. But, the higher polarized distribution of Jal Aliyah was in the north direction. Based on the obtained results, it can be concluded that this paper provides and suggests a proper design of the wind turbines for designers.
可再生能源被认为是最重要和最清洁的能源之一;因为它不产生任何类型的排放或污染。在科威特,风能主要存在于三个地方,它们是;Ras Jal Aliyah、Bubian以及Subiyah,本文基于10米高度的气象测量数据对这些地区的风特征进行了评估。此外,除了风速外,本文还进行了不同的研究,分析了高度对风能、风密度等参数的影响。本文对Jal Aliyah的位置进行了研究,结果表明风速与功率成正比关系,风速为29.1 m/s时最大功率为潜在功率,最大平均风量为725.54 W/m2。其中,布bidan岛和Ras Subiyah岛风向均为东北象限,风速均大于10m /s。但是,“阿利亚”的高极化分布在北方。根据所获得的结果,可以得出结论,本文为设计人员提供并建议了合理的风力机设计。
{"title":"Evaluating Performance of Utilizing Onshore Wind Turbines Specifically the Farm Turbines in Kuwait","authors":"Mohammed Salem Alsubai'e, Maritime Transport, Saad Abdullah Alshatti","doi":"10.18034/AJASE.V7I2.234","DOIUrl":"https://doi.org/10.18034/AJASE.V7I2.234","url":null,"abstract":"Renewable energy is considered one of the most important and clean sources; since it does not produce any type of emission or pollution. In Kuwait, the energy of wind is existing in three main locations, which are; Ras Jal Aliyah, Bubian in addition to Subiyah, where the characteristics of wind have been evaluated in this paper based on the data generated from the meteorological measurements at 10m height. Also, different studies have been performed in this paper in order to analyze the impact of height on the parameters of wind energy, wind density, in addition to wind speed. Jal Aliyah location has been studied in this paper and the results showed that there is a proportional relation between the wind speed and power, where the maximum power is potential if the speed is equal to 29.1 m/s, and the maximum averaged flux of wind power is equal to 725.54 W/m2. Where both Bubidan Island and Ras Subiyah showed the wind direction in the North-East quadrant with speed is greater than 10 m/s. But, the higher polarized distribution of Jal Aliyah was in the north direction. Based on the obtained results, it can be concluded that this paper provides and suggests a proper design of the wind turbines for designers.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90076914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Theoretical Approaches of Machine Learning to Schizophrenia 机器学习治疗精神分裂症的理论方法
IF 0.6 4区 工程技术 Q4 Engineering Pub Date : 2018-12-22 DOI: 10.18034/ei.v6i2.568
N. Bynagari, Takudzwa Fadziso
Machine learning techniques have been successfully used to analyze neuroimaging data in the context of disease diagnosis in recent years. In this study, we present an overview of contemporary support vector machine-based methods developed and used in psychiatric neuroimaging for schizophrenia research. We focus in particular on our group's algorithms, which have been used to categorize schizophrenia patients and healthy controls, and compare their accuracy findings to those of other recently published studies. First, we'll go over some basic pattern recognition and machine learning terms. Then, for each study, we describe and discuss it independently, emphasizing the key characteristics that distinguish each approach. Finally, conclusions are reached as a result of comparing the data obtained using the various methodologies presented to determine how beneficial automatic categorization systems are in understanding the molecular underpinnings of schizophrenia. The primary implications of applying these approaches in clinical practice are then discussed.
近年来,机器学习技术已经成功地用于分析疾病诊断背景下的神经影像学数据。在这项研究中,我们介绍了当代基于支持向量机的方法开发和用于精神分裂症研究的精神神经成像的概述。我们特别关注我们小组的算法,这些算法已被用于对精神分裂症患者和健康对照进行分类,并将其准确性发现与其他最近发表的研究结果进行比较。首先,我们将回顾一些基本的模式识别和机器学习术语。然后,对于每个研究,我们独立地描述和讨论它,强调区分每种方法的关键特征。最后,通过比较使用各种方法获得的数据,得出结论,以确定自动分类系统在理解精神分裂症的分子基础方面有多有益。然后讨论了在临床实践中应用这些方法的主要含义。
{"title":"Theoretical Approaches of Machine Learning to Schizophrenia","authors":"N. Bynagari, Takudzwa Fadziso","doi":"10.18034/ei.v6i2.568","DOIUrl":"https://doi.org/10.18034/ei.v6i2.568","url":null,"abstract":"Machine learning techniques have been successfully used to analyze neuroimaging data in the context of disease diagnosis in recent years. In this study, we present an overview of contemporary support vector machine-based methods developed and used in psychiatric neuroimaging for schizophrenia research. We focus in particular on our group's algorithms, which have been used to categorize schizophrenia patients and healthy controls, and compare their accuracy findings to those of other recently published studies. First, we'll go over some basic pattern recognition and machine learning terms. Then, for each study, we describe and discuss it independently, emphasizing the key characteristics that distinguish each approach. Finally, conclusions are reached as a result of comparing the data obtained using the various methodologies presented to determine how beneficial automatic categorization systems are in understanding the molecular underpinnings of schizophrenia. The primary implications of applying these approaches in clinical practice are then discussed.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2018-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85067205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Cloud Security - A Semantic Approach in End to End Security Compliance 云安全——端到端安全合规的语义方法
IF 0.6 4区 工程技术 Q4 Engineering Pub Date : 2017-12-31 DOI: 10.18034/ei.v5i2.586
Vns Surendra Chimakurthi
Many firms are seeing the benefits of moving to the cloud. For the sake of their customers' data, cloud service providers are required by law to maintain the highest levels of data security and privacy. Most cloud service providers employ a patchwork of security and privacy safeguards while industry standards are being created. The upshot is that customers of cloud services are unsure whether or not the security protections supplied by these services are enough to meet their specific security and compliance requirements. In this article, we have discussed the many threats cloud users face and emphasized the compliance frameworks and security processes that should be in place to minimize the risk. To categorize cloud security measures, risks, and compliance requirements, we developed an ontology. We needed to design software to identify the high-level policy rules that must be applied in response to each danger as part of this initiative. Additionally, the program provides a list of cloud service providers that now satisfy specific security requirements. Even if they aren't familiar with the underlying technology, cloud users may utilize our system to build up their security policy and identify compatible providers.
许多公司都看到了迁移到云计算的好处。为了保护客户的数据,法律要求云服务提供商保持最高水平的数据安全和隐私。大多数云服务提供商在制定行业标准的同时,采用了各种安全和隐私保护措施。其结果是,云服务的客户不确定这些服务提供的安全保护是否足以满足其特定的安全和遵从性需求。在本文中,我们讨论了云用户面临的许多威胁,并强调了应该采用的合规性框架和安全流程,以最大限度地降低风险。为了对云安全措施、风险和遵从性需求进行分类,我们开发了一个本体。我们需要设计软件来识别高级策略规则,这些规则必须应用于响应作为该计划一部分的每个危险。此外,该计划还提供了一份云服务提供商列表,这些提供商现在满足了特定的安全要求。即使他们不熟悉底层技术,云用户也可以利用我们的系统来建立他们的安全策略并识别兼容的提供商。
{"title":"Cloud Security - A Semantic Approach in End to End Security Compliance","authors":"Vns Surendra Chimakurthi","doi":"10.18034/ei.v5i2.586","DOIUrl":"https://doi.org/10.18034/ei.v5i2.586","url":null,"abstract":"Many firms are seeing the benefits of moving to the cloud. For the sake of their customers' data, cloud service providers are required by law to maintain the highest levels of data security and privacy. Most cloud service providers employ a patchwork of security and privacy safeguards while industry standards are being created. The upshot is that customers of cloud services are unsure whether or not the security protections supplied by these services are enough to meet their specific security and compliance requirements. In this article, we have discussed the many threats cloud users face and emphasized the compliance frameworks and security processes that should be in place to minimize the risk. To categorize cloud security measures, risks, and compliance requirements, we developed an ontology. We needed to design software to identify the high-level policy rules that must be applied in response to each danger as part of this initiative. Additionally, the program provides a list of cloud service providers that now satisfy specific security requirements. Even if they aren't familiar with the underlying technology, cloud users may utilize our system to build up their security policy and identify compatible providers.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75157860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Waste not, want not 不浪费,不匮乏
IF 0.6 4区 工程技术 Q4 Engineering Pub Date : 2017-01-01 DOI: 10.1016/s0140-6736(47)91772-8
L. Eric, F. David
{"title":"Waste not, want not","authors":"L. Eric, F. David","doi":"10.1016/s0140-6736(47)91772-8","DOIUrl":"https://doi.org/10.1016/s0140-6736(47)91772-8","url":null,"abstract":"","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/s0140-6736(47)91772-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"55874433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Commercial Applications of Blockchain and Distributed Ledger Technology 区块链和分布式账本技术的商业应用
IF 0.6 4区 工程技术 Q4 Engineering Pub Date : 2016-12-31 DOI: 10.18034/ei.v4i2.653
Sai Srujan Gutlapalli
Blockchains are distributed ledgers. Distributed ledgers replace centralized ledgers. Distributed ledgers use nodes—computers—to record, share, and synchronize transactions in their electronic ledgers. The paper examines how blockchain data is arranged into blocks and how an append-only mode chain links them. Distributed ledger technology (DLT) encrypts and consensuses immutable and sequential transaction records. Bitcoin pioneered blockchain. Since then, many blockchains with decentralization, encryption, consensus, and immutability have been developed for diverse uses. Blockchain technology is most typically used in transaction settlement, digital currency banks, and supply chain applications to solve problems quickly. The study examines how blockchain and DLTs might improve information management and build new technologies like the Internet of Things. The study shows how legal issues encourage blockchain technology despite limited international and federal restrictions. However, data privacy and security must be addressed immediately.
区块链是分布式账本。分布式账本取代集中式账本。分布式账本使用节点——计算机——在其电子账本中记录、共享和同步交易。本文研究了区块链数据如何排列成块,以及仅追加模式链如何将它们连接起来。分布式账本技术(DLT)对不可变和顺序的交易记录进行加密和共识。比特币开创了区块链。从那时起,许多具有去中心化、加密、共识和不变性的区块链被开发出来,用于各种用途。区块链技术最典型的应用是交易结算、数字货币银行和供应链应用,以快速解决问题。该研究探讨了区块链和dlt如何改善信息管理,并建立物联网等新技术。该研究表明,尽管国际和联邦限制有限,法律问题如何鼓励区块链技术。然而,必须立即解决数据隐私和安全问题。
{"title":"Commercial Applications of Blockchain and Distributed Ledger Technology","authors":"Sai Srujan Gutlapalli","doi":"10.18034/ei.v4i2.653","DOIUrl":"https://doi.org/10.18034/ei.v4i2.653","url":null,"abstract":"Blockchains are distributed ledgers. Distributed ledgers replace centralized ledgers. Distributed ledgers use nodes—computers—to record, share, and synchronize transactions in their electronic ledgers. The paper examines how blockchain data is arranged into blocks and how an append-only mode chain links them. Distributed ledger technology (DLT) encrypts and consensuses immutable and sequential transaction records. Bitcoin pioneered blockchain. Since then, many blockchains with decentralization, encryption, consensus, and immutability have been developed for diverse uses. Blockchain technology is most typically used in transaction settlement, digital currency banks, and supply chain applications to solve problems quickly. The study examines how blockchain and DLTs might improve information management and build new technologies like the Internet of Things. The study shows how legal issues encourage blockchain technology despite limited international and federal restrictions. However, data privacy and security must be addressed immediately.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73094560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Software as a Service (SaaS) as Cloud Computing: Security and Risk vs. Technological Complexity 软件即服务(SaaS)与云计算:安全性和风险vs.技术复杂性
IF 0.6 4区 工程技术 Q4 Engineering Pub Date : 2016-12-31 DOI: 10.18034/ei.v4i2.633
Sandesh Achar
The software delivery model known as Software as a service (SaaS) has evolved from cutting-edge innovation to an essential technology for many companies. However, due to the extensive range of cloud services that companies offer as part of their SaaS offerings, it is indispensable to thoroughly comprehend the dangers associated with using these services. This article describes those dangers and recommendations for the most effective methods of control that are open to managers. This study's objective is to investigate the factors of Technological Complexity, Security and Risk, and Technical Support within an organization to determine how these factors can influence an organization's end-use intention regarding cloud technology. The availability of technical support, the complexity of use, and the organization's training have been highlighted as the most crucial factors of this aim. The findings suggest that complexity negatively influences intention to use, although training and assistance are vital, with a similar weight. Shared or collective knowledge is essential in the adoption of cloud computing technologies.
被称为软件即服务(SaaS)的软件交付模型已经从前沿创新发展成为许多公司的基本技术。然而,由于公司作为SaaS产品的一部分提供了广泛的云服务,因此彻底理解与使用这些服务相关的危险是必不可少的。本文描述了这些危险,并为管理者提供了最有效的控制方法建议。本研究的目的是调查组织内的技术复杂性、安全性和风险以及技术支持因素,以确定这些因素如何影响组织对云技术的最终使用意图。技术支持的可得性、使用的复杂性和组织的培训被强调为实现这一目标的最关键因素。研究结果表明,尽管训练和帮助是至关重要的,但复杂性对使用意愿产生了负面影响,其权重相似。共享或集体知识对于采用云计算技术至关重要。
{"title":"Software as a Service (SaaS) as Cloud Computing: Security and Risk vs. Technological Complexity","authors":"Sandesh Achar","doi":"10.18034/ei.v4i2.633","DOIUrl":"https://doi.org/10.18034/ei.v4i2.633","url":null,"abstract":"The software delivery model known as Software as a service (SaaS) has evolved from cutting-edge innovation to an essential technology for many companies. However, due to the extensive range of cloud services that companies offer as part of their SaaS offerings, it is indispensable to thoroughly comprehend the dangers associated with using these services. This article describes those dangers and recommendations for the most effective methods of control that are open to managers. This study's objective is to investigate the factors of Technological Complexity, Security and Risk, and Technical Support within an organization to determine how these factors can influence an organization's end-use intention regarding cloud technology. The availability of technical support, the complexity of use, and the organization's training have been highlighted as the most crucial factors of this aim. The findings suggest that complexity negatively influences intention to use, although training and assistance are vital, with a similar weight. Shared or collective knowledge is essential in the adoption of cloud computing technologies.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79932191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Machine Learning and Artificial Intelligence in Online Fake Transaction Alerting 在线虚假交易预警中的机器学习和人工智能
IF 0.6 4区 工程技术 Q4 Engineering Pub Date : 2015-12-31 DOI: 10.18034/ei.v3i2.566
N. Bynagari
Artificial Intelligence (AI) is one of the most promising and intriguing innovations of modernity. Its potential is virtually unlimited, from smart music selection in personal gadgets to intelligent analysis of big data and real-time fraud detection and aversion. At the core of the AI philosophy lies an assumption that once a computer system is provided with enough data, it can learn based on that input. The more data is provided, the more sophisticated its learning ability becomes. This feature has acquired the name "machine learning" (ML). The opportunities explored with ML are plentiful today, and one of them is an ability to set up an evolving security system learning from the past cyber-fraud experiences and developing more rigorous fraud detection mechanisms. Read on to learn more about ML, the types and magnitude of fraud evidenced in modern banking, e-commerce, and healthcare, and how ML has become an innovative, timely, and efficient fraud prevention technology.
人工智能(AI)是现代最有前途和最有趣的创新之一。它的潜力几乎是无限的,从个人设备的智能音乐选择,到大数据的智能分析,以及实时欺诈检测和规避。人工智能哲学的核心假设是,一旦计算机系统获得了足够的数据,它就可以根据这些输入进行学习。提供的数据越多,它的学习能力就越复杂。这种特性被称为“机器学习”(ML)。今天,机器学习探索的机会很多,其中之一是能够从过去的网络欺诈经验中学习,建立一个不断发展的安全系统,并开发更严格的欺诈检测机制。继续阅读以了解更多关于机器学习的信息,现代银行、电子商务和医疗保健中欺诈的类型和严重程度,以及机器学习如何成为一种创新、及时和有效的欺诈预防技术。
{"title":"Machine Learning and Artificial Intelligence in Online Fake Transaction Alerting","authors":"N. Bynagari","doi":"10.18034/ei.v3i2.566","DOIUrl":"https://doi.org/10.18034/ei.v3i2.566","url":null,"abstract":"Artificial Intelligence (AI) is one of the most promising and intriguing innovations of modernity. Its potential is virtually unlimited, from smart music selection in personal gadgets to intelligent analysis of big data and real-time fraud detection and aversion. At the core of the AI philosophy lies an assumption that once a computer system is provided with enough data, it can learn based on that input. The more data is provided, the more sophisticated its learning ability becomes. This feature has acquired the name \"machine learning\" (ML). The opportunities explored with ML are plentiful today, and one of them is an ability to set up an evolving security system learning from the past cyber-fraud experiences and developing more rigorous fraud detection mechanisms. Read on to learn more about ML, the types and magnitude of fraud evidenced in modern banking, e-commerce, and healthcare, and how ML has become an innovative, timely, and efficient fraud prevention technology.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2015-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86743591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Enabling Trustworthiness in Artificial Intelligence - A Detailed Discussion 在人工智能中实现可信度——详细讨论
IF 0.6 4区 工程技术 Q4 Engineering Pub Date : 2015-01-01 DOI: 10.18034/ei.v3i2.519
Siddhartha Vadlamudi
Artificial intelligence (AI) delivers numerous chances to add to the prosperity of people and the stability of economies and society, yet besides, it adds up a variety of novel moral, legal, social, and innovative difficulties. Trustworthy AI (TAI) bases on the possibility that trust builds the establishment of various societies, economies, and sustainable turn of events, and that people, organizations, and societies can along these lines just at any point understand the maximum capacity of AI, if trust can be set up in its development, deployment, and use. The risks of unintended and negative outcomes related to AI are proportionately high, particularly at scale. Most AI is really artificial narrow intelligence, intended to achieve a specific task on previously curated information from a certain source. Since most AI models expand on correlations, predictions could fail to sum up to various populations or settings and might fuel existing disparities and biases. As the AI industry is amazingly imbalanced, and experts are as of now overpowered by other digital devices, there could be a little capacity to catch blunders. With this article, we aim to present the idea of TAI and its five essential standards (1) usefulness, (2) non-maleficence, (3) autonomy, (4) justice, and (5) logic. We further draw on these five standards to build up a data-driven analysis for TAI and present its application by portraying productive paths for future research, especially as to the distributed ledger technology-based acknowledgment of TAI.
人工智能(AI)为人类的繁荣和经济社会的稳定提供了许多机会,但同时也带来了各种新的道德、法律、社会和创新难题。值得信赖的人工智能(TAI)基于信任建立各种社会、经济和可持续发展的可能性,如果在人工智能的开发、部署和使用中能够建立信任,那么人们、组织和社会可以在任何时候理解人工智能的最大能力。与人工智能相关的意外和负面结果的风险相当高,特别是在规模上。大多数人工智能都是狭义的人工智能,旨在根据特定来源的预先策划信息完成特定任务。由于大多数人工智能模型扩展了相关性,预测可能无法总结不同的人群或环境,并可能加剧现有的差异和偏见。由于人工智能行业非常不平衡,专家们目前被其他数字设备所压倒,因此可能有一点能力来发现错误。在本文中,我们旨在介绍TAI的概念及其五个基本标准(1)有用性,(2)非恶意性,(3)自主性,(4)正义和(5)逻辑性。我们进一步借鉴这五个标准,为TAI建立一个数据驱动的分析,并通过描绘未来研究的生产路径来展示其应用,特别是基于分布式账本技术的TAI确认。
{"title":"Enabling Trustworthiness in Artificial Intelligence - A Detailed Discussion","authors":"Siddhartha Vadlamudi","doi":"10.18034/ei.v3i2.519","DOIUrl":"https://doi.org/10.18034/ei.v3i2.519","url":null,"abstract":"Artificial intelligence (AI) delivers numerous chances to add to the prosperity of people and the stability of economies and society, yet besides, it adds up a variety of novel moral, legal, social, and innovative difficulties. Trustworthy AI (TAI) bases on the possibility that trust builds the establishment of various societies, economies, and sustainable turn of events, and that people, organizations, and societies can along these lines just at any point understand the maximum capacity of AI, if trust can be set up in its development, deployment, and use. The risks of unintended and negative outcomes related to AI are proportionately high, particularly at scale. Most AI is really artificial narrow intelligence, intended to achieve a specific task on previously curated information from a certain source. Since most AI models expand on correlations, predictions could fail to sum up to various populations or settings and might fuel existing disparities and biases. As the AI industry is amazingly imbalanced, and experts are as of now overpowered by other digital devices, there could be a little capacity to catch blunders. With this article, we aim to present the idea of TAI and its five essential standards (1) usefulness, (2) non-maleficence, (3) autonomy, (4) justice, and (5) logic. We further draw on these five standards to build up a data-driven analysis for TAI and present its application by portraying productive paths for future research, especially as to the distributed ledger technology-based acknowledgment of TAI.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2015-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78350922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Machine Learning as a New Search Engine Interface: An Overview 机器学习作为一种新的搜索引擎界面:概述
IF 0.6 4区 工程技术 Q4 Engineering Pub Date : 2014-01-01 DOI: 10.18034/ei.v2i2.539
Taposh Kumar Neogy, Harish Paruchuri
The essence of a web page is an inherently predisposed issue, one that is built on behaviors, interests, and intelligence. There are relatively a ton of reasons web pages are critical to the new world, as the matter cannot be overemphasized. The meteoric growth of the internet is one of the most potent factors making it hard for search engines to provide actionable results. With classified directories, search engines store web pages. To store these pages, some of the engines rely on the expertise of real people. Most of them are enabled and classified using automated means but the human factor is dominant in their success. From experimental results, we can deduce that the most effective and critical way to automate web pages for search engines is via the integration of machine learning.
网页的本质是一个固有的预先处理的问题,一个建立在行为、兴趣和智力上的问题。网页对新世界至关重要的原因有很多,这一点怎么强调都不为过。互联网的飞速发展是使搜索引擎难以提供可操作结果的最有力因素之一。通过分类目录,搜索引擎可以存储网页。为了存储这些页面,一些引擎依赖于真人的专业知识。它们中的大多数都是使用自动化手段启用和分类的,但人为因素在它们的成功中占主导地位。从实验结果中,我们可以推断出,为搜索引擎实现网页自动化的最有效和最关键的方法是通过整合机器学习。
{"title":"Machine Learning as a New Search Engine Interface: An Overview","authors":"Taposh Kumar Neogy, Harish Paruchuri","doi":"10.18034/ei.v2i2.539","DOIUrl":"https://doi.org/10.18034/ei.v2i2.539","url":null,"abstract":"The essence of a web page is an inherently predisposed issue, one that is built on behaviors, interests, and intelligence. There are relatively a ton of reasons web pages are critical to the new world, as the matter cannot be overemphasized. The meteoric growth of the internet is one of the most potent factors making it hard for search engines to provide actionable results. With classified directories, search engines store web pages. To store these pages, some of the engines rely on the expertise of real people. Most of them are enabled and classified using automated means but the human factor is dominant in their success. From experimental results, we can deduce that the most effective and critical way to automate web pages for search engines is via the integration of machine learning.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85470205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Reinforcement Learning in Robotics 机器人中的强化学习
IF 0.6 4区 工程技术 Q4 Engineering Pub Date : 2014-01-01 DOI: 10.18034/ei.v2i2.572
Mani Manavalan, Apoorva Ganapathy
Reinforcement learning has been found to offer to robotics the valid tools and techniques for the redesign of valuable and sophisticated designs for robotics. There are multiple challenges related to the prime problems related to the value added in the reinforcement of the new learning. The study has found the linkages between different subjects related to science in particular. We have attempted to make and establish the links that have been found between the two research communities in order to provide a survey-related task in reinforcement learning for behavior in terms of the generation that are found in the study. Many issues have been highlighted in the robot learning process that is used in their learning as well as various key programming tools and methods. We discuss how contributions that aimed towards taming the complexity of the domain of the study and determining representations and goals of RL. There has been a particular focus that is based on the goals of reinforcement learning that can provide the value-added function approaches and challenges in robotic reinforcement learning. The analysis has been conducted and has strived to demonstrate the value of reinforcement learning that has to be applied to different circumstances.
强化学习已经被发现为机器人技术提供了有效的工具和技术来重新设计有价值的和复杂的机器人设计。在强化新学习的过程中,存在着与附加价值相关的主要问题相关的多重挑战。这项研究发现了不同学科之间的联系,尤其是与科学相关的学科。我们试图在两个研究社区之间建立联系,以便在研究中发现的生成方面为行为强化学习提供与调查相关的任务。机器人学习过程中使用的许多问题以及各种关键的编程工具和方法都得到了强调。我们讨论了旨在驯服研究领域复杂性和确定强化学习的表征和目标的贡献。有一个特别的焦点是基于强化学习的目标,可以提供机器人强化学习中的增值函数方法和挑战。分析已经进行,并努力证明强化学习的价值,必须应用于不同的情况。
{"title":"Reinforcement Learning in Robotics","authors":"Mani Manavalan, Apoorva Ganapathy","doi":"10.18034/ei.v2i2.572","DOIUrl":"https://doi.org/10.18034/ei.v2i2.572","url":null,"abstract":"Reinforcement learning has been found to offer to robotics the valid tools and techniques for the redesign of valuable and sophisticated designs for robotics. There are multiple challenges related to the prime problems related to the value added in the reinforcement of the new learning. The study has found the linkages between different subjects related to science in particular. We have attempted to make and establish the links that have been found between the two research communities in order to provide a survey-related task in reinforcement learning for behavior in terms of the generation that are found in the study. Many issues have been highlighted in the robot learning process that is used in their learning as well as various key programming tools and methods. We discuss how contributions that aimed towards taming the complexity of the domain of the study and determining representations and goals of RL. There has been a particular focus that is based on the goals of reinforcement learning that can provide the value-added function approaches and challenges in robotic reinforcement learning. The analysis has been conducted and has strived to demonstrate the value of reinforcement learning that has to be applied to different circumstances.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78168350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
期刊
Nuclear Engineering International
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1