In order to study the application of nonlinear fractional differential equations in computer arti... more In order to study the application of nonlinear fractional differential equations in computer artificial intelligence algorithms. First, the concept, properties and commonly used neural network models of artificial neural network are introduced, the domestic and foreign status quo of the application of fractional calculus theory to neural network technology is described. Then, the definition, properties and numerical calculation methods of fractional calculus theory are introduced in detail. Then, based on the analysis of artificial intelligence neural network algorithm, the theory of fractional differentiation is introduced, construct BP neural network based on fractional order theory. The Sigmoid function is used as the node function of the neural network, and the actual data is used as the sample set, train a fractional-order network. Finally, by training the network, summarize the change of the two parameters a and p in the function, the impact on the training of the entire netwo...
Deployable antennas, as the core content of national defense technology research at this stage, h... more Deployable antennas, as the core content of national defense technology research at this stage, have the advantages of large flexibility and light weight in practical applications, so this type of antenna can also be called a rigid-flexible hybrid structure. According to the theoretical analysis of the dynamics of flexible multi-body systems, it can be seen that effective control of unfolding antennas is a basic requirement for practical applications. Due to the instability of the specific numerical solution of the static Lagrangian function, it is difficult to completely meet the constraint equation, which is also the main factor affecting the steady development of flexible multibody dynamics. Therefore, in-depth discussion of the numerical calculation method of the static Lagrangian function, obtaining efficient and stable numerical methods from it, and providing effective information for the process control of the deployment of the antenna, is the focus of scientific research sch...
We use the Legendre wavelet method to study nonlinear fractional differential equations. Based on... more We use the Legendre wavelet method to study nonlinear fractional differential equations. Based on the in-depth study of the characteristics of various fractional-order dynamic system models, this paper designs a system for solving fractional-order differential equations, and we apply them to the anomaly analysis of big computer data. This method can improve the efficiency of big data classification. The results of computer numerical simulation show that the designed algorithm for solving fractional differential equations has high accuracy. At the same time, the algorithm can avoid misclassification and omission in big data analysis.
Journal of Statistics and Management Systems, 2021
Abstract Coronavirus disease 2019 (COVID 19) has adversely affected millions of people across the... more Abstract Coronavirus disease 2019 (COVID 19) has adversely affected millions of people across the globe. Though, it is too early to predict the economic consequences of the pandemic. Within seven months of the first case detected in China, more than 600 thousand people have already lost their lives, more than 14.5 million people are directly affected by the virus (as n date; 19/07/2020, Source WHO website) and millions of jobs are being lost daily. All in all, there is very little positive the virus is going to give to the world. But, there is hope in the education sector as this pandemic has paved the way for the futuristic cloud-based educational model. Though the education sector has quickly adapted to the change by having online classes with the use of existing available technologies. To understand the shift in online medium education and the problem encountered in online education delivery. This study collected 956 sample respondents from across Bahrain and analyzed it by using SPSS 25.0. The study found that our existing educational system is not prepared to handle this kind of situation. The makeshift arrangement to the online mode of teaching has resulted in dissatisfaction with both educators and students. Based on the analysis of primary data collected from students and educators in the Kingdom of Bahrain, the study proposes a cloud-based futuristic educational model for next-generation of learning and teaching that will be completely unaffected by the situation like a current pandemic, war, and decreasing student enrolment, etc.
In this paper, we present a method for segmenting Arabic handwritten documents into text lines an... more In this paper, we present a method for segmenting Arabic handwritten documents into text lines and words. Text line segmentation is addressed by a well-known technique, the horizontal projection profile, in which autocorrelation is used to enhance the self similarity of this profile. This technique promotes the estimation of text line spacing. Word extraction is based on an adaptation of a known method, gap metrics.This improvement relies on deriving the values of these gaps from the properties of each input document, making the proposed method tolerant and robust to Arabic handwritten nature. Text is often divided into words, sub-words and letters; however, some letters do not connect to the following letter, even in the middle of a word. A gap metric method exploits the membership values of a clustering algorithm to identify segmentation thresholds as “within word” or “between words” gaps. The proposed method is tested on the benchmarking datasets of Arabic handwritten text recogn...
2020 Seventh International Conference on Software Defined Systems (SDS)
With the emergence of advanced technology, the user authentication methods have also been improve... more With the emergence of advanced technology, the user authentication methods have also been improved. Authenticating the user, several secure and efficient approaches have been introduced, but the biometric authentication method is considered much safer as compared to password-driven methods. In this paper, we explore the risks, concerns, and methods by installing well-known open-source software used in Unibiometric analysis by the partners of The National Institute of Standards and Technology (NIST). Not only are the algorithms used all open source but it comes with test data and several internal open source utilities necessary to process biometric data.
2021 Eighth International Conference on Software Defined Systems (SDS), 2021
Quick response (QR) codes are currently used ubiq-uitously. Their interaction protocol design is ... more Quick response (QR) codes are currently used ubiq-uitously. Their interaction protocol design is initially unsecured. It forces users to scan QR codes, which makes it harder to differentiate a genuine code from a malicious one. Intruders can change the original QR code and make it fake, which can lead to phishing websites that collect sensitive data. The interaction model can be improved and made more secure by adding some modifications to the backend side of the application. This paper addresses the vulnerabilities of QR codes and recommends improvements in security design. Furthermore, two state-of-the-art algorithms, Digital Signature (DS) and Elliptic Curve Digital Signature (ECDS), are analytically compared to determine their strengths in QR code security.
This paper presents an efficient data compression technique based on using Lempel-Ziv coding algo... more This paper presents an efficient data compression technique based on using Lempel-Ziv coding algorithms such as the LZ-78 algorithm. The conventional LZ-78 algorithm was applied directly to a non-binary information source (i.e., original source) with a large number of alphabets (such as 256 characters in English text). However, this modified technique applies the LZ-78 algorithm to an nth-order extension equivalent binary source which includes 2 n symbols. The equivalent binary source is generated by applying an efficient source encoding scheme on the original one. In this encoding scheme, each alphabet in the original source is given a weighted fixed-length code (e.g. eight bits/character). The weighted codes are chosen in such a way that the entropy of the generated binary source is made as close as possible to that of the original one. The reduction in number of symbols in the extended binary source leads to a better compression algorithm performance which can be measured based o...
Because the current computer sensor data positioning analysis has positioning difficulties and fa... more Because the current computer sensor data positioning analysis has positioning difficulties and false positioning problems, we use the Lagrangian multiplier method of the interactive direction to disassemble the computer sensor sound source. Through this algorithm, the information fusion of computer sensor nodes is realized. After using Lagrangian mathematical equations, these error correction measurements have achieved better target positioning results. Theoretical analysis and experimental results show that the algorithm improves the speed of computer sensor data association. To a certain extent, the correlation accuracy is improved.
Human writing is highly variable and inconsistent, and this makes the offline recognition of hand... more Human writing is highly variable and inconsistent, and this makes the offline recognition of handwritten words extremely challenging. This paper describes a novel approach that can be employed for the offline recognition of handwritten Arabic words. Through conceptualizing each word as single, inseparable objects, the proposed approach aims to recognize words in accordance with their complete shape. This paper describes the bag-of-visual-words method that has been effectively employed for the purposes of classifying images. The study consisted of four main stages. First, a set of image patches were sampled for the purposes of training, and a speeded up robust features (SURF) descriptor was then used to characterize them. Following that, the bag-of-visual-words model was employed through constructing the K-means clustering algorithm. A histogram of each whole world was developed and this operated as the image feature vector. This was employed to train the support vector machine class...
Journal of Experimental and Theoretical Artificial Intelligence, 2007
Many techniques have been reported for handwriting-based writer identification. None of these tec... more Many techniques have been reported for handwriting-based writer identification. None of these techniques assume that the written text is in Arabic. In this paper we present a new technique for feature extraction based on hybrid spectral–statistical measures (SSMs) of texture. We show its effectiveness compared with multiple-channel (Gabor) filters and the grey-level co-occurrence matrix (GLCM), which are well-known techniques yielding
In this introductory chapter, we present an evolutionary-based technique for designing one-dimens... more In this introductory chapter, we present an evolutionary-based technique for designing one-dimensional and two-dimensional Finite Impulse Response (FIR) filters. Typically, the required filter has a given set of specifications to be met. The specifications may include cut-off frequency, band-stop region, band-pass region and ripple factors. The evolutionary method we are using is a modified version of the Genetic Algorithm (GA), which we call Flexible Genetic Algorithm (FGA). It is an optimization algorithm with high capabilities to span the space of filter parameters. FIR filters are highly required in different applications that process signals or images. A review of the state-of-the-art of filter optimization using evolutionary techniques is presented in this chapter. The aim of this work is to simply give a basic example of how filters can be designed using evolutionary techniques. As a matter of fact, medical applications require high linearity in the filter phase function to prevent undesired distortions in the detected signals. The proposed technique is based on minimizing a cost function that uses the weighted squared difference between the optimum filter specifications and the solutions generated by the evolutionary method. Comparisons between FGA-designed filter and standard method designed filters are implemented. Testing of filters is done using different noisy artificial ECG signals and selected images. We used Hermite functions to build the artificial ECG signals.
One important task of every teacher is to help improve his/her student's ability of think... more One important task of every teacher is to help improve his/her student's ability of thinking and reasoning. The ability to think and reason out vigorously is one of the substantial learning that the student can achieve. Now, everybody is in the process of changing because of the advances in technology and as the technology continues to grow, the application of Mathematics to Science becomes superior. To reach the utmost potential of our students' mathematical skills, there are a lot of numerous ways we can do as teachers to achieve this and one of the methods or strategies that can be instigated is through game-based learning. As an educator, we always seek to determine first if the students are ready to learn the new topics that we are about to discuss and this is based on what they already know. Difficulty in coping with the topics is then experienced by the students if they lack the needed mathematical skills for a particular lesson. In this study, the researcher developed a game-based diagnostic test and learning intervention for freshman engineering students for the course in Differential Calculus. The learning intervention was developed as a tool for mastery of topics for the course. The goal of the game-based learning system is for the students to bridge the gap of mastery in their Pre-Calculus most especially for the non-STEM students who were not able to take Pre-Calculus in their senior high school strand. The researcher also investigated if the game-based learning system eventually strengthened students' mathematical skills required in improving the performances in the course Differential Calculus. The researcher presented the acceptability of the game-based learning system, the comparison in the academic performance of the freshman engineering students who were exposed in traditional bridging with game-based learning intervention and those who were exposed with the purely traditional bridging program in the General Mathematics, Diagnostic Pretest and Posttest and Differential Calculus Final Grade.
In order to study the application of nonlinear fractional differential equations in computer arti... more In order to study the application of nonlinear fractional differential equations in computer artificial intelligence algorithms. First, the concept, properties and commonly used neural network models of artificial neural network are introduced, the domestic and foreign status quo of the application of fractional calculus theory to neural network technology is described. Then, the definition, properties and numerical calculation methods of fractional calculus theory are introduced in detail. Then, based on the analysis of artificial intelligence neural network algorithm, the theory of fractional differentiation is introduced, construct BP neural network based on fractional order theory. The Sigmoid function is used as the node function of the neural network, and the actual data is used as the sample set, train a fractional-order network. Finally, by training the network, summarize the change of the two parameters a and p in the function, the impact on the training of the entire netwo...
Deployable antennas, as the core content of national defense technology research at this stage, h... more Deployable antennas, as the core content of national defense technology research at this stage, have the advantages of large flexibility and light weight in practical applications, so this type of antenna can also be called a rigid-flexible hybrid structure. According to the theoretical analysis of the dynamics of flexible multi-body systems, it can be seen that effective control of unfolding antennas is a basic requirement for practical applications. Due to the instability of the specific numerical solution of the static Lagrangian function, it is difficult to completely meet the constraint equation, which is also the main factor affecting the steady development of flexible multibody dynamics. Therefore, in-depth discussion of the numerical calculation method of the static Lagrangian function, obtaining efficient and stable numerical methods from it, and providing effective information for the process control of the deployment of the antenna, is the focus of scientific research sch...
We use the Legendre wavelet method to study nonlinear fractional differential equations. Based on... more We use the Legendre wavelet method to study nonlinear fractional differential equations. Based on the in-depth study of the characteristics of various fractional-order dynamic system models, this paper designs a system for solving fractional-order differential equations, and we apply them to the anomaly analysis of big computer data. This method can improve the efficiency of big data classification. The results of computer numerical simulation show that the designed algorithm for solving fractional differential equations has high accuracy. At the same time, the algorithm can avoid misclassification and omission in big data analysis.
Journal of Statistics and Management Systems, 2021
Abstract Coronavirus disease 2019 (COVID 19) has adversely affected millions of people across the... more Abstract Coronavirus disease 2019 (COVID 19) has adversely affected millions of people across the globe. Though, it is too early to predict the economic consequences of the pandemic. Within seven months of the first case detected in China, more than 600 thousand people have already lost their lives, more than 14.5 million people are directly affected by the virus (as n date; 19/07/2020, Source WHO website) and millions of jobs are being lost daily. All in all, there is very little positive the virus is going to give to the world. But, there is hope in the education sector as this pandemic has paved the way for the futuristic cloud-based educational model. Though the education sector has quickly adapted to the change by having online classes with the use of existing available technologies. To understand the shift in online medium education and the problem encountered in online education delivery. This study collected 956 sample respondents from across Bahrain and analyzed it by using SPSS 25.0. The study found that our existing educational system is not prepared to handle this kind of situation. The makeshift arrangement to the online mode of teaching has resulted in dissatisfaction with both educators and students. Based on the analysis of primary data collected from students and educators in the Kingdom of Bahrain, the study proposes a cloud-based futuristic educational model for next-generation of learning and teaching that will be completely unaffected by the situation like a current pandemic, war, and decreasing student enrolment, etc.
In this paper, we present a method for segmenting Arabic handwritten documents into text lines an... more In this paper, we present a method for segmenting Arabic handwritten documents into text lines and words. Text line segmentation is addressed by a well-known technique, the horizontal projection profile, in which autocorrelation is used to enhance the self similarity of this profile. This technique promotes the estimation of text line spacing. Word extraction is based on an adaptation of a known method, gap metrics.This improvement relies on deriving the values of these gaps from the properties of each input document, making the proposed method tolerant and robust to Arabic handwritten nature. Text is often divided into words, sub-words and letters; however, some letters do not connect to the following letter, even in the middle of a word. A gap metric method exploits the membership values of a clustering algorithm to identify segmentation thresholds as “within word” or “between words” gaps. The proposed method is tested on the benchmarking datasets of Arabic handwritten text recogn...
2020 Seventh International Conference on Software Defined Systems (SDS)
With the emergence of advanced technology, the user authentication methods have also been improve... more With the emergence of advanced technology, the user authentication methods have also been improved. Authenticating the user, several secure and efficient approaches have been introduced, but the biometric authentication method is considered much safer as compared to password-driven methods. In this paper, we explore the risks, concerns, and methods by installing well-known open-source software used in Unibiometric analysis by the partners of The National Institute of Standards and Technology (NIST). Not only are the algorithms used all open source but it comes with test data and several internal open source utilities necessary to process biometric data.
2021 Eighth International Conference on Software Defined Systems (SDS), 2021
Quick response (QR) codes are currently used ubiq-uitously. Their interaction protocol design is ... more Quick response (QR) codes are currently used ubiq-uitously. Their interaction protocol design is initially unsecured. It forces users to scan QR codes, which makes it harder to differentiate a genuine code from a malicious one. Intruders can change the original QR code and make it fake, which can lead to phishing websites that collect sensitive data. The interaction model can be improved and made more secure by adding some modifications to the backend side of the application. This paper addresses the vulnerabilities of QR codes and recommends improvements in security design. Furthermore, two state-of-the-art algorithms, Digital Signature (DS) and Elliptic Curve Digital Signature (ECDS), are analytically compared to determine their strengths in QR code security.
This paper presents an efficient data compression technique based on using Lempel-Ziv coding algo... more This paper presents an efficient data compression technique based on using Lempel-Ziv coding algorithms such as the LZ-78 algorithm. The conventional LZ-78 algorithm was applied directly to a non-binary information source (i.e., original source) with a large number of alphabets (such as 256 characters in English text). However, this modified technique applies the LZ-78 algorithm to an nth-order extension equivalent binary source which includes 2 n symbols. The equivalent binary source is generated by applying an efficient source encoding scheme on the original one. In this encoding scheme, each alphabet in the original source is given a weighted fixed-length code (e.g. eight bits/character). The weighted codes are chosen in such a way that the entropy of the generated binary source is made as close as possible to that of the original one. The reduction in number of symbols in the extended binary source leads to a better compression algorithm performance which can be measured based o...
Because the current computer sensor data positioning analysis has positioning difficulties and fa... more Because the current computer sensor data positioning analysis has positioning difficulties and false positioning problems, we use the Lagrangian multiplier method of the interactive direction to disassemble the computer sensor sound source. Through this algorithm, the information fusion of computer sensor nodes is realized. After using Lagrangian mathematical equations, these error correction measurements have achieved better target positioning results. Theoretical analysis and experimental results show that the algorithm improves the speed of computer sensor data association. To a certain extent, the correlation accuracy is improved.
Human writing is highly variable and inconsistent, and this makes the offline recognition of hand... more Human writing is highly variable and inconsistent, and this makes the offline recognition of handwritten words extremely challenging. This paper describes a novel approach that can be employed for the offline recognition of handwritten Arabic words. Through conceptualizing each word as single, inseparable objects, the proposed approach aims to recognize words in accordance with their complete shape. This paper describes the bag-of-visual-words method that has been effectively employed for the purposes of classifying images. The study consisted of four main stages. First, a set of image patches were sampled for the purposes of training, and a speeded up robust features (SURF) descriptor was then used to characterize them. Following that, the bag-of-visual-words model was employed through constructing the K-means clustering algorithm. A histogram of each whole world was developed and this operated as the image feature vector. This was employed to train the support vector machine class...
Journal of Experimental and Theoretical Artificial Intelligence, 2007
Many techniques have been reported for handwriting-based writer identification. None of these tec... more Many techniques have been reported for handwriting-based writer identification. None of these techniques assume that the written text is in Arabic. In this paper we present a new technique for feature extraction based on hybrid spectral–statistical measures (SSMs) of texture. We show its effectiveness compared with multiple-channel (Gabor) filters and the grey-level co-occurrence matrix (GLCM), which are well-known techniques yielding
In this introductory chapter, we present an evolutionary-based technique for designing one-dimens... more In this introductory chapter, we present an evolutionary-based technique for designing one-dimensional and two-dimensional Finite Impulse Response (FIR) filters. Typically, the required filter has a given set of specifications to be met. The specifications may include cut-off frequency, band-stop region, band-pass region and ripple factors. The evolutionary method we are using is a modified version of the Genetic Algorithm (GA), which we call Flexible Genetic Algorithm (FGA). It is an optimization algorithm with high capabilities to span the space of filter parameters. FIR filters are highly required in different applications that process signals or images. A review of the state-of-the-art of filter optimization using evolutionary techniques is presented in this chapter. The aim of this work is to simply give a basic example of how filters can be designed using evolutionary techniques. As a matter of fact, medical applications require high linearity in the filter phase function to prevent undesired distortions in the detected signals. The proposed technique is based on minimizing a cost function that uses the weighted squared difference between the optimum filter specifications and the solutions generated by the evolutionary method. Comparisons between FGA-designed filter and standard method designed filters are implemented. Testing of filters is done using different noisy artificial ECG signals and selected images. We used Hermite functions to build the artificial ECG signals.
One important task of every teacher is to help improve his/her student's ability of think... more One important task of every teacher is to help improve his/her student's ability of thinking and reasoning. The ability to think and reason out vigorously is one of the substantial learning that the student can achieve. Now, everybody is in the process of changing because of the advances in technology and as the technology continues to grow, the application of Mathematics to Science becomes superior. To reach the utmost potential of our students' mathematical skills, there are a lot of numerous ways we can do as teachers to achieve this and one of the methods or strategies that can be instigated is through game-based learning. As an educator, we always seek to determine first if the students are ready to learn the new topics that we are about to discuss and this is based on what they already know. Difficulty in coping with the topics is then experienced by the students if they lack the needed mathematical skills for a particular lesson. In this study, the researcher developed a game-based diagnostic test and learning intervention for freshman engineering students for the course in Differential Calculus. The learning intervention was developed as a tool for mastery of topics for the course. The goal of the game-based learning system is for the students to bridge the gap of mastery in their Pre-Calculus most especially for the non-STEM students who were not able to take Pre-Calculus in their senior high school strand. The researcher also investigated if the game-based learning system eventually strengthened students' mathematical skills required in improving the performances in the course Differential Calculus. The researcher presented the acceptability of the game-based learning system, the comparison in the academic performance of the freshman engineering students who were exposed in traditional bridging with game-based learning intervention and those who were exposed with the purely traditional bridging program in the General Mathematics, Diagnostic Pretest and Posttest and Differential Calculus Final Grade.
Uploads
Papers