The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Archives
  • Indexing

IJARAI Volume 1 Issue 7

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Evacuation Path Selection for Firefighters Based on Dynamic Triangular Network Model

Abstract: Path selection is one of the critical aspects in emergency evacuation. In a fire scene, how to choose an optimal evacuation path for firefighters is a challenging aspect. In this paper, firstly, a dynamic triangular network model formed by robots is presented. On the basis of this model, directed graph is established in order to calculate direct paths. Then multi-parameter information fusion which includes smoke density, temperature and oxygen density is discussed in detail for environment safety evaluation. Based on the discussions, a new way has been proposed for optimal path selection, taking into consideration the safety-factor of the path. The objectives of the method are to minimize the path lengths, at the same time, to protect firefighters from the dangerous regions. In the end, numerical simulation results prove the feasibility and superiority of this method.

Author 1: Qianyi Zhang
Author 2: Demin Li
Author 3: Yajuan An

Keywords: Evacuation Path Selection; Information Fusion; Dynamic Triangular Network Model.

PDF

Paper 2: The Classification of the Real-Time Interaction-Based Behavior of Online Game Addiction in Children and Early Adolescents in Thailand

Abstract: This paper aims to study actual behaviors of Thai children and early adolescents with different levels of game addiction while playing online games from an angle of the interaction between a user and computer. Real-time interaction-based behavior data from a program agent installed in personal computers in 20 sample houses were screened along with consent given by children and their parents. Collection of data about game-playing periods, frequency, game-playing times, text-based chatting, mouse click and keyboard typing during the game was carried out over two months and four case study in-depth interviews for addicted players and their parents. The results revealed a novel method to classify online game addiction level of children and early adolescents by mouse click and keyboard typing data and also found relationship between the playing data recorded and game addiction risk conditions and risk behaviors as explained in the article.

Author 1: Kongkarn Vachirapanang
Author 2: Sakoontip Tuisima
Author 3: Sukree Sinthupinyo
Author 4: Puntip Sirivunnabood

Keywords: online game addiction; classification; intelligent agent; real time.

PDF

Paper 3: Provenance and Temporally Annotated Logic Programming

Abstract: In this paper, we consider provenance and temporally annotated logic rules (pt-logic rules, for short), which are definite logic programming rules associated with the name of the source that they originate and the temporal interval during which they are valid. A collection of pt-logic rules form a provenance and temporally annotated logic program P, called pt-logic program, for short. We develop a model theory for P and define its maximally temporal entailments of the form A:<S, ti>, indicating that atom A is derived from a set of sources S and holds at a maximal temporal interval ti, according to S. We define a consequence operator that derives exactly the maximally temporal entailments of P for a set of sources. We show that the complexity of the considered entailment is EXPTIME-complete.

Author 1: Anastasia Analyti
Author 2: Ioannis Pachoulakis

Keywords: Annotated logic programming; provenance and temporal information; model theory; consequence operator.

PDF

Paper 4: Temporally Annotated Extended Logic Programs

Abstract: Extended logic programs (ELPs) are a set of logic rules with strong negation allowed in the bodies or head of the rules and weak negation ~ allowed in the bodies of the rules. ELPs enable for various forms of reasoning that cannot be achieved by definite logic programs. Answer Set Programming provides a widely acceptable semantics for ELPs. However, ELPs do not provide information regarding the temporal intervals that derived ELP literals or weakly negated ELP literals are valid. In this paper, we associate ELP rules with their validity temporal interval, resulting in a temporally annotated logic program. A ground temporal literal has the form L:i, where L is a ground ELP literal or weakly negated ELP literal and i is a temporal interval. We define (simple) entailment and maximal entailment of a ground temporal literal L:i from a temporally annotated logic program C. Both kinds of entailment are based on Answer Set Programming. Additionally, we provide an algorithm that for an ELP literal or a weakly negated ELP literal L returns a list with all temporal intervals i such that a temporally annotated logic program C maximally entails L:i. Based on this algorithm, the answer of various kinds of temporal queries can be provided.

Author 1: Anastasia Analyti
Author 2: Ioannis Pachoulakis

Keywords: Extended logic programs; validity temporal intervals; temporal inference; query answering.

PDF

Paper 5: Brain Computer Interface Boulevard of Smarter Thoughts

Abstract: The Brain Computer Interface is a major breakthrough for the technical industry, medical world, military and the society on a whole. It is concerned with the control of devices around us such as computing gears & even automobiles in the near future without really the physical intervention of the user. It helps bridge the communication gap between the society and the disabled. This mainly lays its focus on people suffering from brainstem stroke, going through a spinal cord injury or even blindness. BCI helps such patients to retain or restore communication with the outside world through intelligent signals from the brain due to the high risk of paralysis under such circumstances. This is achieved by a signal acquisition technique and converting these signals available from the sensors placed on the scalp into real-time computer commands that can be visually operated and understood. It has nothing to do with the natural neural transmission of brain signals but extracts them with the help of sensors to be processed and direct the outputs to an external device. This may also prove to be a major military gadget where troops may communicate their thoughts in highly stressed situations without breaking the hush. But, as every technology have some merits and demerits, so does BCI.

Author 1: Sumit Ghulyani
Author 2: Yashasvi Pratap
Author 3: Sumit Bisht
Author 4: Ravideep Singh

Keywords: Brain Computer Interface (BCI); Blood Oxygen Level Dependent (BOLD); Electrocorticography (ECoG); Practical Electrical Stimulation (PES); Electroencephalograph (EEG); Magnetic Resonance Imaging (MRI),Functional Magnetic Resonance Imaging (fMRI) brain scythe, motor cortex.

PDF

Paper 6: Identification Filtering with fuzzy estimations

Abstract: A digital identification filter interacts with an output reference model signal known as a black-box output system. The identification technique commonly needs the transition and gain matrixes. Both estimation cases are based on mean square criterion obtaining of the minimum output error as the best estimation filtering. The evolution system represents adaptive properties that the identification mechanism includes considering the fuzzy logic strategies affecting in probability sense the evolution identification filter. The fuzzy estimation filter allows in two forms describing the transition and the gain matrixes applying actions that affect the identification structure. Basically, the adaptive criterion conforming the inference mechanisms set, the Knowledge and Rule bases, selecting the optimal coefficients in distribution form. This paper describes the fuzzy strategies applied to the Kalman filter transition function, and gain matrixes. The simulation results were developed using Matlab©.

Author 1: J.J Medel J
Author 2: J. C: Garcia I
Author 3: J. C. Sanchez G

Keywords: Intelligent Identification; Digital identification filter; Fuzzy estimation; Signal processing; Probability.

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org