Review of Computer Engineering Research

Published by: Conscientia Beam
Online ISSN: 2410-9142
Print ISSN: 2412-4281
Quick Submission    Login/Submit/Track

No. 1

Smart Feature Fusion and Model for Human Detection

Pages: 38-46
Find References

Finding References


Smart Feature Fusion and Model for Human Detection

Search :
Google Scholor
Search :
Microsoft Academic Search
Cite

DOI: 10.18488/journal.76.2020.71.38.46

Htet Htet Lin

Export to    BibTeX   |   EndNote   |   RIS

[1]  P. P. Reboucas Filho, E. D. S. Reboucas, L. B. Marinho, R. M. Sarmento, J. M. R. Tavares, and V. H. C. De Albuquerque, "Analysis of human tissue densities: A new approach to extract features from medical images," Pattern Recognition Letters, vol. 94, pp. 211-218, 2017.

[2]  N. Dalal and B. Triggs, "Histograms of oriented gradients for human detection," in 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05), 2005, pp. 886-893.

[3]  Q. Zhu, S. Avidan, M. Yeh, and K. Cheng, "Fast human detection using a cascade of histograms of oriented gradients," in In Proceeding IEEE International Conference on Computer Vision and Pattern Recognition, 2006, pp. 1491–1498.

[4]  Y. Mu, S. Yan, Y. Liu, T. Huang, and B. Zhou, "Discriminative local binary patterns for human detection in personal album," in In Proceeding IEEE International Conference on Computer Vision and Pattern Recognition, 2008, pp. 1–8.

[5]  P. Viola, M. Jones, and D. Snow, "Detecting pedestrians using patterns of motion and appearance," International Journal of Computer Vision vol. 63, pp. 153–161, 2005.

[6]  Q. Ye, J. Jiao, and B. Zhang, "Fast pedestrian detection with multi-scale orientation features and two-stage classifiers," in In Proceeding IEEE 17th International Conference on Image Processing, 2010, pp. 881–884.

[7]  X. Wang, T. X. Han, and S. Yan, "An HOG-LBP human detector with partial occlusion handling," in In Proceeding IEEE International Conference Computer Vision, 2009, pp. 32–39.

[8]  Y. Jiang and J. Ma, "Combination features and models for human detection," in In Proceeding IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015.

[9]  H. H. Lin and K. T. Win, "Person detection based on fusion histogram of gradients with texture (FHGT) local features”, in Researchscript," International Journal of Research in Computer Scientific (IJRCS), vol. 5, pp. 1 – 4, 2018.

[10]X. Ren and D. Ramanan, "Histograms of sparse codes for object detection," in In Proceeding IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2013.

No any video found for this article.
Htet Htet Lin (2020). Smart Feature Fusion and Model for Human Detection. Review of Computer Engineering Research, 7(1): 38-46. DOI: 10.18488/journal.76.2020.71.38.46
Extraction of discriminate and accurate features is challenging to precise the statistical data on monitoring people. It still remains an active research due to various variations as inter class and intra class, lighting challenge, static and dynamic occlusion. To tackle this variation and occlusion issue, this paper proposes to combine the differential gradient and statistical Tamura features with joint histogram. In addition, these extracted smart features use actually to detect people by using the gradient feature descriptor and a statistical feature detector. The model fusion of human detection creates by combining two models result (Grammar model and Poselet model) with the adaptive threshold weighted non-maximum suppression algorithm. The system presents a powerful fusion insight to capture the stronger occlusion parts and several variations of the foreground people. To compare the performance with the state of the arts, the public Pascal VOC 2007 Dataset is used. The outperformed result of this work proofs our concern.
Contribution/ Originality
Various feature and model was studied to detect the human. Focused on this, a fusion feature and model was contributed.

Interactive Algorithms for the Verification of the Equality between Complex and Simplified Boolean-Algebra Expressions in Digital Decoders

Pages: 27-37
Find References

Finding References


Interactive Algorithms for the Verification of the Equality between Complex and Simplified Boolean-Algebra Expressions in Digital Decoders

Search :
Google Scholor
Search :
Microsoft Academic Search
Cite

DOI: 10.18488/journal.76.2020.71.27.37

Tochukwu Arinze Ikwunne , Samuel Obiora Okide

Export to    BibTeX   |   EndNote   |   RIS

[1]          D. Tan, "On the structure of finite Boolean algebra," Journal of Mathematical Sciences & Mathematics Education, vol. 5, pp. 20-24, 2011.

[2]          O. E. Oguike, "Algorithms for verifying variants of boolean algebra equations and expressions," African Journal of Computing & ICT, vol. 6, pp. 1-8, 2013.

[3]          M. Dhar, "Fuzzy sets towards forming boolean algebra," International Journal of Energy, Information and Communications, vol. 2, pp. 1-22, 2011.

[4]          L. Rompis, "Boolean agebra for xor gates," Journal of Computer Science and Applications, vol. 1, pp. 14 - 16, 2013.

[5]          E. Clarke and E. Emerson, "Design and synthesis of synchronization skeletons using branching time temporal logic," in Proceedings of Workshop on Logics of Programs, Lecture Notes in Computer Science, Springer-Verlag, 1981, pp. 52–71.

[6]          J. Burch, E. M. Clarke, K. McMillan, D. Dill, and L. Hwang, "Symbolic model checking: 1020 states and beyond," in Proceedings of the 5th Annual IEEE Symposium on Logic in Computer Science, 1990, pp. 428–39.

[7]          G. Holzmann, Design and validation of computer protocols. Englewood Cliffs: Prentice Hall, Pearson Technology Group USA, 1990.

[8]          E. E. A. and C. Lei, "Efficient model checking in the fragments of the propositional μ-calculus," presented at the Symposion on Logic in Computer Science, IEEE Computer Society Press, 1986.

[9]          D. Long, A. Browne, E. Clarke, S. Jha, and W. Marrero, "An improved algorithm for the evaluation of fixpoint expressions," in Proceedings of International Conference on Computer Aided Verification (CAV’1994), Lecture Notes in Computer Science, Springer-Verlag, 1994, pp. 338–350.

[10]        H. Seidl, "Fast and simple nested fixpoints " Information Processing Letters, vol. 59, pp. 303–308, 1996. Available at: https://doi.org/10.1016/0020-0190(96)00130-5.

[11]        X. Liu, C. R. Ramakrishnan, and S. A. Smolka, "Fully local and efficient evaluation of alternating fixed points," in Proceedings of the 4th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Lecture Notes in Computer Science, Springer Verlag, 1998, pp. 5–19.

[12]        H. R. Andersen and B. Vergauwen, "Efficient checking of behavioural relations and modal assertions using fixed-point inversion," in Proceedings of Conference on Computer Aided Verification, Lecture Notes on Computer Science, Springer-Verlag, , 1995, pp. 142–154.

[13]        R. Cleaveland and B. Steffen, "Computing behavioural relations logically," in Proceedings of the 18th International Colloquium on Automata, Languages and Programming, Lecture Notes in Computer Science, Springer-Verlag, 1991, pp. 127–138.

[14]        K. Larsen, "Efficient local correctness checking," in Proceedings of Conference on Computer Aided Verification, Lecture Notes on Computer Science, Springer-Verlag, , 1992, pp. 30–43.

[15]        M. R. . "A generic on-the-fly solver for alternation-free boolean equation systems," in Proceedings of the 9th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS’2003), Lecture Notes in Computer Science, Springer Verlag, 2003, pp. 81–96.

[16]        A. Mader, "Verification of modal properties using boolean equation systems," PhD Thesis, Technical University of Munich, 1997.

[17]        J. F. Groote and T. Willemse, "A checker for modal formulas for processes with data," in Proceedings of Formal Methods for Components and Objects, Second International Symposium (FMCO’2003), Lecture Notes in Computer Science, Springer-Verlag, 2004, pp. 223–239.

[18]        J. F. Groote and T. Willemse, "Parameterised boolean equation systems," in Proceedings of the 15th International Conference on Concurrency Theory (CONCUR’2004), Lecture Notes in Computer Science, Springer-Verlag, 2004, pp. 308–324.

[19]        J. F. Groote and T. Willemse, "Parameterised boolean equation systems," Theoretical Computer Science, vol. 343, pp. 332–369, 2005.

[20]        M. Azram, "Arithmetic version of boolean algebra," in Proceeding of 2nd IEEE Internation Conference on Computer Science and Information Technology, 2009, pp. 79 – 80.

No any video found for this article.
Tochukwu Arinze Ikwunne , Samuel Obiora Okide (2020). Interactive Algorithms for the Verification of the Equality between Complex and Simplified Boolean-Algebra Expressions in Digital Decoders. Review of Computer Engineering Research, 7(1): 27-37. DOI: 10.18488/journal.76.2020.71.27.37
This work highlights the use of an algorithm in evaluating and verifying a complex Boolean expression that are used in fabricating digital decoder systems. Digital decoders are built by human beings and, unfortunately, humans make mistakes. Both design errors and faulty implementation may lead both the hardware and software components of systems to behave in unexpected ways, which in turn may lead to business losses and even risky situations. Karnough maps, Boolean algebra theorems and laws are some of the techniques that can be used to simplify and reduce complex Boolean algebra expressions and truth table can be used to confirm that the reduced Boolean algebra expression is the same as the original, complex Boolean algebra expression. However, generating the truth table manually is tedious, especially when the Boolean algebra equation or expression has many Boolean variables. Therefore, this work presents novel algorithms to verify and evaluate complex Boolean expression from the fabricated decoder circuit.
Contribution/ Originality
This study documents the importance of using an algorithmic approach in checking and evaluating the equality of a complex Boolean expression and its simplified form from the fabricated decoder circuit. This is to ensure that the hardware and software systems are designed with reduced or no errors.

Dynamic Modelling of 3-RUS Spatial Parallel Robot Manipulator

Pages: 20-26
Find References

Finding References


Dynamic Modelling of 3-RUS Spatial Parallel Robot Manipulator

Search :
Google Scholor
Search :
Microsoft Academic Search
Cite

DOI: 10.18488/journal.76.2020.71.20.26

Nguyen Hong Quang , Nguyen Van Quyen , Do Trung Hai , Nguyen Nhu Hien

Export to    BibTeX   |   EndNote   |   RIS

[1]          L.-W. Tsai, Robot analysis / the mechanics of serial and parallel manipulators. New York: John Wiley & Sons, 1999.

[2]          J. P. Merlet, Parallel robots, 2nd ed. Berlin: Springer, 2006.

[3]          A. Mueller and T. Hufnagel, "Model-based control of redundantly actuated parallel manipulators in redundant coordinates," Robotics and Autonomous Systems, vol. 60, pp. 563-571, 2012. Available at: https://doi.org/10.1016/j.robot.2011.11.014.

[4]          H. Abdellatif, M. Grotjahn, and B. Heimann, " High efficient dynamics calculation approach for computed-force control of robots with parallel structures," presented at the IEEE Conference on Decision and Control and European Control Conference, CDC-ECC, 12-15 December, 2005.

[5]          W. W. Shang, S. Cong, and S. I. Jiang, "Dynamic model based nonlinear tracking control of a planar parallel manipulator," Nonlinear Dynamics, vol. 60, pp. 597-606, 2010. Available at: https://doi.org/10.1007/s11071-009-9617-6.

[6]          V. K. Nguyen, Q. H. Nguyen, D. S. Nguyen, and D. D. Nguyen, "A comparison study of some control methods for spatial parallel robot," Journal of Computer and Cybernetics, vol. 31, pp. 71-81, 2015. Available at: https://doi.org/10.15625/1813-9663/31/1/5088.

[7]          V. K. Nguyen, Q. H. Nguyen, D. D. Nguyen, and V. Q. Nguyen, "Model-based control of a 3-PRS spatial parallel robot in the space of redundant coordinates," Journal of Science & Technology, vol. 112, pp. 049-053, 2016.

[8]          L. Sciavicco and B. Siciliano, Modelling and control of robot manipulators, 2nd ed. London: Springer-Verlag, 2000.

[9]          R. Kelly, V. Santibanez, and A. Loria, Control of robot manipulators in joint space. London: Springer-Verlag, 2005.

[10]        J. G. Jalon and E. Bayo, Kinematic and dynamic simulation of multibody systems – the real-time challenge. New York: Springer-Verlag, 1994.

[11]        V. K. Nguyen, "Consistent definition of partial derivatives of matrix functions in dynamics of mechanical systems," Mechanism and Machine Theory, vol. 45, pp. 981-988, 2010. Available at: https://doi.org/10.1016/j.mechmachtheory.2010.03.005.

[12]        V. K. Nguyen, "Kronecker product and a new matrix form of Lagrangian equations with multipliers for constrained multibody systems," Mechanics Research Communications, vol. 38, pp. 294-299, 2011. Available at: https://doi.org/10.1016/j.mechrescom.2011.04.004.

[13]        Q. H. Nguyen, V. K. Nguyen, and D. D. Nguyen, "Influence of models on computed torque of Delta spatial parallel robot," in Proceedings of the 16th Asian Pacific Vibration Conference (APVC), Hanoi, November 24-26, 2015, Bachkhoa Publisching,Hanoi, 2015, pp. 791-798.

[14]        W. Blajer, W. Schiehlen, and W. Schirm, "A projective criterion to the coordinate partitioning method for multibody dynamics," Archive of Applied Mechanics, vol. 64, pp. 86-98, 1994

No any video found for this article.
Nguyen Hong Quang , Nguyen Van Quyen , Do Trung Hai , Nguyen Nhu Hien (2020). Dynamic Modelling of 3-RUS Spatial Parallel Robot Manipulator. Review of Computer Engineering Research, 7(1): 20-26. DOI: 10.18488/journal.76.2020.71.20.26
Parallel manipulators are characterized as having closed-loop kinematic chains. Parallel robots have received increasing attention due to their inherent advantages over conventional serial mechanism, such as high rigidity, high load capacity, high velocity, and high precision. A definite advantage of parallel robots is the fact that, in most cases, actuators can be placed on the truss, thus achieving a limited weight for the moving parts, which makes it possible for parallel robots to move at a high speed. These advantages avoid the drawbacks on serial ones and make the mobile platforms of the parallel manipulators carry out higher performances. Therefore, parallel manipulators have been applied to the industrial manufacturing, flight simulation, medical resuscitation, and so on. The basis for model-based control of parallel manipulators is an efficient formulation of the motion equations. In this paper a formulation of the motion equations in redundant coordinates is presented for parallel manipulators. The fully coupled non-linear equations of motion of 3-RUS spatial parallel manipulator having 3 DOF with Revolute-Universal-Spherical joints are obtained by using the Lagrange equations with multipliers for constrained multibody systems.
Contribution/ Originality
This paper presented the modelling of motion for 3-RUS spatial parallel manipulator by using the redundant generalized coordinates and the Lagrangian multipliers. A novel formulation of Coriolis/centrifugal matrix is constructed directly in matrix based manner by using Kronecker product. The skew symmetry property of dynamic model of robot manipulators is guaranteed by the proposed Coriolis/centrifugal matrix. Then, the equations of motion in DAEs form were transformed to ordinary differential equations.

Cloud Security Vulnerabilities and Solution Model

Pages: 12-19
Find References

Finding References


Cloud Security Vulnerabilities and Solution Model

Search :
Google Scholor
Search :
Microsoft Academic Search
Cite

DOI: 10.18488/journal.76.2020.71.12.19

Shouket Ahmad Kouchay

Export to    BibTeX   |   EndNote   |   RIS

[1]          Cloud Vulnerabilities Working Group, "Cloud vulnerabilities research program." Retrieved: https://www.vulnerability-lab.com/ . [Accessed Dec 2019], 2016.

[2]          G. Calvary, Computer science and ambient intelligence, 1st ed. London: Iste, 2013.

[3]          Z. Fu, X. Sun, N. Linge, and L. Zhou, "Achieving effective cloud search services: Multi-keyword ranked search over encrypted cloud data supporting synonym query," IEEE Transactions on Consumer Electronics, vol. 60, pp. 164-172, 2014.Available at: https://doi.org/10.1109/tce.2014.6780939.

[4]          S. O. Kuyoro, F. Ibikunle, and O. Awodele, "Cloud computing security issues and challenges," International Journal of Computer Networks, vol. 3, pp. 247-255, 2011.

[5]          L. Allen, T. Heriyanto, and S. Ali, Kali linux - assuring security by penetration testing, 1st ed. Birmingham, UK: Packt Publication, 2014.

[6]          A. K. Shouket, "Secured architecture strategy for fighting against bots," Computer Science & Telecommunications, vol. 40, pp. 16-23, 2013.

[7]          B. M. Salih and H. A. Edreis, "Comparison between virtualization and cloud computing," International Journal of Science and Research, vol. 5, pp. 195-199, 2016.Available at: https://doi.org/10.21275/v5i6.nov164128.

[8]          S. Singh, Y. S. Jeong, and J. H. Park, "A survey on cloud computing security: Issues, threats, and solutions," Journal of Network and Computer Applications, vol. 75, pp. 200-222, 2016.

[9]          K. Kumar and P. Kaur, "Road traffic control system in cloud computing: A review," International Journal of Grid and Distributed Computing, vol. 8, pp. 201-206, 2015.Available at: https://doi.org/10.14257/ijgdc.2015.8.3.20.

[10]        T. Erl, R. Puttini, and Z. Mahmood, Cloud computing: Concepts, technology & architecture: Pearson Education, 2013.

[11]        M. Loudini, S. Rezig, and Y. Salhi, "Incorporate intelligence into the differentiated services strategies of a Web server: An advanced feedback control approach," Journal of Internet Services and Applications, vol. 1, pp. 1-16, 2013.

[12]        S. Rajasekhar, E. Murali, and G. Nagalakshm, "Efficient architecture cloud computing confidentiality," International Journal of Research Studies in Computer Science and Engineering, vol. 3, pp. 12-16, 2016.

[13]        C. Esposito, A. Castiglione, B. Martini, and K. Choo, "Cloud manufacturing: Security, privacy, and forensic concerns," IEEE Cloud Computing, vol. 3, pp. 16-22, 2016.Available at: https://doi.org/10.1109/mcc.2016.79.

[14]        N. Huansheng, Unit and ubiquitous internet of things: CRC Press, 2016.

[15]        S. Pearson and G. Yee, Privacy and security for cloud computing, 1st ed. London: Springer, 2013.

[16]        L. Zhang, "Software architecture evaluation," Journal of Software, vol. 19, pp. 1328-1339, 2008.Available at: https://doi.org/10.3724/sp.j.1001.2008.01328.

[17]        R. Samani, B. Honan, J. Reavis, and V. Jirasek, CSA guide to cloud computing, 1st ed. Waltham, MA: Syngress, 2015.

[18]        H. Takabi, J. Joshi, and G. Ahn, "Security and privacy challenges in cloud computing environments," IEEE Security & Privacy Magazine, vol. 8, pp. 24-31, 2010.Available at: https://doi.org/10.1109/msp.2010.186.

[19]        S. Sherin, S., "Security and privacy issues of cloud computing; Solutions and secure framework," IOSR Journal of Computer Engineering, vol. 10, pp. 33-37, 2013.Available at: https://doi.org/10.9790/0661-01043337.

[20]        A. Gouri, K. Karthik, G. Arpita, and G. Priya, "Review on security management in cloud computing," International Journal of Engineering and Computer Science, vol. 5, pp. 18897-18906, 2016.

[21]        Z. Tari, "Security and privacy in cloud computing," IEEE Cloud Computing, vol. 1, pp. 54-57, 2014.

[22]        M. ZekriyapanahGashti, "Scrutiny new framework in integrated distributed reliable systems," International Journal of Distributed and Parallel Systems, vol. 3, pp. 13-20, 2012.Available at: https://doi.org/10.5121/ijdps.2012.3502.

[23]        R. Minni, K. Sultania, S. Mishra, and D. R. Vincent, "An algorithm to enhance security in RSA," presented at the 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT). IEEE, 2013.

No any video found for this article.
Shouket Ahmad Kouchay (2020). Cloud Security Vulnerabilities and Solution Model. Review of Computer Engineering Research, 7(1): 12-19. DOI: 10.18488/journal.76.2020.71.12.19
Cloud computing is the revolution and solution to the computing world which has paid further attention as an emerging network storage technology. Cloud computing has enormous adaptability in terms of demand or availability of resources. The organization prefers cloud storage services to reduce the overhead of storing data locally. Yet, Data security and privacy are the major issues in cloud computing. Although security is still one of the critical challenges in the world of cloud computing. The security concerns comprise the loss of vital information and privacy loss of any individual who uses cloud networking. This research reviews the cloud Security, its vulnerabilities and proposes a three-layer model of AES encryption for Cloud Computing Security and RSA is used to hide the key of the AES. According to our research, this model is one of the most compact encryption which consumes less storage space with short calculation time. A detailed review of cloud security concerns and resolutions has been discussed in this paper.
Contribution/ Originality
This research reviews the cloud Security, its vulnerabilities and proposes a three-layer model of AES encryption for Cloud Computing Security and RSA is used to hide the key of the AES.

Exploration of Intellectual Software Systems and Development of Conceptual Model

Pages: 1-11
Find References

Finding References


Exploration of Intellectual Software Systems and Development of Conceptual Model

Search :
Google Scholor
Search :
Microsoft Academic Search
Cite

DOI: 10.18488/journal.76.2020.71.1.11

Shafagat Mahmudova

Export to    BibTeX   |   EndNote   |   RIS

[1]          W. Lawless, R. Mittu, and S. Russell, Artificial intelligence for the internet of everything. Amsterdam: Elsevier Inc, 2019.

[2]          A. N. Averkin, M. G. Haase-Rapoport, and D. A. Pospelov, Explanatory dictionary of artificial intelligence. Moscow: Radio and Communications, 1992.

[3]          G. A. Lisiev, Decision support technologies. Moscow: FLINT, 2011.

[4]          P. Zaraté and S. Liu, "A new trend for knowledge-based decision support systems design," International Journal of Information and Decision Sciences, vol. 8, pp. 305-324, 2016.Available at: https://doi.org/10.1504/ijids.2016.078586.

[5]          O. Dolinina, V. Kushnikov, V. Pechenkin, and A. Rezchikov, "The way of quality management of the decision making software systems development," Software Engineering and Algorithms in Intelligent Systems, vol. 763, pp. 99-98, 2019.Available at: https://doi.org/10.1007/978-3-319-91186-1_11.

[6]          L. T. Soliman, "Ideological terminology: Between software and intellectual property," Studies University Babes-Bolyai-Philolog, vol. 62, pp. 235-244, 2017.

[7]          E. Sargolzaei and F. Fateme, "Examining software intellectual property rights," International Journal of Advanced Computer Science and Applications, vol. 8, pp. 594-600, 2017.

[8]          Y. C. Chang, C. W. Shih, and W. L. Hsu, "Entailment-based intelligent system for software project monitoring and control," IEEE Systems Journal, vol. 12, pp. 216-227, 2018.Available at: https://doi.org/10.1109/JSYST.2016.2563463.

[9]          R. T. Prasad and J. J. Mukkada, "Intelligent autonomous systems for software engineering - an example," presented at the 2018 International Conference on Intelligent Autonomous Systems (ICOIAS), IEEE, 2018.

[10]        J. D. Dumas, Computer architecture: Fundamentals and principles of computer design. Florida: CRC Press, 2005.

[11]        A. Vasudevan, The Linux Kernel HOWTO, system.map. Washington: Amazon, 2003.

[12]        R. G. Baldwin, "Programming fundamentals: Types of errors," pp. 120. Retrieved from: http://www.dickbaldwin.com/Cosc1315/Pf00120.htm, 2007.

[13]        A. Y. Gerasimov, L. V. Kruglov, M. Ermakov, and S. P. Vartanov, "An approach to reachability determination for static analysis defects with the help of dynamic symbolic execution," Programming and Computer Software, vol. 44, pp. 467-475, 2018.Available at: https://doi.org/10.1134/s0361768818060051.

[14]        P. M. Norling, J. P. Herring, W. A. Rosenkrans Jr, M. Stellpflug, and S. B. Kaufman, "Putting competitive technology intelligence to work," Research-Technology Management, vol. 43, pp. 23-28, 2000.Available at: https://doi.org/10.1080/08956308.2000.11671377.

[15]        S. I. Makarenko, Intelligent information systems: A training manual. Stavropol: Siberian State University, 2009.

No any video found for this article.
Shafagat Mahmudova (2020). Exploration of Intellectual Software Systems and Development of Conceptual Model. Review of Computer Engineering Research, 7(1): 1-11. DOI: 10.18488/journal.76.2020.71.1.11
This article explores the field of artificial intelligence and intellectual systems. The structure, types and classification of the intellectual system are studied. The intellectual system is a technical or software system that is capable of solving the problems which are specific and creative in a particular subject area, so that knowledge is stored in the memory of such systems. Intelligent System is a technical or software system that competently solves the problems that are relevant to a particular subject area and that knowledge is stored in such systems. Intelligent systems are studied by a team of researchers called "artificial intelligence". The article provides the differences between the ordinary system and the intellectual system. The system is intellectual when it not only changes the parameters of information access, but also changes its behavior itself depending on the system capability. Intelligent system in decision-making technologies is an intellectual information-computing system that solves the problems without human involvement. The classification of intellectual systems is analyzed in the article. A conceptual model for intelligent systems has been developed. The intellectual systems themselves may also have some gaps. In future, the development of new intelligence systems and improvement of existing ones will benefit the economy even more.
Contribution/ Originality
The intelligent system structure, types of program errors, classification of programming errors, research areas of intellectual systems was studied. Based on the study, a conceptual model for intellectual systems has been developed.