Abstract Artificial intelligence as a concept is used in many uncountable fields. From the essential fields that AI is used in is the biomedicine field. AI can recognize the stresses in the muscles of the body, predict the overload, predict the blood pressure, predict the body temperature, and many other beneficial uses. In the coming sections many related concepted are defined as the uses and examples about these applications, how these technologies are used and some other beneficial information about this field.
I. Introduction
Artificial intelligence has been used in many beneficial fields. One of those fields is the
biomedical field. The first AI application in the medical field was in the 1970s, when the field of
AI was 15 years old. Early AI in medicine (AIM) researchers had discovered the applicability of AI
methods to life sciences. The general AI research community was fascinated by the applications being
developed in the medical world, noting that significant new AI methods were emerging as AIM
researchers struggled with challenging biomedical problems. In fact, by 1978, the leading
journal in the field (Artificial Intelligence, Elsevier, Amsterdam) had devoted a special issue
II. AI in biomedical information process
Information processing in biomedicine had many breakthroughs by using traditional information
processing ways. As a result, there should be a step forward to make these processes as fast as it
can. Inthe area of biomedical question answering (BioQA), the aim is to find fast and accurate
answers to user formulated questions from a reservoir of documents and datasets. To begin with, the
biomedical questions must be classified into different categories in order to extract appropriate
information from the answer. ML can categorize biomedical questions into four basic types
with an accuracy of nearly 90%
III. AI in biomedical research
In addition to being able to act as an ‘‘eDoctor” for disease diagnosis, management, and
prognosis, AI has uncharted usage as a powerful tool in biomedical research
IV. Disease diagnostic and prediction
The most urgent need for AI in biomedicine is in the diagnostics of diseases. AI allows health
professionals to give earlier and more accurate diagnostics for many kinds of diseases
V. Health care
AI nowadays had many approaches like predicting the health status of the body rabidly. Using AI, we could predict and measure blood pressure, heartbeats, body temperature, and more health care status that are significant. Blood pressure (BP): many people are daily tracking their blood pressure. Mostly measured to get insights into their health condition or to communicate with their doctor for follow up. Nowadays they measure their BP with a sphygmomanometer, a tool with inflatable cuffs, but it is not a good choice, as it is not a user-friendly measuring tool, also faults may be caused by wrong placement, and it is only a single moment measurement. “experts stress the importance of accurate blood pressure screenings “. Varheart wanted to create an AI-solution that could work with dataset of one sensor. This to fit into the already known applications like smartwatches. It also makes it a lot easier to implement in future applications.
VI. Conclusion
AI was first used in 1950s; it entered the biomedical field in 1970s. AI in biomedical fields had many approaches and beneficial applications. AI can be used in biomedical information process. In the BioQA, the aim is to find an answer in a reservoir of documents. AI helped making the process of searching for these questions easier than earlier. AI is also used in biomedical research in analyzing and identifying patterns in large, complicated datasets. This data can be analyzed in a meaningfully precise, faster, and more cost-effective way than traditional analytical methods, reducing spend and improving outcomes. From the most relevant uses of AI in biomedical fields is the diagnosis and prediction of disease. AI allows health professionals to give earlier and more accurate diagnostics for many kinds of diseases. Also, it can measure health status of the body as heart rates, body temperature and body pressure.
VII. References
Abstract
No one can deny the internet’s great effect on the progress that we see around us. Despite all the
benefits of the internet, it has its dark side, when misused the internet represents a threat,
especially for children. Lacking child internet safety is a hazardous problem that people usually
ignore or simply underestimate. According to the Center for Cyber Safety and Education, 53% of kids in
grades 4-8 revealed their number to a stranger, and about 11% have met a stranger
I. Introduction
In recent years children’s usage of the internet has skyrocketed now that 80-98% of American children aged 3-18 have internet access in their homes. This presents parents with a problem that has been getting more dangerous over the years, child internet safety. Child internet safety has been listed as the 4th “biggest problem” according to a survey done by the C.S Mott children hospital in Michigan, going up from the 8th most prominent problem in the year prior, and this makes sense, as more and more children get their hands-on electronic devices that can access the internet.
This shows the need to both start educating parents on the dangers of unsupervised internet usage and to start creating and implementing online child protection solutions. The main challenge that would face any developer trying to achieve such a goal is to maintain the privacy of the children while allowing the parents to easily supervise the children’s usage. As a result, a low information-to-results ratio had to be achieved to make sure not too much of the child’s information is accessed and still gets the required results. After that, the second challenge is maintaining the overall privacy of the information, something which would require the software to be either disrupted according to a Software as a service model or to be locally hosted, a combination of both approaches was selected for this prototype. The third problem would be the number of places that a child’s safety can be compromised, this problem comes as a result of the many places a child can interact with strangers, from anonymous chatrooms to online game lobbies, this limits the places this A.I can help. The last problem is the many platforms that children use, this problem is not as big as the others, but it still increases the work required to integrate the A.I with different platforms like Android, IOS, and Windows.
II. Implementation methods
In the creation of the software, already existing ideas and code modules were used in combination with new ideas to maximize efficiency. The project is separated into three main parts, general internet content moderation, video caption analysis, and predatory behavior chat scanning.
III. Main programming languages and programs used.
In the project, Python was used as the primary programming language due to its versatility when it comes to A.I and algorithms, quick integration with other programming languages, and the wide range of already existing modules and programs. This allows for more development time to be dedicated to adding features and optimizing them instead of making custom versions of these programs (i.e. the image detection algorithm). In professionally developed software, it is of course preferred to use custom-made software though to allow for deeper integration and optimization.
IV. General Internet Content Moderation
This is the first and simplest part of this project, the moderation algorithm is very simple but quite effective. On the first run, the program presents a list of other child safety measures that they can deploy to enhance their child’s safety, for example, it recommends users to use a DNS that offers a family plan or a child safety blocklist (i.e. OpenDNS Family Shield, Cloudflare 1.1.1.1 For Families, etc.) which simplifies the work needed for the project because they already block a majority of adult content, the program also recommends users to make sure they are using Google SafeSearch to prevent explicit images from popping out in Google’s image search. Using a simple extension that grabs the URLs of the webpages that the child visits and sends it to the python extension so it can look to see if this website is part of a trusted website list that includes sites like Wikipedia, government websites, etc. which we are sure don’t include adult content, if the website isn’t a part of that list the program it’ll search through the website’s content to see if it has any of the blacklisted words that exist in a list defined by the child’s parent and this list includes terms like references of pornography, swear words, etc., if it doesn’t find any matches it deletes the entry and waits for another link, if it finds any of these words the program it fetches the URLs of all images in the website using the Beautiful Soup module for python and sends them to the explicit image detection algorithm to scan these photos to check if the website has any explicit photos, after it checks the photos on the website it saves all the results of this scan (all blacklist matches, explicit photo scan results) to a file sent with the alert that is sent to the parent when the website the scan is done. The program also saves these URLs to an online open-source database that can be community checked to improve the program.
V. Video Caption Analysis
When the HTML parser finds that the domain name is YouTube it instead calls for the video caption analysis, the video caption analysis program first gets the unique video ID given to all videos uploaded to YouTube, it then uses the YouTube API to fetch the captions for the video which it then sends to Google’s Natural Language Processing API and it calls its content classification to classify the themes in the captions to figure out whether the video contains any age-inappropriate subjects (i.e. gambling), after it receives the themes from the API it saves them in a text file with the video title and ID. This is not an arguably bad way to analyze YouTube videos, but it has a flaw that is being slowly fixed. auto-generated captions, while a very useful feature to have, it makes mistakes all the time which can affect the results for videos that do not contain human-written captions and while a lot more channels are starting to add captions to their videos, we still include the name of the video so the parents can check the watch history to review the video again.
VI. Predatory Behavior Chat Scanning
Now that this is the hardest part of the program due to how there are no existing resources on this except ChildSafe.ai which is still not even in beta, but this also means that there is a whole new field of child safety that is barely explored. While currently there is no open-source solution available, one can be made with enough resources as is going to be discussed here. First, we propose training an NLP API to detect specific behaviors that connect with online exploitation (i.e. persuasion, manipulation,deception, etc.) and that gets easier due to the abundance of chat logs that the Pervert-Justice foundation has compiled over 15 years of decoy operations that allowed them to achieve over 623 convictions, only one of which was from research, that means that we have over 600 full chat logs of actual convicted online predators which when paired with the multiple research papers available on the techniques that online predators utilize to lure young children one can train a very reliable model by feeding these chat logs and tagging them with appropriate tags, secondly the proposed A.I have to have a predator identification and police reporting algorithm which tries to look up the predator using the given username, altering the parents and reporting the case to local authorities immediately and giving them easy access to the results of the lookup if there are any, finally, there has to be a database that records these chatlogs anonymously with the parent’s permission to be available to further help development in this area of child safety, the database should be available to researchers, physiologists to help research newer behaviors and techniques that these predators are using, it should also be possible to A.I researchers so they can feed these into their models to improve them.
VII. Conclusion
As internet use is extending to younger children, there is an increasing need for research focusing on the risks young users are experiencing, as well as the opportunities, and how they should cope. The Internet represents a significant threat to children because many children lack the simplest protection ways. Approximately 34% of students report experiencing cyberbullying during their lifetime. Over 60% of students who experience cyberbullying reported that it immensely impacted their ability to learn and feel safe while at school. We chose our approach to solve the problem, which is using AI to limit the threats caused by the internet, especially Chatrooms, websites, and videos. We use algorithms to recognize any spam and any unfriendly or immoral content. Any source that was found to fulfill these conditions will be prohibited immediately, and parents shall be alarmed. By working on decreasing these threats, we are helping in solving this terrible problem. We are providing a safer climate for children to use the internet without any fear. There are 71% of teens have hidden their online behavior from their parents so we provide parents with a program that will make them feel comfortable and rest assured that their children are in safe hands. We are working for a better future.
VI. References
Abstract Academic procrastination is a big problem having noticeable effects on both student’s mental health and academic development. Mathematics is really hard and is confusing to a big portion of high school students, along with other factors that are responsible for academic procrastination while learning the subject. These factors are either personal or are caused by the person like mood, unlike external factors which are mainly caused by the surrounding learning environment. studying these causes can help us find a solution to prevent the consequences.
I. Introduction
Mathematics is a relatively difficult subject to learn or study for a lot of students especially in high school years. Problem-solving, reasoning and proof, communication, connections, and representation are five standards used in the process of studying as described by the National Council of Teachers of Mathematics [1], it is not that easy to understand some concepts of Mathematics more than 95% of junior high school students in Indonesia are having trouble reaching mid-levels of Math according to the results of the 2011 Trends in International Mathematics and Science Study (TIMSS) research in the fields of mathematics and science for the second graders of junior high schools. This low level can result from various factors, including the behavior of delaying tasks which are also known as “academic procrastination”, procrastination is the act of delaying or postponing any type of work (i.e., school tasks) in favor of doing an activity (i.e., going out with friends). These students procrastinating do not understand the importance of given tasks as some may find it not useful or not worth the hassle, some others see that these tasks are difficult or that they need a huge amount of time and power to finish.
II. Personality and Emotion
Academic procrastination has some impacts as well as causes. Perfectionism and a negative
self-image are personally related factors while lack of knowledge and study skills and regulation of
low self-esteem are competence-related, and there are many other factors like anxiety, boredom, lack
of motivation, physical and mental health, and poor management skills. Factors like the quality of
teachers, culture, and conditions of the school, and peer influences are external factors.
A study was done to conclude a reason for the act of procrastination focusing on Mathematics as
a subject for junior high school students
III. Learning Environment and external factors
Not only that academic procrastination is caused and affected by personal factors, but it can also be affected by external factors like lack of social support or social networks, and the quality of teachers and the learning environment and culture. For example, inconducive studying or learning from home can cause academic procrastination as parents aren’t usually strict or discipline of learning at home and not paying enough attention to whether the child is doing his school tasks or not, they only see the child’s learning improvement and level from exam grades. This is not always the case as some families pay great attention to their child’s education. Parents can be a great factor while students are at home, the same goes for teachers at school. A good teacher controlling the class and paying attention to tasks can prevent some procrastinating, this discipline act is supported by the teacher encouraging students to complete their work and giving advice about time-management. On the other hand, teachers that do not discipline along with no motivation or competence can be troublesome causing students to go lazy finishing tasks. From the six schools included in the survey, two schools were not disciplined enough, these two had the highest levels of procrastination as they were not able to create a culture of achievement. Forty-seven (57.3%) of the eighty-two that did procrastinate were from these two schools. This level of academic procrastination results in noticeably lower grades, students procrastinating had an average of 7.40 in mathematics while students who never postpone their work averaged at 8.10.
IV. Conclusion
Academic procrastination is caused by many factors like the students’ unawareness considering the importance of given tasks, complaining about the difficulty of the work, or the time offered to finish. Perfectionism, lack of self-regulation, self-esteem, ineffective learning environment, and indiscipline teachers are also main causes. Knowing these factors can help find a solution for each of them and take action, inventing new learning strategies is a great solution and can cover many factors as it isn’t always the same. For example, since mathematics is really hard and confusing, it can be implemented into activities to make its learning process more fun exterminating boredom. Other effective strategies can be used to prevent procrastination like coordinating with students’schools. Also, parents’ contribution is as important, students spend most of the time finishing tasks at home. If these solutions were to be implemented, it will mostly result in lower academic procrastination.
References
Abstract Programmable computers have been around for more than 7 decades. They have almost reached their maximum potential because computer parts are becoming too small. More than two decades ago, researchers theorized the first quantum computer: a computer that uses different mechanics than digital computers and is way faster than them. This unimaginable power might lead to breaking current cryptography algorithms, which led researchers and field experts to work on new post-quantum cryptography algorithms to counter quantum computers' ability.
I. Introduction
The first freely programmable computer was created by German Konrad Zuse between 1936 and 1938
II. How Modern Processors Work
1. CPU
A central processing unit (CPU) gives instructionsthat make up programs. It performs logic, arithmetic operations, input, and output. CPUs are generally composed of a memory unit consisting of ROM, RAM, Cache—, a Control Unit (CU), and an Arithmetic Logic Unit (ALU). These contain logic gates: electronic circuits that change one or more input to an output.
2. Logic Gates
There are 7 logic gates, and each has a different function: AND, OR, NOT, NAND, NOR, XOR, and XNOR.
These logic gates are made by combining diodes, resistors, and transistors: semiconductor devices are considered one of the basic building blocks of modern electronics.
3. Transistors
CPUs can contain up to billions of transistors. A transistor can work either as an amplifier or as a switch:
III. Quantum Computing
In 1985, David Deutsch attempted to define a device that can efficiently simulate an arbitrary
physical system. Because physics laws are ultimately quantum mechanical, he considered computing
devices based upon quantum mechanics, which lead to our modern conception of a quantum computer
IV. Cryptography
V. How quantum computers might affect cryptography
Many IT security aspects rely on encryption and public-key cryptography, which are essential
forbusiness, e-commerce, protecting secret and confidential information. These are based on
algorithms that are difficult to trick with modern computers and cannot be attacked by brute force
like elliptic curve cryptosystems (ECCs)
VI. Conclusion
Quantum computers are the next technological step for humanity. Digital computers are reaching their maximum potential because of their very small size and Moore's law became almost obsolete. Although digital computers are enough for our daily life, quantum computers will be used for accurate and fast simulations important in many fields, drug development, space exploration, artificial intelligence, solving difficult problems, and many more. However, quantum computers can also be used in breaking algorithms and ruining IT security, but scientists and field experts are working on creating quantum-resistant algorithms.
IX. References
Abstract Fossil fuels are non-renewable sources and cause pollution. Hence, it is mandatory to utilize another source of energy that is renewable and does not cause pollution. The energy from the sun is non-exhaustible and a better choice to make our future bright. If they can operate a massive spacecraft for so many years, they can replace fossil fuels soon. So, in this study, each aspect of solar panels has been discussed to get fundamental knowledge of solar panels.
I. Introduction
Have you ever wondered why some solar panels are black while others are blue? The hue of the solar panels totally depends on the type of silicon crystal they are made of. Solar cells convert solar energy into electrical energy. Solar cells contain multiplelayers to perform this function. Usually, silicon is used in the manufacturing of solar cells, but their efficiency is very low. To boost the efficiency of solar panels, other semiconductors like gallium and germanium have been introduced to manufacture solar cells. Solar panels have seen a great improvement in their technology from the time they were invented.
II. How are solar cells made?
When the photons strike the depletion layer, the electrons in the valence band of silicon jumps to its conduction band and the electron-hole pair generates. This is known as the Photoelectric Effect which is given by the formula: E = hv where, E =energy of photon, h =Planck’s constant (The Planck's constant, is the quantum of electromagnetic action that relates a photon's energy to its frequency. v =frequency of light The electric field (formed due to opposite charges on the two sides) drives the electrons towards the positive side while the holes towards the negative side and a strong potential difference are created.
Now, it is to be noted that the N-type silicon layer (being placed above the P-type silicon layer) is always a thinner P-type silicon layer so that the sunlight reaches the depletion layer. All the solar cells are connected by silver (due to its highest conductivity) to make a solar panel. Then, solar panels are joined to make solar arrays.
III. Types of solar panels
There are three types of solar panels-
Monocrystalline- These types of panels are called “monocrystalline” because they are made up of
single-crystal silicon. Silicon is formed into bars and cut into wafers to make the solar cells.
Since they are made from single-crystal silicon, the electrons that generate a flow of electricity
have room to move. Therefore, monocrystalline panels have the highest efficiency.
Polycrystalline- Such panels are made by the melting of many fragments of silicon to form the
panels. Polycrystalline panels are also known as “multicrystalline” because each solar cell is
composed of many crystals of silicon. So, electrons do not get much freedom to move. As a result,
these are less efficient than monocrystalline solar panels
IV. Why Solar Panels have so low efficiency?
It is shown in the figure that 19% of the pink color of the spectrum does not get absorbed by
the solar cells. This is because the photons in this part of the spectrum have too low energy to
emit the electrons (energy must be equal to or higher than the bandgap energy). 33% of the blue
color (photons) is lost inthermalization (conversion of the absorbed energy into heat). This happens
when photons having energy much higher than the bandgap of a semiconductor strikes the solar cells.
All the energy, above the bandgap, is converted into heat. The orange color spectrum (15%)
is lost due to material imperfections. All these losses contribute to lower the efficiency of the
solar cells. Shockley- Queisser
V. Tandem Solar Cells
Let us take an example of a tandem solar cell that is the perovskite-crystalline silicon tandem. Perovskite is a material that has the same crystal structure as the mineral calcium titanium oxide. Generally, perovskite compounds have a chemical formula ABX3, where ‘A’ and ‘B’ represent cations and X is an anion that bonds to both. They are used to create semiconductors to manufacture solar cells. They are used as an alternative to silicon as they have a large bandgap.
VI. Multi-junction solar cells
The solar cells with one P-N junction are called single-junction solar cells while multi-junction solar cells have multiple P-N junctions of different semiconductors. Multi-junction solar cells are a type of tandem cells (with multiple cells stacked one upon another). Every cell in a multi-junction solar cell has a traditional design that includes one P-N junction. Each cell is made up of a different semiconductor (having different band gaps), with each material tuned to absorb different parts of the solar spectrum.
A solar cell with 5-6 layers may have an efficiency of up to 70%. Multi-junction solar cells
VII. Solar Panels in space
Due to the absence of atmosphere in space, sunlight is an abandoned form of energy. Solar panels have proved to be a reliable source of electricity for Spacecrafts. Until the early 1990s, crystalline silicon was used to make solar arrays for Spacecrafts. But after that period, crystalline silicon saw a replacement with Gallium Arsenide because silicon was not able to withstand excessive heat and cold and solar radiation in space.
Panels expand and contract due to this variation. As a result, cracks appear in the silicon crystal over the years. Gallium Arsenide is preferred over crystalline silicon solar cells due to its higher efficiency. Gallium Arsenide is one of the main components of a multi-junction solar cell, which is used in spacecraft. Multi-junction solar panels have higher efficiency which means smaller panels will be used for the same amount of power. This will be helpful in reducing the size and weight of the spacecraft. Moreover, gallium arsenide based solar cells degrade slowly in the space radiation environment as compared to silicon solar cells. There are four sources of space radiations:
These radiations play a vital role in degrading the efficiency of solar panels. But the degradation rate depends on the shielding technology of solar cells. Borosilicate glass panel covering see an efficiency loss of 5-10℅ per year while this loss is only 1℅ in the case of fused silica and lead glass covering.
VIII. Conclusion
Gallium arsenide based solar cells have the following advantages over silicon solar cells:Although gallium arsenide-based solar panels are highly efficient, silicon solar panels are still used for household and commercial purposes due to the high cost of gallium arsenide solar cells.
IX. References