Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (108)
- Association of Arab Universities (24)
- University of South Florida (15)
- Maurer School of Law: Indiana University (5)
- Tashkent State Technical University (5)
-
- Technological University Dublin (4)
- University of Arkansas, Fayetteville (4)
- DePaul University (3)
- Embry-Riddle Aeronautical University (3)
- Karbala International Journal of Modern Science (3)
- Kennesaw State University (3)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (3)
- Beirut Arab University (2)
- Chinese Academy of Sciences (2)
- Georgia Southern University (2)
- Penn State Dickinson Law (2)
- Purdue University (2)
- Southern Methodist University (2)
- University of Alkafeel (2)
- Boise State University (1)
- Brigham Young University (1)
- Faculty of Engineering, Mansoura University (1)
- Institute of Business Administration (1)
- Journal of Police and Legal Sciences (1)
- Kansas State University Libraries (1)
- Missouri University of Science and Technology (1)
- Old Dominion University (1)
- Rochester Institute of Technology (1)
- United Arab Emirates University (1)
- University of Maryland Francis King Carey School of Law (1)
- Keyword
-
- ToC (10)
- Cybersecurity (9)
- Technology (8)
- Social media (7)
- Internet (6)
-
- Privacy (5)
- Table (5)
- Blockchain (4)
- China (4)
- Classification (4)
- Cloud Computing (4)
- Contents (4)
- Editor (4)
- Education (4)
- Information security (4)
- Machine learning (4)
- Tanzania (4)
- AI (3)
- Communication (3)
- Deep learning (3)
- Healthcare (3)
- Information (3)
- International (3)
- Metaverse (3)
- Network Architecture (3)
- Security (3)
- ARIMA (2)
- Adoption (2)
- Algorithm (2)
- Algorithms (2)
- Publication Year
- Publication
-
- Journal of International Technology and Information Management (108)
- Future Computing and Informatics Journal (22)
- Military Cyber Affairs (13)
- Chemical Technology, Control and Management (5)
- Federal Communications Law Journal (5)
-
- The ITB Journal (4)
- Karbala International Journal of Modern Science (3)
- Al-Bahir Journal for Engineering and Pure Sciences (2)
- BAU Journal - Science and Technology (2)
- Bulletin of Chinese Academy of Sciences (Chinese Version) (2)
- Bulletin of TUIT: Management and Communication Technologies (2)
- DePaul Magazine (2)
- Dickinson Law Review (2017-Present) (2)
- Inquiry: The University of Arkansas Undergraduate Research Journal (2)
- Journal of Digital Forensics, Security and Law (2)
- Journal of the Arkansas Academy of Science (2)
- Purdue Journal of Service-Learning and International Engagement (2)
- SMU Data Science Review (2)
- The African Journal of Information Systems (2)
- Theory and Applications of Graphs (2)
- An-Najah University Journal for Research - B (Humanities) (1)
- Business Review (1)
- Frameless (1)
- Free and Open Source Software for Geospatial (FOSS4G) Conference Proceedings (1)
- In The Loop (1)
- International Journal of Aviation, Aeronautics, and Aerospace (1)
- Journal of Business & Technology Law (1)
- Journal of Cybersecurity Education, Research and Practice (1)
- Journal of Engineering Research (1)
- Journal of Global Business Insights (1)
Articles 1 - 30 of 208
Full-Text Articles in Computer Engineering
Sustaining Digital Assets Through Mobile Estate Planning, Norliza Katuk, Asvinitha Muniandy, Norazlina Abd. Wahab, Ijaz Ahmad
Sustaining Digital Assets Through Mobile Estate Planning, Norliza Katuk, Asvinitha Muniandy, Norazlina Abd. Wahab, Ijaz Ahmad
An-Najah University Journal for Research - B (Humanities)
Many people own online accounts, with some having financial values like Internet banking, e-wallet and cryptocurrency. In the case of sudden death, their heirs are unaware of the digital assets possessed by the deceased person, which causes the assets to be lost forever, and the heirs might not receive the assets. If an estate plan did not account for digital assets properly, the beneficiaries would not be able to access them. Therefore, this paper addresses this issue by implementing a software development approach in designing a suitable model for sustaining digital assets through smartphones to allow the inheritance of digital …
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Military Cyber Affairs
Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Military Cyber Affairs
Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Military Cyber Affairs
Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …
Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin
Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin
Military Cyber Affairs
Automated approaches to cyber security based on machine learning will be necessary to combat the next generation of cyber-attacks. Current machine learning tools, however, are difficult to develop and deploy due to issues such as data availability and high false positive rates. Generative models can help solve data-related issues by creating high quality synthetic data for training and testing. Furthermore, some generative architectures are multipurpose, and when used for tasks such as intrusion detection, can outperform existing classifier models. This paper demonstrates how the future of cyber security stands to benefit from continued research on generative models.
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Military Cyber Affairs
Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Military Cyber Affairs
Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Military Cyber Affairs
In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.
In-Depth Examination Of Gas Consumption In E-Will Smart Contract: A Case Study, Manal Mansour, May Salama, Hala Helmi, Mona F.M Mursi
In-Depth Examination Of Gas Consumption In E-Will Smart Contract: A Case Study, Manal Mansour, May Salama, Hala Helmi, Mona F.M Mursi
Journal of Engineering Research
In recent years, blockchain technology, coupled with smart contracts, has played a pivotal role in the development of distributed applications. Numerous case studies have emerged, showcasing the remarkable potential of this technology across various applications. Despite its widespread adoption in the industry, there exists a significant gap between the practical implementation of blockchain and the analytical and academic studies dedicated to understanding its nuances.
This paper aims to bridge this divide by presenting an empirical case study focused on the e-will contract, with a specific emphasis on gas-related challenges. By closely examining the e-will contract case study, we seek to …
The Role Of Artificial Intelligence In Determining The Criminal Fingerprint, Saeed Al Matrooshi
The Role Of Artificial Intelligence In Determining The Criminal Fingerprint, Saeed Al Matrooshi
Journal of Police and Legal Sciences
The research aimed to identify the motives and justifications for the use of artificial intelligence in predicting crimes, to explain the challenges of artificial intelligence algorithms, the risks of bias and their ethical rules, and to highlight the role of artificial intelligence in identifying the criminal fingerprint during the detection of crimes. The research relied on the analytical approach, for the purpose of identifying the motives and justifications for the use of intelligence. Artificial intelligence in crime detection, explaining the challenges of artificial intelligence algorithms, their risks of bias, and ethical rules, and exploring how artificial intelligence technology can hopefully …
Parallel Algorithm For Testing The Singularity Of An N-Th Order Matrix, Ehab Alasadi
Parallel Algorithm For Testing The Singularity Of An N-Th Order Matrix, Ehab Alasadi
Al-Bahir Journal for Engineering and Pure Sciences
Analyze the possibilities of implementing a parallel algorithm to test the singularity of the N-th order matrix. Design and implement in ( C/C++) a solution based on sending messages between nodes using the PVM system library. Distribute the load among the nodes such that the computation time is as small as possible. Find out how the execution time and calculation acceleration depend on the number of nodes and the size of the problem (indicate the table and graphs). Based on the results, estimate the communication latency, for what size the task is (well) scalable on the given architecture, and what …
The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin
The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin
Journal of International Technology and Information Management
Research has extensively studied nonprofit organizations’ use of social media for communications and interactions with supporters. However, there has been limited research examining the impact of social media on charitable giving. This research attempts to address the gap by empirically examining the relationship between the use of social media and charitable giving for nonprofit organizations. We employ a data set of the Nonprofit Times’ top 100 nonprofits ranked by total revenue for the empirical analysis. As measures for social media traction, i.e., how extensively nonprofits draw supporters on their social media sites, we use Facebook Likes, Twitter Followers, and Instagram …
Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco
Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco
Journal of International Technology and Information Management
Developing an effective business analytics function within a company has become a crucial component to an organization’s competitive advantage today. Predictive analytics enables an organization to make proactive, data-driven decisions. While companies are increasing their investments in data and analytics technologies, little research effort has been devoted to understanding how to best convert analytics assets into positive business performance. This issue can be best studied from the socio-technical perspective to gain a holistic understanding of the key factors relevant to implementing predictive analytics. Based upon information from structured interviews with information technology and analytics executives of 11 organizations across the …
Application Of Quantum Algorithms In The Synthesis Of Dynamic Objects, Noilakhon Yakubova
Application Of Quantum Algorithms In The Synthesis Of Dynamic Objects, Noilakhon Yakubova
Chemical Technology, Control and Management
Around the world, the food industry is focusing on achieving energy and resource efficiency. One of the main challenges in the field of process automation is the creation of effective control systems using intelligent technologies to improve the quality of processes and achieve the production of high-quality products with less energy and resources. Therefore, it is necessary to work with a large amount of data. Particular attention is paid to the development of computational algorithms for automated high-speed computational analysis systems for processing this data at high speed. Therefore, the article discusses the use of quantum computing methods in controlling …
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Journal of Nonprofit Innovation
Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.
Imagine Doris, who is …
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Journal of Cybersecurity Education, Research and Practice
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …
Smart Service Function Chain System For Dynamic Traffic Steering Using Reinforcement Learning (Chrl), Ahmed Nadhum, Ahmed Al-Saadi
Smart Service Function Chain System For Dynamic Traffic Steering Using Reinforcement Learning (Chrl), Ahmed Nadhum, Ahmed Al-Saadi
Karbala International Journal of Modern Science
The rapid development of the Internet and network services coupled with the growth of communication infrastructure necessitates the employment of intelligent systems. The complexity of the network is heightened by these systems, as they offer diverse services contingent on traffic type, user needs, and security considerations. In this context, a service function chain offers a toolkit to facilitate the management of intricate network systems. However, various traffic types require dynamic adaptation in the sets of function chains. The problem of optimizing the order of service functions in the chain must be solved using the proposed approach, along with balancing the …
Deep Learning Techniques For Efficient Evaluation Of Asphalt Pavement Condition, Kamel Mahdy, Ahmed Zekry, Mohamed Moussa, Ahmed Mohamed, Hassan Mahdy, Mohamed Elhabiby
Deep Learning Techniques For Efficient Evaluation Of Asphalt Pavement Condition, Kamel Mahdy, Ahmed Zekry, Mohamed Moussa, Ahmed Mohamed, Hassan Mahdy, Mohamed Elhabiby
Mansoura Engineering Journal
For the last few decades, researchers have been devising a simple and cost-effective method to evaluate pavement distresses to give decision-makers adequate feedbacks about the pavement condition of a certain road. Fortunately, with the evolution and progression of computer vision tools and techniques, good results had been achieved regarding the detection, classification, and quantification of road distress. In this paper, a new efficient process of road distress analysis using deep learning models is introduced. This new process was tested on a collected road dataset to evaluate the efficiency and speed of this low-cost road maintenance system. Promising results were obtained …
An Enhanced Adaptive Learning System Based On Microservice Architecture, Abdelsalam Helmy Ibrahim, Mohamed Eliemy, Aliaa Abdelhalim Youssif
An Enhanced Adaptive Learning System Based On Microservice Architecture, Abdelsalam Helmy Ibrahim, Mohamed Eliemy, Aliaa Abdelhalim Youssif
Future Computing and Informatics Journal
This study aims to enhance Adaptive Learning Systems (ALS) in Petroleum Sector in Egypt by using the Microservice Architecture and measure the impact of enhancing ALS by participating ALS users through a statistical study and questionnaire directed to them if they accept to apply the Cloud Computing Service “Microservices” to enhance the ALS performance, quality and cost value or not. The study also aims to confirm that there is a statistically significant relationship between ALS and Cloud Computing Service “Microservices” and prove the impact of enhancing the ALS by using Microservices in the cloud in Adaptive Learning in the Egyptian …
Risk Assessment Approaches In Banking Sector –A Survey, Mona Sharaf, Shimaa Mohamed Ouf, Amira M. Idrees Ami
Risk Assessment Approaches In Banking Sector –A Survey, Mona Sharaf, Shimaa Mohamed Ouf, Amira M. Idrees Ami
Future Computing and Informatics Journal
Prediction analysis is a method that makes predictions based on the data currently available. Bank loans come with a lot of risks to both the bank and the borrowers. One of the most exciting and important areas of research is data mining, which aims to extract information from vast amounts of accumulated data sets. The loan process is one of the key processes for the banking industry, and this paper examines various prior studies that used data mining techniques to extract all served entities and attributes necessary for analytical purposes, categorize these attributes, and forecast the future of their business …
News’ Credibility Detection On Social Media Using Machine Learning Algorithms, Farah Yasser, Sayed Abdelmawgoud, Amira M. Idrees Ami
News’ Credibility Detection On Social Media Using Machine Learning Algorithms, Farah Yasser, Sayed Abdelmawgoud, Amira M. Idrees Ami
Future Computing and Informatics Journal
Social media is essential in many aspects of our lives. Social media allows us to find news for free. anyone can access it easily at any time. However, social media may also facilitate the rapid spread of misleading news. As a result, there is a probability that low-quality news, including incorrect and fake information, will spread over social media. As well as detecting news credibility on social media becomes essential because fake news can affect society negatively, and the spread of false news has a considerable impact on personal reputation and public trust. In this research, we conducted a model …
Visual Question Answering: A Survey, Gehad Assem El-Naggar
Visual Question Answering: A Survey, Gehad Assem El-Naggar
Future Computing and Informatics Journal
Visual Question Answering (VQA) has been an emerging field in computer vision and natural language processing that aims to enable machines to understand the content of images and answer natural language questions about them. Recently, there has been increasing interest in integrating Semantic Web technologies into VQA systems to enhance their performance and scalability. In this context, knowledge graphs, which represent structured knowledge in the form of entities and their relationships, have shown great potential in providing rich semantic information for VQA. This paper provides an abstract overview of the state-of-the-art research on VQA using Semantic Web technologies, including knowledge …
Investigation Of Information Security Incidents In The Enterprise, Fayzullajon Botirov
Investigation Of Information Security Incidents In The Enterprise, Fayzullajon Botirov
Chemical Technology, Control and Management
This article analyzes the concept of investigating information security incidents and the processes of responsibility for their commission, checking the place where the incident occurred, collecting and storing their data, as well as organizing the investigation of information security incidents at the enterprise.
Classification Of Arabic Social Media Texts Based On A Deep Learning Multi-Tasks Model, Ali A. Jalil, Ahmed H. Aliwy
Classification Of Arabic Social Media Texts Based On A Deep Learning Multi-Tasks Model, Ali A. Jalil, Ahmed H. Aliwy
Al-Bahir Journal for Engineering and Pure Sciences
The proliferation of social networking sites and their user base has led to an exponential increase in the amount of data generated on a daily basis. Textual content is one type of data that is commonly found on these platforms, and it has been shown to have a significant impact on decision-making processes at the individual, group, and national levels. One of the most important and largest part of this data are the texts that express human intentions, feelings and condition. Understanding these texts is one of the biggest challenges that facing data analysis. It is the backbone for understanding …
Tech Time
DePaul Magazine
DePaul is embracing tech more than ever, incorporating innovative devices and approaches into education in all corners of the university. Here are seven ways DePaul provides hands-on experiences with cutting-edge tools that position students and faculty in the forefront of their industries and disciplines.
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Military Cyber Affairs
Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Military Cyber Affairs
No abstract provided.
Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane
Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane
Military Cyber Affairs
No abstract provided.
Models Of Team Structure In Information Security Incident Investigation, Fayzullajon Botirov
Models Of Team Structure In Information Security Incident Investigation, Fayzullajon Botirov
Chemical Technology, Control and Management
This article discusses the models of the group structure in the investigation of information security incidents, contradictions in the investigation of information security incidents, methods for assessing information security incidents at the enterprise, processes for assessing information security incidents based on its factors.
From Policy Promotion To Research Output: Brief Analysis Of Technical Challenges Of Hospital-Led Artificial Intelligence Research, Yu Zhuang, Cheng Zhou
From Policy Promotion To Research Output: Brief Analysis Of Technical Challenges Of Hospital-Led Artificial Intelligence Research, Yu Zhuang, Cheng Zhou
Bulletin of Chinese Academy of Sciences (Chinese Version)
In recent years, artificial intelligence has become a key direction of medical and health-related research and a hot spot of international competition. In order to investigate the current situation and challenges in hospital-led artificial intelligence researched, this study selects 14 national pilot hospitals to promote the high-quality development of public hospitals as samples, adopts a combination of quantitative and qualitative methods, analyzes the research articles related to artificial intelligence published by the sample hospitals in recent years, and analyzes the technical challenges in the hospital-led artificial intelligence research. The results show that although the number of hospital-led artificial intelligence research …