PLOMS AI https://plomscience.com/journals/index.php/PLOMSAI <p><strong>PLOMS AI </strong>is a comprehensive journal aiming to proceed science-society interactions . The open access strategy offers increased vulnerability of the research and help in dissemination of research results, as well. We believe that all accurate scientific results have to be published and disseminated by being freely accessible to all.<br /><br /><strong>PLOMS AI</strong> accepts research in areas related to Artificial Intelligence, Computational Intelligence, and bio inspired related areas. The submitted manuscripts are evaluated on the basis of high ethical standards, accurate methodology, scientific and perceived novelty.<br /><br /><strong>Types of articles:</strong><br /><strong>Original research</strong> that contributes to the base of scientific knowledge <br /><strong>Systematic reviews </strong>whose methods ensure the comprehensive and unbiased sampling of existing literature.<br /><strong>Qualitative research</strong> that adheres to appropriate study design and reporting guidelines.<br /><strong>Other submissions</strong> that describes methods, software, databases, or other tools that if they follow the appropriate reporting guidelines. accepts research in areas related to Artificial Intelligence, Computational Intelligence, and bio inspired related areas. The submitted manuscripts are evaluated on the basis of high ethical standards, accurate methodology, scientific and perceived novelty.</p> PLOMS en-US PLOMS AI <p><strong>PLOMS Journals Copyright Statement</strong></p> <p><strong>PLOMS LLC</strong>. grants you a non-exclusive, royalty-free, revocable license to: </p> <ul> <li>Academic Journals licenses all works published under the Creative Commons Attribution 4.0 International License. This license grants anybody the right to reproduce, redistribute, remix, transmit, and modify the work, as long as the original work and source are properly cited.</li> <li>PLOMS LLC. grants you no further rights in respect to this website or its content. </li> </ul> <p>Without the prior consent of PLOMS LLC, this website and its content (in any form or medium) may not be changed or converted in any manner. To avoid doubt, you must not modify, edit, alter, convert, publish, republish, distribute, redistribute, broadcast, rebroadcast, display, or play in public any of the content on this website (in any form or medium) without PLOMS LLC's prior written approval.</p> <p><strong>Permissions</strong></p> <p>Permission to use the copyright content on this website may be obtained by emailing to: </p> <p> <strong>[email protected].</strong></p> <p>PLOMS LLC. takes copyright protection very seriously. If PLOMS LLC. discovers that you have violated the license above by using its copyright materials, PLOMS LLC. may pursue legal action against you, demanding monetary penalties and an injunction to prevent you from using such materials. Additionally, you may be required to pay legal fees.</p> <p>If you become aware of any unauthorized use of PLOMS LLC. copyright content that violates or may violate the license above, please contact :</p> <p><strong>[email protected].</strong></p> <p><strong>Infringing content</strong></p> <p>If you become aware of any content on the website that you feel violates your or another person's copyright, please notify <strong>[email protected]</strong>.</p> Deep Neural Network for Arabic Tweets Sentiment Analysis Related to COVD-19 https://plomscience.com/journals/index.php/PLOMSAI/article/view/15 <p>Aside from the Coronavirus pandemic, several other major crises erupted worldwide. Various industries have been irreparably harmed, and many organizations have succumbed to the calamity. There is an unavoidable need to examine various patterns on social media platforms in order to reduce public anxiety and misconceptions. The study examines the emotional orientations of Arabic persons who use social media, specifically the Twitter platform. From November 2020 to January 2021, we gathered data from Twitter. Tweets have been sent from a number of Arab cities. Natural Language Processing (NLP) and Machine Learning (ML) methods are used to identify whether an opinion's sentiment is favorable, negative, or neutral. This study gathers Arabic tweets and then manually annotates them to classify them as negative, positive, neutral, etc. In this work, word embedding and TFIDF are employed as vector features, with Long Short-Term Memory (LSTM) and Naive Bayes used for classification. This paper offers a learned LSTM model and a Naive Bayes model based on the collected tweets, leveraging two powerful ML methods. The LSTM model is more effective than the Nave Bayes model since its superior performance. This is noted by achieving an accuracy of 99% for the LSTM model. The analysis of this study aids various governments and corporate entities in better understanding public attitude and behavior in the face of the pandemic and making strategic decisions in response. Furthermore, this study focuses on data visualization by exhibiting an emotion plot and a word cloud. This study is an extended version of our work "the Sentiment Analysis of Arabic Tweets Related to COVID-19 Using Deep Neural Network".</p> Jawad Hassan Alkhateeb Najla Hamandi Alharbi Abdel-Hamid M. Emara Copyright (c) 2022 PLOMS AI https://creativecommons.org/licenses/by-nc/4.0 2022-01-28 2022-01-28 2 1 A Study of Crowd Abnormal Events Understanding in Surveillance Videos https://plomscience.com/journals/index.php/PLOMSAI/article/view/18 <p>Crowd abnormal events detection in surveillance videos is a common topic in computer vision. For better security and safety, automatic video surveillance systems can detect and record abnormal activities at public and private places. However, traditional methods based on optical flow or segmentation cannot show good detection performance. On the other hand, deep learning based solutions for crowd unusual events detection showed better performance than those of conventional machine learning. This paper includes the latest deep learning models for crowd abnormal events detection in surveillance videos and their overall performance study.</p> Mousumi Yeasmin Benzir Copyright (c) 2022 PLOMS AI https://creativecommons.org/licenses/by-nc/4.0 2022-09-09 2022-09-09 2 1 Internet of Things (IoT) Security Vulnerabilities: A Review https://plomscience.com/journals/index.php/PLOMSAI/article/view/14 <p>The Internet of Things (IoT) collects and processes data from remote locations, substantially increasing the productivity of dispersed systems or individuals. Due to the restricted budget available for power consumption, IoT devices usually lack advanced data encryption and device authentication. &nbsp;The hardware components used in IoT devices are not high-end, and therefore, the integrity and security of the majority of IoT devices are in question. For instance, an adversary may include a Hardware Trojan (HT) during the manufacturing phase of IoT hardware devices to trigger data leakage or device failures in addition to other security issues. Here, we examine security risks to IoT in this paper, with a particular focus on attacks aimed at compromising the software, hardware, communication, and chip.&nbsp;</p> Rabie Ramadan Copyright (c) 2022 PLOMS AI https://creativecommons.org/licenses/by-nc/4.0 2021-10-20 2021-10-20 2 1 Intrusion Detection Based Learning in Wireless Sensor Networks https://plomscience.com/journals/index.php/PLOMSAI/article/view/10 <p>Wireless Sensor Networks (WSNs) have different limitations, including storage and processing capabilities. Besides, sensors' communication ranges are limited. Besides, those limitations raise the issue of the network intrusion and sensors' capabilities in detecting intruders. This paper introduces two different algorithms to detect intrusions in wireless sensor-based systems, which are more vulnerable to attacks. The first proposed algorithm is supervised learning-based classification. On the other hand, the second algorithm is unsupervised learning-based clustering. Both algorithms try to detect intrusions using a set of detection rules that are structured in the form of decision trees. The algorithms are detailed and extensively examined on a well-known dataset. They also are tested against two different architectures, two and three levels networks. The three-level architecture represents the sensor node, sink node, and base station level, while the two-level architecture represents the levels of sensor and sink nodes. An enhancement for decision-tree-based classification algorithms is also proposed by changing the decision tree to a binary tree. Such change made a significant enhancement in the complexity of reaching a decision. The produced decision trees use a similar decision tree node structure as the one used in Classification and Regression Trees (CART). The performance of our proposed algorithms and techniques are measured and extensively examined.</p> Rabie Ramadan Karen Medhat Copyright (c) 2021 Dr. Rabie A. Ramadan, Eng. Karen Medhat https://creativecommons.org/licenses/by-nc/4.0 2021-08-11 2021-08-11 2 1