The Artificial Intelligence (AI) field experienced a renaissance in the last few years across various fields such as law, medicine, and finance. Firms have been devoting significant resources to developing and evaluat...
详细信息
The Artificial Intelligence (AI) field experienced a renaissance in the last few years across various fields such as law, medicine, and finance. Firms have been devoting significant resources to developing and evaluating AI applications including the creation of internal AI Innovation Departments. While there are studies outlining the landscape of AI in the legal field as well as surveys of the current AI efforts of law firms, to our knowledge there has not been an investigation of the intersection of law students and AI. Such research is critical to help ensure current law students are positioned to fully exploit this technology as they embark on their legal careers but to also assist existing legal firms to better leverage their AI skillset both operationally and in helping to formulate future legal frameworks for regulating this technology across many industries. The study presented in this paper addresses this gap – the intersection of law students and AI. Through a survey of 27 questions conducted over the period of July 22 – Aug 19, 2024, the study covers the law students’ background, AI usage, AI applications in the legal field, AI regulations and open-ended comments to share opinions. The results from this study show the uniqueness of law students as a distinct cohort. The results differ from the ones of established law firms especially in AI engagement - established legal professionals are more engaged than law students. The law firm participants show much higher enthusiasm about AI than this student cohort - somewhat surprising as one would expect the younger generation to be more open to new technologies. Collaborations with Computer Science departments would further enhance the AI knowledge and experience of law students in AI technologies such as prompt engineering, chain-of-thought prompting, zero- and few-shot prompting, and language model hallucination management. As future work, we would like to expand the study to include more variables and a large
The atmospheric turbulence as the natural media of optical propagation for the free-space optical (FSO) communications is the great advantage to reach flexible connection and low-cost deployment but also is the major ...
详细信息
Acute lymphoblastic leukemia (ALL), a disease that is quite common, necessitates invasive, costly, and time consuming diagnostic procedures for a final diagnosis. The early classification of cancer cases from noncance...
详细信息
ISBN:
(数字)9798350343427
ISBN:
(纸本)9798350343434
Acute lymphoblastic leukemia (ALL), a disease that is quite common, necessitates invasive, costly, and time consuming diagnostic procedures for a final diagnosis. The early classification of cancer cases from noncancerous samples plays a crucial role in ALL detection utilizing peripheral blood smear (PBS) images. This research highlights the successful application of the YOLOv5 object detection model in detecting ALL cells and classify it into four distinct types, achieving 97.8%,96%,96.7%, accuracy, precision, and recall respectively using an ALL image dataset after adding the bounding boxes manually. Moreover, a comparison is conducted among three popular convolution neural network (CNN) models, namely GoogleNet, ResNet, and AlexNet, alongside YOLOv5 using the ALL dataset. The results clearly demonstrate that YOLOv5 model outperforms the other CNN models, further confirming its superiority in ALL detection.
Superior and quality human resources are based on healthy human resources with indicators of adequate nutritional intake according to age development. However, the world still faces the problem of hunger and malnutrit...
详细信息
Process Mining (PM) is a research discipline that helps organizations track and optimize processes to support their business. Further, it focuses on providing process analysis techniques and tools, and several of its ...
Process Mining (PM) is a research discipline that helps organizations track and optimize processes to support their business. Further, it focuses on providing process analysis techniques and tools, and several of its applications have been described in the literature. The start point for PM is using event logs generated by information systems to analyze processes. These event logs need to be extracted from databases and prepared for use because the quality of the event logs used as input is critical to the success of any PM effort. In this article, we present a systematic mapping review to provide the reader with highlights of the state-of-the-art techniques for event log preparation. Based on the retrieved studies, we identified six main categories of log preparation techniques: extraction, cleaning, repair, non-adequate granularity, quality evaluation, and privacy. The results are explored quantitatively and qualitatively. All results are made available through spreadsheets and charts. We believe this paper is a starting point for researchers to identify the studies that would help them prepare event logs for PM.
Garden of Eden (GOE) states in cellular automata are grid configurations which have no precursors, that is, they can only occur as initial conditions. Finding individual configurations that minimize or maximize some c...
RSA is an asymmetric encryption algorithm that uses two different keys, a public key to encrypt the plain text and a private key to decrypt the cipher text. Fernet is a symmetric encryption algorithm that uses a singl...
RSA is an asymmetric encryption algorithm that uses two different keys, a public key to encrypt the plain text and a private key to decrypt the cipher text. Fernet is a symmetric encryption algorithm that uses a single key to encrypt and decrypt information. This study uses Fernet and RSA which is the combination of symmetric and asymmetric encryption called hybrid encryption. In addition, the cipher text will be hidden inside an image using Stepic. Hybrid Encryption uses asymmetric encryption to encrypt the symmetric encryption secret key, it will secure the symmetric encryption. The result of this study is the lowest error that we got as the MSE is 0.00% and is inversely proportional with the Peak Signal to Noise Ratio (PSNR) and Avalanche (AVA) with 79.00% and 42.34% in order. Inversely proportional to the length of the text that is hidden in the image, the longest text that is hidden, the more changes that we get in the image with the highest Unified Average Changing Intensity (UACI) and Number of Pixels Change Rate (NPCR) with the biggest image size with 46.48% for UACI and 99.86% for the NPCR.
Financial markets, such as forex markets, are inherently complex, with high volatility, noise, trends, and market shocks. Therefore, designing effective trading strategies is crucial for maximizing investment returns....
Financial markets, such as forex markets, are inherently complex, with high volatility, noise, trends, and market shocks. Therefore, designing effective trading strategies is crucial for maximizing investment returns. The implementation of deep reinforcement learning (DRL) in financial trading has become an attractive research topic in recent years. This study proposes Advantage Actor-Critic-based algorithms (A2C) algorithms to learn forex trading strategies using deep reinforcement schemes. The ensemble trading strategy was obtained by combining the best features of the two algorithms' Policy Gradient as Actor and Q-learning as Critic, resulting in a robust strategy that adapts to different market situations. Our experiment on the EURUSD currency on the 4 hour candlestick timeframe using five years of data history was divided into three parts for training, validating, and testing. The A2C agent learns to buy, sell, and hold a trade with the goals of maximizing profits and reducing losses. Our proposed method provides an effective and robust solution to various financial trading problems using deep reinforcement learning. Our proposed methods provide effective and robust solutions to various financial trading problems using deep reinforcement learning. The evaluation results improved from each training, where the Cumulative Return evaluation increased from 29.65 to 112.74, the Maximum Drawdown reduced from 36.18% to 4.48%, the Sharp Ratio increased from 0.94 to 2.47%, and the AHPR increased from 0.19% to 3.56%. This indicates that longer training data result in higher cumulative rewards and an increase in total profit.
In this work, we propose an automated solution to support researchers of histological sciences labs on the analysis of muscle fibers microscopic images. For this purpose, we developed a dataset carefully curated compo...
In this work, we propose an automated solution to support researchers of histological sciences labs on the analysis of muscle fibers microscopic images. For this purpose, we developed a dataset carefully curated composed of semi-seriated muscle samples. The manual annotation of these images is laborious and tiring, and the results may become compromised as the human gets tired. Thus, we propose a framework to address this problem which starts with a preprocessing step, aiming to mitigate discrepancies regarding the color variation frequently found in this type of image, followed by the use of Mask R-CNN, to automatically perform muscle fibers segmentation and also to extract the smallest diameter of these fibers, which is an important measure for further analysis. Experiments showed that there is no statistically significant difference between the results obtained manually and those obtained using our proposal. The dataset used in the experiments is also a contribution of this work.
Multi-Speaker Voice Cloning is a system that can produce various voices based on voice samples and text input. Voice cloning can be an alternative to get audio data quickly without recording, which requires a lot of t...
详细信息
暂无评论