首页 > 最新文献

Inf. Comput.最新文献

英文 中文
Theme Mapping and Bibliometric Analysis of Two Decades of Smart Farming 智慧农业二十年的主题映射与文献计量分析
Pub Date : 2023-07-11 DOI: 10.3390/info14070396
Tri Kushartadi, A. Mulyono, Azhari Haris Al Hamdi, Muhammad Afif Rizki, Muhammad Anwar Sadat Faidar, Wirawan Dwi Harsanto, M. Suryanegara, M. Asvial
The estimated global population for 2050 is 9 billion, which implies an increase in food demand. Agriculture is the primary source of food production worldwide, and improving its efficiency and productivity through an integration with information and communication technology system, so-called “smart farming”, is a promising approach to optimizing food supply. This research employed bibliometric analysis techniques to investigate smart farming trends, identify their potential benefits, and analyze their research insight. Data were collected from 1141 publications in the Scopus database in the period 1997–2021 and were extracted using VOS Viewer, which quantified the connections between the articles using the co-citation unit, resulting in a mapping of 10 clusters, ranging from agriculture to soil moisture. Finally, the analysis further focuses on the three major themes of smart farming, namely the IoT; blockchain and agricultural robots; and smart agriculture, crops, and irrigation.
预计2050年全球人口将达到90亿,这意味着粮食需求将会增加。农业是全球粮食生产的主要来源,通过与信息和通信技术系统的整合来提高其效率和生产力,即所谓的“智能农业”,是优化粮食供应的一种有希望的方法。本研究采用文献计量分析技术调查智能农业趋势,确定其潜在利益,并分析其研究见解。数据来自Scopus数据库1997-2021年期间的1141篇出版物,并使用VOS Viewer进行提取,该工具使用共被引单位量化文章之间的联系,从而绘制出从农业到土壤湿度等10个集群的地图。最后,进一步分析了智慧农业的三大主题,即物联网;区块链和农业机器人;智能农业、作物和灌溉。
{"title":"Theme Mapping and Bibliometric Analysis of Two Decades of Smart Farming","authors":"Tri Kushartadi, A. Mulyono, Azhari Haris Al Hamdi, Muhammad Afif Rizki, Muhammad Anwar Sadat Faidar, Wirawan Dwi Harsanto, M. Suryanegara, M. Asvial","doi":"10.3390/info14070396","DOIUrl":"https://doi.org/10.3390/info14070396","url":null,"abstract":"The estimated global population for 2050 is 9 billion, which implies an increase in food demand. Agriculture is the primary source of food production worldwide, and improving its efficiency and productivity through an integration with information and communication technology system, so-called “smart farming”, is a promising approach to optimizing food supply. This research employed bibliometric analysis techniques to investigate smart farming trends, identify their potential benefits, and analyze their research insight. Data were collected from 1141 publications in the Scopus database in the period 1997–2021 and were extracted using VOS Viewer, which quantified the connections between the articles using the co-citation unit, resulting in a mapping of 10 clusters, ranging from agriculture to soil moisture. Finally, the analysis further focuses on the three major themes of smart farming, namely the IoT; blockchain and agricultural robots; and smart agriculture, crops, and irrigation.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89027112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Findings on Ad Hoc Contractions 关于特设宫缩的调查结果
Pub Date : 2023-07-10 DOI: 10.3390/info14070391
Sing Choi, K. Taghva
Abbreviations are often overlooked, since their frequency and acceptance are almost second nature in everyday communication. Business names, handwritten notes, online messaging, professional domains, and different languages all have their own set of abbreviations. The abundance and frequent introduction of new abbreviations cause multiple areas of overlaps and ambiguity, which mean documents often lose their clarity. We reverse engineered the process of creating these ad hoc abbreviations and revealed some preliminary statistics on what makes them easier or harder to define. In addition, we generated candidate definitions for which it proved difficult for a word sense disambiguation model to select the correct definition.
缩略语经常被忽视,因为它们的使用频率和接受程度几乎是日常交流的第二天性。企业名称、手写笔记、在线消息、专业领域和不同的语言都有自己的一套缩写。大量且频繁地引入新缩写会导致多个领域的重叠和歧义,这意味着文档通常会失去其清晰度。我们对创建这些临时缩写的过程进行了逆向工程,并揭示了一些使它们更容易或更难以定义的初步统计数据。此外,我们还生成了候选定义,事实证明,词义消歧模型很难从中选择正确的定义。
{"title":"Findings on Ad Hoc Contractions","authors":"Sing Choi, K. Taghva","doi":"10.3390/info14070391","DOIUrl":"https://doi.org/10.3390/info14070391","url":null,"abstract":"Abbreviations are often overlooked, since their frequency and acceptance are almost second nature in everyday communication. Business names, handwritten notes, online messaging, professional domains, and different languages all have their own set of abbreviations. The abundance and frequent introduction of new abbreviations cause multiple areas of overlaps and ambiguity, which mean documents often lose their clarity. We reverse engineered the process of creating these ad hoc abbreviations and revealed some preliminary statistics on what makes them easier or harder to define. In addition, we generated candidate definitions for which it proved difficult for a word sense disambiguation model to select the correct definition.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75891602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Isotropy of Multimodal Embeddings 关于多模态嵌入的各向同性
Pub Date : 2023-07-10 DOI: 10.3390/info14070392
Kirill Tyshchuk, Polina Karpikova, Andrew Spiridonov, Anastasiia Prutianova, Anton Razzhigaev, A. Panchenko
Embeddings, i.e., vector representations of objects, such as texts, images, or graphs, play a key role in deep learning methodologies nowadays. Prior research has shown the importance of analyzing the isotropy of textual embeddings for transformer-based text encoders, such as the BERT model. Anisotropic word embeddings do not use the entire space, instead concentrating on a narrow cone in such a pretrained vector space, negatively affecting the performance of applications, such as textual semantic similarity. Transforming a vector space to optimize isotropy has been shown to be beneficial for improving performance in text processing tasks. This paper is the first comprehensive investigation of the distribution of multimodal embeddings using the example of OpenAI’s CLIP pretrained model. We aimed to deepen the understanding of the embedding space of multimodal embeddings, which has previously been unexplored in this respect, and study the impact on various end tasks. Our initial efforts were focused on measuring the alignment of image and text embedding distributions, with an emphasis on their isotropic properties. In addition, we evaluated several gradient-free approaches to enhance these properties, establishing their efficiency in improving the isotropy/alignment of the embeddings and, in certain cases, the zero-shot classification accuracy. Significantly, our analysis revealed that both CLIP and BERT models yielded embeddings situated within a cone immediately after initialization and preceding training. However, they were mostly isotropic in the local sense. We further extended our investigation to the structure of multilingual CLIP text embeddings, confirming that the observed characteristics were language-independent. By computing the few-shot classification accuracy and point-cloud metrics, we provide evidence of a strong correlation among multilingual embeddings. Embeddings transformation using the methods described in this article makes it easier to visualize embeddings. At the same time, multiple experiments that we conducted showed that, in regard to the transformed embeddings, the downstream tasks performance does not drop substantially (and sometimes is even improved). This means that one could obtain an easily visualizable embedding space, without substantially losing the quality of downstream tasks.
嵌入,即对象(如文本、图像或图形)的向量表示,在当今的深度学习方法中起着关键作用。先前的研究表明,分析文本嵌入的各向同性对于基于转换的文本编码器(如BERT模型)的重要性。各向异性词嵌入不使用整个空间,而是集中在这样一个预训练的向量空间中的一个窄锥体上,这对应用程序的性能产生了负面影响,例如文本语义相似度。转换矢量空间以优化各向同性已被证明有利于提高文本处理任务的性能。本文以OpenAI的CLIP预训练模型为例,首次全面研究了多模态嵌入的分布。我们的目的是加深对多模态嵌入空间的理解,这是以前在这方面未被探索的,并研究对各种终端任务的影响。我们最初的工作集中在测量图像和文本嵌入分布的对齐,重点是它们的各向同性属性。此外,我们评估了几种无梯度方法来增强这些特性,确定了它们在改善嵌入的各向同性/对齐方面的效率,以及在某些情况下,零射击分类精度。值得注意的是,我们的分析显示CLIP和BERT模型在初始化和训练之前立即产生位于锥体内的嵌入。然而,在当地意义上,它们大多是各向同性的。我们进一步将我们的研究扩展到多语言CLIP文本嵌入的结构,确认观察到的特征是语言无关的。通过计算少射分类精度和点云度量,我们提供了多语言嵌入之间强相关性的证据。使用本文中描述的方法进行嵌入转换可以更容易地可视化嵌入。同时,我们进行的多个实验表明,对于转换后的嵌入,下游任务的性能并没有大幅下降(有时甚至有所提高)。这意味着可以获得一个容易可视化的嵌入空间,而不会实质上损失下游任务的质量。
{"title":"On Isotropy of Multimodal Embeddings","authors":"Kirill Tyshchuk, Polina Karpikova, Andrew Spiridonov, Anastasiia Prutianova, Anton Razzhigaev, A. Panchenko","doi":"10.3390/info14070392","DOIUrl":"https://doi.org/10.3390/info14070392","url":null,"abstract":"Embeddings, i.e., vector representations of objects, such as texts, images, or graphs, play a key role in deep learning methodologies nowadays. Prior research has shown the importance of analyzing the isotropy of textual embeddings for transformer-based text encoders, such as the BERT model. Anisotropic word embeddings do not use the entire space, instead concentrating on a narrow cone in such a pretrained vector space, negatively affecting the performance of applications, such as textual semantic similarity. Transforming a vector space to optimize isotropy has been shown to be beneficial for improving performance in text processing tasks. This paper is the first comprehensive investigation of the distribution of multimodal embeddings using the example of OpenAI’s CLIP pretrained model. We aimed to deepen the understanding of the embedding space of multimodal embeddings, which has previously been unexplored in this respect, and study the impact on various end tasks. Our initial efforts were focused on measuring the alignment of image and text embedding distributions, with an emphasis on their isotropic properties. In addition, we evaluated several gradient-free approaches to enhance these properties, establishing their efficiency in improving the isotropy/alignment of the embeddings and, in certain cases, the zero-shot classification accuracy. Significantly, our analysis revealed that both CLIP and BERT models yielded embeddings situated within a cone immediately after initialization and preceding training. However, they were mostly isotropic in the local sense. We further extended our investigation to the structure of multilingual CLIP text embeddings, confirming that the observed characteristics were language-independent. By computing the few-shot classification accuracy and point-cloud metrics, we provide evidence of a strong correlation among multilingual embeddings. Embeddings transformation using the methods described in this article makes it easier to visualize embeddings. At the same time, multiple experiments that we conducted showed that, in regard to the transformed embeddings, the downstream tasks performance does not drop substantially (and sometimes is even improved). This means that one could obtain an easily visualizable embedding space, without substantially losing the quality of downstream tasks.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83622158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Monkeypox, Disinformation, and Fact-Checking: A Review of Ten Iberoamerican Countries in the Context of Public Health Emergency 猴痘、虚假信息和事实核查:突发公共卫生事件背景下10个伊比利亚美洲国家回顾
Pub Date : 2023-07-09 DOI: 10.3390/info14070390
Noemí Morejón-Llamas, F. Cristòfol
This paper examines the disinformation and fact-checking activity of ten Ibero-American countries during the outbreak of monkeypox in 2022. Using a mixed-methods approach based on content analysis, the debunkings published by these organizations on their websites between 7 May and 10 September 2022 are studied. The countries with the highest number of debunkings are Spain and Bolivia, with two verification agencies, Maldita and Bolivia Verifica. The outbreak’s onset marked a peak in the spread of hoaxes, particularly following the declaration of the disease as a public health emergency. The identification of disinformants is challenging due to the diverse dissemination channels, although Twitter predominantly serves as the platform of choice. The preferred format for disinformation is image text, and the common theme links monkeypox to a side effect of the SARS-CoV-2 vaccine. Furthermore, the internationalization capacity of scientific hoaxes is demonstrated. Fact-checking agencies conduct adequate and thorough source verification, predominantly relying on official and expert sources. However, they employ limited digital tools that could expedite the verification process. Disinformation regarding monkeypox is closely related to COVID-19 hoaxes, either by resurrecting conspiracy theories or through the dissemination of speeches by well-known anti-vaccine activists who belong to healthcare collectives and were influential during the health pandemic.
本文考察了2022年猴痘疫情期间伊比利亚美洲十个国家的虚假信息和事实核查活动。使用基于内容分析的混合方法,研究了这些组织在2022年5月7日至9月10日期间在其网站上发布的揭穿。揭发人数最多的国家是西班牙和玻利维亚,它们有两家核查机构:马耳他和玻利维亚核查机构。疫情的爆发标志着恶作剧传播的高峰,特别是在宣布该疾病为突发公共卫生事件之后。由于传播渠道的多样化,尽管推特是主要的选择平台,但识别告密者是具有挑战性的。虚假信息的首选格式是图像文本,常见的主题是将猴痘与SARS-CoV-2疫苗的副作用联系起来。进一步论证了科学骗局的国际化能力。事实核查机构进行充分和彻底的来源核查,主要依靠官方和专家来源。然而,他们使用有限的数字工具来加快验证过程。关于猴痘的虚假信息与COVID-19骗局密切相关,要么是通过复活阴谋论,要么是通过传播属于医疗保健集体的知名反疫苗活动家的演讲,这些活动家在卫生大流行期间具有影响力。
{"title":"Monkeypox, Disinformation, and Fact-Checking: A Review of Ten Iberoamerican Countries in the Context of Public Health Emergency","authors":"Noemí Morejón-Llamas, F. Cristòfol","doi":"10.3390/info14070390","DOIUrl":"https://doi.org/10.3390/info14070390","url":null,"abstract":"This paper examines the disinformation and fact-checking activity of ten Ibero-American countries during the outbreak of monkeypox in 2022. Using a mixed-methods approach based on content analysis, the debunkings published by these organizations on their websites between 7 May and 10 September 2022 are studied. The countries with the highest number of debunkings are Spain and Bolivia, with two verification agencies, Maldita and Bolivia Verifica. The outbreak’s onset marked a peak in the spread of hoaxes, particularly following the declaration of the disease as a public health emergency. The identification of disinformants is challenging due to the diverse dissemination channels, although Twitter predominantly serves as the platform of choice. The preferred format for disinformation is image text, and the common theme links monkeypox to a side effect of the SARS-CoV-2 vaccine. Furthermore, the internationalization capacity of scientific hoaxes is demonstrated. Fact-checking agencies conduct adequate and thorough source verification, predominantly relying on official and expert sources. However, they employ limited digital tools that could expedite the verification process. Disinformation regarding monkeypox is closely related to COVID-19 hoaxes, either by resurrecting conspiracy theories or through the dissemination of speeches by well-known anti-vaccine activists who belong to healthcare collectives and were influential during the health pandemic.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88392798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep-Learning-Based Human Chromosome Classification: Data Augmentation and Ensemble 基于深度学习的人类染色体分类:数据增强和集成
Pub Date : 2023-07-09 DOI: 10.3390/info14070389
M. D’Angelo, L. Nanni
Object classification is a crucial task in deep learning, which involves the identification and categorization of objects in images or videos. Although humans can easily recognize common objects, such as cars, animals, or plants, performing this task on a large scale can be time-consuming and error-prone. Therefore, automating this process using neural networks can save time and effort while achieving higher accuracy. Our study focuses on the classification step of human chromosome karyotyping, an important medical procedure that helps diagnose genetic disorders. Traditionally, this task is performed manually by expert cytologists, which is a time-consuming process that requires specialized medical skills. Therefore, automating it through deep learning can be immensely useful. To accomplish this, we implemented and adapted existing preprocessing and data augmentation techniques to prepare the chromosome images for classification. We used ResNet-50 convolutional neural network and Swin Transformer, coupled with an ensemble approach to classify the chromosomes, obtaining state-of-the-art performance in the tested dataset.
对象分类是深度学习中的一项关键任务,涉及对图像或视频中的对象进行识别和分类。虽然人类可以很容易地识别常见的物体,比如汽车、动物或植物,但大规模地执行这项任务可能会很耗时,而且容易出错。因此,使用神经网络自动化这一过程可以节省时间和精力,同时实现更高的准确性。我们的研究集中在人类染色体核型的分类步骤,一个重要的医疗程序,有助于诊断遗传疾病。传统上,这项任务是由细胞学专家手动执行的,这是一个耗时的过程,需要专业的医疗技能。因此,通过深度学习实现自动化是非常有用的。为了实现这一目标,我们实现并调整了现有的预处理和数据增强技术,以准备用于分类的染色体图像。我们使用ResNet-50卷积神经网络和Swin Transformer,结合集成方法对染色体进行分类,在测试数据集中获得了最先进的性能。
{"title":"Deep-Learning-Based Human Chromosome Classification: Data Augmentation and Ensemble","authors":"M. D’Angelo, L. Nanni","doi":"10.3390/info14070389","DOIUrl":"https://doi.org/10.3390/info14070389","url":null,"abstract":"Object classification is a crucial task in deep learning, which involves the identification and categorization of objects in images or videos. Although humans can easily recognize common objects, such as cars, animals, or plants, performing this task on a large scale can be time-consuming and error-prone. Therefore, automating this process using neural networks can save time and effort while achieving higher accuracy. Our study focuses on the classification step of human chromosome karyotyping, an important medical procedure that helps diagnose genetic disorders. Traditionally, this task is performed manually by expert cytologists, which is a time-consuming process that requires specialized medical skills. Therefore, automating it through deep learning can be immensely useful. To accomplish this, we implemented and adapted existing preprocessing and data augmentation techniques to prepare the chromosome images for classification. We used ResNet-50 convolutional neural network and Swin Transformer, coupled with an ensemble approach to classify the chromosomes, obtaining state-of-the-art performance in the tested dataset.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74663784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Internet of Things and Cyber-Physical Systems: Standards, Algorithms, Applications, Security, Challenges, and Future Directions 物联网和网络物理系统综述:标准、算法、应用、安全、挑战和未来方向
Pub Date : 2023-07-08 DOI: 10.3390/info14070388
Kwok Tai Chui, B. B. Gupta, Jiaqi Liu, Varsha Arya, N. Nedjah, Ammar Almomani, Priyanka Chaurasia
The smart city vision has driven the rapid development and advancement of interconnected technologies using the Internet of Things (IoT) and cyber-physical systems (CPS). In this paper, various aspects of IoT and CPS in recent years (from 2013 to May 2023) are surveyed. It first begins with industry standards which ensure cost-effective solutions and interoperability. With ever-growing big data, tremendous undiscovered knowledge can be mined to be transformed into useful applications. Machine learning algorithms are taking the lead to achieve various target applications with formulations such as classification, clustering, regression, prediction, and anomaly detection. Notably, attention has shifted from traditional machine learning algorithms to advanced algorithms, including deep learning, transfer learning, and data generation algorithms, to provide more accurate models. In recent years, there has been an increasing need for advanced security techniques and defense strategies to detect and prevent the IoT and CPS from being attacked. Research challenges and future directions are summarized. We hope that more researchers can conduct more studies on the IoT and on CPS.
智慧城市愿景推动了物联网(IoT)和网络物理系统(CPS)等互联技术的快速发展和进步。本文对近年来(2013年至2023年5月)物联网和CPS的各个方面进行了调查。它首先从确保具有成本效益的解决方案和互操作性的行业标准开始。随着大数据的不断增长,大量未被发现的知识可以被挖掘并转化为有用的应用。机器学习算法通过分类、聚类、回归、预测和异常检测等公式率先实现各种目标应用。值得注意的是,人们的注意力已经从传统的机器学习算法转向了高级算法,包括深度学习、迁移学习和数据生成算法,以提供更准确的模型。近年来,越来越需要先进的安全技术和防御策略来检测和防止物联网和CPS受到攻击。总结了研究面临的挑战和未来的发展方向。我们希望更多的研究人员能够对物联网和CPS进行更多的研究。
{"title":"A Survey of Internet of Things and Cyber-Physical Systems: Standards, Algorithms, Applications, Security, Challenges, and Future Directions","authors":"Kwok Tai Chui, B. B. Gupta, Jiaqi Liu, Varsha Arya, N. Nedjah, Ammar Almomani, Priyanka Chaurasia","doi":"10.3390/info14070388","DOIUrl":"https://doi.org/10.3390/info14070388","url":null,"abstract":"The smart city vision has driven the rapid development and advancement of interconnected technologies using the Internet of Things (IoT) and cyber-physical systems (CPS). In this paper, various aspects of IoT and CPS in recent years (from 2013 to May 2023) are surveyed. It first begins with industry standards which ensure cost-effective solutions and interoperability. With ever-growing big data, tremendous undiscovered knowledge can be mined to be transformed into useful applications. Machine learning algorithms are taking the lead to achieve various target applications with formulations such as classification, clustering, regression, prediction, and anomaly detection. Notably, attention has shifted from traditional machine learning algorithms to advanced algorithms, including deep learning, transfer learning, and data generation algorithms, to provide more accurate models. In recent years, there has been an increasing need for advanced security techniques and defense strategies to detect and prevent the IoT and CPS from being attacked. Research challenges and future directions are summarized. We hope that more researchers can conduct more studies on the IoT and on CPS.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86358311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comprehensive Survey of Facet Ranking Approaches Used in Faceted Search Systems 面搜索系统中面排序方法的综合研究
Pub Date : 2023-07-07 DOI: 10.3390/info14070387
Esraa Ali, A. Caputo, Gareth J. F. Jones
Faceted Search Systems (FSSs) have gained prominence as one of the dominant search approaches in vertical search systems. They provide facets to educate users about the information space and allow them to refine their search query and navigate back and forth between resources on a single results page. Despite the importance of this problem, it is rare to find studies dedicated solely to the investigation of facet ranking methods, nor to how this step, aside from other aspects of faceted search, affects the user’s search experience. The objective of this survey paper is to review the state of the art in research related to faceted search systems, with a focus on existing facet ranking approaches and the key challenges posed by this problem. In addition to that, this survey also investigates state-of-the-art FSS evaluation frameworks and the most commonly used techniques and metrics to evaluate facet ranking approaches. It also lays out criteria for dataset appropriateness and its needed structure to be used in evaluating facet ranking methods aside from other FSS aspects. This paper concludes by highlighting gaps in the current research and future research directions related to this area.
分面搜索系统(fss)已成为垂直搜索系统中占主导地位的搜索方法之一。它们提供了一些方面,让用户了解信息空间,并允许他们改进搜索查询,并在单个结果页面上的资源之间来回导航。尽管这个问题很重要,但很少发现专门研究面排序方法的研究,也很少发现除了面搜索的其他方面之外,这一步是如何影响用户的搜索体验的。这篇调查论文的目的是回顾与面搜索系统相关的研究现状,重点是现有的面排序方法和这个问题带来的关键挑战。除此之外,本调查还调查了最先进的FSS评估框架和最常用的技术和指标来评估facet排名方法。它还列出了数据集适当性的标准及其所需的结构,用于评估除其他FSS方面之外的facet排名方法。文章最后指出了当前研究的不足和未来的研究方向。
{"title":"A Comprehensive Survey of Facet Ranking Approaches Used in Faceted Search Systems","authors":"Esraa Ali, A. Caputo, Gareth J. F. Jones","doi":"10.3390/info14070387","DOIUrl":"https://doi.org/10.3390/info14070387","url":null,"abstract":"Faceted Search Systems (FSSs) have gained prominence as one of the dominant search approaches in vertical search systems. They provide facets to educate users about the information space and allow them to refine their search query and navigate back and forth between resources on a single results page. Despite the importance of this problem, it is rare to find studies dedicated solely to the investigation of facet ranking methods, nor to how this step, aside from other aspects of faceted search, affects the user’s search experience. The objective of this survey paper is to review the state of the art in research related to faceted search systems, with a focus on existing facet ranking approaches and the key challenges posed by this problem. In addition to that, this survey also investigates state-of-the-art FSS evaluation frameworks and the most commonly used techniques and metrics to evaluate facet ranking approaches. It also lays out criteria for dataset appropriateness and its needed structure to be used in evaluating facet ranking methods aside from other FSS aspects. This paper concludes by highlighting gaps in the current research and future research directions related to this area.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91395464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Unveiling Key Themes and Establishing a Hierarchical Taxonomy of Disaster-Related Tweets: A Text Mining Approach for Enhanced Emergency Management Planning 揭示关键主题并建立灾害相关推文的分层分类法:一种用于增强应急管理规划的文本挖掘方法
Pub Date : 2023-07-07 DOI: 10.3390/info14070385
James Durham, Sudipta Chowdhury, Ammar Alzarrad
Effectively harnessing the power of social media data for disaster management requires sophisticated analysis methods and frameworks. This research focuses on understanding the contextual information present in social media posts during disasters and developing a taxonomy to effectively categorize and classify the diverse range of topics discussed. First, the existing literature on social media analysis in disaster management is explored, highlighting the limitations and gaps in current methodologies. Second, a dataset comprising real-time social media posts related to various disasters is collected and preprocessed to ensure data quality and reliability. Third, three well-established topic modeling techniques, namely Latent Dirichlet Allocation (LDA), Latent Semantic Analysis (LSA), and Non-Negative Matrix Factorization (NMF), are employed to extract and analyze the latent topics and themes present in the social media data. The contributions of this research lie in the development of a taxonomy that effectively categorizes and classifies disaster-related social media data, the identification of key latent topics and themes, and the extraction of valuable insights to support and enhance emergency management efforts. Overall, the findings of this research have the potential to transform the way emergency management and response are conducted by harnessing the power of social media data. By incorporating these insights into decision-making processes, emergency managers can make more informed and strategic choices, resulting in more efficient and effective emergency response strategies. This, in turn, leads to improved outcomes, better utilization of resources, and ultimately, the ability to save lives and mitigate the impacts of disasters.
有效利用社会媒体数据的力量进行灾害管理需要复杂的分析方法和框架。本研究的重点是了解灾害期间社交媒体帖子中存在的上下文信息,并制定一种分类法,以有效地对所讨论的各种主题进行分类和分类。首先,对灾害管理中社交媒体分析的现有文献进行了探索,突出了当前方法的局限性和差距。其次,收集与各种灾害相关的实时社交媒体帖子数据集并进行预处理,以确保数据质量和可靠性。第三,利用潜在狄利克雷分配(LDA)、潜在语义分析(LSA)和非负矩阵分解(NMF)三种成熟的主题建模技术提取和分析社交媒体数据中存在的潜在话题和主题。这项研究的贡献在于制定了一种分类法,有效地对与灾害有关的社会媒体数据进行分类和分类,确定了关键的潜在主题和主题,并提取了宝贵的见解,以支持和加强应急管理工作。总的来说,这项研究的结果有可能通过利用社交媒体数据的力量来改变应急管理和响应的方式。通过将这些见解纳入决策过程,应急管理人员可以做出更明智和更具战略性的选择,从而制定更高效和有效的应急战略。这反过来又能改善成果,更好地利用资源,并最终提高拯救生命和减轻灾害影响的能力。
{"title":"Unveiling Key Themes and Establishing a Hierarchical Taxonomy of Disaster-Related Tweets: A Text Mining Approach for Enhanced Emergency Management Planning","authors":"James Durham, Sudipta Chowdhury, Ammar Alzarrad","doi":"10.3390/info14070385","DOIUrl":"https://doi.org/10.3390/info14070385","url":null,"abstract":"Effectively harnessing the power of social media data for disaster management requires sophisticated analysis methods and frameworks. This research focuses on understanding the contextual information present in social media posts during disasters and developing a taxonomy to effectively categorize and classify the diverse range of topics discussed. First, the existing literature on social media analysis in disaster management is explored, highlighting the limitations and gaps in current methodologies. Second, a dataset comprising real-time social media posts related to various disasters is collected and preprocessed to ensure data quality and reliability. Third, three well-established topic modeling techniques, namely Latent Dirichlet Allocation (LDA), Latent Semantic Analysis (LSA), and Non-Negative Matrix Factorization (NMF), are employed to extract and analyze the latent topics and themes present in the social media data. The contributions of this research lie in the development of a taxonomy that effectively categorizes and classifies disaster-related social media data, the identification of key latent topics and themes, and the extraction of valuable insights to support and enhance emergency management efforts. Overall, the findings of this research have the potential to transform the way emergency management and response are conducted by harnessing the power of social media data. By incorporating these insights into decision-making processes, emergency managers can make more informed and strategic choices, resulting in more efficient and effective emergency response strategies. This, in turn, leads to improved outcomes, better utilization of resources, and ultimately, the ability to save lives and mitigate the impacts of disasters.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88122311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Authentication Method That Combines Honeytokens and Google Authenticator 结合Honeytokens和Google Authenticator的新型身份验证方法
Pub Date : 2023-07-07 DOI: 10.3390/info14070386
Vassilis Papaspirou, Maria Papathanasaki, L. Maglaras, I. Kantzavelou, C. Douligeris, M. Ferrag, H. Janicke
Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. To address this, this study proposes a new two-factor authentication method that uses honeytokens. Honeytokens and Google Authenticator are combined to create a stronger authentication process. The proposed approach aims to provide additional layers of security and protection to computer systems, increasing their overall security beyond what is currently provided by single-password or standard two-factor authentication methods. The key difference is that the proposed system resembles a two-factor authentication but, in reality, works like a multi-factor authentication system. Multi-factor authentication (MFA) is a security technique that verifies a user’s identity by requiring multiple credentials from distinct categories. These typically include knowledge factors (something the user knows, such as a password or PIN), possession factors (something the user has, such as a mobile phone or security token), and inherence factors (something the user is, such as a biometric characteristic like a fingerprint). This multi-tiered approach significantly enhances protection against potential attacks. We examined and evaluated our system’s robustness against various types of attacks. From the user’s side, the system is as friendly as a two-factor authentication method with an authenticator and is more secure.
尽管技术发展迅速,但计算机系统仍然严重依赖密码来保证安全,这可能会带来问题。尽管引入了多因素身份验证,但它并不能完全有效地抵御更高级的攻击。为了解决这个问题,本研究提出了一种新的使用蜂蜜令牌的双因素认证方法。Honeytokens和Google Authenticator相结合,创建了更强大的身份验证过程。拟议的方法旨在为计算机系统提供额外的安全和保护层,提高其整体安全性,而不是目前由单密码或标准双因素身份验证方法提供的安全性。关键的区别在于,所提议的系统类似于双因素身份验证,但实际上,它的工作方式类似于多因素身份验证系统。多因素身份验证(MFA)是一种安全技术,它通过要求来自不同类别的多个凭据来验证用户身份。这些因素通常包括知识因素(用户知道的东西,如密码或PIN)、占有因素(用户拥有的东西,如移动电话或安全令牌)和固有因素(用户本身的东西,如指纹等生物特征)。这种多层方法显著增强了对潜在攻击的保护。我们检查并评估了系统对各种类型攻击的健壮性。从用户的角度来看,该系统与带有身份验证器的双因素身份验证方法一样友好,并且更加安全。
{"title":"A Novel Authentication Method That Combines Honeytokens and Google Authenticator","authors":"Vassilis Papaspirou, Maria Papathanasaki, L. Maglaras, I. Kantzavelou, C. Douligeris, M. Ferrag, H. Janicke","doi":"10.3390/info14070386","DOIUrl":"https://doi.org/10.3390/info14070386","url":null,"abstract":"Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. To address this, this study proposes a new two-factor authentication method that uses honeytokens. Honeytokens and Google Authenticator are combined to create a stronger authentication process. The proposed approach aims to provide additional layers of security and protection to computer systems, increasing their overall security beyond what is currently provided by single-password or standard two-factor authentication methods. The key difference is that the proposed system resembles a two-factor authentication but, in reality, works like a multi-factor authentication system. Multi-factor authentication (MFA) is a security technique that verifies a user’s identity by requiring multiple credentials from distinct categories. These typically include knowledge factors (something the user knows, such as a password or PIN), possession factors (something the user has, such as a mobile phone or security token), and inherence factors (something the user is, such as a biometric characteristic like a fingerprint). This multi-tiered approach significantly enhances protection against potential attacks. We examined and evaluated our system’s robustness against various types of attacks. From the user’s side, the system is as friendly as a two-factor authentication method with an authenticator and is more secure.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90348614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Layered and Parallelized Method of Eventual Model Checking 一种分层并行的最终模型检验方法
Pub Date : 2023-07-06 DOI: 10.3390/info14070384
Yati Phyo, Moe Nandi Aung, Canh Minh Do, K. Ogata
Termination or halting is an important system requirement that many systems should satisfy and can be expressed in linear temporal logic as eventual properties. We devised a divide-and-conquer approach to eventual model checking in order to reduce the state space explosion in model checking. The idea of the technique is to split an original model checking problem for eventual properties into multiple smaller model checking problems and handle each smaller one. Due to the nature of the divide-and-conquer approach, each smaller model checking problem can essentially be tackled independently. Hence, this paper proposes a parallel technique/tool based on a master–worker pattern for the divide-and-conquer approach to model checking eventual properties. We carry out some experiments to show the effectiveness of our parallel technique/tool, which can somewhat enhance the running performance to a certain extent when conducting model checking for eventual properties.
终止或停止是许多系统应该满足的重要系统要求,并且可以用线性时间逻辑表示为最终属性。我们设计了一种分而治之的方法来进行最终的模型检查,以减少模型检查中的状态空间爆炸。该技术的思想是将最终属性的原始模型检查问题拆分为多个较小的模型检查问题,并处理每个较小的模型检查问题。由于分而治之方法的性质,每个较小的模型检查问题本质上可以独立解决。因此,本文提出了一种基于主工模式的并行技术/工具,用于分而治之的方法来模型检查最终属性。我们进行了一些实验来证明我们的并行技术/工具的有效性,在进行最终属性的模型检查时,可以在一定程度上提高运行性能。
{"title":"A Layered and Parallelized Method of Eventual Model Checking","authors":"Yati Phyo, Moe Nandi Aung, Canh Minh Do, K. Ogata","doi":"10.3390/info14070384","DOIUrl":"https://doi.org/10.3390/info14070384","url":null,"abstract":"Termination or halting is an important system requirement that many systems should satisfy and can be expressed in linear temporal logic as eventual properties. We devised a divide-and-conquer approach to eventual model checking in order to reduce the state space explosion in model checking. The idea of the technique is to split an original model checking problem for eventual properties into multiple smaller model checking problems and handle each smaller one. Due to the nature of the divide-and-conquer approach, each smaller model checking problem can essentially be tackled independently. Hence, this paper proposes a parallel technique/tool based on a master–worker pattern for the divide-and-conquer approach to model checking eventual properties. We carry out some experiments to show the effectiveness of our parallel technique/tool, which can somewhat enhance the running performance to a certain extent when conducting model checking for eventual properties.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81122265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Inf. Comput.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1