首页 > 最新文献

Journal of King Saud University-Computer and Information Sciences最新文献

英文 中文
Graph contrast learning for recommendation based on relational graph convolutional neural network 基于关系图卷积神经网络的推荐图对比学习
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-14 DOI: 10.1016/j.jksuci.2024.102168
Xiaoyang Liu , Hanwen Feng , Xiaoqin Zhang , Xia Zhou , Asgarali Bouyer
Current knowledge graph-based recommendation methods heavily rely on high-quality knowledge graphs, often falling short in effectively addressing issues such as the cold start problem and heterogeneous noise in user interactions. This leads to biases in user interest and popularity. To overcome these challenges, this paper introduces a novel recommendation approach termed Knowledge-enhanced Perceptive Graph Attention with Graph Contrastive Learning (KPA-GCL), which leverages relational graph convolutional neural networks. The proposed method optimizes the triplet embedding representation of entity-item interactions based on relationships between adjacent entities in a heterogeneous graph. Subsequently, a graph convolutional neural network is employed for enhanced aggregation. Similarity scores from a contrastive view serve as the selection criterion for high-quality embedded representations, facilitating the extraction of refined knowledge subgraphs. Multiple adaptive contrast-loss optimization functions are introduced by combining Bayesian Personalized Ranking (BPR) and hard negative sampling techniques. Comparative experiments are conducted with ten popular existing methods using real public datasets. Results indicate that the KPA-GCL method outperforms compared methods in all datasets based on Recall, NDCG, Precision, and Hit-ratio measures. Furthermore, in terms of mitigating cold start and noise, the KPA-GCL method surpasses other ten methods. This validates the reasonability and effectiveness of KPA-GCL in real-world datasets.
当前基于知识图谱的推荐方法严重依赖高质量的知识图谱,但往往无法有效解决冷启动问题和用户交互中的异构噪声等问题。这会导致用户兴趣和受欢迎程度出现偏差。为了克服这些挑战,本文介绍了一种新颖的推荐方法,即利用关系图卷积神经网络的知识增强型感知图注意与图对比学习(KPA-GCL)。所提出的方法基于异构图中相邻实体之间的关系,优化了实体-项目交互的三重嵌入表示。随后,采用图卷积神经网络进行增强聚合。来自对比视图的相似性得分可作为高质量嵌入表示的选择标准,从而促进对精细知识子图的提取。通过结合贝叶斯个性化排名(BPR)和硬负采样技术,引入了多种自适应对比度损失优化函数。利用真实的公共数据集,与现有的十种流行方法进行了对比实验。结果表明,基于 Recall、NDCG、Precision 和 Hit-ratio 等指标,KPA-GCL 方法在所有数据集上都优于其他方法。此外,在减少冷启动和噪音方面,KPA-GCL 方法超过了其他十种方法。这验证了 KPA-GCL 在实际数据集中的合理性和有效性。
{"title":"Graph contrast learning for recommendation based on relational graph convolutional neural network","authors":"Xiaoyang Liu ,&nbsp;Hanwen Feng ,&nbsp;Xiaoqin Zhang ,&nbsp;Xia Zhou ,&nbsp;Asgarali Bouyer","doi":"10.1016/j.jksuci.2024.102168","DOIUrl":"10.1016/j.jksuci.2024.102168","url":null,"abstract":"<div><div>Current knowledge graph-based recommendation methods heavily rely on high-quality knowledge graphs, often falling short in effectively addressing issues such as the cold start problem and heterogeneous noise in user interactions. This leads to biases in user interest and popularity. To overcome these challenges, this paper introduces a novel recommendation approach termed Knowledge-enhanced Perceptive Graph Attention with Graph Contrastive Learning (KPA-GCL), which leverages relational graph convolutional neural networks. The proposed method optimizes the triplet embedding representation of entity-item interactions based on relationships between adjacent entities in a heterogeneous graph. Subsequently, a graph convolutional neural network is employed for enhanced aggregation. Similarity scores from a contrastive view serve as the selection criterion for high-quality embedded representations, facilitating the extraction of refined knowledge subgraphs. Multiple adaptive contrast-loss optimization functions are introduced by combining Bayesian Personalized Ranking (BPR) and hard negative sampling techniques. Comparative experiments are conducted with ten popular existing methods using real public datasets. Results indicate that the KPA-GCL method outperforms compared methods in all datasets based on Recall, NDCG, Precision, and Hit-ratio measures. Furthermore, in terms of mitigating cold start and noise, the KPA-GCL method surpasses other ten methods. This validates the reasonability and effectiveness of KPA-GCL in real-world datasets.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 8","pages":"Article 102168"},"PeriodicalIF":5.2,"publicationDate":"2024-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S131915782400257X/pdfft?md5=d69bd7bfcc27dc9c754378e21af4a8b9&pid=1-s2.0-S131915782400257X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142315441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving embedding-based link prediction performance using clustering 利用聚类提高基于嵌入的链接预测性能
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-13 DOI: 10.1016/j.jksuci.2024.102181
Fitri Susanti , Nur Ulfa Maulidevi , Kridanto Surendro

Incomplete knowledge graphs are common problem that can impair task accuracy. As knowledge graphs grow extensively, the probability of incompleteness increases. Link prediction addresses this problem, but accurate and efficient link prediction methods are needed to handle incomplete and extensive knowledge graphs. This study proposed modifications to the embedding-based link prediction using clustering to improve performance. The proposed method involves four main processes: embedding, clustering, determining clusters, and scoring. Embedding converts entities and relations into vectors while clustering groups these vectors. Selected clusters are determined based on the shortest distance between the centroid and the incomplete knowledge graph. Scoring measures relation rankings, and link prediction result is selected based on highest scores. The link prediction performance is evaluated using Hits@1, Mean Rank, Mean Reciprocal Rank and prediction time on three knowledge graph datasets: WN11, WN18RR, and FB13. The link prediction methods used are TransE and ComplEx, with BIRCH as the clustering technique and Mahalanobis for short-distance measurement. The proposed method significantly improves link prediction performance, achieving accuracy up to 98% and reducing prediction time by 99%. This study provides effective and efficient solution for improving link prediction, demonstrating high accuracy and efficiency in handling incomplete and extensive knowledge graphs.

知识图谱不完整是影响任务准确性的常见问题。随着知识图谱的扩展,不完整的概率也会增加。链接预测可以解决这个问题,但需要准确高效的链接预测方法来处理不完整和广泛的知识图谱。本研究提出利用聚类对基于嵌入的链接预测进行修改,以提高性能。建议的方法包括四个主要过程:嵌入、聚类、确定聚类和评分。嵌入将实体和关系转换为向量,而聚类则将这些向量分组。根据中心点与不完整知识图谱之间的最短距离确定选定的聚类。评分衡量关系排名,并根据最高分选出链接预测结果。在三个知识图谱数据集上,使用点击率@1、平均排名、平均互易排名和预测时间对链接预测性能进行了评估:三个知识图谱数据集:WN11、WN18RR 和 FB13。使用的链接预测方法是 TransE 和 ComplEx,聚类技术是 BIRCH,短距离测量是 Mahalanobis。所提出的方法大大提高了链路预测性能,准确率高达 98%,预测时间缩短了 99%。这项研究为改进链接预测提供了有效和高效的解决方案,在处理不完整和广泛的知识图谱时表现出高精度和高效率。
{"title":"Improving embedding-based link prediction performance using clustering","authors":"Fitri Susanti ,&nbsp;Nur Ulfa Maulidevi ,&nbsp;Kridanto Surendro","doi":"10.1016/j.jksuci.2024.102181","DOIUrl":"10.1016/j.jksuci.2024.102181","url":null,"abstract":"<div><p>Incomplete knowledge graphs are common problem that can impair task accuracy. As knowledge graphs grow extensively, the probability of incompleteness increases. Link prediction addresses this problem, but accurate and efficient link prediction methods are needed to handle incomplete and extensive knowledge graphs. This study proposed modifications to the embedding-based link prediction using clustering to improve performance. The proposed method involves four main processes: embedding, clustering, determining clusters, and scoring. Embedding converts entities and relations into vectors while clustering groups these vectors. Selected clusters are determined based on the shortest distance between the centroid and the incomplete knowledge graph. Scoring measures relation rankings, and link prediction result is selected based on highest scores. The link prediction performance is evaluated using Hits@1, Mean Rank, Mean Reciprocal Rank and prediction time on three knowledge graph datasets: WN11, WN18RR, and FB13. The link prediction methods used are TransE and ComplEx, with BIRCH as the clustering technique and Mahalanobis for short-distance measurement. The proposed method significantly improves link prediction performance, achieving accuracy up to 98% and reducing prediction time by 99%. This study provides effective and efficient solution for improving link prediction, demonstrating high accuracy and efficiency in handling incomplete and extensive knowledge graphs.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 8","pages":"Article 102181"},"PeriodicalIF":5.2,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002702/pdfft?md5=e31143cd70a22f8ffa2da3a54e983856&pid=1-s2.0-S1319157824002702-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142241566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A sharding blockchain protocol for enhanced scalability and performance optimization through account transaction reconfiguration 通过账户交易重新配置增强可扩展性和性能优化的分片区块链协议
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-11 DOI: 10.1016/j.jksuci.2024.102184
Jiaying Wu , Lingyun Yuan , Tianyu Xie , Hui Dai

Sharding is a critical technology for enhancing blockchain scalability. However, existing sharding blockchain protocols suffer from a high cross-shard ratio, high transaction latency, limited throughput enhancement, and high account migration. To address these problems, this paper proposes a sharding blockchain protocol for enhanced scalability and performance optimization through account transaction reconfiguration. Firstly, we construct a blockchain transaction account graph network structure to analyze transaction account correlations. Secondly, a modularity-based account transaction reconfiguration algorithm and a detailed account reconfiguration process is designed to minimize cross-shard transactions. Finally, we introduce a transaction processing mechanism for account transaction reconfiguration in parallel with block consensus uploading, which reduces the reconfiguration time overhead and system latency. Experimental results demonstrate substantial performance improvements compared to existing shard protocols: up to a 34.7% reduction in cross-shard transaction ratio, at least an 83.2% decrease in transaction latency, at least a 52.7% increase in throughput and a 7.8% decrease in account migration number. The proposed protocol significantly enhances the overall performance and scalability of blockchain, providing robust support for blockchain applications in various fields such as financial services, supply chain management, and industrial Internet of Things. It also enables better support for high-concurrency scenarios and large-scale network environments.

分片是提高区块链可扩展性的关键技术。然而,现有的分片区块链协议存在跨分片比率高、交易延迟高、吞吐量提升有限以及账户迁移率高等问题。针对这些问题,本文提出了一种分片区块链协议,通过账户交易重构来增强可扩展性和优化性能。首先,我们构建了区块链交易账户图网络结构,分析交易账户相关性。其次,我们设计了一种基于模块化的账户交易重构算法和详细的账户重构流程,以尽量减少跨分区交易。最后,我们引入了与区块共识上传并行的账户交易重新配置交易处理机制,从而减少了重新配置时间开销和系统延迟。实验结果表明,与现有的分片协议相比,该协议的性能有了大幅提升:跨分片交易比率降低了 34.7%,交易延迟至少减少了 83.2%,吞吐量至少增加了 52.7%,账户迁移数量减少了 7.8%。所提出的协议大大提高了区块链的整体性能和可扩展性,为金融服务、供应链管理和工业物联网等各个领域的区块链应用提供了强有力的支持。它还能更好地支持高并发场景和大规模网络环境。
{"title":"A sharding blockchain protocol for enhanced scalability and performance optimization through account transaction reconfiguration","authors":"Jiaying Wu ,&nbsp;Lingyun Yuan ,&nbsp;Tianyu Xie ,&nbsp;Hui Dai","doi":"10.1016/j.jksuci.2024.102184","DOIUrl":"10.1016/j.jksuci.2024.102184","url":null,"abstract":"<div><p>Sharding is a critical technology for enhancing blockchain scalability. However, existing sharding blockchain protocols suffer from a high cross-shard ratio, high transaction latency, limited throughput enhancement, and high account migration. To address these problems, this paper proposes a sharding blockchain protocol for enhanced scalability and performance optimization through account transaction reconfiguration. Firstly, we construct a blockchain transaction account graph network structure to analyze transaction account correlations. Secondly, a modularity-based account transaction reconfiguration algorithm and a detailed account reconfiguration process is designed to minimize cross-shard transactions. Finally, we introduce a transaction processing mechanism for account transaction reconfiguration in parallel with block consensus uploading, which reduces the reconfiguration time overhead and system latency. Experimental results demonstrate substantial performance improvements compared to existing shard protocols: up to a 34.7% reduction in cross-shard transaction ratio, at least an 83.2% decrease in transaction latency, at least a 52.7% increase in throughput and a 7.8% decrease in account migration number. The proposed protocol significantly enhances the overall performance and scalability of blockchain, providing robust support for blockchain applications in various fields such as financial services, supply chain management, and industrial Internet of Things. It also enables better support for high-concurrency scenarios and large-scale network environments.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 8","pages":"Article 102184"},"PeriodicalIF":5.2,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002738/pdfft?md5=107fe417689144e59c75fddd0f5b671f&pid=1-s2.0-S1319157824002738-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RAPID: Robust multi-pAtch masker using channel-wise Pooled varIance with two-stage patch Detection RAPID:利用信道汇集变异和两级补丁检测的鲁棒多咀屏蔽器
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-11 DOI: 10.1016/j.jksuci.2024.102188
Heemin Kim , Byeong-Chan Kim , Sumi Lee , Minjung Kang , Hyunjee Nam , Sunghwan Park , Il-Youp Kwak , Jaewoo Lee

Recently, adversarial patches have become frequently used in adversarial attacks in real-world settings, evolving into various shapes and numbers. However, existing defense methods often exhibit limitations in addressing specific attacks, datasets, or conditions. This underscores the demand for versatile and robust defenses capable of operating across diverse scenarios. In this paper, we propose the RAPID (Robust multi-pAtch masker using channel-wise Pooled varIance with two-stage patch Detection) framework, a stable solution to restore detection efficacy in the presence of multiple patches. The RAPID framework excels in defending against attacks regardless of patch number or shape, offering a versatile defense adaptable to diverse adversarial scenarios. RAPID employs a two-stage strategy to identify and mask coordinates associated with patch attacks. In the first stage, we propose the ‘channel-wise pooled variance’ to detect candidate patch regions. In the second step, upon detecting these regions, we identify dense areas as patches and mask them accordingly. This framework easily integrates into the preprocessing stage of any object detection model due to its independent structure, requiring no modifications to the model itself. Evaluation indicates that RAPID enhances robustness by up to 60% compared to other defenses. RAPID achieves mAP50 and mAP@50-95 values of 0.696 and 0.479, respectively.

最近,对抗性补丁在现实世界的对抗性攻击中被频繁使用,并演变成各种形状和数量。然而,现有的防御方法在应对特定攻击、数据集或条件时往往表现出局限性。这凸显了对能够在不同场景下运行的多功能、强大的防御系统的需求。在本文中,我们提出了 RAPID(Robust multi-pAtch masker using channel-wise Pooled varIance with two-stage patch Detection)框架,这是一种在存在多个补丁的情况下恢复检测功效的稳定解决方案。RAPID 框架在抵御攻击方面表现出色,无论补丁数量或形状如何,都能提供适应不同对抗场景的多功能防御。RAPID 采用两阶段策略来识别和屏蔽与补丁攻击相关的坐标。在第一阶段,我们提出了 "信道汇集方差 "来检测候选补丁区域。第二步,在检测到这些区域后,我们将密集区域识别为补丁,并对其进行相应的屏蔽。由于该框架结构独立,无需修改模型本身,因此可轻松集成到任何物体检测模型的预处理阶段。评估结果表明,与其他防御方法相比,RAPID 增强了高达 60% 的鲁棒性。RAPID 的 mAP50 和 mAP@50-95 值分别为 0.696 和 0.479。
{"title":"RAPID: Robust multi-pAtch masker using channel-wise Pooled varIance with two-stage patch Detection","authors":"Heemin Kim ,&nbsp;Byeong-Chan Kim ,&nbsp;Sumi Lee ,&nbsp;Minjung Kang ,&nbsp;Hyunjee Nam ,&nbsp;Sunghwan Park ,&nbsp;Il-Youp Kwak ,&nbsp;Jaewoo Lee","doi":"10.1016/j.jksuci.2024.102188","DOIUrl":"10.1016/j.jksuci.2024.102188","url":null,"abstract":"<div><p>Recently, adversarial patches have become frequently used in adversarial attacks in real-world settings, evolving into various shapes and numbers. However, existing defense methods often exhibit limitations in addressing specific attacks, datasets, or conditions. This underscores the demand for versatile and robust defenses capable of operating across diverse scenarios. In this paper, we propose the RAPID (<strong>R</strong>obust multi-p<strong>A</strong>tch masker using channel-wise <strong>P</strong>ooled var<strong>I</strong>ance with two-stage patch <strong>D</strong>etection) framework, a stable solution to restore detection efficacy in the presence of multiple patches. The RAPID framework excels in defending against attacks regardless of patch number or shape, offering a versatile defense adaptable to diverse adversarial scenarios. RAPID employs a two-stage strategy to identify and mask coordinates associated with patch attacks. In the first stage, we propose the ‘channel-wise pooled variance’ to detect candidate patch regions. In the second step, upon detecting these regions, we identify dense areas as patches and mask them accordingly. This framework easily integrates into the preprocessing stage of any object detection model due to its independent structure, requiring no modifications to the model itself. Evaluation indicates that RAPID enhances robustness by up to 60% compared to other defenses. RAPID achieves mAP50 and mAP@50-95 values of 0.696 and 0.479, respectively.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 8","pages":"Article 102188"},"PeriodicalIF":5.2,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002775/pdfft?md5=097312e661d7cf2bd4bcbc118fd164bd&pid=1-s2.0-S1319157824002775-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and FPGA implementation of nested grid multi-scroll chaotic system 嵌套网格多卷混沌系统的设计与 FPGA 实现
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-10 DOI: 10.1016/j.jksuci.2024.102186
Guofeng Yu, Chunlei Fan, Jiale Xi, Chengbin Xu

Conventional multi-scroll chaotic systems are often constrained by the number of attractors and the complexity of generation, making it challenging to meet the increasing demands of communication and computation. This paper revolves around the modified Chua’s system. By modifying its differential equation and introducing traditional nonlinear functions, such as the step function sequence and sawtooth function sequence. A nested grid multi-scroll chaotic system (NGMSCS) can be established, capable of generating nested grid multi-scroll attractors. In contrast to conventional grid multi-scroll chaotic attractors, scroll-like phenomena can be initiated outside the grid structure, thereby revealing more complex dynamic behavior and topological features. Through the theoretical design and analysis of the equilibrium point of the system and its stability, the number of saddle-focused equilibrium points of index 2 is further expanded, which can generate (2 N+2) × M attractors, and the formation mechanism is elaborated and verified in detail. In addition, the generation of an arbitrary number of equilibrium points in the y-direction is achieved by transforming the x and y variables, which can generate M×(2 N+2) attractors, increasing the complexity of the system. The system’s dynamical properties are discussed in depth via time series plots, Lyapunov exponents, Poincaré cross sections, 0–1 tests, bifurcation diagrams, and attraction basins. The existence of attractors is confirmed through numerical simulations and FPGA-based hardware experiments.

传统的多辊混沌系统往往受制于吸引子的数量和生成的复杂性,因而难以满足日益增长的通信和计算需求。本文围绕修正的蔡氏系统展开论述。通过修改其微分方程并引入传统的非线性函数,如阶跃函数序列和锯齿函数序列。嵌套网格多卷混沌系统(NGMSCS)就可以建立起来,并能产生嵌套网格多卷吸引子。与传统的网格多卷积混沌吸引子相比,卷积现象可以在网格结构之外启动,从而显示出更复杂的动态行为和拓扑特征。通过对系统平衡点及其稳定性的理论设计和分析,进一步扩展了指数为 2 的鞍焦平衡点数量,可生成(2 N+2 )×M 个吸引子,并详细阐述和验证了其形成机理。此外,通过变换 x 和 y 变量,在 y 方向上生成任意数量的平衡点,可产生 M×(2 N+2) 个吸引子,增加了系统的复杂性。通过时间序列图、Lyapunov 指数、Poincaré 截面、0-1 检验、分岔图和吸引盆地,深入讨论了系统的动力学特性。吸引子的存在通过数值模拟和基于 FPGA 的硬件实验得到了证实。
{"title":"Design and FPGA implementation of nested grid multi-scroll chaotic system","authors":"Guofeng Yu,&nbsp;Chunlei Fan,&nbsp;Jiale Xi,&nbsp;Chengbin Xu","doi":"10.1016/j.jksuci.2024.102186","DOIUrl":"10.1016/j.jksuci.2024.102186","url":null,"abstract":"<div><p>Conventional multi-scroll chaotic systems are often constrained by the number of attractors and the complexity of generation, making it challenging to meet the increasing demands of communication and computation. This paper revolves around the modified Chua’s system. By modifying its differential equation and introducing traditional nonlinear functions, such as the step function sequence and sawtooth function sequence. A nested grid multi-scroll chaotic system (NGMSCS) can be established, capable of generating nested grid multi-scroll attractors. In contrast to conventional grid multi-scroll chaotic attractors, scroll-like phenomena can be initiated outside the grid structure, thereby revealing more complex dynamic behavior and topological features. Through the theoretical design and analysis of the equilibrium point of the system and its stability, the number of saddle-focused equilibrium points of index 2 is further expanded, which can generate (2 N+2) × M attractors, and the formation mechanism is elaborated and verified in detail. In addition, the generation of an arbitrary number of equilibrium points in the <em>y</em>-direction is achieved by transforming the <em>x</em> and <em>y</em> variables, which can generate M×(2 N+2) attractors, increasing the complexity of the system. The system’s dynamical properties are discussed in depth via time series plots, Lyapunov exponents, Poincaré cross sections, 0–1 tests, bifurcation diagrams, and attraction basins. The existence of attractors is confirmed through numerical simulations and FPGA-based hardware experiments.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 8","pages":"Article 102186"},"PeriodicalIF":5.2,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002751/pdfft?md5=5a97268ac1950c4cb177bec835b9c871&pid=1-s2.0-S1319157824002751-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142233768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards the development of believable agents: Adopting neural architectures and adaptive neuro-fuzzy inference system via playback of human traces 开发可信的代理:通过回放人类痕迹采用神经架构和自适应神经模糊推理系统
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1016/j.jksuci.2024.102182
Naveed Anwer Butt , Mian Muhammad Awais , Samra Shahzadi , Tai-hoon Kim , Imran Ashraf

Artificial intelligence (AI) research on video games primarily focused on the imitation of human-like behavior during the past few years. Moreover, to increase the perceived worth of amusement and gratification, there is an enormous rise in the demand for intelligent agents that can imitate human players and video game characters. However, the agents developed using the majority of current approaches are perceived as rather more mechanical, which leads to frustration, and more importantly, failure in engagement. On that account, this study proposes an imitation learning framework to generate human-like behavior for more precise and accurate reproduction. To build a computational model, two learning paradigms are explored, artificial neural networks (ANN) and adaptive neuro-fuzzy inference systems (ANFIS). This study utilized several variations of ANN, including feed-forward, recurrent, extreme learning machines, and regressions, to simulate human player behavior. Furthermore, to find the ideal ANFIS, grid partitioning, subtractive clustering, and fuzzy c-means clustering are used for training. The results demonstrate that ANFIS hybrid intelligence systems trained with subtractive clustering are overall best with an average accuracy of 95%, followed by fuzzy c-means with an average accuracy of 87%. Also, the believability of the obtained AI agents is tested using two statistical methods, i.e., the Mann–Whitney U test and the cosine similarity analysis. Both methods validate that the observed behavior has been reproduced with high accuracy.

在过去几年里,有关视频游戏的人工智能(AI)研究主要集中在模仿人类行为上。此外,为了提高娱乐和满足感的感知价值,对能够模仿人类玩家和视频游戏角色的智能代理的需求也大幅上升。然而,目前使用大多数方法开发的代理被认为是比较机械的,这会导致挫败感,更重要的是,会导致参与失败。有鉴于此,本研究提出了一种模仿学习框架,以生成类似人类的行为,从而实现更精确、更准确的再现。为了建立一个计算模型,我们探索了两种学习范式,即人工神经网络(ANN)和自适应神经模糊推理系统(ANFIS)。本研究利用了几种不同的人工神经网络,包括前馈、递归、极端学习机和回归,来模拟人类球员的行为。此外,为了找到理想的 ANFIS,还使用了网格划分、减法聚类和模糊 c-means 聚类来进行训练。结果表明,使用减法聚类训练的 ANFIS 混合智能系统总体最佳,平均准确率为 95%,其次是模糊 c-means,平均准确率为 87%。此外,还使用两种统计方法,即曼-惠特尼 U 检验和余弦相似性分析,对所获得的人工智能代理的可信度进行了测试。这两种方法都验证了观察到的行为得到了高精度的再现。
{"title":"Towards the development of believable agents: Adopting neural architectures and adaptive neuro-fuzzy inference system via playback of human traces","authors":"Naveed Anwer Butt ,&nbsp;Mian Muhammad Awais ,&nbsp;Samra Shahzadi ,&nbsp;Tai-hoon Kim ,&nbsp;Imran Ashraf","doi":"10.1016/j.jksuci.2024.102182","DOIUrl":"10.1016/j.jksuci.2024.102182","url":null,"abstract":"<div><p>Artificial intelligence (AI) research on video games primarily focused on the imitation of human-like behavior during the past few years. Moreover, to increase the perceived worth of amusement and gratification, there is an enormous rise in the demand for intelligent agents that can imitate human players and video game characters. However, the agents developed using the majority of current approaches are perceived as rather more mechanical, which leads to frustration, and more importantly, failure in engagement. On that account, this study proposes an imitation learning framework to generate human-like behavior for more precise and accurate reproduction. To build a computational model, two learning paradigms are explored, artificial neural networks (ANN) and adaptive neuro-fuzzy inference systems (ANFIS). This study utilized several variations of ANN, including feed-forward, recurrent, extreme learning machines, and regressions, to simulate human player behavior. Furthermore, to find the ideal ANFIS, grid partitioning, subtractive clustering, and fuzzy c-means clustering are used for training. The results demonstrate that ANFIS hybrid intelligence systems trained with subtractive clustering are overall best with an average accuracy of 95%, followed by fuzzy c-means with an average accuracy of 87%. Also, the believability of the obtained AI agents is tested using two statistical methods, i.e., the Mann–Whitney U test and the cosine similarity analysis. Both methods validate that the observed behavior has been reproduced with high accuracy.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 8","pages":"Article 102182"},"PeriodicalIF":5.2,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002714/pdfft?md5=542b4e8449657f4dbd195276e5fb54c1&pid=1-s2.0-S1319157824002714-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142229614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GCNT: Identify influential seed set effectively in social networks by integrating graph convolutional networks with graph transformers GCNT:通过将图卷积网络与图转换器整合,有效识别社交网络中具有影响力的种子集
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1016/j.jksuci.2024.102183
Jianxin Tang , Jitao Qu , Shihui Song , Zhili Zhao , Qian Du

Exploring effective and efficient strategies for identifying influential nodes from social networks as seeds to promote the propagation of influence remains a crucial challenge in the field of influence maximization (IM), which has attracted significant research efforts. Deep learning-based approaches have been adopted as an alternative promising solution to the IM problem. However, a robust model that captures the associations between network information and node influence needs to be investigated, while concurrently considering the effects of the overlapped influence on training labels. To address these challenges, a GCNT model, which integrates Graph Convolutional Networks with Graph Transformers, is introduced in this paper to capture the intricate relationships among the topology of the network, node attributes, and node influence effectively. Furthermore, an innovative method called Greedy-LIE is proposed to generate labels to alleviate the issue of overlapped influence spread. Moreover, a Mask mechanism specially tailored for the IM problem is presented along with an input embedding balancing strategy. The effectiveness of the GCNT model is demonstrated through comprehensive experiments conducted on six real-world networks, and the model shows its competitive performance in terms of both influence maximization and computational efficiency over state-of-the-art methods.

在影响力最大化(IM)领域,探索从社交网络中识别有影响力的节点作为种子以促进影响力传播的切实有效的策略仍然是一个重要挑战,吸引了大量研究人员的努力。基于深度学习的方法已被采用,作为解决 IM 问题的另一种有前途的方案。然而,需要研究一种能捕捉网络信息与节点影响力之间关联的稳健模型,同时考虑重叠影响力对训练标签的影响。为了应对这些挑战,本文引入了一个 GCNT 模型,该模型将图卷积网络与图变换器整合在一起,能有效捕捉网络拓扑、节点属性和节点影响力之间错综复杂的关系。此外,本文还提出了一种名为 "Greedy-LIE "的创新方法来生成标签,以缓解影响扩散重叠的问题。此外,还提出了专门针对 IM 问题的掩码机制以及输入嵌入平衡策略。通过在六个真实世界网络上进行的综合实验,证明了 GCNT 模型的有效性,而且该模型在影响力最大化和计算效率方面的表现都优于最先进的方法。
{"title":"GCNT: Identify influential seed set effectively in social networks by integrating graph convolutional networks with graph transformers","authors":"Jianxin Tang ,&nbsp;Jitao Qu ,&nbsp;Shihui Song ,&nbsp;Zhili Zhao ,&nbsp;Qian Du","doi":"10.1016/j.jksuci.2024.102183","DOIUrl":"10.1016/j.jksuci.2024.102183","url":null,"abstract":"<div><p>Exploring effective and efficient strategies for identifying influential nodes from social networks as seeds to promote the propagation of influence remains a crucial challenge in the field of influence maximization (IM), which has attracted significant research efforts. Deep learning-based approaches have been adopted as an alternative promising solution to the IM problem. However, a robust model that captures the associations between network information and node influence needs to be investigated, while concurrently considering the effects of the overlapped influence on training labels. To address these challenges, a GCNT model, which integrates Graph Convolutional Networks with Graph Transformers, is introduced in this paper to capture the intricate relationships among the topology of the network, node attributes, and node influence effectively. Furthermore, an innovative method called <span><math><mrow><mi>G</mi><mi>r</mi><mi>e</mi><mi>e</mi><mi>d</mi><mi>y</mi></mrow></math></span>-<span><math><mrow><mi>L</mi><mi>I</mi><mi>E</mi></mrow></math></span> is proposed to generate labels to alleviate the issue of overlapped influence spread. Moreover, a Mask mechanism specially tailored for the IM problem is presented along with an input embedding balancing strategy. The effectiveness of the GCNT model is demonstrated through comprehensive experiments conducted on six real-world networks, and the model shows its competitive performance in terms of both influence maximization and computational efficiency over state-of-the-art methods.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 8","pages":"Article 102183"},"PeriodicalIF":5.2,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002726/pdfft?md5=fb687d0a26ab54db6f7c889e608384a1&pid=1-s2.0-S1319157824002726-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142149684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning-driven Data Fabric Trends and Challenges for cloud-to-thing continuum 学习驱动的数据架构趋势与挑战,实现从云到物的连续性
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1016/j.jksuci.2024.102145
Praveen Kumar Donta , Chinmaya Kumar Dehury , Yu-Chen Hu

This special issue is a collection of emerging trends and challenges in applying learning-driven approaches to data fabric architectures within the cloud-to-thing continuum. As data generation and processing increasingly occur at the edge, there is a growing need for intelligent, adaptive data management solutions that seamlessly operate across distributed environments. In this special issue, we received research contributions from various groups around the world. We chose the eight most appropriate and novel contributions to include in this special issue. These eight contributions were further categorized into three themes: Data Handling approaches, resource optimization and management, and security and attacks. Additionally, this editorial suggests future research directions that will potentially lead to groundbreaking insights, which could pave the way for a new era of learning techniques in Data Fabric and the Cloud-to-Thing Continuum.

本特刊汇集了在 "从云到物 "的连续统一体中将学习驱动方法应用于数据结构架构的新兴趋势和挑战。随着数据生成和处理越来越多地发生在边缘,人们越来越需要能够在分布式环境中无缝运行的智能、自适应数据管理解决方案。在本特刊中,我们收到了来自世界各地不同团体的研究成果。我们选择了八篇最合适、最新颖的论文纳入本特刊。这八篇论文被进一步分为三个主题:数据处理方法、资源优化与管理以及安全与攻击。此外,这篇社论还提出了未来的研究方向,这些方向可能会带来突破性的见解,为数据架构和云到物连续体学习技术的新时代铺平道路。
{"title":"Learning-driven Data Fabric Trends and Challenges for cloud-to-thing continuum","authors":"Praveen Kumar Donta ,&nbsp;Chinmaya Kumar Dehury ,&nbsp;Yu-Chen Hu","doi":"10.1016/j.jksuci.2024.102145","DOIUrl":"10.1016/j.jksuci.2024.102145","url":null,"abstract":"<div><p>This special issue is a collection of emerging trends and challenges in applying learning-driven approaches to data fabric architectures within the cloud-to-thing continuum. As data generation and processing increasingly occur at the edge, there is a growing need for intelligent, adaptive data management solutions that seamlessly operate across distributed environments. In this special issue, we received research contributions from various groups around the world. We chose the eight most appropriate and novel contributions to include in this special issue. These eight contributions were further categorized into three themes: Data Handling approaches, resource optimization and management, and security and attacks. Additionally, this editorial suggests future research directions that will potentially lead to groundbreaking insights, which could pave the way for a new era of learning techniques in Data Fabric and the Cloud-to-Thing Continuum.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 7","pages":"Article 102145"},"PeriodicalIF":5.2,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002349/pdfft?md5=286285bbd5dfa0b63dd8785bf5349c2e&pid=1-s2.0-S1319157824002349-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142230508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EETS: An energy-efficient task scheduler in cloud computing based on improved DQN algorithm EETS:基于改进的 DQN 算法的云计算高能效任务调度器
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-31 DOI: 10.1016/j.jksuci.2024.102177
Huanhuan Hou , Azlan Ismail

The huge energy consumption of data centers in cloud computing leads to increased operating costs and high carbon emissions to the environment. Deep Reinforcement Learning (DRL) technology combines of deep learning and reinforcement learning, which has an obvious advantage in solving complex task scheduling problems. Deep Q Network(DQN)-based task scheduling has been employed for objective optimization. However, training the DQN algorithm may result in value overestimation, which can negatively impact the learning effectiveness. The replay buffer technique, while increasing sample utilization, does not distinguish between sample importance, resulting in limited utilization of valuable samples. This study proposes an enhanced task scheduling algorithm based on the DQN framework, which utilizes a more optimized Dueling-network architecture as well as Double DQN strategy to alleviate the overestimation bias and address the shortcomings of DQN. It also incorporates a prioritized experience replay technique to achieve importance sampling of experience data, which overcomes the problem of low utilization due to uniform sampling from replay memory. Based on these improved techniques, we developed an energy-efficient task scheduling algorithm called EETS (Energy-Efficient Task Scheduling). This algorithm automatically learns the optimal scheduling policy from historical data while interacting with the environment. Experimental results demonstrate that EETS exhibits faster convergence rates and higher rewards compared to both DQN and DDQN. In scheduling performance, EETS outperforms other baseline algorithms in key metrics, including energy consumption, average task response time, and average machine working time. Particularly, it has a significant advantage when handling large batches of tasks.

云计算中数据中心的巨大能耗导致运营成本增加,并对环境造成高碳排放。深度强化学习(DRL)技术结合了深度学习和强化学习,在解决复杂任务调度问题方面具有明显优势。基于深度 Q 网络(DQN)的任务调度已被用于目标优化。然而,训练 DQN 算法可能会导致值被高估,从而对学习效果产生负面影响。重放缓冲技术虽然能提高样本利用率,但无法区分样本的重要性,导致宝贵样本的利用率有限。本研究提出了一种基于 DQN 框架的增强型任务调度算法,利用更优化的 Dueling 网络架构和 Double DQN 策略来缓解高估偏差,解决 DQN 的不足。它还采用了优先经验重放技术来实现经验数据的重要性采样,从而克服了重放内存均匀采样导致的利用率低的问题。在这些改进技术的基础上,我们开发了一种名为 EETS(高能效任务调度)的高能效任务调度算法。该算法在与环境交互的过程中自动从历史数据中学习最优调度策略。实验结果表明,与 DQN 和 DDQN 相比,EETS 表现出更快的收敛速度和更高的回报率。在调度性能方面,EETS 在能耗、平均任务响应时间和平均机器工作时间等关键指标上都优于其他基准算法。尤其是在处理大批量任务时,EETS 具有明显优势。
{"title":"EETS: An energy-efficient task scheduler in cloud computing based on improved DQN algorithm","authors":"Huanhuan Hou ,&nbsp;Azlan Ismail","doi":"10.1016/j.jksuci.2024.102177","DOIUrl":"10.1016/j.jksuci.2024.102177","url":null,"abstract":"<div><p>The huge energy consumption of data centers in cloud computing leads to increased operating costs and high carbon emissions to the environment. Deep Reinforcement Learning (DRL) technology combines of deep learning and reinforcement learning, which has an obvious advantage in solving complex task scheduling problems. Deep Q Network(DQN)-based task scheduling has been employed for objective optimization. However, training the DQN algorithm may result in value overestimation, which can negatively impact the learning effectiveness. The replay buffer technique, while increasing sample utilization, does not distinguish between sample importance, resulting in limited utilization of valuable samples. This study proposes an enhanced task scheduling algorithm based on the DQN framework, which utilizes a more optimized Dueling-network architecture as well as Double DQN strategy to alleviate the overestimation bias and address the shortcomings of DQN. It also incorporates a prioritized experience replay technique to achieve importance sampling of experience data, which overcomes the problem of low utilization due to uniform sampling from replay memory. Based on these improved techniques, we developed an energy-efficient task scheduling algorithm called EETS (Energy-Efficient Task Scheduling). This algorithm automatically learns the optimal scheduling policy from historical data while interacting with the environment. Experimental results demonstrate that EETS exhibits faster convergence rates and higher rewards compared to both DQN and DDQN. In scheduling performance, EETS outperforms other baseline algorithms in key metrics, including energy consumption, average task response time, and average machine working time. Particularly, it has a significant advantage when handling large batches of tasks.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 8","pages":"Article 102177"},"PeriodicalIF":5.2,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002660/pdfft?md5=a86e26e6d8a0d8a013697db9338917a5&pid=1-s2.0-S1319157824002660-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142149683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Establishing a multimodal dataset for Arabic Sign Language (ArSL) production 建立阿拉伯手语(ArSL)制作的多模态数据集
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1016/j.jksuci.2024.102165
Samah Abbas , Dimah Alahmadi , Hassanin Al-Barhamtoshy

This paper addresses the potential of Arabic Sign Language (ArSL) recognition systems to facilitate direct communication and enhance social engagement between deaf and non-deaf. Specifically, we focus on the domain of religion to address the lack of accessible religious content for the deaf community. We propose a multimodal architecture framework and develop a novel dataset for ArSL production. The dataset comprises 1950 audio signals with corresponding 131 texts, including words and phrases, and 262 ArSL videos. These videos were recorded by two expert signers and annotated using ELAN based on gloss representation. To evaluate ArSL videos, we employ Cosine similarities and mode distances based on MobileNetV2 and Euclidean distance based on MediaPipe. Additionally, we implement Jac card Similarity to evaluate the gloss representation, resulting in an overall similarity score of 85% between the glosses of the two ArSL videos. The evaluation highlights the complexity of creating an ArSL video corpus and reveals slight differences between the two videos. The findings emphasize the need for careful annotation and representation of ArSL videos to ensure accurate recognition and understanding. Overall, it contributes to bridging the gap in accessible religious content for deaf community by developing a multimodal framework and a comprehensive ArSL dataset.

本文探讨了阿拉伯语手语 (ArSL) 识别系统在促进聋人与非聋人之间的直接交流和社会参与方面的潜力。具体而言,我们将重点放在宗教领域,以解决聋人群体缺乏无障碍宗教内容的问题。我们提出了一个多模态架构框架,并开发了一个新颖的 ArSL 生成数据集。该数据集包括 1950 个音频信号和相应的 131 个文本(包括单词和短语),以及 262 个 ArSL 视频。这些视频由两位专家手语者录制,并使用基于词汇表的 ELAN 进行注释。为了评估 ArSL 视频,我们采用了基于 MobileNetV2 的余弦相似度和模式距离,以及基于 MediaPipe 的欧氏距离。此外,我们还采用了 Jac card Similarity 来评估词汇表,结果发现两段 ArSL 视频的词汇表之间的总体相似度达到了 85%。评估结果凸显了创建 ArSL 视频语料库的复杂性,并揭示了两段视频之间的细微差别。评估结果强调了对 ArSL 视频进行仔细标注和表示的必要性,以确保准确的识别和理解。总之,通过开发一个多模态框架和一个全面的 ArSL 数据集,该研究有助于缩小聋人社区在无障碍宗教内容方面的差距。
{"title":"Establishing a multimodal dataset for Arabic Sign Language (ArSL) production","authors":"Samah Abbas ,&nbsp;Dimah Alahmadi ,&nbsp;Hassanin Al-Barhamtoshy","doi":"10.1016/j.jksuci.2024.102165","DOIUrl":"10.1016/j.jksuci.2024.102165","url":null,"abstract":"<div><p>This paper addresses the potential of Arabic Sign Language (ArSL) recognition systems to facilitate direct communication and enhance social engagement between deaf and non-deaf. Specifically, we focus on the domain of religion to address the lack of accessible religious content for the deaf community. We propose a multimodal architecture framework and develop a novel dataset for ArSL production. The dataset comprises 1950 audio signals with corresponding 131 texts, including words and phrases, and 262 ArSL videos. These videos were recorded by two expert signers and annotated using ELAN based on gloss representation. To evaluate ArSL videos, we employ Cosine similarities and mode distances based on MobileNetV2 and Euclidean distance based on MediaPipe. Additionally, we implement Jac card Similarity to evaluate the gloss representation, resulting in an overall similarity score of 85% between the glosses of the two ArSL videos. The evaluation highlights the complexity of creating an ArSL video corpus and reveals slight differences between the two videos. The findings emphasize the need for careful annotation and representation of ArSL videos to ensure accurate recognition and understanding. Overall, it contributes to bridging the gap in accessible religious content for deaf community by developing a multimodal framework and a comprehensive ArSL dataset.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 8","pages":"Article 102165"},"PeriodicalIF":5.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002544/pdfft?md5=301cc3d87bf22d8e207fb35edd191aea&pid=1-s2.0-S1319157824002544-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of King Saud University-Computer and Information Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1