首页 > 最新文献

Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023最新文献

英文 中文
Image Processing and Optimization Using Deep Learning-Based Generative Adversarial Networks (GANs) 使用基于深度学习的生成对抗网络(GANs)进行图像处理和优化
Pub Date : 2024-06-11 DOI: 10.60087/jaigs.v5i1.163
Yang Zhang, Hangyu Xie, Shikai Zhuang, Xiaoan Zhan
This paper introduces the application of generative adversarial networks (GANs) in image processing and optimization. GANs model can generate realistic images by co-training generator and discriminator, and achieve remarkable results in image restoration tasks. CATGAN and DCGAN are two commonly used GAN models applied to image classification and image restoration respectively. In addition, the global and local image patching methods can effectively fill the missing areas in the image and show good results in the restoration of large images. In conclusion, the image processing and optimization method based on GANs has shown great potential in practice and provides beneficial insight for future research and application in the field of image processing.
本文介绍了生成式对抗网络(GANs)在图像处理和优化中的应用。GANs 模型可以通过联合训练生成器和判别器生成逼真的图像,并在图像复原任务中取得显著效果。CATGAN 和 DCGAN 是两种常用的 GAN 模型,分别应用于图像分类和图像修复。此外,全局和局部图像修补方法能有效填补图像中的缺失区域,在大图像的修复中表现出良好的效果。总之,基于 GANs 的图像处理和优化方法在实践中展现出了巨大的潜力,为今后图像处理领域的研究和应用提供了有益的启示。
{"title":"Image Processing and Optimization Using Deep Learning-Based Generative Adversarial Networks (GANs)","authors":"Yang Zhang, Hangyu Xie, Shikai Zhuang, Xiaoan Zhan","doi":"10.60087/jaigs.v5i1.163","DOIUrl":"https://doi.org/10.60087/jaigs.v5i1.163","url":null,"abstract":"This paper introduces the application of generative adversarial networks (GANs) in image processing and optimization. GANs model can generate realistic images by co-training generator and discriminator, and achieve remarkable results in image restoration tasks. CATGAN and DCGAN are two commonly used GAN models applied to image classification and image restoration respectively. In addition, the global and local image patching methods can effectively fill the missing areas in the image and show good results in the restoration of large images. In conclusion, the image processing and optimization method based on GANs has shown great potential in practice and provides beneficial insight for future research and application in the field of image processing.","PeriodicalId":517201,"journal":{"name":"Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023","volume":"7 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141357158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-based NLP section discusses the application and effect of bag-of-words models and TF-IDF in NLP tasks 基于人工智能的 NLP 部分讨论了词袋模型和 TF-IDF 在 NLP 任务中的应用和效果
Pub Date : 2024-06-01 DOI: 10.60087/jaigs.v5i1.149
Shuying Dai, Keqin Li, Zhuolun Luo, Peng Zhao, Bo Hong, Armando Zhu, Jiabei Liu
This paper delves into the practical applications and effectiveness of two prominent text representation methods, the Bag-of-Words (BoW) model and Term Frequency-Inverse Document Frequency (TF-IDF), in the realm of Natural Language Processing (NLP). It commences with an introductory overview of NLP and its pivotal role in the broader field of Artificial Intelligence (AI), elucidating the importance of enabling computers to comprehend and manipulate human language. Subsequently, a comprehensive elucidation of the underlying principles and implementation of these two methods is provided. By conducting a comparative analysis of their respective strengths and weaknesses, the paper endeavors to ascertain the most suitable model for a diverse range of scenarios. The study reveals that while the BoW model proves to be effective for tasks involving short text classification, TF-IDF emerges as the preferred choice for applications such as search engines and keyword extraction. This is attributed to TF-IDF's ability to discern the significance of words within a document in relation to a corpus, thereby mitigating the influence of common but less meaningful words. In conclusion, the paper highlights the significance of AI advancements in shaping the future landscape of NLP. The integration of neural networks and deep learning has revolutionized the field, enabling more sophisticated text representations and enhancing performance in areas such as speech recognition, machine translation, and sentiment analysis. The paper underscores the dynamic nature of NLP and its continual evolution in tandem with AI technologies, offering promising prospects for future research and application development.
本文深入探讨了词袋(BoW)模型和词频-反向文档频率(TF-IDF)这两种著名文本表示方法在自然语言处理(NLP)领域的实际应用和有效性。本书首先介绍了 NLP 及其在人工智能(AI)这一更广泛领域中的关键作用,阐明了使计算机能够理解和处理人类语言的重要性。随后,对这两种方法的基本原理和实施进行了全面阐释。通过对这两种方法各自的优缺点进行比较分析,本文试图确定最适合各种不同场景的模型。研究结果表明,BoW 模型对涉及短文本分类的任务非常有效,而 TF-IDF 则成为搜索引擎和关键词提取等应用的首选。这要归功于 TF-IDF 能够辨别文档中与语料库相关的单词的重要性,从而减轻常见但意义不大的单词的影响。最后,本文强调了人工智能的进步对塑造未来 NLP 格局的重要意义。神经网络和深度学习的融合给这一领域带来了革命性的变化,使语音识别、机器翻译和情感分析等领域能够实现更复杂的文本表示并提高性能。论文强调了 NLP 的动态性质及其与人工智能技术的不断发展,为未来的研究和应用开发提供了广阔的前景。
{"title":"AI-based NLP section discusses the application and effect of bag-of-words models and TF-IDF in NLP tasks","authors":"Shuying Dai, Keqin Li, Zhuolun Luo, Peng Zhao, Bo Hong, Armando Zhu, Jiabei Liu","doi":"10.60087/jaigs.v5i1.149","DOIUrl":"https://doi.org/10.60087/jaigs.v5i1.149","url":null,"abstract":"This paper delves into the practical applications and effectiveness of two prominent text representation methods, the Bag-of-Words (BoW) model and Term Frequency-Inverse Document Frequency (TF-IDF), in the realm of Natural Language Processing (NLP). It commences with an introductory overview of NLP and its pivotal role in the broader field of Artificial Intelligence (AI), elucidating the importance of enabling computers to comprehend and manipulate human language. Subsequently, a comprehensive elucidation of the underlying principles and implementation of these two methods is provided. By conducting a comparative analysis of their respective strengths and weaknesses, the paper endeavors to ascertain the most suitable model for a diverse range of scenarios. The study reveals that while the BoW model proves to be effective for tasks involving short text classification, TF-IDF emerges as the preferred choice for applications such as search engines and keyword extraction. This is attributed to TF-IDF's ability to discern the significance of words within a document in relation to a corpus, thereby mitigating the influence of common but less meaningful words. In conclusion, the paper highlights the significance of AI advancements in shaping the future landscape of NLP. The integration of neural networks and deep learning has revolutionized the field, enabling more sophisticated text representations and enhancing performance in areas such as speech recognition, machine translation, and sentiment analysis. The paper underscores the dynamic nature of NLP and its continual evolution in tandem with AI technologies, offering promising prospects for future research and application development.","PeriodicalId":517201,"journal":{"name":"Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023","volume":"62 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141280106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Task allocation planning based on hierarchical task network for national economic mobilization 基于分层任务网络的国民经济动员任务分配规划
Pub Date : 2024-06-01 DOI: 10.60087/jaigs.v5i1.150
Peng Zhao, Keqin Li, Bo Hong, Armando Zhu, Jiabei Liu, Shuying Dai
In order to cope with the task allocation in national economic mobilization, a task allocation planning method based on Hierarchical Task Network (HTN) for national economic mobilization is proposed. An HTN planning algorithm is proposed to solve and optimize task allocation, and an algorithm is designed to solve resource shortage. Finally, a case study verifies the effectiveness of the proposed method based on a real task allocation case in national economic mobilization.
为了解决国民经济动员中的任务分配问题,提出了一种基于层次任务网络(HTN)的国民经济动员任务分配规划方法。提出了一种 HTN 规划算法来求解和优化任务分配,并设计了一种算法来解决资源短缺问题。最后,基于国民经济动员中的真实任务分配案例,通过案例研究验证了所提方法的有效性。
{"title":"Task allocation planning based on hierarchical task network for national economic mobilization","authors":"Peng Zhao, Keqin Li, Bo Hong, Armando Zhu, Jiabei Liu, Shuying Dai","doi":"10.60087/jaigs.v5i1.150","DOIUrl":"https://doi.org/10.60087/jaigs.v5i1.150","url":null,"abstract":"In order to cope with the task allocation in national economic mobilization, a task allocation planning method based on Hierarchical Task Network (HTN) for national economic mobilization is proposed. An HTN planning algorithm is proposed to solve and optimize task allocation, and an algorithm is designed to solve resource shortage. Finally, a case study verifies the effectiveness of the proposed method based on a real task allocation case in national economic mobilization.","PeriodicalId":517201,"journal":{"name":"Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023","volume":"23 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141274494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Platform for Robot-Assisted Minimally Supervised Hand Therapy: Design and Pilot Usability Evaluation 迈向机器人辅助微监督手部治疗平台:设计与试点可用性评估
Pub Date : 2024-05-22 DOI: 10.60087/jaigs.v4i1.137
Venkata dinesh Reddy kalli
Background   Robot-assisted therapy has the potential to enhance therapy doses post-stroke, addressing the often insufficient treatment of hand function in clinical settings and after discharge. Traditionally, these systems have been complex and required therapist supervision. To better leverage robot-assisted therapy, we propose a platform designed for minimal therapist supervision and present a preliminary evaluation of its immediate usability, addressing a key challenge often neglected in real-world applications. This approach could increase therapy doses by enabling a single therapist to train multiple patients simultaneously, as well as supporting independent training in clinics or at home.    Methods   We implemented design changes on a hand rehabilitation robot, focusing on enabling minimally-supervised therapy. This involved developing new physical and graphical user interfaces and creating two functional therapy exercises aimed at training hand motor coordination, somatosensation, and memory. Ten participants with chronic stroke evaluated the platform's usability and reported their perceived workload during a minimally-supervised therapy session. The ability to use the platform independently was assessed using a checklist.   Results   After a brief familiarization period, participants were able to independently perform the therapy session, needing assistance in only 13.46% (range: 7.69–19.23%) of the tasks. They rated the user interface and exercises highly on the System Usability Scale, with scores of 85.00 (75.63–86.88) and 73.75 (63.13–83.75) out of 100, respectively. Nine participants indicated they would use the platform frequently. The perceived workload was within acceptable ranges. The most challenging tasks identified were object grasping with simultaneous control of forearm pronosupination and stiffness discrimination.   Discussion   Our findings indicate that a robot-assisted therapy device can be safely and intuitively used with minimal supervision upon first exposure by adhering to usability and workload requirements. The preliminary usability evaluation highlighted specific challenges that need to be addressed to enable real-world minimally-supervised use. This platform could complement conventional therapy, providing increased therapy doses with existing resources and establishing a continuum of care that transitions from the clinic to the home.
背景 机器人辅助治疗有可能提高中风后的治疗剂量,解决临床环境和出院后手部功能治疗不足的问题。传统上,这些系统比较复杂,需要治疗师的监督。为了更好地利用机器人辅助治疗,我们提出了一种只需最少治疗师监督的平台,并对其即时可用性进行了初步评估,以解决实际应用中经常被忽视的关键挑战。这种方法能让一名治疗师同时训练多名患者,并支持在诊所或家中进行独立训练,从而提高治疗剂量。 方法 我们对手部康复机器人进行了设计变更,重点是实现最小监督治疗。这包括开发新的物理和图形用户界面,以及创建两个旨在训练手部运动协调、躯体感觉和记忆的功能性治疗练习。十名慢性中风患者对平台的可用性进行了评估,并报告了他们在最小监督治疗过程中感知到的工作量。独立使用平台的能力则通过核对表进行评估。 结果 经过短暂的熟悉后,参与者能够独立完成治疗过程,仅有 13.46%(范围:7.69-19.23%)的任务需要协助。他们在系统可用性量表中对用户界面和练习给予了很高的评价,满分分别为 85.00(75.63-86.88)和 73.75(63.13-83.75)。九名参与者表示会经常使用该平台。感知工作量在可接受范围内。最具挑战性的任务是抓取物体,同时控制前臂前伸和硬度辨别。 讨论 我们的研究结果表明,通过遵守可用性和工作量要求,机器人辅助治疗设备在首次接触时只需最少的监护就能安全、直观地使用。初步可用性评估强调了在现实世界中实现最小监督使用所面临的具体挑战。该平台可作为传统疗法的补充,利用现有资源增加治疗剂量,建立从诊所到家庭的连续护理。
{"title":"Towards a Platform for Robot-Assisted Minimally Supervised Hand Therapy: Design and Pilot Usability Evaluation","authors":"Venkata dinesh Reddy kalli","doi":"10.60087/jaigs.v4i1.137","DOIUrl":"https://doi.org/10.60087/jaigs.v4i1.137","url":null,"abstract":"Background \u0000  \u0000Robot-assisted therapy has the potential to enhance therapy doses post-stroke, addressing the often insufficient treatment of hand function in clinical settings and after discharge. Traditionally, these systems have been complex and required therapist supervision. To better leverage robot-assisted therapy, we propose a platform designed for minimal therapist supervision and present a preliminary evaluation of its immediate usability, addressing a key challenge often neglected in real-world applications. This approach could increase therapy doses by enabling a single therapist to train multiple patients simultaneously, as well as supporting independent training in clinics or at home. \u0000  \u0000 Methods \u0000  \u0000We implemented design changes on a hand rehabilitation robot, focusing on enabling minimally-supervised therapy. This involved developing new physical and graphical user interfaces and creating two functional therapy exercises aimed at training hand motor coordination, somatosensation, and memory. Ten participants with chronic stroke evaluated the platform's usability and reported their perceived workload during a minimally-supervised therapy session. The ability to use the platform independently was assessed using a checklist. \u0000  \u0000Results \u0000  \u0000After a brief familiarization period, participants were able to independently perform the therapy session, needing assistance in only 13.46% (range: 7.69–19.23%) of the tasks. They rated the user interface and exercises highly on the System Usability Scale, with scores of 85.00 (75.63–86.88) and 73.75 (63.13–83.75) out of 100, respectively. Nine participants indicated they would use the platform frequently. The perceived workload was within acceptable ranges. The most challenging tasks identified were object grasping with simultaneous control of forearm pronosupination and stiffness discrimination. \u0000  \u0000Discussion \u0000  \u0000Our findings indicate that a robot-assisted therapy device can be safely and intuitively used with minimal supervision upon first exposure by adhering to usability and workload requirements. The preliminary usability evaluation highlighted specific challenges that need to be addressed to enable real-world minimally-supervised use. This platform could complement conventional therapy, providing increased therapy doses with existing resources and establishing a continuum of care that transitions from the clinic to the home.","PeriodicalId":517201,"journal":{"name":"Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023","volume":"39 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141109566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancing Collective Intelligence in Human–AI Collaboration: Foundations for the COHUMAIN Framework 在人类-人工智能协作中推进集体智能:COHUMAIN 框架的基础
Pub Date : 2024-05-22 DOI: 10.60087/jaigs.v4i1.140
Sohana Akter
Artificial Intelligence (AI) powered machines are increasingly mediating our work and many of our managerial, economic, and cultural interactions. While technology enhances individual capabilities in many ways, how can we ensure that the sociotechnical system as a whole—comprising a complex web of hundreds of human–machine interactions—is exhibiting collective intelligence? Research on human–machine interactions has been conducted within different disciplinary silos, resulting in social science models that underestimate technology and vice versa. Integrating these diverse perspectives and methods is crucial at this juncture. To truly advance our understanding of this important and rapidly evolving area, we need frameworks to facilitate research that bridges disciplinary boundaries. This paper advocates for establishing an interdisciplinary research domain—Collective Human-Machine Intelligence (COHUMAIN). It outlines a research agenda for a holistic approach to designing and developing the dynamics of sociotechnical systems. To illustrate the approach we envision in this domain, we describe recent work on a sociocognitive architecture, the transactive systems model of collective intelligence, which articulates the critical processes underlying the emergence and functioning of collective intelligence in human–AI collaborations.
由人工智能(AI)驱动的机器正越来越多地介入我们的工作以及许多管理、经济和文化互动。虽然技术在许多方面增强了个人能力,但我们如何才能确保社会技术系统作为一个整体--由数百种人机互动组成的复杂网络--展现出集体智慧?有关人机互动的研究一直在不同的学科领域内进行,导致社会科学模型低估了技术,反之亦然。在这个关键时刻,整合这些不同的观点和方法至关重要。为了真正推进我们对这一重要且快速发展领域的理解,我们需要一个框架来促进跨越学科界限的研究。本文主张建立一个跨学科研究领域--人机交互智能(COHUMAIN)。它概述了以整体方法设计和开发社会技术系统动态的研究议程。为了说明我们在这一领域所设想的方法,我们介绍了最近在社会认知架构--集体智能的交互系统模型--方面所做的工作,该模型阐明了人类与人工智能合作中集体智能出现和运作的关键过程。
{"title":"Advancing Collective Intelligence in Human–AI Collaboration: Foundations for the COHUMAIN Framework","authors":"Sohana Akter","doi":"10.60087/jaigs.v4i1.140","DOIUrl":"https://doi.org/10.60087/jaigs.v4i1.140","url":null,"abstract":"Artificial Intelligence (AI) powered machines are increasingly mediating our work and many of our managerial, economic, and cultural interactions. While technology enhances individual capabilities in many ways, how can we ensure that the sociotechnical system as a whole—comprising a complex web of hundreds of human–machine interactions—is exhibiting collective intelligence? Research on human–machine interactions has been conducted within different disciplinary silos, resulting in social science models that underestimate technology and vice versa. Integrating these diverse perspectives and methods is crucial at this juncture. To truly advance our understanding of this important and rapidly evolving area, we need frameworks to facilitate research that bridges disciplinary boundaries. \u0000This paper advocates for establishing an interdisciplinary research domain—Collective Human-Machine Intelligence (COHUMAIN). It outlines a research agenda for a holistic approach to designing and developing the dynamics of sociotechnical systems. To illustrate the approach we envision in this domain, we describe recent work on a sociocognitive architecture, the transactive systems model of collective intelligence, which articulates the critical processes underlying the emergence and functioning of collective intelligence in human–AI collaborations.","PeriodicalId":517201,"journal":{"name":"Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023","volume":"49 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141112029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DNA Cryptography for Enhanced Data Storage Security in Cloud Environments 增强云环境中数据存储安全性的 DNA 密码学
Pub Date : 2024-05-22 DOI: 10.60087/jaigs.v4i1.141
Mithun Sarker
Despite the persistent security challenges inherent in cloud systems, a distributed cloud environment necessitates an access control model that is contextually aware to effectively manage these challenges. This model should incorporate a role activation process based on the user's contextual information. Within this role activation process, the rationale behind data collection and usage is disclosed, enabling administrators to establish context-based policies. Consequently, role permissions are dynamically activated based on the association of roles with context. To mitigate complications in the role-based access control model, users are categorized into classes or groups, each with its own access control standards. Access to specific resources is determined by the user's identity upon request.   Traditional access control models often fall short in cloud environments due to their inability to address all aspects of the diverse entities, resources, and users present. In the proposed access control system with perception reasoning, entities are expanded using Extensible Access Control Markup Language (XACML), while a trust module monitors user behavior dynamically, detecting and restricting malicious users attempting illegal data access. This includes assigning an identity tag to malicious users, which involves task and data classification along with database tagging.
尽管云系统固有的安全挑战持续存在,但分布式云环境需要一个能感知上下文的访问控制模型来有效管理这些挑战。这种模式应包含一个基于用户上下文信息的角色激活流程。在角色激活过程中,数据收集和使用背后的理由将被披露,从而使管理员能够建立基于上下文的策略。因此,角色权限是根据角色与上下文的关联动态激活的。为了减少基于角色的访问控制模式的复杂性,用户被分为不同的类别或组别,每个类别或组别都有自己的访问控制标准。对特定资源的访问权限由用户提出申请时的身份决定。 在云环境中,传统的访问控制模型往往无法解决存在的各种实体、资源和用户的方方面面的问题,因而存在不足。在建议的具有感知推理功能的访问控制系统中,实体使用可扩展访问控制标记语言(XACML)进行扩展,而信任模块则动态监控用户行为,检测并限制试图非法访问数据的恶意用户。这包括为恶意用户分配身份标签,其中涉及任务和数据分类以及数据库标签。
{"title":"DNA Cryptography for Enhanced Data Storage Security in Cloud Environments","authors":"Mithun Sarker","doi":"10.60087/jaigs.v4i1.141","DOIUrl":"https://doi.org/10.60087/jaigs.v4i1.141","url":null,"abstract":"Despite the persistent security challenges inherent in cloud systems, a distributed cloud environment necessitates an access control model that is contextually aware to effectively manage these challenges. This model should incorporate a role activation process based on the user's contextual information. Within this role activation process, the rationale behind data collection and usage is disclosed, enabling administrators to establish context-based policies. Consequently, role permissions are dynamically activated based on the association of roles with context. To mitigate complications in the role-based access control model, users are categorized into classes or groups, each with its own access control standards. Access to specific resources is determined by the user's identity upon request. \u0000  \u0000Traditional access control models often fall short in cloud environments due to their inability to address all aspects of the diverse entities, resources, and users present. In the proposed access control system with perception reasoning, entities are expanded using Extensible Access Control Markup Language (XACML), while a trust module monitors user behavior dynamically, detecting and restricting malicious users attempting illegal data access. This includes assigning an identity tag to malicious users, which involves task and data classification along with database tagging.","PeriodicalId":517201,"journal":{"name":"Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023","volume":"67 36","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141109965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Expedited Examination of Responsible AI Frameworks: Directing Ethical AI Development 快速审查负责任的人工智能框架:引导合乎道德的人工智能发展
Pub Date : 2024-05-22 DOI: 10.60087/jaigs.v4i1.138
Jeff Shuford
In recent years, the rapid expansion of Artificial Intelligence (AI) and its integration into various aspects of daily life have ignited significant discourse on the ethical considerations governing its application. This study addresses these concerns by swiftly reviewing multiple frameworks designed to guide the development and utilization of Responsible AI (RAI) applications. Through this exploration, we analyze each framework's alignment with the Software Development Life Cycle (SDLC) phases, revealing a predominant focus on the Requirements Elicitation phase, with limited coverage of other stages. Furthermore, we note a scarcity of supportive tools, predominantly offered by private entities. Our findings underscore the absence of a comprehensive framework capable of accommodating both technical and non-technical stakeholders across all SDLC phases, thus revealing a notable gap in the current landscape. This study sheds light on the imperative need for a unified framework encompassing all RAI principles and SDLC phases, accessible to users of varying expertise and objectives.
近年来,人工智能(AI)的快速发展及其与日常生活各方面的融合,引发了有关其应用伦理问题的重要讨论。本研究针对这些问题,迅速审查了多个旨在指导负责任的人工智能(RAI)应用开发和使用的框架。通过这一探索,我们分析了每个框架与软件开发生命周期(SDLC)各阶段的一致性,发现其主要侧重于需求征询阶段,对其他阶段的覆盖范围有限。此外,我们还注意到支持性工具很少,主要由私营实体提供。我们的研究结果表明,在 SDLC 的所有阶段,都缺乏一个能够兼顾技术和非技术利益相关者的综合框架,从而揭示了目前存在的一个显著差距。本研究揭示了一个统一框架的迫切需要,该框架应涵盖所有 RAI 原则和 SDLC 阶段,并可供不同专业知识和目标的用户使用。
{"title":"An Expedited Examination of Responsible AI Frameworks: Directing Ethical AI Development","authors":"Jeff Shuford","doi":"10.60087/jaigs.v4i1.138","DOIUrl":"https://doi.org/10.60087/jaigs.v4i1.138","url":null,"abstract":"In recent years, the rapid expansion of Artificial Intelligence (AI) and its integration into various aspects of daily life have ignited significant discourse on the ethical considerations governing its application. This study addresses these concerns by swiftly reviewing multiple frameworks designed to guide the development and utilization of Responsible AI (RAI) applications. Through this exploration, we analyze each framework's alignment with the Software Development Life Cycle (SDLC) phases, revealing a predominant focus on the Requirements Elicitation phase, with limited coverage of other stages. Furthermore, we note a scarcity of supportive tools, predominantly offered by private entities. Our findings underscore the absence of a comprehensive framework capable of accommodating both technical and non-technical stakeholders across all SDLC phases, thus revealing a notable gap in the current landscape. This study sheds light on the imperative need for a unified framework encompassing all RAI principles and SDLC phases, accessible to users of varying expertise and objectives.","PeriodicalId":517201,"journal":{"name":"Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023","volume":"51 21","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141111144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ethical Considerations in AI Simulations for Designing Assistive Technologies 设计辅助技术的人工智能模拟中的伦理考虑因素
Pub Date : 2024-05-20 DOI: 10.60087/jaigs.v4i1.135
Evin Miser, Orcun Sarioguz
Current ethical debates on the use of artificial intelligence (AI) in healthcare approach AI technology in three primary ways. First, they assess the risks and potential benefits of current AI-enabled products using ethical checklists. Second, they propose ex ante lists of ethical values relevant to the design and development of assistive technologies. Third, they advocate for incorporating moral reasoning into AI's automation processes. These three perspectives dominate the discourse, as evidenced by a brief literature summary. We propose a fourth approach: viewing AI as a methodological tool to aid ethical reflection. This involves an AI simulation concept informed by three elements: 1) stochastic human behavior models based on behavioral data for simulating realistic scenarios, 2) qualitative empirical data on value statements regarding internal policy, and 3) visualization components to illustrate the impact of variable changes. This approach aims to inform an interdisciplinary field about anticipated ethical challenges or trade-offs in specific settings, prompting a re-evaluation of design and implementation plans. This is particularly useful for applications involving complex values and behaviors or limited communication resources, such as dementia care or care for individuals with cognitive impairments. While simulation does not replace ethical reflection, it allows for detailed, context-sensitive analysis during the design process and before implementation.Finally, we discuss the quantitative analysis methods enabled by stochastic simulations and the potential for these simulations to enhance traditional thought experiments and future-oriented technology assessments.
目前关于在医疗保健领域使用人工智能(AI)的伦理辩论主要从三个方面探讨人工智能技术。首先,他们使用伦理清单评估当前人工智能产品的风险和潜在益处。其次,他们事先提出了与辅助技术的设计和开发相关的伦理价值清单。第三,他们主张将道德推理纳入人工智能的自动化流程。正如简要的文献综述所示,这三种观点在讨论中占主导地位。我们提出了第四种方法:将人工智能视为辅助道德反思的方法论工具。这涉及一个人工智能模拟概念,其中包含三个要素:1) 基于行为数据的随机人类行为模型,用于模拟现实场景;2) 有关内部政策价值声明的定性经验数据;3) 可视化组件,用于说明变量变化的影响。这种方法旨在为跨学科领域提供有关特定环境中预期的伦理挑战或权衡的信息,从而促使对设计和实施计划进行重新评估。这对于涉及复杂价值观和行为或沟通资源有限的应用尤其有用,例如老年痴呆症护理或认知障碍患者护理。最后,我们讨论了随机模拟所带来的定量分析方法,以及这些模拟在加强传统思想实验和面向未来的技术评估方面的潜力。
{"title":"Ethical Considerations in AI Simulations for Designing Assistive Technologies","authors":"Evin Miser, Orcun Sarioguz","doi":"10.60087/jaigs.v4i1.135","DOIUrl":"https://doi.org/10.60087/jaigs.v4i1.135","url":null,"abstract":"Current ethical debates on the use of artificial intelligence (AI) in healthcare approach AI technology in three primary ways. First, they assess the risks and potential benefits of current AI-enabled products using ethical checklists. Second, they propose ex ante lists of ethical values relevant to the design and development of assistive technologies. Third, they advocate for incorporating moral reasoning into AI's automation processes. These three perspectives dominate the discourse, as evidenced by a brief literature summary. We propose a fourth approach: viewing AI as a methodological tool to aid ethical reflection. This involves an AI simulation concept informed by three elements: 1) stochastic human behavior models based on behavioral data for simulating realistic scenarios, 2) qualitative empirical data on value statements regarding internal policy, and 3) visualization components to illustrate the impact of variable changes. This approach aims to inform an interdisciplinary field about anticipated ethical challenges or trade-offs in specific settings, prompting a re-evaluation of design and implementation plans. This is particularly useful for applications involving complex values and behaviors or limited communication resources, such as dementia care or care for individuals with cognitive impairments. While simulation does not replace ethical reflection, it allows for detailed, context-sensitive analysis during the design process and before implementation.Finally, we discuss the quantitative analysis methods enabled by stochastic simulations and the potential for these simulations to enhance traditional thought experiments and future-oriented technology assessments.","PeriodicalId":517201,"journal":{"name":"Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023","volume":"60 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141121773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revolutionizing Cybersecurity with Machine Learning: A Comprehensive Review and Future Directions 用机器学习革新网络安全:全面回顾与未来方向
Pub Date : 2024-05-19 DOI: 10.60087/jaigs.v4i1.133
Bhuvi Chopra
In the realm of computing, data science has revolutionized cybersecurity operations and technologies. The key to creating automated and intelligent security systems lies in extracting patterns or insights from cybersecurity data and building data-driven models. Data science, encompassing various scientific approaches, machine learning techniques, processes, and systems, studies real-world occurrences through data analysis. Machine learning techniques, known for their flexibility, scalability, and adaptability to new and unknown challenges, have been applied across many scientific fields. Cybersecurity is rapidly expanding due to significant advancements in social networks, cloud and web technologies, online banking, mobile environments, smart grids, and more. Various machine learning techniques have effectively addressed a wide range of computer security issues. This article reviews several machine learning applications in cybersecurity, including phishing detection, network intrusion detection, keystroke dynamics authentication, cryptography, human interaction proofs, spam detection in social networks, smart meter energy consumption profiling, and security concerns associated with machine learning techniques themselves. The methodology involves collecting a large dataset of phishing and legitimate instances, extracting relevant features such as email headers, content, and URLs, and training a machine learning model using supervised learning algorithms. These models can effectively identify phishing emails and websites with high accuracy and low false positive rates. To enhance phishing detection, it is recommended to continuously update the training dataset to include new phishing techniques and employ ensemble methods that combine multiple machine learning models for improved performance
在计算领域,数据科学已经彻底改变了网络安全操作和技术。创建自动化和智能化安全系统的关键在于从网络安全数据中提取模式或见解,并建立数据驱动模型。数据科学包含各种科学方法、机器学习技术、流程和系统,通过数据分析研究现实世界中发生的事情。机器学习技术以其灵活性、可扩展性和对新的未知挑战的适应性而著称,已在许多科学领域得到应用。由于社交网络、云计算和网络技术、网上银行、移动环境、智能电网等领域的显著进步,网络安全正在迅速扩展。各种机器学习技术有效地解决了广泛的计算机安全问题。本文回顾了机器学习在网络安全领域的几种应用,包括网络钓鱼检测、网络入侵检测、按键动态验证、密码学、人机交互证明、社交网络中的垃圾邮件检测、智能电表能耗分析,以及与机器学习技术本身相关的安全问题。该方法包括收集大量网络钓鱼和合法实例数据集,提取电子邮件标题、内容和 URL 等相关特征,并使用监督学习算法训练机器学习模型。这些模型能有效识别网络钓鱼邮件和网站,准确率高,误报率低。为提高网络钓鱼检测能力,建议不断更新训练数据集,以纳入新的网络钓鱼技术,并采用结合多个机器学习模型的集合方法来提高性能。
{"title":"Revolutionizing Cybersecurity with Machine Learning: A Comprehensive Review and Future Directions","authors":"Bhuvi Chopra","doi":"10.60087/jaigs.v4i1.133","DOIUrl":"https://doi.org/10.60087/jaigs.v4i1.133","url":null,"abstract":"In the realm of computing, data science has revolutionized cybersecurity operations and technologies. The key to creating automated and intelligent security systems lies in extracting patterns or insights from cybersecurity data and building data-driven models. Data science, encompassing various scientific approaches, machine learning techniques, processes, and systems, studies real-world occurrences through data analysis. Machine learning techniques, known for their flexibility, scalability, and adaptability to new and unknown challenges, have been applied across many scientific fields. Cybersecurity is rapidly expanding due to significant advancements in social networks, cloud and web technologies, online banking, mobile environments, smart grids, and more. Various machine learning techniques have effectively addressed a wide range of computer security issues. This article reviews several machine learning applications in cybersecurity, including phishing detection, network intrusion detection, keystroke dynamics authentication, cryptography, human interaction proofs, spam detection in social networks, smart meter energy consumption profiling, and security concerns associated with machine learning techniques themselves. The methodology involves collecting a large dataset of phishing and legitimate instances, extracting relevant features such as email headers, content, and URLs, and training a machine learning model using supervised learning algorithms. These models can effectively identify phishing emails and websites with high accuracy and low false positive rates. To enhance phishing detection, it is recommended to continuously update the training dataset to include new phishing techniques and employ ensemble methods that combine multiple machine learning models for improved performance","PeriodicalId":517201,"journal":{"name":"Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023","volume":"120 25","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141124163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Improved Privacy in Digital Marketing: A Unified Approach to User Modeling with Deep Learning on a Data Monetization Platform 提高数字营销中的隐私保护:数据货币化平台上的深度学习用户建模统一方法
Pub Date : 2024-05-13 DOI: 10.60087/jaigs.v4i1.130
Bhuvi Chopra, Vinayak Raja
This paper introduces an innovative method for safeguarding user privacy in digital marketing campaigns through the application of deep learning techniques on a data monetization platform. This framework empowers users to maintain authority over their personal data while enabling marketers to pinpoint suitable target audiences. The system consists of several key stages Data representation learning in hyperbolic space captures latent user interests across various data sources with hierarchical structures. Subsequently, Generative Adversarial Networks generate synthetic user interests from these embedding. To preserve user privacy, Federated Learning is utilized for decentralized user monetization, Data privacy, modeling training, ensuring data remains undisclosed to marketers. Lastly, a hyperbolic embedding, Federated learning targeting strategy, rooted in recommendation systems, utilizes learned user interests to identify optimal target audiences for digital marketing campaigns. In sum, this approach offers a comprehensive solution for privacy-preserving user modeling in digital marketing.
本文介绍了一种创新方法,通过在数据货币化平台上应用深度学习技术,在数字营销活动中保护用户隐私。该框架使用户能够保持对其个人数据的控制权,同时使营销人员能够准确定位合适的目标受众。该系统由几个关键阶段组成 在双曲空间中进行数据表示学习,捕捉各种数据源中具有层次结构的潜在用户兴趣。随后,生成对抗网络(Generative Adversarial Networks)根据这些嵌入生成合成用户兴趣。为了保护用户隐私,联邦学习(Federated Learning)被用于分散的用户货币化、数据隐私、建模训练,确保数据不会泄露给营销人员。最后,以推荐系统为基础的双曲嵌入、联邦学习目标定位策略利用学习到的用户兴趣来确定数字营销活动的最佳目标受众。总之,这种方法为数字营销中的隐私保护用户建模提供了全面的解决方案。
{"title":"Towards Improved Privacy in Digital Marketing: A Unified Approach to User Modeling with Deep Learning on a Data Monetization Platform","authors":"Bhuvi Chopra, Vinayak Raja","doi":"10.60087/jaigs.v4i1.130","DOIUrl":"https://doi.org/10.60087/jaigs.v4i1.130","url":null,"abstract":"This paper introduces an innovative method for safeguarding user privacy in digital marketing campaigns through the application of deep learning techniques on a data monetization platform. This framework empowers users to maintain authority over their personal data while enabling marketers to pinpoint suitable target audiences. The system consists of several key stages Data representation learning in hyperbolic space captures latent user interests across various data sources with hierarchical structures. Subsequently, Generative Adversarial Networks generate synthetic user interests from these embedding. To preserve user privacy, Federated Learning is utilized for decentralized user monetization, Data privacy, modeling training, ensuring data remains undisclosed to marketers. Lastly, a hyperbolic embedding, Federated learning targeting strategy, rooted in recommendation systems, utilizes learned user interests to identify optimal target audiences for digital marketing campaigns. In sum, this approach offers a comprehensive solution for privacy-preserving user modeling in digital marketing.","PeriodicalId":517201,"journal":{"name":"Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023","volume":"41 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140984013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1