首页 > 最新文献

PeerJ Computer Science最新文献

英文 中文
Intelligent accounting optimization method based on meta-heuristic algorithm and CNN. 基于元启发式算法和 CNN 的智能会计优化方法。
IF 3.5 4区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-09-20 eCollection Date: 2024-01-01 DOI: 10.7717/peerj-cs.2281
Yanrui Dong

The evolution of social intelligence has led to the adoption of intelligent accounting practices in enterprises. To enhance the efficiency of enterprise accounting operations and improve the capabilities of accountants, we propose an intelligent accounting optimization approach that integrates meta-heuristic algorithms with convolutional neural networks (CNN). First, we enhance the CNN framework by incorporating document and voucher information into accounting audits, creating a multi-modal feature extraction mechanism. Utilizing these multi-modal accounting features, we then introduce a method for assessing accounting quality, which objectively evaluates financial performance. Finally, we propose an optimization technique based on meta-heuristic principles, combining genetic algorithms with annealing models to improve the accounting system. Experimental results validate our approach, demonstrating an accuracy of 0.943 and a mean average precision (mAP) score of 0.812. This method provides technological support for refining accounting audit mechanisms.

社会智能的发展促使企业采用智能会计实践。为了提高企业会计业务的效率,提升会计人员的能力,我们提出了一种元启发式算法与卷积神经网络(CNN)相结合的智能会计优化方法。首先,我们增强了 CNN 框架,将单据和凭证信息纳入会计审计,创建了多模态特征提取机制。然后,利用这些多模态会计特征,我们引入了一种评估会计质量的方法,该方法可客观地评估财务业绩。最后,我们提出了一种基于元启发式原理的优化技术,将遗传算法与退火模型相结合,以改进会计系统。实验结果验证了我们的方法,准确率达到 0.943,平均精确度(mAP)达到 0.812。这种方法为完善会计审计机制提供了技术支持。
{"title":"Intelligent accounting optimization method based on meta-heuristic algorithm and CNN.","authors":"Yanrui Dong","doi":"10.7717/peerj-cs.2281","DOIUrl":"10.7717/peerj-cs.2281","url":null,"abstract":"<p><p>The evolution of social intelligence has led to the adoption of intelligent accounting practices in enterprises. To enhance the efficiency of enterprise accounting operations and improve the capabilities of accountants, we propose an intelligent accounting optimization approach that integrates meta-heuristic algorithms with convolutional neural networks (CNN). First, we enhance the CNN framework by incorporating document and voucher information into accounting audits, creating a multi-modal feature extraction mechanism. Utilizing these multi-modal accounting features, we then introduce a method for assessing accounting quality, which objectively evaluates financial performance. Finally, we propose an optimization technique based on meta-heuristic principles, combining genetic algorithms with annealing models to improve the accounting system. Experimental results validate our approach, demonstrating an accuracy of 0.943 and a mean average precision (mAP) score of 0.812. This method provides technological support for refining accounting audit mechanisms.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"10 ","pages":"e2281"},"PeriodicalIF":3.5,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11419630/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142309136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving synthetic media generation and detection using generative adversarial networks. 利用生成对抗网络改进合成媒体生成和检测。
IF 3.5 4区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-09-20 eCollection Date: 2024-01-01 DOI: 10.7717/peerj-cs.2181
Rabbia Zia, Mariam Rehman, Afzaal Hussain, Shahbaz Nazeer, Maria Anjum

Synthetic images ar---e created using computer graphics modeling and artificial intelligence techniques, referred to as deepfakes. They modify human features by using generative models and deep learning algorithms, posing risks violations of social media regulations and spread false information. To address these concerns, the study proposed an improved generative adversarial network (GAN) model which improves accuracy while differentiating between real and fake images focusing on data augmentation and label smoothing strategies for GAN training. The study utilizes a dataset containing human faces and employs DCGAN (deep convolutional generative adversarial network) as the base model. In comparison with the traditional GANs, the proposed GAN outperform in terms of frequently used metrics i.e., Fréchet Inception Distance (FID) and accuracy. The model effectiveness is demonstrated through evaluation on the Flickr-Faces Nvidia dataset and Fakefaces d--ataset, achieving an FID score of 55.67, an accuracy of 98.82%, and an F1-score of 0.99 in detection. This study optimizes the model parameters to achieve optimal parameter settings. This study fine-tune the model parameters to reach optimal settings, thereby reducing risks in synthetic image generation. The article introduces an effective framework for both image manipulation and detection.

利用计算机图形建模和人工智能技术创建的合成图像被称为深度伪造。它们利用生成模型和深度学习算法修改人体特征,有可能违反社交媒体法规并传播虚假信息。为了解决这些问题,该研究提出了一种改进的生成对抗网络(GAN)模型,该模型在提高准确性的同时,还能区分真实和虚假图像,重点关注 GAN 训练中的数据增强和标签平滑策略。该研究利用包含人脸的数据集,并采用 DCGAN(深度卷积生成式对抗网络)作为基础模型。与传统的 GAN 相比,所提出的 GAN 在常用指标(即弗雷谢特起始距离(FID)和准确率)方面表现更优。通过对 Flickr-Faces Nvidia 数据集和 Fakefaces d--ataset 数据集的评估,证明了该模型的有效性,其 FID 得分为 55.67,准确率为 98.82%,检测的 F1 分数为 0.99。本研究对模型参数进行了优化,以达到最佳参数设置。本研究对模型参数进行微调,以达到最佳参数设置,从而降低合成图像生成的风险。文章介绍了一种有效的图像处理和检测框架。
{"title":"Improving synthetic media generation and detection using generative adversarial networks.","authors":"Rabbia Zia, Mariam Rehman, Afzaal Hussain, Shahbaz Nazeer, Maria Anjum","doi":"10.7717/peerj-cs.2181","DOIUrl":"10.7717/peerj-cs.2181","url":null,"abstract":"<p><p>Synthetic images ar---e created using computer graphics modeling and artificial intelligence techniques, referred to as deepfakes. They modify human features by using generative models and deep learning algorithms, posing risks violations of social media regulations and spread false information. To address these concerns, the study proposed an improved generative adversarial network (GAN) model which improves accuracy while differentiating between real and fake images focusing on data augmentation and label smoothing strategies for GAN training. The study utilizes a dataset containing human faces and employs DCGAN (deep convolutional generative adversarial network) as the base model. In comparison with the traditional GANs, the proposed GAN outperform in terms of frequently used metrics <i>i.e</i>., Fréchet Inception Distance (FID) and accuracy. The model effectiveness is demonstrated through evaluation on the Flickr-Faces Nvidia dataset and Fakefaces d--ataset, achieving an FID score of 55.67, an accuracy of 98.82%, and an F1-score of 0.99 in detection. This study optimizes the model parameters to achieve optimal parameter settings. This study fine-tune the model parameters to reach optimal settings, thereby reducing risks in synthetic image generation. The article introduces an effective framework for both image manipulation and detection.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"10 ","pages":"e2181"},"PeriodicalIF":3.5,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11419665/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142309135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Terrorism group prediction using feature combination and BiGRU with self-attention mechanism. 利用具有自我关注机制的特征组合和 BiGRU 预测恐怖主义群体。
IF 3.5 4区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-09-20 eCollection Date: 2024-01-01 DOI: 10.7717/peerj-cs.2252
Mohammed Abdalsalam, Chunlin Li, Abdelghani Dahou, Natalia Kryvinska

The world faces the ongoing challenge of terrorism and extremism, which threaten the stability of nations, the security of their citizens, and the integrity of political, economic, and social systems. Given the complexity and multifaceted nature of this phenomenon, combating it requires a collective effort, with tailored methods to address its various aspects. Identifying the terrorist organization responsible for an attack is a critical step in combating terrorism. Historical data plays a pivotal role in this process, providing insights that can inform prevention and response strategies. With advancements in technology and artificial intelligence (AI), particularly in military applications, there is growing interest in utilizing these developments to enhance national and regional security against terrorism. Central to this effort are terrorism databases, which serve as rich resources for data on armed organizations, extremist entities, and terrorist incidents. The Global Terrorism Database (GTD) stands out as one of the most widely used and accessible resources for researchers. Recent progress in machine learning (ML), deep learning (DL), and natural language processing (NLP) offers promising avenues for improving the identification and classification of terrorist organizations. This study introduces a framework designed to classify and predict terrorist groups using bidirectional recurrent units and self-attention mechanisms, referred to as BiGRU-SA. This approach utilizes the comprehensive data in the GTD by integrating textual features extracted by DistilBERT with features that show a high correlation with terrorist organizations. Additionally, the Synthetic Minority Over-sampling Technique with Tomek links (SMOTE-T) was employed to address data imbalance and enhance the robustness of our predictions. The BiGRU-SA model captures temporal dependencies and contextual information within the data. By processing data sequences in both forward and reverse directions, BiGRU-SA offers a comprehensive view of the temporal dynamics, significantly enhancing classification accuracy. To evaluate the effectiveness of our framework, we compared ten models, including six traditional ML models and four DL algorithms. The proposed BiGRU-SA framework demonstrated outstanding performance in classifying 36 terrorist organizations responsible for terrorist attacks, achieving an accuracy of 98.68%, precision of 96.06%, sensitivity of 96.83%, specificity of 99.50%, and a Matthews correlation coefficient of 97.50%. Compared to state-of-the-art methods, the proposed model outperformed others, confirming its effectiveness and accuracy in the classification and prediction of terrorist organizations.

恐怖主义和极端主义威胁着国家的稳定、公民的安全以及政治、经济和社会体系的完整,世界面临着持续不断的挑战。鉴于恐怖主义和极端主义现象的复杂性和多面性,打击恐怖主义和极端主义需要集体努力,采取有针对性的方法解决其各个方面的问题。确定对袭击负责的恐怖组织是打击恐怖主义的关键一步。历史数据在这一过程中发挥着关键作用,可为预防和应对战略提供洞察力。随着技术和人工智能(AI)的进步,特别是在军事应用方面的进步,人们越来越有兴趣利用这些发展来加强国家和地区的反恐安全。恐怖主义数据库是这项工作的核心,它是有关武装组织、极端主义实体和恐怖事件的丰富数据资源。全球恐怖主义数据库(GTD)是研究人员最广泛使用和访问的资源之一。机器学习(ML)、深度学习(DL)和自然语言处理(NLP)领域的最新进展为改进恐怖组织的识别和分类提供了大有可为的途径。本研究介绍了一种旨在利用双向递归单元和自我关注机制对恐怖组织进行分类和预测的框架,称为 BiGRU-SA。该方法利用 GTD 中的综合数据,将 DistilBERT 提取的文本特征与显示出与恐怖组织高度相关的特征进行整合。此外,还采用了带有 Tomek 链接的合成少数群体过度采样技术(SMOTE-T)来解决数据不平衡问题,并增强我们预测的鲁棒性。BiGRU-SA 模型捕捉了数据中的时间依赖性和上下文信息。通过处理正向和反向的数据序列,BiGRU-SA 提供了全面的时间动态视图,显著提高了分类准确性。为了评估我们框架的有效性,我们比较了十种模型,包括六种传统 ML 模型和四种 DL 算法。所提出的 BiGRU-SA 框架在对造成恐怖袭击的 36 个恐怖组织进行分类方面表现出色,准确率达到 98.68%,精确率达到 96.06%,灵敏度达到 96.83%,特异性达到 99.50%,马修斯相关系数达到 97.50%。与最先进的方法相比,所提出的模型表现优于其他方法,证实了其在恐怖组织分类和预测方面的有效性和准确性。
{"title":"Terrorism group prediction using feature combination and BiGRU with self-attention mechanism.","authors":"Mohammed Abdalsalam, Chunlin Li, Abdelghani Dahou, Natalia Kryvinska","doi":"10.7717/peerj-cs.2252","DOIUrl":"10.7717/peerj-cs.2252","url":null,"abstract":"<p><p>The world faces the ongoing challenge of terrorism and extremism, which threaten the stability of nations, the security of their citizens, and the integrity of political, economic, and social systems. Given the complexity and multifaceted nature of this phenomenon, combating it requires a collective effort, with tailored methods to address its various aspects. Identifying the terrorist organization responsible for an attack is a critical step in combating terrorism. Historical data plays a pivotal role in this process, providing insights that can inform prevention and response strategies. With advancements in technology and artificial intelligence (AI), particularly in military applications, there is growing interest in utilizing these developments to enhance national and regional security against terrorism. Central to this effort are terrorism databases, which serve as rich resources for data on armed organizations, extremist entities, and terrorist incidents. The Global Terrorism Database (GTD) stands out as one of the most widely used and accessible resources for researchers. Recent progress in machine learning (ML), deep learning (DL), and natural language processing (NLP) offers promising avenues for improving the identification and classification of terrorist organizations. This study introduces a framework designed to classify and predict terrorist groups using bidirectional recurrent units and self-attention mechanisms, referred to as BiGRU-SA. This approach utilizes the comprehensive data in the GTD by integrating textual features extracted by DistilBERT with features that show a high correlation with terrorist organizations. Additionally, the Synthetic Minority Over-sampling Technique with Tomek links (SMOTE-T) was employed to address data imbalance and enhance the robustness of our predictions. The BiGRU-SA model captures temporal dependencies and contextual information within the data. By processing data sequences in both forward and reverse directions, BiGRU-SA offers a comprehensive view of the temporal dynamics, significantly enhancing classification accuracy. To evaluate the effectiveness of our framework, we compared ten models, including six traditional ML models and four DL algorithms. The proposed BiGRU-SA framework demonstrated outstanding performance in classifying 36 terrorist organizations responsible for terrorist attacks, achieving an accuracy of 98.68%, precision of 96.06%, sensitivity of 96.83%, specificity of 99.50%, and a Matthews correlation coefficient of 97.50%. Compared to state-of-the-art methods, the proposed model outperformed others, confirming its effectiveness and accuracy in the classification and prediction of terrorist organizations.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"10 ","pages":"e2252"},"PeriodicalIF":3.5,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11419613/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142309137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Harnessing AI and analytics to enhance cybersecurity and privacy for collective intelligence systems. 利用人工智能和分析技术加强集体智能系统的网络安全和隐私保护。
IF 3.5 4区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-09-20 eCollection Date: 2024-01-01 DOI: 10.7717/peerj-cs.2264
Muhammad Rehan Naeem, Rashid Amin, Muhammad Farhan, Faiz Abdullah Alotaibi, Mrim M Alnfiai, Gabriel Avelino Sampedro, Vincent Karovič

Collective intelligence systems like Chat Generative Pre-Trained Transformer (ChatGPT) have emerged. They have brought both promise and peril to cybersecurity and privacy protection. This study introduces novel approaches to harness the power of artificial intelligence (AI) and big data analytics to enhance security and privacy in this new era. Contributions could explore topics such as: leveraging natural language processing (NLP) in ChatGPT-like systems to strengthen information security; evaluating privacy-enhancing technologies to maximize data utility while minimizing personal data exposure; modeling human behavior and agency to build secure and ethical human-centric systems; applying machine learning to detect threats and vulnerabilities in a data-driven manner; using analytics to preserve privacy in large datasets while enabling value creation; crafting AI techniques that operate in a trustworthy and explainable manner. This article advances the state-of-the-art at the intersection of cybersecurity, privacy, human factors, ethics, and cutting-edge AI, providing impactful solutions to emerging challenges. Our research presents a revolutionary approach to malware detection that leverages deep learning (DL) based methodologies to automatically learn features from raw data. Our approach involves constructing a grayscale image from a malware file and extracting features to minimize its size. This process affords us the ability to discern patterns that might remain hidden from other techniques, enabling us to utilize convolutional neural networks (CNNs) to learn from these grayscale images and a stacking ensemble to classify malware. The goal is to model a highly complex nonlinear function with parameters that can be optimized to achieve superior performance. To test our approach, we ran it on over 6,414 malware variants and 2,050 benign files from the MalImg collection, resulting in an impressive 99.86 percent validation accuracy for malware detection. Furthermore, we conducted a classification experiment on 15 malware families and 13 tests with varying parameters to compare our model to other comparable research. Our model outperformed most of the similar research with detection accuracy ranging from 47.07% to 99.81% and a significant increase in detection performance. Our results demonstrate the efficacy of our approach, which unlocks the hidden patterns that underlie complex systems, advancing the frontiers of computational security.

像聊天生成预训练转换器(ChatGPT)这样的集体智能系统已经出现。它们既给网络安全和隐私保护带来了希望,也带来了危险。本研究介绍了在这个新时代利用人工智能(AI)和大数据分析的力量来加强安全和隐私保护的新方法。投稿可探讨的主题包括:在类似 ChatGPT 的系统中利用自然语言处理(NLP)来加强信息安全;评估隐私增强技术,以最大限度地提高数据效用,同时最大限度地减少个人数据的暴露;模拟人类行为和代理,以建立安全、道德的以人为本的系统;应用机器学习,以数据驱动的方式检测威胁和漏洞;利用分析技术保护大型数据集中的隐私,同时实现价值创造;精心设计以可信和可解释的方式运行的人工智能技术。这篇文章推进了网络安全、隐私、人为因素、伦理和尖端人工智能交叉领域的最新进展,为新出现的挑战提供了有影响力的解决方案。我们的研究提出了一种革命性的恶意软件检测方法,它利用基于深度学习(DL)的方法自动学习原始数据中的特征。我们的方法包括从恶意软件文件中构建灰度图像,并提取特征以最小化其大小。这一过程使我们有能力识别其他技术可能无法识别的模式,从而利用卷积神经网络(CNN)从这些灰度图像中学习,并利用堆叠集合对恶意软件进行分类。我们的目标是建立一个高度复杂的非线性函数模型,并对参数进行优化,以实现卓越的性能。为了测试我们的方法,我们在 MalImg 收集的 6414 个恶意软件变体和 2050 个良性文件上运行了该方法,结果恶意软件检测的验证准确率达到了令人印象深刻的 99.86%。此外,我们还对 15 个恶意软件系列和 13 个不同参数的测试进行了分类实验,将我们的模型与其他同类研究进行了比较。我们的模型优于大多数同类研究,检测准确率从 47.07% 到 99.81%,检测性能显著提高。我们的结果证明了我们方法的有效性,它揭开了复杂系统背后隐藏的模式,推动了计算安全领域的前沿发展。
{"title":"Harnessing AI and analytics to enhance cybersecurity and privacy for collective intelligence systems.","authors":"Muhammad Rehan Naeem, Rashid Amin, Muhammad Farhan, Faiz Abdullah Alotaibi, Mrim M Alnfiai, Gabriel Avelino Sampedro, Vincent Karovič","doi":"10.7717/peerj-cs.2264","DOIUrl":"10.7717/peerj-cs.2264","url":null,"abstract":"<p><p>Collective intelligence systems like Chat Generative Pre-Trained Transformer (ChatGPT) have emerged. They have brought both promise and peril to cybersecurity and privacy protection. This study introduces novel approaches to harness the power of artificial intelligence (AI) and big data analytics to enhance security and privacy in this new era. Contributions could explore topics such as: leveraging natural language processing (NLP) in ChatGPT-like systems to strengthen information security; evaluating privacy-enhancing technologies to maximize data utility while minimizing personal data exposure; modeling human behavior and agency to build secure and ethical human-centric systems; applying machine learning to detect threats and vulnerabilities in a data-driven manner; using analytics to preserve privacy in large datasets while enabling value creation; crafting AI techniques that operate in a trustworthy and explainable manner. This article advances the state-of-the-art at the intersection of cybersecurity, privacy, human factors, ethics, and cutting-edge AI, providing impactful solutions to emerging challenges. Our research presents a revolutionary approach to malware detection that leverages deep learning (DL) based methodologies to automatically learn features from raw data. Our approach involves constructing a grayscale image from a malware file and extracting features to minimize its size. This process affords us the ability to discern patterns that might remain hidden from other techniques, enabling us to utilize convolutional neural networks (CNNs) to learn from these grayscale images and a stacking ensemble to classify malware. The goal is to model a highly complex nonlinear function with parameters that can be optimized to achieve superior performance. To test our approach, we ran it on over 6,414 malware variants and 2,050 benign files from the MalImg collection, resulting in an impressive 99.86 percent validation accuracy for malware detection. Furthermore, we conducted a classification experiment on 15 malware families and 13 tests with varying parameters to compare our model to other comparable research. Our model outperformed most of the similar research with detection accuracy ranging from 47.07% to 99.81% and a significant increase in detection performance. Our results demonstrate the efficacy of our approach, which unlocks the hidden patterns that underlie complex systems, advancing the frontiers of computational security.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"10 ","pages":"e2264"},"PeriodicalIF":3.5,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11419604/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142309134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting rumors in social media using emotion based deep learning approach. 使用基于情感的深度学习方法检测社交媒体中的谣言。
IF 3.5 4区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-09-20 eCollection Date: 2024-01-01 DOI: 10.7717/peerj-cs.2202
Drishti Sharma, Abhishek Srivastava

Social media, an undeniable facet of the modern era, has become a primary pathway for disseminating information. Unverified and potentially harmful rumors can have detrimental effects on both society and individuals. Owing to the plethora of content generated, it is essential to assess its alignment with factual accuracy and determine its veracity. Previous research has explored various approaches, including feature engineering and deep learning techniques, that leverage propagation theory to identify rumors. In our study, we place significant importance on examining the emotional and sentimental aspects of tweets using deep learning approaches to improve our ability to detect rumors. Leveraging the findings from the previous analysis, we propose a Sentiment and EMotion driven TransformEr Classifier method (SEMTEC). Unlike the existing studies, our method leverages the extraction of emotion and sentiment tags alongside the assimilation of the content-based information from the textual modality, i.e., the main tweet. This meticulous semantic analysis allows us to measure the user's emotional state, leading to an impressive accuracy rate of 92% for rumor detection on the "PHEME" dataset. The validation is carried out on a novel dataset named "Twitter24". Furthermore, SEMTEC exceeds standard methods accuracy by around 2% on "Twitter24" dataset.

社交媒体是现代社会不可否认的一面,它已成为传播信息的主要途径。未经证实且可能有害的谣言会对社会和个人产生不利影响。由于产生了大量的内容,评估其与事实准确性的一致性并确定其真实性至关重要。以往的研究探索了各种方法,包括利用传播理论识别谣言的特征工程和深度学习技术。在我们的研究中,我们非常重视利用深度学习方法检查推文的情感和情绪方面,以提高我们检测谣言的能力。利用之前的分析结果,我们提出了一种情感和情绪驱动的转换分类器方法(SEMTEC)。与现有研究不同的是,我们的方法在从文本模态(即主推文)中同化基于内容的信息的同时,还利用了情感和情绪标签的提取。这种细致的语义分析使我们能够测量用户的情绪状态,从而在 "PHEME "数据集上实现了令人印象深刻的 92% 的谣言检测准确率。在名为 "Twitter24 "的新数据集上进行了验证。此外,SEMTEC 在 "Twitter24 "数据集上的准确率比标准方法高出约 2%。
{"title":"Detecting rumors in social media using emotion based deep learning approach.","authors":"Drishti Sharma, Abhishek Srivastava","doi":"10.7717/peerj-cs.2202","DOIUrl":"10.7717/peerj-cs.2202","url":null,"abstract":"<p><p>Social media, an undeniable facet of the modern era, has become a primary pathway for disseminating information. Unverified and potentially harmful rumors can have detrimental effects on both society and individuals. Owing to the plethora of content generated, it is essential to assess its alignment with factual accuracy and determine its veracity. Previous research has explored various approaches, including feature engineering and deep learning techniques, that leverage propagation theory to identify rumors. In our study, we place significant importance on examining the emotional and sentimental aspects of tweets using deep learning approaches to improve our ability to detect rumors. Leveraging the findings from the previous analysis, we propose a Sentiment and EMotion driven TransformEr Classifier method (SEMTEC). Unlike the existing studies, our method leverages the extraction of emotion and sentiment tags alongside the assimilation of the content-based information from the textual modality, <i>i.e.</i>, the main tweet. This meticulous semantic analysis allows us to measure the user's emotional state, leading to an impressive accuracy rate of 92% for rumor detection on the \"PHEME\" dataset. The validation is carried out on a novel dataset named \"Twitter24\". Furthermore, SEMTEC exceeds standard methods accuracy by around 2% on \"Twitter24\" dataset.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"10 ","pages":"e2202"},"PeriodicalIF":3.5,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11419649/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142309133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A model integrating attention mechanism and generative adversarial network for image style transfer. 将注意力机制与生成式对抗网络相结合的图像风格转移模型。
IF 3.5 4区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-09-20 eCollection Date: 2024-01-01 DOI: 10.7717/peerj-cs.2332
Miaomiao Fu, Yixing Liu, Rongrong Ma, Binbin Zhang, Linli Wu, Lingli Zhu

Image style transfer is an important way to combine different styles and contents to generate new images, which plays an important role in computer vision tasks such as image reconstruction and image texture synthesis. In style transfer tasks, there are often long-distance dependencies between pixels of different styles and contents, and existing neural network-based work cannot handle this problem well. This paper constructs a generation model for style transfer based on the cycle-consistent network and the attention mechanism. The forward and backward learning process of the cycle-consistent mechanism could make the network complete the mismatch conversion between the input and output of the image. The attention mechanism enhances the model's ability to perceive the long-distance dependencies between pixels in process of learning feature representation from the target content and the target styles, and at the same time suppresses the style feature information of the non-target area. Finally, a large number of experiments were carried out in the monet2photo dataset, and the results show that the misjudgment rate of Amazon Mechanical Turk (AMT) perceptual studies achieves 45%, which verified that the cycle-consistent network model with attention mechanism has certain advantages in image style transfer.

图像风格转换是将不同风格和内容组合生成新图像的重要方法,在图像重建和图像纹理合成等计算机视觉任务中发挥着重要作用。在风格转换任务中,不同风格和内容的像素之间往往存在长距离依赖关系,现有的基于神经网络的工作无法很好地解决这一问题。本文基于循环一致性网络和注意力机制,构建了风格转换的生成模型。循环一致机制的前向和后向学习过程可以使网络完成图像输入和输出之间的错配转换。注意力机制增强了模型在学习目标内容和目标风格特征表征过程中感知像素间远距离依赖关系的能力,同时抑制了非目标区域的风格特征信息。最后,在 monet2photo 数据集中进行了大量实验,结果表明亚马逊机械土耳其人(Amazon Mechanical Turk,AMT)感知研究的误判率达到了 45%,这验证了带有注意力机制的循环一致性网络模型在图像风格转移方面具有一定的优势。
{"title":"A model integrating attention mechanism and generative adversarial network for image style transfer.","authors":"Miaomiao Fu, Yixing Liu, Rongrong Ma, Binbin Zhang, Linli Wu, Lingli Zhu","doi":"10.7717/peerj-cs.2332","DOIUrl":"10.7717/peerj-cs.2332","url":null,"abstract":"<p><p>Image style transfer is an important way to combine different styles and contents to generate new images, which plays an important role in computer vision tasks such as image reconstruction and image texture synthesis. In style transfer tasks, there are often long-distance dependencies between pixels of different styles and contents, and existing neural network-based work cannot handle this problem well. This paper constructs a generation model for style transfer based on the cycle-consistent network and the attention mechanism. The forward and backward learning process of the cycle-consistent mechanism could make the network complete the mismatch conversion between the input and output of the image. The attention mechanism enhances the model's ability to perceive the long-distance dependencies between pixels in process of learning feature representation from the target content and the target styles, and at the same time suppresses the style feature information of the non-target area. Finally, a large number of experiments were carried out in the monet2photo dataset, and the results show that the misjudgment rate of Amazon Mechanical Turk (AMT) perceptual studies achieves 45%, which verified that the cycle-consistent network model with attention mechanism has certain advantages in image style transfer.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"10 ","pages":"e2332"},"PeriodicalIF":3.5,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11419672/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142309132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A flexible perception method of thin smoke based on patch total bounded variation for buildings 基于补丁总边界变化的建筑物薄烟灵活感知方法
IF 3.8 4区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-09-19 DOI: 10.7717/peerj-cs.2282
Jieming Zhang, Yifan Gao, Xianchao Chen, Zhanchen Chen
Early fire warning is critical to the safety and stability of power systems. However, current methods encounter challenges in capturing subtle features, limiting their effectiveness in providing timely alerts for potential fire hazards. To overcome this drawback, a novel detection algorithm for thin smoke was proposed to enhance early fire detection capabilities. The core is that the Patch-TBV feature was proposed first, and the total bounded variation (TBV) was computed at the patch level. This approach is rooted in the understanding that traditional methods struggle to detect minute variations in image characteristics, particularly in scenarios where the features are dispersed or subtle. By computing TBV at a more localized level, the algorithm proposed gains a finer granularity in assessing image quality, enabling it to capture subtle variations that might indicate the presence of smoke or early signs of a fire. Another key aspect that sets our algorithm apart is the incorporation of subtle variation magnification. This technique serves to magnify subtle features within the image, leveraging the computed TBV values. This magnification strategy is pivotal for improving the algorithm’s precision in detecting subtle variations, especially in environments where smoke concentrations may be minimal or dispersed. To evaluate the algorithm’s performance in real-world scenarios, a comprehensive dataset, named TIP, comprising 3,120 images was constructed. The dataset covers diverse conditions and potential challenges that might be encountered in practical applications. Experimental results confirm the robustness and effectiveness of the proposed algorithm, showcasing its ability to provide accurate and timely fire warnings in various contexts. In conclusion, our research not only identifies the limitations of existing methods in capturing subtle features for early fire detection but also proposes a sophisticated algorithm, integrating Patch-TBV and micro-variation amplification, to address these challenges. The algorithm’s effectiveness and robustness are substantiated through extensive testing, demonstrating its potential as a valuable tool for enhancing fire safety in power systems and similar environments.
早期火灾预警对电力系统的安全性和稳定性至关重要。然而,目前的方法在捕捉细微特征方面遇到了挑战,从而限制了其在针对潜在火灾危险提供及时警报方面的有效性。为了克服这一缺陷,我们提出了一种新型薄烟检测算法,以增强早期火灾检测能力。其核心是首先提出了 "斑块-TBV "特征,并在斑块级别计算总边界变化(TBV)。这种方法源于这样一种认识,即传统方法难以检测到图像特征的微小变化,尤其是在特征分散或微妙的情况下。通过在更局部的水平上计算 TBV,所提出的算法在评估图像质量时获得了更精细的粒度,使其能够捕捉到可能表明存在烟雾或火灾早期迹象的细微变化。使我们的算法与众不同的另一个关键方面是加入了细微变化放大技术。这项技术利用计算出的 TBV 值放大图像中的细微特征。这种放大策略对于提高算法检测细微变化的精度至关重要,尤其是在烟雾浓度可能很小或很分散的环境中。为了评估该算法在实际场景中的性能,我们构建了一个名为 TIP 的综合数据集,其中包含 3,120 张图像。该数据集涵盖了实际应用中可能遇到的各种情况和潜在挑战。实验结果证实了所提算法的鲁棒性和有效性,展示了其在各种情况下提供准确、及时的火灾预警的能力。总之,我们的研究不仅发现了现有方法在捕捉细微特征进行早期火灾探测方面的局限性,还提出了一种复杂的算法,将 Patch-TBV 和微变异放大集成在一起,以应对这些挑战。该算法的有效性和稳健性通过广泛的测试得到了证实,证明了其作为加强电力系统和类似环境中消防安全的重要工具的潜力。
{"title":"A flexible perception method of thin smoke based on patch total bounded variation for buildings","authors":"Jieming Zhang, Yifan Gao, Xianchao Chen, Zhanchen Chen","doi":"10.7717/peerj-cs.2282","DOIUrl":"https://doi.org/10.7717/peerj-cs.2282","url":null,"abstract":"Early fire warning is critical to the safety and stability of power systems. However, current methods encounter challenges in capturing subtle features, limiting their effectiveness in providing timely alerts for potential fire hazards. To overcome this drawback, a novel detection algorithm for thin smoke was proposed to enhance early fire detection capabilities. The core is that the Patch-TBV feature was proposed first, and the total bounded variation (TBV) was computed at the patch level. This approach is rooted in the understanding that traditional methods struggle to detect minute variations in image characteristics, particularly in scenarios where the features are dispersed or subtle. By computing TBV at a more localized level, the algorithm proposed gains a finer granularity in assessing image quality, enabling it to capture subtle variations that might indicate the presence of smoke or early signs of a fire. Another key aspect that sets our algorithm apart is the incorporation of subtle variation magnification. This technique serves to magnify subtle features within the image, leveraging the computed TBV values. This magnification strategy is pivotal for improving the algorithm’s precision in detecting subtle variations, especially in environments where smoke concentrations may be minimal or dispersed. To evaluate the algorithm’s performance in real-world scenarios, a comprehensive dataset, named TIP, comprising 3,120 images was constructed. The dataset covers diverse conditions and potential challenges that might be encountered in practical applications. Experimental results confirm the robustness and effectiveness of the proposed algorithm, showcasing its ability to provide accurate and timely fire warnings in various contexts. In conclusion, our research not only identifies the limitations of existing methods in capturing subtle features for early fire detection but also proposes a sophisticated algorithm, integrating Patch-TBV and micro-variation amplification, to address these challenges. The algorithm’s effectiveness and robustness are substantiated through extensive testing, demonstrating its potential as a valuable tool for enhancing fire safety in power systems and similar environments.","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"46 1","pages":""},"PeriodicalIF":3.8,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142247784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning and natural language processing to assess the emotional impact of influencers’ mental health content on Instagram 利用机器学习和自然语言处理技术评估 Instagram 上影响者心理健康内容的情感影响
IF 3.8 4区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-09-19 DOI: 10.7717/peerj-cs.2251
Noemi Merayo, Alba Ayuso-Lanchares, Clara González-Sanguino
BackgroundThis study aims to examine, through artificial intelligence, specifically machine learning, the emotional impact generated by disclosures about mental health on social media. In contrast to previous research, which primarily focused on identifying psychopathologies, our study investigates the emotional response to mental health-related content on Instagram, particularly content created by influencers/celebrities. This platform, especially favored by the youth, is the stage where these influencers exert significant social impact, and where their analysis holds strong relevance. Analyzing mental health with machine learning techniques on Instagram is unprecedented, as all existing research has primarily focused on Twitter. MethodsThis research involves creating a new corpus labelled with responses to mental health posts made by influencers/celebrities on Instagram, categorized by emotions such as love/admiration, anger/contempt/mockery, gratitude, identification/empathy, and sadness. The study is complemented by modelling a set of machine learning algorithms to efficiently detect the emotions arising when faced with these mental health disclosures on Instagram, using the previous corpus. ResultsResults have shown that machine learning algorithms can effectively detect such emotional responses. Traditional techniques, such as Random Forest, showed decent performance with low computational loads (around 50%), while deep learning and Bidirectional Encoder Representation from Transformers (BERT) algorithms achieved very good results. In particular, the BERT models reached accuracy levels between 86–90%, and the deep learning model achieved 72% accuracy. These results are satisfactory, considering that predicting emotions, especially in social networks, is challenging due to factors such as the subjectivity of emotion interpretation, the variability of emotions between individuals, and the interpretation of emotions in different cultures and communities. DiscussionThis cross-cutting research between mental health and artificial intelligence allows us to understand the emotional impact generated by mental health content on social networks, especially content generated by influential celebrities among young people. The application of machine learning allows us to understand the emotional reactions of society to messages related to mental health, which is highly innovative and socially relevant given the importance of the phenomenon in societies. In fact, the proposed algorithms’ high accuracy (86–90%) in social contexts like mental health, where detecting negative emotions is crucial, presents a promising research avenue. Achieving such levels of accuracy is highly valuable due to the significant implications of false positives or false negatives in this social context.
研究背景本研究旨在通过人工智能,特别是机器学习,研究在社交媒体上披露心理健康信息所产生的情绪影响。以往的研究主要侧重于识别心理病症,与此不同的是,我们的研究调查的是 Instagram 上与心理健康有关的内容所引起的情绪反应,尤其是由有影响力的人物/名人创建的内容。这个平台尤其受到年轻人的青睐,是这些有影响力的人产生重大社会影响的舞台,因此对他们的分析具有很强的现实意义。在 Instagram 上使用机器学习技术分析心理健康是前所未有的,因为现有的所有研究都主要集中在 Twitter 上。研究方法这项研究包括创建一个新的语料库,标注有对 Instagram 上有影响力的人物/名人发布的心理健康帖子的回复,并按爱/钦佩、愤怒/蔑视/嘲讽、感激、认同/同情和悲伤等情绪进行分类。该研究还利用之前的语料库,建立了一套机器学习算法模型,以有效检测在 Instagram 上面对这些心理健康信息时产生的情绪。结果结果表明,机器学习算法可以有效检测出此类情绪反应。随机森林(Random Forest)等传统技术以较低的计算负荷(约 50%)表现出了不错的性能,而深度学习和来自变换器的双向编码器表示(BERT)算法则取得了非常好的效果。其中,BERT 模型的准确率在 86-90% 之间,深度学习模型的准确率达到 72%。考虑到由于情绪解读的主观性、个体间情绪的差异性以及不同文化和社区对情绪的解读等因素,预测情绪(尤其是社交网络中的情绪)具有挑战性,这些结果令人满意。讨论这项心理健康与人工智能之间的交叉研究让我们了解了心理健康内容在社交网络上产生的情绪影响,尤其是在年轻人中有影响力的名人所产生的内容。机器学习的应用使我们能够了解社会对心理健康相关信息的情绪反应,鉴于这一现象在社会中的重要性,这一研究具有高度的创新性和社会相关性。事实上,在像心理健康这样的社会环境中,检测负面情绪至关重要,而所提出的算法具有很高的准确率(86-90%),这为我们提供了一个前景广阔的研究途径。在这种社会背景下,假阳性或假阴性都会产生重大影响,因此达到如此高的准确率是非常有价值的。
{"title":"Machine learning and natural language processing to assess the emotional impact of influencers’ mental health content on Instagram","authors":"Noemi Merayo, Alba Ayuso-Lanchares, Clara González-Sanguino","doi":"10.7717/peerj-cs.2251","DOIUrl":"https://doi.org/10.7717/peerj-cs.2251","url":null,"abstract":"Background\u0000This study aims to examine, through artificial intelligence, specifically machine learning, the emotional impact generated by disclosures about mental health on social media. In contrast to previous research, which primarily focused on identifying psychopathologies, our study investigates the emotional response to mental health-related content on Instagram, particularly content created by influencers/celebrities. This platform, especially favored by the youth, is the stage where these influencers exert significant social impact, and where their analysis holds strong relevance. Analyzing mental health with machine learning techniques on Instagram is unprecedented, as all existing research has primarily focused on Twitter. Methods\u0000This research involves creating a new corpus labelled with responses to mental health posts made by influencers/celebrities on Instagram, categorized by emotions such as love/admiration, anger/contempt/mockery, gratitude, identification/empathy, and sadness. The study is complemented by modelling a set of machine learning algorithms to efficiently detect the emotions arising when faced with these mental health disclosures on Instagram, using the previous corpus. Results\u0000Results have shown that machine learning algorithms can effectively detect such emotional responses. Traditional techniques, such as Random Forest, showed decent performance with low computational loads (around 50%), while deep learning and Bidirectional Encoder Representation from Transformers (BERT) algorithms achieved very good results. In particular, the BERT models reached accuracy levels between 86–90%, and the deep learning model achieved 72% accuracy. These results are satisfactory, considering that predicting emotions, especially in social networks, is challenging due to factors such as the subjectivity of emotion interpretation, the variability of emotions between individuals, and the interpretation of emotions in different cultures and communities. Discussion\u0000This cross-cutting research between mental health and artificial intelligence allows us to understand the emotional impact generated by mental health content on social networks, especially content generated by influential celebrities among young people. The application of machine learning allows us to understand the emotional reactions of society to messages related to mental health, which is highly innovative and socially relevant given the importance of the phenomenon in societies. In fact, the proposed algorithms’ high accuracy (86–90%) in social contexts like mental health, where detecting negative emotions is crucial, presents a promising research avenue. Achieving such levels of accuracy is highly valuable due to the significant implications of false positives or false negatives in this social context.","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"26 1","pages":""},"PeriodicalIF":3.8,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142268378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gamify4LexAmb: a gamification-based approach to address lexical ambiguity in natural language requirements Gamify4LexAmb:解决自然语言需求中词汇歧义的游戏化方法
IF 3.8 4区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-09-19 DOI: 10.7717/peerj-cs.2229
Hafsa Dar, Romana Aziz, Javed Ali Khan, Muhammad IkramUllah Lali, Nouf Abdullah Almujally
Ambiguity is a common challenge in specifying natural language (NL) requirements. One of the reasons for the occurrence of ambiguity in software requirements is the lack of user involvement in requirements elicitation and inspection phases. Even if they get involved, it is hard for them to understand the context of the system, and ultimately unable to provide requirements correctly due to a lack of interest. Previously, the researchers have worked on ambiguity avoidance, detection, and removal techniques in requirements. Still, less work is reported in the literature to actively engage users in the system to reduce ambiguity at the early stages of requirements engineering. Traditionally, ambiguity is addressed during inspection when requirements are initially specified in the SRS document. Resolving or removing ambiguity during the inspection is time-consuming, costly, and laborious. Also, traditional elicitation techniques have limitations like lack of user involvement, inactive user participation, biases, incomplete requirements, etc. Therefore, in this study, we have designed a framework, Gamification for Lexical Ambiguity (Gamify4LexAmb), for detecting and reducing ambiguity using gamification. Gamify4LexAmb engages users and identifies lexical ambiguity in requirements, which occurs in polysemy words where a single word can have several different meanings. We have also validated Gamify4LexAmb by developing an initial prototype. The results show that Gamify4LexAmb successfully identifies lexical ambiguities in given requirements by engaging users in requirements elicitation. In the next part of our research, an industrial case study will be performed to understand the effects of gamification on real-time data for detecting and reducing NL ambiguity.
含糊不清是指定自然语言(NL)需求时经常遇到的难题。软件需求含糊不清的原因之一是用户在需求激发和检查阶段缺乏参与。即使用户参与其中,他们也很难理解系统的上下文,最终因缺乏兴趣而无法正确提供需求。此前,研究人员曾研究过需求中的模糊性规避、检测和消除技术。然而,在需求工程的早期阶段,让用户积极参与系统以减少模糊性的文献报道仍然较少。传统上,模糊性是在 SRS 文档最初规定需求时,在检查过程中解决的。在检查过程中解决或消除模棱两可的问题费时、费钱、费力。此外,传统的诱导技术也有局限性,如缺乏用户参与、用户参与不积极、存在偏见、需求不完整等。因此,在本研究中,我们设计了一个框架--词义模糊游戏化(Gamify4LexAmb),利用游戏化来检测和减少词义模糊。Gamify4LexAmb 让用户参与进来,并识别需求中的词汇歧义,这种歧义发生在多义词中,即一个词可能有几种不同的含义。我们还通过开发初始原型验证了 Gamify4LexAmb。结果表明,Gamify4LexAmb 通过让用户参与需求激发,成功识别了给定需求中的词汇歧义。在下一部分研究中,我们将进行一项工业案例研究,以了解游戏化对检测和减少 NL 歧义的实时数据的影响。
{"title":"Gamify4LexAmb: a gamification-based approach to address lexical ambiguity in natural language requirements","authors":"Hafsa Dar, Romana Aziz, Javed Ali Khan, Muhammad IkramUllah Lali, Nouf Abdullah Almujally","doi":"10.7717/peerj-cs.2229","DOIUrl":"https://doi.org/10.7717/peerj-cs.2229","url":null,"abstract":"Ambiguity is a common challenge in specifying natural language (NL) requirements. One of the reasons for the occurrence of ambiguity in software requirements is the lack of user involvement in requirements elicitation and inspection phases. Even if they get involved, it is hard for them to understand the context of the system, and ultimately unable to provide requirements correctly due to a lack of interest. Previously, the researchers have worked on ambiguity avoidance, detection, and removal techniques in requirements. Still, less work is reported in the literature to actively engage users in the system to reduce ambiguity at the early stages of requirements engineering. Traditionally, ambiguity is addressed during inspection when requirements are initially specified in the SRS document. Resolving or removing ambiguity during the inspection is time-consuming, costly, and laborious. Also, traditional elicitation techniques have limitations like lack of user involvement, inactive user participation, biases, incomplete requirements, etc. Therefore, in this study, we have designed a framework, Gamification for Lexical Ambiguity (Gamify4LexAmb), for detecting and reducing ambiguity using gamification. Gamify4LexAmb engages users and identifies lexical ambiguity in requirements, which occurs in polysemy words where a single word can have several different meanings. We have also validated Gamify4LexAmb by developing an initial prototype. The results show that Gamify4LexAmb successfully identifies lexical ambiguities in given requirements by engaging users in requirements elicitation. In the next part of our research, an industrial case study will be performed to understand the effects of gamification on real-time data for detecting and reducing NL ambiguity.","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"212 1","pages":""},"PeriodicalIF":3.8,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142268379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection and diagnosis of diabetic eye diseases using two phase transfer learning approach 利用两相迁移学习法检测和诊断糖尿病眼病
IF 3.8 4区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-09-19 DOI: 10.7717/peerj-cs.2135
Vamsi Krishna Madduri, Battula Srinivasa Rao
BackgroundEarly diagnosis and treatment of diabetic eye disease (DED) improve prognosis and lessen the possibility of permanent vision loss. Screening of retinal fundus images is a significant process widely employed for diagnosing patients with DED or other eye problems. However, considerable time and effort are required to detect these images manually. MethodsDeep learning approaches in machine learning have attained superior performance for the binary classification of healthy and pathological retinal fundus images. In contrast, multi-class retinal eye disease classification is still a difficult task. Therefore, a two-phase transfer learning approach is developed in this research for automated classification and segmentation of multi-class DED pathologies. ResultsIn the first step, a Modified ResNet-50 model pre-trained on the ImageNet dataset was transferred and learned to classify normal diabetic macular edema (DME), diabetic retinopathy, glaucoma, and cataracts. In the second step, the defective region of multiple eye diseases is segmented using the transfer learning-based DenseUNet model. From the publicly accessible dataset, the suggested model is assessed using several retinal fundus images. Our proposed model for multi-class classification achieves a maximum specificity of 99.73%, a sensitivity of 99.54%, and an accuracy of 99.67%.
背景糖尿病眼病(DED)的早期诊断和治疗可改善预后,减少永久性视力丧失的可能性。筛查视网膜眼底图像是广泛用于诊断 DED 或其他眼疾患者的重要程序。然而,人工检测这些图像需要花费大量的时间和精力。方法机器学习中的深度学习方法在对健康和病变视网膜眼底图像进行二元分类方面取得了卓越的性能。相比之下,多类视网膜眼病分类仍是一项艰巨的任务。因此,本研究开发了一种两阶段迁移学习方法,用于多类 DED 病变的自动分类和分割。结果第一步,将在 ImageNet 数据集上预先训练好的 Modified ResNet-50 模型进行迁移学习,以对正常的糖尿病黄斑水肿(DME)、糖尿病视网膜病变、青光眼和白内障进行分类。第二步,使用基于迁移学习的 DenseUNet 模型分割多种眼病的缺陷区域。从可公开访问的数据集中,使用几幅视网膜眼底图像对所建议的模型进行了评估。我们提出的多类分类模型达到了 99.73% 的最高特异性、99.54% 的灵敏度和 99.67% 的准确度。
{"title":"Detection and diagnosis of diabetic eye diseases using two phase transfer learning approach","authors":"Vamsi Krishna Madduri, Battula Srinivasa Rao","doi":"10.7717/peerj-cs.2135","DOIUrl":"https://doi.org/10.7717/peerj-cs.2135","url":null,"abstract":"Background\u0000Early diagnosis and treatment of diabetic eye disease (DED) improve prognosis and lessen the possibility of permanent vision loss. Screening of retinal fundus images is a significant process widely employed for diagnosing patients with DED or other eye problems. However, considerable time and effort are required to detect these images manually. Methods\u0000Deep learning approaches in machine learning have attained superior performance for the binary classification of healthy and pathological retinal fundus images. In contrast, multi-class retinal eye disease classification is still a difficult task. Therefore, a two-phase transfer learning approach is developed in this research for automated classification and segmentation of multi-class DED pathologies. Results\u0000In the first step, a Modified ResNet-50 model pre-trained on the ImageNet dataset was transferred and learned to classify normal diabetic macular edema (DME), diabetic retinopathy, glaucoma, and cataracts. In the second step, the defective region of multiple eye diseases is segmented using the transfer learning-based DenseUNet model. From the publicly accessible dataset, the suggested model is assessed using several retinal fundus images. Our proposed model for multi-class classification achieves a maximum specificity of 99.73%, a sensitivity of 99.54%, and an accuracy of 99.67%.","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"20 1","pages":""},"PeriodicalIF":3.8,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142268380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
PeerJ Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1