Pub Date : 2025-08-29eCollection Date: 2025-01-01DOI: 10.7717/peerj-cs.3054
Sara Qamar, Hasan Tahir, Zahid Anwar, Naveed Ahmed, Shahzaib Tahir, Muhammad Aleem
The metaverse and extended reality (XR) systems are vulnerable to emerging security threats, as developers have prioritized competitive business gains over security. The virtual entities, immersive experiences, and lack of centralized governance pose significant challenges in establishing standardized guidelines for XR systems and its stakeholders. In this research, a panoramic view is presented to identify mitigation strategies and defensive capabilities, including authenticity, privacy, integrity, interoperability, virtual forensics, and incident reporting to counter potential threats. To facilitate the implementation of a secure XR system, a novel baseline model is introduced, outlining key attributes and functions aligned with the available libraries. A statistical analysis is performed to assess the quality and effectiveness of development resources in embedding novel XR security features. Furthermore, this research assesses the security posture of prominent XR systems and examines the applicable regulatory frameworks in immersive environment. Finally, security recommendations are proposed to counter the threat landscape of XR and the metaverse.
{"title":"A defensive model and implementation baseline for the metaverse and extended reality systems.","authors":"Sara Qamar, Hasan Tahir, Zahid Anwar, Naveed Ahmed, Shahzaib Tahir, Muhammad Aleem","doi":"10.7717/peerj-cs.3054","DOIUrl":"10.7717/peerj-cs.3054","url":null,"abstract":"<p><p>The metaverse and extended reality (XR) systems are vulnerable to emerging security threats, as developers have prioritized competitive business gains over security. The virtual entities, immersive experiences, and lack of centralized governance pose significant challenges in establishing standardized guidelines for XR systems and its stakeholders. In this research, a panoramic view is presented to identify mitigation strategies and defensive capabilities, including authenticity, privacy, integrity, interoperability, virtual forensics, and incident reporting to counter potential threats. To facilitate the implementation of a secure XR system, a novel baseline model is introduced, outlining key attributes and functions aligned with the available libraries. A statistical analysis is performed to assess the quality and effectiveness of development resources in embedding novel XR security features. Furthermore, this research assesses the security posture of prominent XR systems and examines the applicable regulatory frameworks in immersive environment. Finally, security recommendations are proposed to counter the threat landscape of XR and the metaverse.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e3054"},"PeriodicalIF":2.5,"publicationDate":"2025-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12453801/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145132593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-08-29eCollection Date: 2025-01-01DOI: 10.7717/peerj-cs.3031
Wasim Ahmad, Umar Islam, Abdulkadhem A Abdulkadhem, Babar Shah, Fernando Moreira, Ali Abbas
The rapid growth in wireless communication demands has led to a surge in research on technologies capable of enhancing communication reliability, coverage, and energy efficiency. Among these, uncrewed aerial vehicles (UAV) and reconfigurable intelligent surfaces (RIS) have emerged as promising solutions. Prior research on using deep reinforcement learning (DRL) to integrate RIS with UAV concentrated on enhancing signal quality and coverage, but it ignored the challenges caused by electromagnetic interference (EMI). This article introduces a novel framework addressing the challenges posed by EMI from Gallium nitride (GaN) power amplifiers in RIS-assisted UAV communication systems. By integrating DRL with quadrature phase shift keying (QPSK) modulation, the proposed system dynamically optimizes UAV deployment and RIS configurations in real-time, mitigating EMI effects, improving signal-to-interference-plus-noise ratio (SINR), and enhancing energy efficiency. The framework demonstrates superior performance, with an SINR improvement of up to 6.5 dB in interference-prone environments, while achieving a 38% increase in energy efficiency compared to baseline models. Additionally, the system significantly reduces EMI impact, with a mitigation rate of over 70%, and extends coverage area by 35%. The integration of QPSK and DRL allows for real-time decision-making that balances communication quality and energy consumption. These results show the system's potential to outperform traditional methods, particularly in dynamic and challenging environments such as urban, disaster recovery, and remote settings.
{"title":"Enhancing reliable and energy-efficient UAV communications with RIS and deep reinforcement learning.","authors":"Wasim Ahmad, Umar Islam, Abdulkadhem A Abdulkadhem, Babar Shah, Fernando Moreira, Ali Abbas","doi":"10.7717/peerj-cs.3031","DOIUrl":"10.7717/peerj-cs.3031","url":null,"abstract":"<p><p>The rapid growth in wireless communication demands has led to a surge in research on technologies capable of enhancing communication reliability, coverage, and energy efficiency. Among these, uncrewed aerial vehicles (UAV) and reconfigurable intelligent surfaces (RIS) have emerged as promising solutions. Prior research on using deep reinforcement learning (DRL) to integrate RIS with UAV concentrated on enhancing signal quality and coverage, but it ignored the challenges caused by electromagnetic interference (EMI). This article introduces a novel framework addressing the challenges posed by EMI from Gallium nitride (GaN) power amplifiers in RIS-assisted UAV communication systems. By integrating DRL with quadrature phase shift keying (QPSK) modulation, the proposed system dynamically optimizes UAV deployment and RIS configurations in real-time, mitigating EMI effects, improving signal-to-interference-plus-noise ratio (SINR), and enhancing energy efficiency. The framework demonstrates superior performance, with an SINR improvement of up to 6.5 dB in interference-prone environments, while achieving a 38% increase in energy efficiency compared to baseline models. Additionally, the system significantly reduces EMI impact, with a mitigation rate of over 70%, and extends coverage area by 35%. The integration of QPSK and DRL allows for real-time decision-making that balances communication quality and energy consumption. These results show the system's potential to outperform traditional methods, particularly in dynamic and challenging environments such as urban, disaster recovery, and remote settings.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e3031"},"PeriodicalIF":2.5,"publicationDate":"2025-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12453847/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145132457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-08-28eCollection Date: 2025-01-01DOI: 10.7717/peerj-cs.3117
Ailu Fei, Yihan Wang, Tiantian Ruan, Yekang Zhang, Min Yao, Li Wang
Background: The rapid development of artificial intelligence has permeated many fields, with its application in drug discovery becoming increasingly mature. Machine learning, particularly deep learning, has significantly improved the efficiency of drug discovery. In the core task of predicting drug-target affinity (DTA), deep learning enhances predictive performance by automatically extracting complex features from compounds and proteins.
Methods: Traditional approaches often rely heavily on sequence and two-dimensional structural information, overlooking critical three-dimensional and physicochemical properties. To address this, we propose a novel model-Cross Attention Fusion based on Information Enhancement for Drug-Target Affinity Prediction (CAFIE-DTA)-which incorporates protein 3D curvature and electrostatic potential information. The model approximates protein surface curvature using Delaunay triangulation, calculates total electrostatic potential via Adaptive Poisson-Boltzmann Solver (APBS) software, and employs cross multi-head attention to fuse physicochemical and sequence information of proteins. Simultaneously, it integrates graph-based and physicochemical features of compounds using the same attention mechanism. The resulting protein and compound vectors are concatenated for affinity prediction.
Results: Cross-validation and comparative evaluations on the benchmark Davis and KIBA datasets demonstrate that CAFIE-DTA outperforms existing methods. On the Davis dataset, it achieved improvements of 0.003 in confidence interval (CI) and 0.022 in R2. On the KIBA dataset, it improved MSE by 0.008, CI by 0.005, and R2 by 0.017. Compared to traditional models relying on 2D structures and sequence data, CAFIE-DTA shows superior performance in DTA prediction. The source code is available at: https://github.com/NTU-MedAI/CAFIE-DTA.
{"title":"Enhanced information cross-attention fusion for drug-target binding affinity prediction.","authors":"Ailu Fei, Yihan Wang, Tiantian Ruan, Yekang Zhang, Min Yao, Li Wang","doi":"10.7717/peerj-cs.3117","DOIUrl":"10.7717/peerj-cs.3117","url":null,"abstract":"<p><strong>Background: </strong>The rapid development of artificial intelligence has permeated many fields, with its application in drug discovery becoming increasingly mature. Machine learning, particularly deep learning, has significantly improved the efficiency of drug discovery. In the core task of predicting drug-target affinity (DTA), deep learning enhances predictive performance by automatically extracting complex features from compounds and proteins.</p><p><strong>Methods: </strong>Traditional approaches often rely heavily on sequence and two-dimensional structural information, overlooking critical three-dimensional and physicochemical properties. To address this, we propose a novel model-Cross Attention Fusion based on Information Enhancement for Drug-Target Affinity Prediction (CAFIE-DTA)-which incorporates protein 3D curvature and electrostatic potential information. The model approximates protein surface curvature using Delaunay triangulation, calculates total electrostatic potential <i>via</i> Adaptive Poisson-Boltzmann Solver (APBS) software, and employs cross multi-head attention to fuse physicochemical and sequence information of proteins. Simultaneously, it integrates graph-based and physicochemical features of compounds using the same attention mechanism. The resulting protein and compound vectors are concatenated for affinity prediction.</p><p><strong>Results: </strong>Cross-validation and comparative evaluations on the benchmark Davis and KIBA datasets demonstrate that CAFIE-DTA outperforms existing methods. On the Davis dataset, it achieved improvements of 0.003 in confidence interval (CI) and 0.022 in R<sup>2</sup>. On the KIBA dataset, it improved MSE by 0.008, CI by 0.005, and R<sup>2</sup> by 0.017. Compared to traditional models relying on 2D structures and sequence data, CAFIE-DTA shows superior performance in DTA prediction. The source code is available at: https://github.com/NTU-MedAI/CAFIE-DTA.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e3117"},"PeriodicalIF":2.5,"publicationDate":"2025-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12453779/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145132669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-08-28eCollection Date: 2025-01-01DOI: 10.7717/peerj-cs.2990
Hilal Biderci, Ali F Guneri
Background: This study presents a new approach to decision-making based on the selection of decision-makers according to evaluated criteria in multi-criteria decision-making (MCDM) methods. Therefore, sub-decision-maker groups (SDMGs) are created for each evaluated criterion. The SDMG approach, which is created according to the criteria, offers a more flexible and dynamic structure than the existing approaches. This approach aims to use the expertise and knowledge of decision-makers more effectively. The decision-making approach presented in this study offers an innovative model and adds a new dimension to decision-making processes. This decision-making approach is applied to the plastic injection moulding machine risk assessment, as it involves different criteria. In addition to classical risk parameters such as probability, severity, frequency, and detectability, new parameters such as human error, machine error, and existing safety measures are also used in the risk assessment.
Methods: The integration of the analytic hierarchy process (AHP) and the technique for order preference by similarity to ideal solution (TOPSIS) methods into the interval valued fermatean fuzzy set (IVFFS) environment makes an important contribution to a more comprehensive consideration of risks and uncertainties in the risk assessment process. The IVFF-AHP method is used to weight the risk parameters and determine the hazard scores, and the TOPSIS method is used to rank the hazards. A holistic and systematic approach to risk assessment has been achieved by integrating these two methods. Modelling of these methods is carried out using MATLAB_R2024a software.
Results: According to the evaluated criteria, it was concluded that the determination of the decision makers separately is applicable to the decision-making process. Identifying the existing safety measures parameter as the most important risk parameter emphasizes the central role of this factor in risk assessment. In addition, machine error and human error parameters are also found to be important in risk assessment. These parameters, which are used for the first time in the literature, offer a broader perspective than traditional methods and provide significant advantages in risk assessment. According to the evaluations, electricity, asphyxiating and toxic gases, and hot water use are determined as the most risky hazards. The sensitivity and comparative analysis performed in the study confirm that the proposed methodology produces consistent and reasonable results.
背景:本研究提出了一种基于多准则决策(MCDM)方法中基于评价标准的决策者选择的新决策方法。因此,为每个评估标准创建子决策者组(sdmg)。SDMG方法是根据标准创建的,它提供了比现有方法更灵活和动态的结构。这种方法旨在更有效地利用决策者的专业知识和知识。本研究提出的决策方法提供了一个创新的模型,并为决策过程增加了一个新的维度。该决策方法适用于注塑机风险评估,因为它涉及不同的标准。除了概率、严重程度、频率和可检测性等经典风险参数外,还使用了人为错误、机器错误和现有安全措施等新参数进行风险评估。方法:将层次分析法(AHP)和TOPSIS方法结合到区间值fermatean fuzzy set (IVFFS)环境中,为风险评估过程中更全面地考虑风险和不确定性做出了重要贡献。采用IVFF-AHP法对风险参数进行加权,确定危害分值,采用TOPSIS法对危害进行排序。通过综合这两种方法,实现了一种全面和系统的风险评估方法。利用MATLAB_R2024a软件对这些方法进行建模。结果:根据评价标准,得出单独确定决策者适用于决策过程。将现有安全措施参数确定为最重要的风险参数,强调了这一因素在风险评估中的核心作用。此外,机器误差和人为误差参数在风险评估中也很重要。这些参数在文献中首次使用,比传统方法提供了更广阔的视角,在风险评估中具有显著优势。根据评估,电力、窒息性和有毒气体以及热水的使用被确定为最危险的危害。研究中进行的敏感性和比较分析证实,所提出的方法产生一致和合理的结果。
{"title":"Risk assessment based on a new decision-making approach with fermatean fuzzy sets.","authors":"Hilal Biderci, Ali F Guneri","doi":"10.7717/peerj-cs.2990","DOIUrl":"10.7717/peerj-cs.2990","url":null,"abstract":"<p><strong>Background: </strong>This study presents a new approach to decision-making based on the selection of decision-makers according to evaluated criteria in multi-criteria decision-making (MCDM) methods. Therefore, sub-decision-maker groups (SDMGs) are created for each evaluated criterion. The SDMG approach, which is created according to the criteria, offers a more flexible and dynamic structure than the existing approaches. This approach aims to use the expertise and knowledge of decision-makers more effectively. The decision-making approach presented in this study offers an innovative model and adds a new dimension to decision-making processes. This decision-making approach is applied to the plastic injection moulding machine risk assessment, as it involves different criteria. In addition to classical risk parameters such as probability, severity, frequency, and detectability, new parameters such as human error, machine error, and existing safety measures are also used in the risk assessment.</p><p><strong>Methods: </strong>The integration of the analytic hierarchy process (AHP) and the technique for order preference by similarity to ideal solution (TOPSIS) methods into the interval valued fermatean fuzzy set (IVFFS) environment makes an important contribution to a more comprehensive consideration of risks and uncertainties in the risk assessment process. The IVFF-AHP method is used to weight the risk parameters and determine the hazard scores, and the TOPSIS method is used to rank the hazards. A holistic and systematic approach to risk assessment has been achieved by integrating these two methods. Modelling of these methods is carried out using MATLAB_R2024a software.</p><p><strong>Results: </strong>According to the evaluated criteria, it was concluded that the determination of the decision makers separately is applicable to the decision-making process. Identifying the existing safety measures parameter as the most important risk parameter emphasizes the central role of this factor in risk assessment. In addition, machine error and human error parameters are also found to be important in risk assessment. These parameters, which are used for the first time in the literature, offer a broader perspective than traditional methods and provide significant advantages in risk assessment. According to the evaluations, electricity, asphyxiating and toxic gases, and hot water use are determined as the most risky hazards. The sensitivity and comparative analysis performed in the study confirm that the proposed methodology produces consistent and reasonable results.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e2990"},"PeriodicalIF":2.5,"publicationDate":"2025-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12453700/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145132674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-08-28eCollection Date: 2025-01-01DOI: 10.7717/peerj-cs.3168
Murat Saran
Virtual reality (VR) holds significant promise for enhancing science education by providing immersive and interactive learning experiences. However, the optimal interaction modality within educational VR environments remains an open question. This study investigates the impact of hand-based vs. controller-based interaction on sixth-grade students' sense of presence and interaction performance in a VR science laboratory simulation. Fifty-four sixth-grade students were randomly assigned to either a hand-based interaction group or a controller-based interaction group. Participants completed three interactive science experiments (solar system, electrical circuits, and force/energy) within a virtual laboratory environment designed to mimic their school's physical lab. Presence was assessed using a validated Turkish adaptation of the Presence Questionnaire (PQ), while interaction performance was evaluated using a structured observation form completed by a school teacher. Independent samples t-tests and Mann-Whitney U tests were used to compare the presence and performance scores between the groups. Supplementary analyses explored the effects of gender and prior VR experience. Contrary to expectations, no significant differences were found in either presence (t(49.4) = -0.01, p = 0.992) or interaction performance (t(52) = -1.30, p = 0.199) between the hand-based and controller-based interaction groups. Both interaction modalities yielded comparable levels of self-reported presence and observed performance. However, an unexpected finding emerged regarding performance. A supplementary analysis revealed a significant main effect of gender on performance scores (F(1, 50) = 4.844, p = 0.032), independent of interaction type. Specifically, males demonstrated significantly higher performance than females. This study suggests that, for sixth-grade students engaging in these specific VR science simulations, hand-based and controller-based interactions are equally effective in terms of fostering presence and supporting interaction performance. These findings have practical implications for the design and implementation of VR learning environments, particularly in resource-constrained settings where the reduced maintenance and hygiene concerns associated with hand-based interaction may be advantageous.
虚拟现实(VR)通过提供身临其境的互动学习体验,为加强科学教育带来了巨大的希望。然而,教育VR环境中的最佳交互方式仍然是一个悬而未决的问题。在虚拟现实科学实验室模拟实验中,研究了基于手和基于控制器的交互对六年级学生的存在感和交互表现的影响。54名六年级学生被随机分配到基于手的互动组和基于控制器的互动组。参与者在模拟学校物理实验室的虚拟实验室环境中完成了三个互动科学实验(太阳系、电路和力/能量)。使用经过验证的土耳其版存在问卷(PQ)评估存在,而使用由学校教师完成的结构化观察表评估互动表现。使用独立样本t检验和Mann-Whitney U检验比较各组之间的存在和表现得分。补充分析探讨了性别和先前VR体验的影响。与预期相反,在基于手的交互组和基于控制器的交互组之间,无论是存在(t(49.4) = -0.01, p = 0.992)还是交互性能(t(52) = -1.30, p = 0.199)都没有发现显著差异。两种互动方式产生了相当水平的自我报告存在和观察表现。然而,在性能方面出现了一个意想不到的发现。补充分析显示,性别对成绩得分有显著的主效应(F(1,50) = 4.844, p = 0.032),与互动类型无关。具体来说,男性的表现明显高于女性。本研究表明,对于参与这些特定的VR科学模拟的六年级学生来说,基于手和基于控制器的互动在培养存在感和支持互动表现方面同样有效。这些发现对VR学习环境的设计和实施具有实际意义,特别是在资源受限的环境中,减少与手部交互相关的维护和卫生问题可能是有利的。
{"title":"Comparing hand-based and controller-based interactions in virtual reality learning: effects on presence and interaction performance.","authors":"Murat Saran","doi":"10.7717/peerj-cs.3168","DOIUrl":"10.7717/peerj-cs.3168","url":null,"abstract":"<p><p>Virtual reality (VR) holds significant promise for enhancing science education by providing immersive and interactive learning experiences. However, the optimal interaction modality within educational VR environments remains an open question. This study investigates the impact of hand-based <i>vs</i>. controller-based interaction on sixth-grade students' sense of presence and interaction performance in a VR science laboratory simulation. Fifty-four sixth-grade students were randomly assigned to either a hand-based interaction group or a controller-based interaction group. Participants completed three interactive science experiments (solar system, electrical circuits, and force/energy) within a virtual laboratory environment designed to mimic their school's physical lab. Presence was assessed using a validated Turkish adaptation of the Presence Questionnaire (PQ), while interaction performance was evaluated using a structured observation form completed by a school teacher. Independent samples t-tests and Mann-Whitney U tests were used to compare the presence and performance scores between the groups. Supplementary analyses explored the effects of gender and prior VR experience. Contrary to expectations, no significant differences were found in either presence (t(49.4) = -0.01, <i>p</i> = 0.992) or interaction performance (t(52) = -1.30, <i>p</i> = 0.199) between the hand-based and controller-based interaction groups. Both interaction modalities yielded comparable levels of self-reported presence and observed performance. However, an unexpected finding emerged regarding performance. A supplementary analysis revealed a significant main effect of gender on performance scores (F(1, 50) = 4.844, <i>p</i> = 0.032), independent of interaction type. Specifically, males demonstrated significantly higher performance than females. This study suggests that, for sixth-grade students engaging in these specific VR science simulations, hand-based and controller-based interactions are equally effective in terms of fostering presence and supporting interaction performance. These findings have practical implications for the design and implementation of VR learning environments, particularly in resource-constrained settings where the reduced maintenance and hygiene concerns associated with hand-based interaction may be advantageous.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e3168"},"PeriodicalIF":2.5,"publicationDate":"2025-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12453734/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145132371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-08-28eCollection Date: 2025-01-01DOI: 10.7717/peerj-cs.3149
Amira Tandirovic Gursel, Yasin Kaya
Early diagnosis of breast cancer through periodic screening is a vital ally in the fight for survival. Mammography, recognized as one of the most widely used and cost-effective tools for detecting early signs of asymmetry, calcification, masses, and architectural distortion in breast tissue, plays a significant role in nearly all screening scenarios. However, the interpretation and scoring of mammograms is a complex multi-parameter process that frequently leads to false-positive and false-negative results. This article introduces a new deep-learning-based model that classifies mammograms according to the Breast Imaging Reporting and Data System (BI-RADS) assessment categories. The model is trained on a private dataset, intentionally excluding no BI-RADS categories. A novel deep neural network architecture is employed to more accurately classify breasts, including their boundaries, as regions of interest (ROIs). The ConvNeXt architecture serves as a feature extractor for lower-level features, which are then combined with the layers of a randomly initialized naive inception module to capture higher-level features. Diagnosis is achieved through three experimental tests, yielding accuracy rates ranging from 82.08% to 86.27%. These promising accuracy levels, in comparison to previous studies, can be attributed to a more comprehensive approach to addressing BI-RADS scoring challenges. In addition to pursuing further enhancements in accuracy, future research should consider integrating prior radiology reports to create a more realistic end-to-end computer-aided detection system.
{"title":"Mam-Incept-Net: a novel inception model for precise interpretation of mammography images.","authors":"Amira Tandirovic Gursel, Yasin Kaya","doi":"10.7717/peerj-cs.3149","DOIUrl":"10.7717/peerj-cs.3149","url":null,"abstract":"<p><p>Early diagnosis of breast cancer through periodic screening is a vital ally in the fight for survival. Mammography, recognized as one of the most widely used and cost-effective tools for detecting early signs of asymmetry, calcification, masses, and architectural distortion in breast tissue, plays a significant role in nearly all screening scenarios. However, the interpretation and scoring of mammograms is a complex multi-parameter process that frequently leads to false-positive and false-negative results. This article introduces a new deep-learning-based model that classifies mammograms according to the Breast Imaging Reporting and Data System (BI-RADS) assessment categories. The model is trained on a private dataset, intentionally excluding no BI-RADS categories. A novel deep neural network architecture is employed to more accurately classify breasts, including their boundaries, as regions of interest (ROIs). The ConvNeXt architecture serves as a feature extractor for lower-level features, which are then combined with the layers of a randomly initialized naive inception module to capture higher-level features. Diagnosis is achieved through three experimental tests, yielding accuracy rates ranging from 82.08% to 86.27%. These promising accuracy levels, in comparison to previous studies, can be attributed to a more comprehensive approach to addressing BI-RADS scoring challenges. In addition to pursuing further enhancements in accuracy, future research should consider integrating prior radiology reports to create a more realistic end-to-end computer-aided detection system.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e3149"},"PeriodicalIF":2.5,"publicationDate":"2025-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12453803/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145132739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-08-28eCollection Date: 2025-01-01DOI: 10.7717/peerj-cs.3110
İlker Kocaoğlu, Erinç Karataş
Course and instructor evaluations (CIE) are essential tools for assessing educational quality in higher education. However, traditional CIE systems often suffer from inconsistencies between structured responses and open-ended feedback, leading to unreliable insights and increased administrative workload. This study suggests a modular system to address these challenges, leveraging sentiment analysis and inconsistency detection to enhance the reliability and efficiency of CIE processes.
Background: Improving the reliability of CIE data is crucial for informed decision-making in higher education. Existing methods fail to address discrepancies between numerical scores and textual feedback, resulting in misleading evaluations. This study proposes a system to identify and exclude inconsistent data, providing more reliable insights.
Methods: Using the Design Science Research Methodology (DSRM), a system architecture was developed with five modules: data collection, preprocessing, sentiment analysis, inconsistency detection, and reporting. A dataset of 13,651 anonymized Turkish CIE records was used to train and evaluate machine learning algorithms, including support vector machines, naive Bayes, random forest, decision trees, K-nearest neighbors, and OpenAI's GPT-4 Turbo Preview model. Sentiment analysis results from open-ended responses were compared with structured responses to identify inconsistencies.
Results: The GPT-4 Turbo Preview model outperformed traditional algorithms, achieving 85% accuracy, 88% precision, and 95% recall. Analysis of a prototype system applied to 431 CIEs identified a 37% inconsistency rate. By excluding inconsistent data, the system generated reliable reports with actionable insights for course and instructor performance. The purpose of this study is to design and evaluate a new system using the Design Science Research (DSR) approach to enhance the accuracy and reliability of course evaluation processes employed in higher education institutions. The modular system effectively addresses inconsistencies in CIE processes, offering a scalable and adaptable solution for higher education institutions. By integrating advanced machine learning techniques, the system enhances the accuracy and reliability of evaluation reports, supporting data-driven decision-making. Future work will focus on refining sentiment analysis for neutral comments and broadening the system's applicability to diverse educational contexts. This innovative approach represents a significant advancement in leveraging technology to improve educational quality.
{"title":"Improving course evaluation processes in higher education institutions: a modular system approach.","authors":"İlker Kocaoğlu, Erinç Karataş","doi":"10.7717/peerj-cs.3110","DOIUrl":"10.7717/peerj-cs.3110","url":null,"abstract":"<p><p>Course and instructor evaluations (CIE) are essential tools for assessing educational quality in higher education. However, traditional CIE systems often suffer from inconsistencies between structured responses and open-ended feedback, leading to unreliable insights and increased administrative workload. This study suggests a modular system to address these challenges, leveraging sentiment analysis and inconsistency detection to enhance the reliability and efficiency of CIE processes.</p><p><strong>Background: </strong>Improving the reliability of CIE data is crucial for informed decision-making in higher education. Existing methods fail to address discrepancies between numerical scores and textual feedback, resulting in misleading evaluations. This study proposes a system to identify and exclude inconsistent data, providing more reliable insights.</p><p><strong>Methods: </strong>Using the Design Science Research Methodology (DSRM), a system architecture was developed with five modules: data collection, preprocessing, sentiment analysis, inconsistency detection, and reporting. A dataset of 13,651 anonymized Turkish CIE records was used to train and evaluate machine learning algorithms, including support vector machines, naive Bayes, random forest, decision trees, K-nearest neighbors, and OpenAI's GPT-4 Turbo Preview model. Sentiment analysis results from open-ended responses were compared with structured responses to identify inconsistencies.</p><p><strong>Results: </strong>The GPT-4 Turbo Preview model outperformed traditional algorithms, achieving 85% accuracy, 88% precision, and 95% recall. Analysis of a prototype system applied to 431 CIEs identified a 37% inconsistency rate. By excluding inconsistent data, the system generated reliable reports with actionable insights for course and instructor performance. The purpose of this study is to design and evaluate a new system using the Design Science Research (DSR) approach to enhance the accuracy and reliability of course evaluation processes employed in higher education institutions. The modular system effectively addresses inconsistencies in CIE processes, offering a scalable and adaptable solution for higher education institutions. By integrating advanced machine learning techniques, the system enhances the accuracy and reliability of evaluation reports, supporting data-driven decision-making. Future work will focus on refining sentiment analysis for neutral comments and broadening the system's applicability to diverse educational contexts. This innovative approach represents a significant advancement in leveraging technology to improve educational quality.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e3110"},"PeriodicalIF":2.5,"publicationDate":"2025-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12453702/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145132721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Next generation sequencing (NGS) has become a cornerstone of modern genomics, enabling high-throughput analysis of DNA and RNA with wide applications across medicine, research, and biotechnology. However, the growing adoption of NGS technologies has introduced significant cyber-biosecurity risks, particularly those arising from insider threats and organizational shortcomings. While technical vulnerabilities have received attention, the human and behavioral dimensions of cybersecurity in NGS environments remain underexplored. This study investigates the role of human factors and organizational behavior in shaping cyber-biosecurity risks in NGS workflows. A mixed-method approach was employed, combining survey data from 120 participants across four countries with statistical analyses including chi-square tests, cross-tabulations, and cluster analysis. The study assessed cybersecurity training availability, employee engagement, training effectiveness, and awareness of insider threats. Findings reveal substantial gaps in training frequency and participation, with 36% of respondents reporting no access to NGS-specific cybersecurity training. Only a minority of participants felt confident in detecting cyber threats, and 32.5% had never applied cybersecurity knowledge in practice. Chi-square results indicate significant associations between training frequency and threat recognition, training relevance, and knowledge application. Cluster analysis further categorized organizations into "robust," "moderate," and "emergent" cybersecurity maturity profiles. The study offers an evidence-based framework to enhance cyber-biosecurity in NGS settings by addressing human-centric risks. It recommends role-specific training, frequent policy updates, and improved organizational communication to mitigate insider threats. These insights support the development of targeted interventions and policies to strengthen the cybersecurity culture in genomics organizations.
{"title":"Next generation sequencing under attack: investigating insider threats and organizational behaviour.","authors":"Nasreen Anjum, Hani Alshahrani, Darakhshan Syed, Asadullah Shaikh, Mahreen Ul Hassan","doi":"10.7717/peerj-cs.3008","DOIUrl":"10.7717/peerj-cs.3008","url":null,"abstract":"<p><p>Next generation sequencing (NGS) has become a cornerstone of modern genomics, enabling high-throughput analysis of DNA and RNA with wide applications across medicine, research, and biotechnology. However, the growing adoption of NGS technologies has introduced significant cyber-biosecurity risks, particularly those arising from insider threats and organizational shortcomings. While technical vulnerabilities have received attention, the human and behavioral dimensions of cybersecurity in NGS environments remain underexplored. This study investigates the role of human factors and organizational behavior in shaping cyber-biosecurity risks in NGS workflows. A mixed-method approach was employed, combining survey data from 120 participants across four countries with statistical analyses including chi-square tests, cross-tabulations, and cluster analysis. The study assessed cybersecurity training availability, employee engagement, training effectiveness, and awareness of insider threats. Findings reveal substantial gaps in training frequency and participation, with 36% of respondents reporting no access to NGS-specific cybersecurity training. Only a minority of participants felt confident in detecting cyber threats, and 32.5% had never applied cybersecurity knowledge in practice. Chi-square results indicate significant associations between training frequency and threat recognition, training relevance, and knowledge application. Cluster analysis further categorized organizations into \"robust,\" \"moderate,\" and \"emergent\" cybersecurity maturity profiles. The study offers an evidence-based framework to enhance cyber-biosecurity in NGS settings by addressing human-centric risks. It recommends role-specific training, frequent policy updates, and improved organizational communication to mitigate insider threats. These insights support the development of targeted interventions and policies to strengthen the cybersecurity culture in genomics organizations.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e3008"},"PeriodicalIF":2.5,"publicationDate":"2025-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12453824/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145132733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-08-26eCollection Date: 2025-01-01DOI: 10.7717/peerj-cs.3071
Mohammed Alsuhaibani, Kamel Gaanoun, Ali Mustafa Qamar
This study examines how Arab media have engaged with the United Nations Sustainable Development Goals (SDGs) over the past decade and evaluates the alignment between media coverage and official government priorities. The research addresses the lack of large-scale, Arabic-focused analyses in SDG discourse, which is often dominated by English-language studies. We collected and processed a unique dataset of over 1.2 million Arabic news articles from ten countries between 2010 and 2024. Using a combination of data augmentation, deep learning (specifically, Transformer-based models), and large language models (LLMs), we trained classifiers to detect references to the SDGs and categorize articles by specific SDGs. The results reveal regional patterns in SDG coverage, with North African countries focusing more on governance-related goals, while Gulf countries emphasize economic and environmental themes. Our findings reveal a general alignment between media discourse and official SDG priorities, with notable exceptions. This study is the first to combine artificial intelligence (AI) methods and Arabic media at this scale for SDG analysis, offering new tools and insights for policymakers, media professionals, and development stakeholders.
{"title":"Artificial intelligence-driven insights into Arab media's sustainable development goals coverage.","authors":"Mohammed Alsuhaibani, Kamel Gaanoun, Ali Mustafa Qamar","doi":"10.7717/peerj-cs.3071","DOIUrl":"10.7717/peerj-cs.3071","url":null,"abstract":"<p><p>This study examines how Arab media have engaged with the United Nations Sustainable Development Goals (SDGs) over the past decade and evaluates the alignment between media coverage and official government priorities. The research addresses the lack of large-scale, Arabic-focused analyses in SDG discourse, which is often dominated by English-language studies. We collected and processed a unique dataset of over 1.2 million Arabic news articles from ten countries between 2010 and 2024. Using a combination of data augmentation, deep learning (specifically, Transformer-based models), and large language models (LLMs), we trained classifiers to detect references to the SDGs and categorize articles by specific SDGs. The results reveal regional patterns in SDG coverage, with North African countries focusing more on governance-related goals, while Gulf countries emphasize economic and environmental themes. Our findings reveal a general alignment between media discourse and official SDG priorities, with notable exceptions. This study is the first to combine artificial intelligence (AI) methods and Arabic media at this scale for SDG analysis, offering new tools and insights for policymakers, media professionals, and development stakeholders.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e3071"},"PeriodicalIF":2.5,"publicationDate":"2025-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12453826/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145132477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-08-25eCollection Date: 2025-01-01DOI: 10.7717/peerj-cs.3132
Sihan Chen, Ying Zhao
In recent years, filter pruning has been recognized as an indispensable technique for mitigating the significant computational complexity and parameter burden associated with deep convolutional neural networks (CNNs). To date, existing methods are based on heuristically designed pruning metrics or implementing weight regulations to penalize filter parameters during the training process. Nevertheless, human-crafted pruning criteria tend not to identify the most critical filters, and the introduction of weight constraints can inadvertently interfere with weight training. To rectify these obstacles, this article introduces a novel mask learning method for autonomous filter pruning, negating requirements for weight penalties. Specifically, we attribute a learnable mask to each filter. During forward propagation, the mask is transformed to a binary value of 1 or 0, serving as indicators for the necessity of corresponding filter pruning. In contrast, throughout backward propagation, we use straight-through estimator (STE) to estimate the gradient of masks, accommodating the non-differentiable characteristic of the rounding function. We verify that these learned masks aptly reflect the significance of corresponding filters. Concurrently, throughout the mask learning process, the training of neural network parameters remains uninfluenced, therefore protecting the normal training process of weights. The efficacy of our proposed filter pruning method based on mask learning, termed MLPruner, is substantiated through its application to prevalent CNNs across numerous representative benchmarks.
{"title":"MLPruner: pruning convolutional neural networks with automatic mask learning.","authors":"Sihan Chen, Ying Zhao","doi":"10.7717/peerj-cs.3132","DOIUrl":"10.7717/peerj-cs.3132","url":null,"abstract":"<p><p>In recent years, filter pruning has been recognized as an indispensable technique for mitigating the significant computational complexity and parameter burden associated with deep convolutional neural networks (CNNs). To date, existing methods are based on heuristically designed pruning metrics or implementing weight regulations to penalize filter parameters during the training process. Nevertheless, human-crafted pruning criteria tend not to identify the most critical filters, and the introduction of weight constraints can inadvertently interfere with weight training. To rectify these obstacles, this article introduces a novel mask learning method for autonomous filter pruning, negating requirements for weight penalties. Specifically, we attribute a learnable mask to each filter. During forward propagation, the mask is transformed to a binary value of 1 or 0, serving as indicators for the necessity of corresponding filter pruning. In contrast, throughout backward propagation, we use straight-through estimator (STE) to estimate the gradient of masks, accommodating the non-differentiable characteristic of the rounding function. We verify that these learned masks aptly reflect the significance of corresponding filters. Concurrently, throughout the mask learning process, the training of neural network parameters remains uninfluenced, therefore protecting the normal training process of weights. The efficacy of our proposed filter pruning method based on mask learning, termed MLPruner, is substantiated through its application to prevalent CNNs across numerous representative benchmarks.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e3132"},"PeriodicalIF":2.5,"publicationDate":"2025-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12453823/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145132736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}