Pub Date : 2024-03-03DOI: 10.1016/j.array.2024.100340
Yuzheng Liu , Jianxun Zhang , Lei Shi , Mingxiang Huang , Linyu Lin , Lingfeng Zhu , Xianglu Lin , Chuanlei Zhang
In the domain of outdoor construction within the power industry, working at significant heights is common, requiring stringent safety measures. Workers are mandated to wear hard hats and secure themselves with seat belts to prevent potential falls, ensuring their safety and reducing the risk of injuries. Detecting seat belt usage holds immense significance in safety inspections within the power industry. This study introduces detection method of the seat belt for workers at height based on UAV Image and YOLO Algorithm. The YOLOv5 approach involves integrating CSPNet into the Darknet53 backbone, incorporating the Focus layer into CSP-Darknet53, replacing the SPPF block in the SPP model, and implementing the CSPNet strategy in the PANet model. Experimental results demonstrate that the YOLOv5 algorithm achieves an elevated average accuracy of 99.2%, surpassing benchmarks set by FastRcnn, SSD, YOLOX-m, and YOLOv7. It also demonstrates superior adaptability in scenarios involving smaller objects, validated using a UAV-collected dataset of seat belt images. These findings confirm the algorithm's compliance with performance criteria for seat belt detection at power construction sites, making a significant contribution to enhancing safety measures within the power industry's construction practices.
{"title":"Detection method of the seat belt for workers at height based on UAV image and YOLO algorithm","authors":"Yuzheng Liu , Jianxun Zhang , Lei Shi , Mingxiang Huang , Linyu Lin , Lingfeng Zhu , Xianglu Lin , Chuanlei Zhang","doi":"10.1016/j.array.2024.100340","DOIUrl":"https://doi.org/10.1016/j.array.2024.100340","url":null,"abstract":"<div><p>In the domain of outdoor construction within the power industry, working at significant heights is common, requiring stringent safety measures. Workers are mandated to wear hard hats and secure themselves with seat belts to prevent potential falls, ensuring their safety and reducing the risk of injuries. Detecting seat belt usage holds immense significance in safety inspections within the power industry. This study introduces detection method of the seat belt for workers at height based on UAV Image and YOLO Algorithm. The YOLOv5 approach involves integrating CSPNet into the Darknet53 backbone, incorporating the Focus layer into CSP-Darknet53, replacing the SPPF block in the SPP model, and implementing the CSPNet strategy in the PANet model. Experimental results demonstrate that the YOLOv5 algorithm achieves an elevated average accuracy of 99.2%, surpassing benchmarks set by FastRcnn, SSD, YOLOX-m, and YOLOv7. It also demonstrates superior adaptability in scenarios involving smaller objects, validated using a UAV-collected dataset of seat belt images. These findings confirm the algorithm's compliance with performance criteria for seat belt detection at power construction sites, making a significant contribution to enhancing safety measures within the power industry's construction practices.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"22 ","pages":"Article 100340"},"PeriodicalIF":0.0,"publicationDate":"2024-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000067/pdfft?md5=50dec4f4bfbf478e832b65943e75f531&pid=1-s2.0-S2590005624000067-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140042676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-01DOI: 10.1016/j.array.2024.100339
Arif Mahmud, Afjal Hossan Sarower, Amir Sohel, Md Assaduzzaman, Touhid Bhuiyan
Given the limited extent of study conducted on the application of ChatGPT in the realm of education, this domain still needs to be explored. Consequently, the primary objective of this study is to evaluate the impact of factors within the extended value-based adoption model (VAM) and to delineate the individual contributions of these factors toward shaping the attitudes of university students regarding the utilization of ChatGPT for instructional purposes. This investigation incorporates dimensions such as social influence, self-efficacy, and personal innovativeness to augment the VAM. This augmentation aims to identify components where a hybrid approach, integrating partial least squares (PLS), artificial neural networks (ANN), deep neural networks (DNN), and classification algorithms, is employed to accurately discern both linear and nonlinear correlations. The data for this study were obtained through an online survey administered to university students, and a purposive sample technique was employed to select 369 valid responses. Following the initial data preparation, the assessment process comprised three successive stages: PLS, ANN, DNN and classification algorithms analysis. Intention is influenced by attitude, which is predicted by perceived usefulness, perceived enjoyment, social influence, self-efficacy, and personal innovativeness. Moreover, personal innovativeness has the maximum contribution to attitude followed by self-efficacy, enjoyment, usefulness, social influence, technicality, and cost. These findings will support the creation and prioritization of student-centered educational services. Additionally, this study can contribute to creating an efficient learning management system to enhance students' academic performance and professional efficiency.
{"title":"Adoption of ChatGPT by university students for academic purposes: Partial least square, artificial neural network, deep neural network and classification algorithms approach","authors":"Arif Mahmud, Afjal Hossan Sarower, Amir Sohel, Md Assaduzzaman, Touhid Bhuiyan","doi":"10.1016/j.array.2024.100339","DOIUrl":"https://doi.org/10.1016/j.array.2024.100339","url":null,"abstract":"<div><p>Given the limited extent of study conducted on the application of ChatGPT in the realm of education, this domain still needs to be explored. Consequently, the primary objective of this study is to evaluate the impact of factors within the extended value-based adoption model (VAM) and to delineate the individual contributions of these factors toward shaping the attitudes of university students regarding the utilization of ChatGPT for instructional purposes. This investigation incorporates dimensions such as social influence, self-efficacy, and personal innovativeness to augment the VAM. This augmentation aims to identify components where a hybrid approach, integrating partial least squares (PLS), artificial neural networks (ANN), deep neural networks (DNN), and classification algorithms, is employed to accurately discern both linear and nonlinear correlations. The data for this study were obtained through an online survey administered to university students, and a purposive sample technique was employed to select 369 valid responses. Following the initial data preparation, the assessment process comprised three successive stages: PLS, ANN, DNN and classification algorithms analysis. Intention is influenced by attitude, which is predicted by perceived usefulness, perceived enjoyment, social influence, self-efficacy, and personal innovativeness. Moreover, personal innovativeness has the maximum contribution to attitude followed by self-efficacy, enjoyment, usefulness, social influence, technicality, and cost. These findings will support the creation and prioritization of student-centered educational services. Additionally, this study can contribute to creating an efficient learning management system to enhance students' academic performance and professional efficiency.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"21 ","pages":"Article 100339"},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000055/pdfft?md5=349b8d60b9358f4b9c5452ad78d09c0d&pid=1-s2.0-S2590005624000055-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140042372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-22DOI: 10.1016/j.array.2024.100336
Abdillah Abdillah , Ida Widianingsih , Rd Ahmad Buchari , Heru Nurasa
This research aims to reduce social media security risks and develop best practices to help governments address social media security risks more effectively. This research begins by reviewing the different discussions in the literature about social media security risks and mitigation techniques. Based on the extensive review, several key insights were identified and summarized to help organizations address social media security risks more effectively. Many national governments around the world do not have effective social media security policies and are unsure how to develop effective social media security strategies to mitigate social media security risks. This research provides guidance to national governments on mitigating potential social media security risks. This study incorporates ongoing debates in the literature and provides guidance on how to reduce social media security and technological risks. Practical insights are identified and summarized from the extensive literature. More discussions and studies are needed on strategies and practical insights to reduce social media risk for the Indonesian government.
{"title":"Big data security & individual (psychological) resilience: A review of social media risks and lessons learned from Indonesia","authors":"Abdillah Abdillah , Ida Widianingsih , Rd Ahmad Buchari , Heru Nurasa","doi":"10.1016/j.array.2024.100336","DOIUrl":"https://doi.org/10.1016/j.array.2024.100336","url":null,"abstract":"<div><p>This research aims to reduce social media security risks and develop best practices to help governments address social media security risks more effectively. This research begins by reviewing the different discussions in the literature about social media security risks and mitigation techniques. Based on the extensive review, several key insights were identified and summarized to help organizations address social media security risks more effectively. Many national governments around the world do not have effective social media security policies and are unsure how to develop effective social media security strategies to mitigate social media security risks. This research provides guidance to national governments on mitigating potential social media security risks. This study incorporates ongoing debates in the literature and provides guidance on how to reduce social media security and technological risks. Practical insights are identified and summarized from the extensive literature. More discussions and studies are needed on strategies and practical insights to reduce social media risk for the Indonesian government.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"21 ","pages":"Article 100336"},"PeriodicalIF":0.0,"publicationDate":"2024-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S259000562400002X/pdfft?md5=ba831e3d2d41e5a91bcf0ce7cc29aec7&pid=1-s2.0-S259000562400002X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139936136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-22DOI: 10.1016/j.array.2024.100338
Peng Zhu , Gang Wang , Jingheng He , Yueli Dong , Yu Chang
As data privacy issues become more and more sensitive, increasing numbers of websites usually encrypt traffic when transmitting it. This method can largely protect privacy, but it also brings a huge challenge. Aiming at the problem that encrypted traffic classification makes it difficult to obtain a global optimal solution, this paper proposes an encrypted traffic identification model called the ET-BERT and 1D-CNN fusion network (BCFNet), based on multi-scale feature fusion. This method combines feature learning with classification tasks, unified into an end-to-end model. The local features of encrypted traffic extracted based on the improved Inception one-dimensional convolutional neural network structure are fused with the global features extracted by the ET-BERT model. The one-dimensional convolutional neural network is more suitable for the encrypted traffic of a one-dimensional sequence than the commonly used two-dimensional convolutional neural network. The proposed model can learn the nonlinear relationship between the input data and the expected label and obtain the global optimal solution with a greater probability. This paper verifies the ISCX VPN-nonVPN dataset and compares the results of the BCFNet model with the other five baseline models on accuracy, precision, recall, and F1 indicators. The experimental results demonstrate that the BCFNet model has a greater overall effect than the other five models. Its accuracy can reach 98.88%.
{"title":"An encrypted traffic identification method based on multi-scale feature fusion","authors":"Peng Zhu , Gang Wang , Jingheng He , Yueli Dong , Yu Chang","doi":"10.1016/j.array.2024.100338","DOIUrl":"https://doi.org/10.1016/j.array.2024.100338","url":null,"abstract":"<div><p>As data privacy issues become more and more sensitive, increasing numbers of websites usually encrypt traffic when transmitting it. This method can largely protect privacy, but it also brings a huge challenge. Aiming at the problem that encrypted traffic classification makes it difficult to obtain a global optimal solution, this paper proposes an encrypted traffic identification model called the ET-BERT and 1D-CNN fusion network (BCFNet), based on multi-scale feature fusion. This method combines feature learning with classification tasks, unified into an end-to-end model. The local features of encrypted traffic extracted based on the improved Inception one-dimensional convolutional neural network structure are fused with the global features extracted by the ET-BERT model. The one-dimensional convolutional neural network is more suitable for the encrypted traffic of a one-dimensional sequence than the commonly used two-dimensional convolutional neural network. The proposed model can learn the nonlinear relationship between the input data and the expected label and obtain the global optimal solution with a greater probability. This paper verifies the ISCX VPN-nonVPN dataset and compares the results of the BCFNet model with the other five baseline models on accuracy, precision, recall, and F1 indicators. The experimental results demonstrate that the BCFNet model has a greater overall effect than the other five models. <em>Its accuracy can reach 98.88%.</em></p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"21 ","pages":"Article 100338"},"PeriodicalIF":0.0,"publicationDate":"2024-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000043/pdfft?md5=9bdc10d2ece62e4a288fe5d295082936&pid=1-s2.0-S2590005624000043-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139985551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-17DOI: 10.1016/j.array.2024.100337
Achraf El Bouazzaoui, Abdelkader Hadjoudja, Omar Mouhib, Nazha Cherkaoui
The relentless increase in data volume and complexity necessitates advancements in machine learning methodologies that are more adaptable. In response to this challenge, we present a novel architecture enabling dynamic classifier selection on FPGA platforms. This unique architecture combines hardware accelerators of three distinct classifiers—Support Vector Machines, K-Nearest Neighbors, and Deep Neural Networks—without requiring the combined area footprint of those implementations. It further introduces a hardware-based Accelerator Selector that dynamically selects the most fitting classifier for incoming data based on the K-Nearest Centroid approach. When tested on four different datasets, Our architecture demonstrated improved classification performance, with an accuracy enhancement of up to 8% compared to the software implementations. Besides this enhanced accuracy, it achieved a significant reduction in resource usage, with a decrease of up to 45% compared to a static implementation making it highly efficient in terms of resource utilization and energy consumption on FPGA platforms, paving the way for scalable ML applications. To the best of our knowledge, this work is the first to harness FPGA platforms for dynamic classifier selection.
{"title":"FPGA-based ML adaptive accelerator: A partial reconfiguration approach for optimized ML accelerator utilization","authors":"Achraf El Bouazzaoui, Abdelkader Hadjoudja, Omar Mouhib, Nazha Cherkaoui","doi":"10.1016/j.array.2024.100337","DOIUrl":"https://doi.org/10.1016/j.array.2024.100337","url":null,"abstract":"<div><p>The relentless increase in data volume and complexity necessitates advancements in machine learning methodologies that are more adaptable. In response to this challenge, we present a novel architecture enabling dynamic classifier selection on FPGA platforms. This unique architecture combines hardware accelerators of three distinct classifiers—Support Vector Machines, K-Nearest Neighbors, and Deep Neural Networks—without requiring the combined area footprint of those implementations. It further introduces a hardware-based Accelerator Selector that dynamically selects the most fitting classifier for incoming data based on the K-Nearest Centroid approach. When tested on four different datasets, Our architecture demonstrated improved classification performance, with an accuracy enhancement of up to 8% compared to the software implementations. Besides this enhanced accuracy, it achieved a significant reduction in resource usage, with a decrease of up to 45% compared to a static implementation making it highly efficient in terms of resource utilization and energy consumption on FPGA platforms, paving the way for scalable ML applications. To the best of our knowledge, this work is the first to harness FPGA platforms for dynamic classifier selection.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"21 ","pages":"Article 100337"},"PeriodicalIF":0.0,"publicationDate":"2024-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000031/pdfft?md5=95f2138b6f79f83ca28d5588ddf2edda&pid=1-s2.0-S2590005624000031-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139901212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-04DOI: 10.1016/j.array.2024.100335
Maneerut Chatrangsan , Chatpong Tangmanee
Text-based CAPTCHA is widely used as an online security guard, requiring a user to input letters for classifying human and automated software (known as a bot). However, they are still a problem for usability and robustness. This study investigated the effect of letter spacing, disturbing line orientation and disturbing line color on user test and robustness of text-based CAPTCHA. The 240 CAPTCHAS were tested using Thai undergraduate students. The results show that there were no significant differences in user tests for the three factors. For robustness, disturbing line orientation had no significant difference. However, overlapping letter CAPTCHA was the most significantly robust. CAPTCHA with a disturbing line using the same color as the background was more significantly robust than that using the same color as the foreground. Moreover, if no-spacing letter is used, the effect of disturbing line color is statistically significant in robustness while the effect of that became insignificant when a spacing between letter and overlapping letter are used. We recommend that CAPTCHA with no spacing letter and combined with disturbing line using the same color as the background is suitable for users and its robustness. This can be concluded that letter segmenting technique is not too hard for users (passed 88 %) while it is not too easy for bot attacks (passed 39 %). In terms of security, more studies can still be carried on the CAPTCHA to enabled more robustness against new crime technologies. In terms of usability, on other age groups could be consider.
{"title":"Robustness and user test on text-based CAPTCHA: Letter segmenting is not too easy or too hard","authors":"Maneerut Chatrangsan , Chatpong Tangmanee","doi":"10.1016/j.array.2024.100335","DOIUrl":"https://doi.org/10.1016/j.array.2024.100335","url":null,"abstract":"<div><p>Text-based CAPTCHA is widely used as an online security guard, requiring a user to input letters for classifying human and automated software (known as a bot). However, they are still a problem for usability and robustness. This study investigated the effect of letter spacing, disturbing line orientation and disturbing line color on user test and robustness of text-based CAPTCHA. The 240 CAPTCHAS were tested using Thai undergraduate students. The results show that there were no significant differences in user tests for the three factors. For robustness, disturbing line orientation had no significant difference. However, overlapping letter CAPTCHA was the most significantly robust. CAPTCHA with a disturbing line using the same color as the background was more significantly robust than that using the same color as the foreground. Moreover, if no-spacing letter is used, the effect of disturbing line color is statistically significant in robustness while the effect of that became insignificant when a spacing between letter and overlapping letter are used. We recommend that CAPTCHA with no spacing letter and combined with disturbing line using the same color as the background is suitable for users and its robustness. This can be concluded that letter segmenting technique is not too hard for users (passed 88 %) while it is not too easy for bot attacks (passed 39 %). In terms of security, more studies can still be carried on the CAPTCHA to enabled more robustness against new crime technologies. In terms of usability, on other age groups could be consider.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"21 ","pages":"Article 100335"},"PeriodicalIF":0.0,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000018/pdfft?md5=46ee351b0b9dc5c07b463a6fa4514913&pid=1-s2.0-S2590005624000018-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139111808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-27DOI: 10.1016/j.array.2023.100334
Stuart Gallina Ottersen, Flávio Pinheiro, Fernando Bação
Knowledge Graphs are a tool to structure (entity, relation, entity) triples. One possible way to construct these knowledge graphs is by extracting triples from unstructured text. The aim when doing this is to maximise the number of useful triples while minimising the triples containing no or useless information. Most previous work in this field uses supervised learning techniques that can be expensive both computationally and in that they require labelled data. While the existing unsupervised methods often produce an excessive amount of triples with low value, base themselves on empirical rules when extracting triples or struggle with the order of the entities relative to the relation. To address these issues this paper suggests a new model: Unsupervised Dependency parsing Aided Semantic Triple Extraction (UDASTE) that leverages sentence structure and allows defining restrictive triple relation types to generate high-quality triples while removing the need for mapping extracted triples to relation schemas. This is done by leveraging pre-trained language models. UDASTE is compared with two baseline models on three datasets. UDASTE outperforms the baselines on all three datasets. Its limitations and possible further work are discussed in addition to the implementation of the model in a computational intelligence context.
{"title":"Triplet extraction leveraging sentence transformers and dependency parsing","authors":"Stuart Gallina Ottersen, Flávio Pinheiro, Fernando Bação","doi":"10.1016/j.array.2023.100334","DOIUrl":"https://doi.org/10.1016/j.array.2023.100334","url":null,"abstract":"<div><p>Knowledge Graphs are a tool to structure (entity, relation, entity) triples. One possible way to construct these knowledge graphs is by extracting triples from unstructured text. The aim when doing this is to maximise the number of useful triples while minimising the triples containing no or useless information. Most previous work in this field uses supervised learning techniques that can be expensive both computationally and in that they require labelled data. While the existing unsupervised methods often produce an excessive amount of triples with low value, base themselves on empirical rules when extracting triples or struggle with the order of the entities relative to the relation. To address these issues this paper suggests a new model: Unsupervised Dependency parsing Aided Semantic Triple Extraction (<em>UDASTE</em>) that leverages sentence structure and allows defining restrictive triple relation types to generate high-quality triples while removing the need for mapping extracted triples to relation schemas. This is done by leveraging pre-trained language models. <em>UDASTE</em> is compared with two baseline models on three datasets. <em>UDASTE</em> outperforms the baselines on all three datasets. Its limitations and possible further work are discussed in addition to the implementation of the model in a computational intelligence context.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"21 ","pages":"Article 100334"},"PeriodicalIF":0.0,"publicationDate":"2023-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005623000590/pdfft?md5=4d42cb559e16ed40cf0fee56cb903290&pid=1-s2.0-S2590005623000590-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139100961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-19DOI: 10.1016/j.array.2023.100333
Marianne Abi Kanaan , Jean-François Couchot , Christophe Guyeux , David Laiymani , Talar Atechian , Rony Darazi
In emergency call centers, operators are required to analyze and prioritize emergency situations prior to any intervention. This allows the team to deploy resources efficiently if needed, and thereby provide the optimal assistance to the victims. The automation of such an analysis remains challenging, given the unpredictable nature of the calls. Therefore, in this study, we describe our attempt in improving an emergency calls processing system’s accuracy in the classification of an emergency’s severity, based on transcriptions of the caller’s speech. Specifically, we first extend the baseline classifier to include additional feature extractors of different modalities of data. These features include detected emotions, time-based features, and the victim’s personal information. Second, we experiment with a multi-task learning approach, in which we attempt to detect the nature of the emergency on the one hand, and improve the severity classification score on the other hand. Additional improvements include the use of a larger dataset and an explainability study of the classifier’s decision-making process. Our best model was able to predict 833 emergency calls’ severity with a 71.27% accuracy, a 5.33% improvement over the baseline model. Moreover, we extended our tool with additional modules that can prove to be useful when handling emergency calls.
{"title":"Combining a multi-feature neural network with multi-task learning for emergency calls severity prediction","authors":"Marianne Abi Kanaan , Jean-François Couchot , Christophe Guyeux , David Laiymani , Talar Atechian , Rony Darazi","doi":"10.1016/j.array.2023.100333","DOIUrl":"10.1016/j.array.2023.100333","url":null,"abstract":"<div><p>In emergency call centers, operators are required to analyze and prioritize emergency situations prior to any intervention. This allows the team to deploy resources efficiently if needed, and thereby provide the optimal assistance to the victims. The automation of such an analysis remains challenging, given the unpredictable nature of the calls. Therefore, in this study, we describe our attempt in improving an emergency calls processing system’s accuracy in the classification of an emergency’s severity, based on transcriptions of the caller’s speech. Specifically, we first extend the baseline classifier to include additional feature extractors of different modalities of data. These features include detected emotions, time-based features, and the victim’s personal information. Second, we experiment with a multi-task learning approach, in which we attempt to detect the nature of the emergency on the one hand, and improve the severity classification score on the other hand. Additional improvements include the use of a larger dataset and an explainability study of the classifier’s decision-making process. Our best model was able to predict 833 emergency calls’ severity with a 71.27% accuracy, a 5.33% improvement over the baseline model. Moreover, we extended our tool with additional modules that can prove to be useful when handling emergency calls.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"21 ","pages":"Article 100333"},"PeriodicalIF":0.0,"publicationDate":"2023-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005623000589/pdfft?md5=2d223cfef124a38eb074b282afcf31c6&pid=1-s2.0-S2590005623000589-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139016983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-01DOI: 10.1016/j.array.2023.100331
Xu Jiang , Yurong Cheng , Siyi Zhang , Juan Wang , Baoquan Ma
Information extraction (IE) aims to discover and extract valuable information from unstructured text. This problem can be decomposed into two subtasks: named entity recognition (NER) and relation extraction (RE). Although the IE problem has been studied for years, most work efforts focused on jointly modeling these two subtasks, either by casting them into a structured prediction framework or by performing multitask learning through shared representations. However, since the contextual representations of entity and relation models inherently capture different feature information, sharing a single encoder to capture the information required by both subtasks in the same space would harm the accuracy of the model. Recent research (Zhong and Chen, 2020) has also proved that using two separate encoders for NER and RE tasks respectively through pipeline method are effective, with the model surpassing all previous joint models in accuracy. Thus, in this paper, we design An Pipeline method Information Extraction module called APIE, APIE combines the advantages of both pipeline methods and joint methods, demonstrating higher accuracy and powerful reasoning abilities. Specifically, we design a multi-level feature NER model based on attention mechanism and a document-level RE model based on local context pooling. To demonstrate the effectiveness of our proposed approach, we conducted tests on multiple datasets. Extensive experimental results have shown that our proposed model outperforms state-of-the-art methods and improves both accuracy and reasoning abilities.
信息抽取(Information extraction, IE)旨在从非结构化文本中发现和提取有价值的信息。该问题可以分解为两个子任务:命名实体识别(NER)和关系提取(RE)。尽管IE问题已经研究多年,但大多数工作都集中在联合建模这两个子任务上,要么将它们投射到一个结构化的预测框架中,要么通过共享表示执行多任务学习。然而,由于实体模型和关系模型的上下文表示本质上捕获不同的特征信息,共享一个编码器来捕获同一空间中两个子任务所需的信息将损害模型的准确性。最近的研究(Zhong and Chen, 2020)也证明了通过管道方法分别为NER和RE任务使用两个单独的编码器是有效的,该模型在精度上超过了之前所有的联合模型。因此,本文设计了一个管道方法信息提取模块APIE, APIE结合了管道方法和联合方法的优点,具有更高的准确性和强大的推理能力。具体来说,我们设计了一个基于注意机制的多层次特征NER模型和一个基于局部上下文池的文档级RE模型。为了证明我们提出的方法的有效性,我们在多个数据集上进行了测试。大量的实验结果表明,我们提出的模型优于最先进的方法,并提高了准确性和推理能力。
{"title":"APIE: An information extraction module designed based on the pipeline method","authors":"Xu Jiang , Yurong Cheng , Siyi Zhang , Juan Wang , Baoquan Ma","doi":"10.1016/j.array.2023.100331","DOIUrl":"https://doi.org/10.1016/j.array.2023.100331","url":null,"abstract":"<div><p>Information extraction (IE) aims to discover and extract valuable information from unstructured text. This problem can be decomposed into two subtasks: named entity recognition (NER) and relation extraction (RE). Although the IE problem has been studied for years, most work efforts focused on jointly modeling these two subtasks, either by casting them into a structured prediction framework or by performing multitask learning through shared representations. However, since the contextual representations of entity and relation models inherently capture different feature information, sharing a single encoder to capture the information required by both subtasks in the same space would harm the accuracy of the model. Recent research (Zhong and Chen, 2020) has also proved that using two separate encoders for NER and RE tasks respectively through pipeline method are effective, with the model surpassing all previous joint models in accuracy. Thus, in this paper, we design <strong>A</strong>n <strong>P</strong>ipeline method <strong>I</strong>nformation <strong>E</strong>xtraction module called <strong>APIE</strong>, APIE combines the advantages of both pipeline methods and joint methods, demonstrating higher accuracy and powerful reasoning abilities. Specifically, we design a multi-level feature NER model based on attention mechanism and a document-level RE model based on local context pooling. To demonstrate the effectiveness of our proposed approach, we conducted tests on multiple datasets. Extensive experimental results have shown that our proposed model outperforms state-of-the-art methods and improves both accuracy and reasoning abilities.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"21 ","pages":"Article 100331"},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005623000565/pdfft?md5=1f053c973dea03b6b99efcb063a40e93&pid=1-s2.0-S2590005623000565-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138501687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-01DOI: 10.1016/j.array.2023.100329
Aditya Rajbongshi , Rashiduzzaman Shakil , Bonna Akter , Munira Akter Lata , Md. Mahbubul Alam Joarder
In recent years, the field of emerging computer vision systems has witnessed significant advancements in automated disease diagnosis through the utilization of vision-oriented technology. This article proposes an optimal approach for detecting the presence of ailments in Rohu fish. The aims of our research is to identify the most significant features based on Analysis of Variance (ANOVA) feature selection and evaluate the best performance among all features for Rohu fish disease recognition. At the outset, diverse techniques for image preprocessing were employed on the acquired images. The region affected by the disease was partitioned through utilization of the K-means clustering algorithm. Subsequently, 10 distinct statistical and Gray-Level Co-occurrence Matrix (GLCM) features were extracted after the image segmentation. The ANOVA feature selection technique was employed to prioritize the most significant features N (where 5 N 10) from the pool of 10 categories. The Synthetic Minority Oversampling Technique, often known as SMOTE, was applied to solve class imbalance problem. After conducting training and testing on nine different machine learning (ML) classifiers, an evaluation was performed to estimate the performance of each classifier using eight various performance metrics. Additionally, a receiver operating characteristic (ROC) curve was generated. The classifier that utilized the Enable Hist Gradient Boosting algorithm and selected the top 9 features demonstrated superior performance compared to the other eight models, achieving the highest accuracy rate of 88.81%. In conclusion, we have demonstrated that the feature selection process reduces the computational cost.
{"title":"A comprehensive analysis of feature ranking-based fish disease recognition","authors":"Aditya Rajbongshi , Rashiduzzaman Shakil , Bonna Akter , Munira Akter Lata , Md. Mahbubul Alam Joarder","doi":"10.1016/j.array.2023.100329","DOIUrl":"https://doi.org/10.1016/j.array.2023.100329","url":null,"abstract":"<div><p>In recent years, the field of emerging computer vision systems has witnessed significant advancements in automated disease diagnosis through the utilization of vision-oriented technology. This article proposes an optimal approach for detecting the presence of ailments in Rohu fish. The aims of our research is to identify the most significant features based on Analysis of Variance (ANOVA) feature selection and evaluate the best performance among all features for Rohu fish disease recognition. At the outset, diverse techniques for image preprocessing were employed on the acquired images. The region affected by the disease was partitioned through utilization of the K-means clustering algorithm. Subsequently, 10 distinct statistical and Gray-Level Co-occurrence Matrix (GLCM) features were extracted after the image segmentation. The ANOVA feature selection technique was employed to prioritize the most significant features N (where 5 <span><math><mo>≤</mo></math></span> N <span><math><mo>≤</mo></math></span> 10) from the pool of 10 categories. The Synthetic Minority Oversampling Technique, often known as SMOTE, was applied to solve class imbalance problem. After conducting training and testing on nine different machine learning (ML) classifiers, an evaluation was performed to estimate the performance of each classifier using eight various performance metrics. Additionally, a receiver operating characteristic (ROC) curve was generated. The classifier that utilized the Enable Hist Gradient Boosting algorithm and selected the top 9 features demonstrated superior performance compared to the other eight models, achieving the highest accuracy rate of 88.81%. In conclusion, we have demonstrated that the feature selection process reduces the computational cost.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"21 ","pages":"Article 100329"},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005623000541/pdfft?md5=76f0417dbf9f956f909e5d5cc71ad2ca&pid=1-s2.0-S2590005623000541-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138557253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}