6 research outputs found

    Adinkra Symbol Recognition using Classical Machine Learning and Deep Learning

    Full text link
    Artificial intelligence (AI) has emerged as a transformative influence, engendering paradigm shifts in global societies, spanning academia and industry. However, in light of these rapid advances, addressing the underrepresentation of black communities and African countries in AI is crucial. Boosting enthusiasm for AI can be effectively accomplished by showcasing straightforward applications around tasks like identifying and categorizing traditional symbols, such as Adinkra symbols, or familiar objects within the community. In this research endeavor, we dived into classical machine learning and harnessed the power of deep learning models to tackle the intricate task of classifying and recognizing Adinkra symbols. The idea led to a newly constructed ADINKRA dataset comprising 174,338 images meticulously organized into 62 distinct classes, each representing a singular and emblematic symbol. We constructed a CNN model for classification and recognition using six convolutional layers, three fully connected (FC) layers, and optional dropout regularization. The model is a simpler and smaller version of VGG, with fewer layers, smaller channel sizes, and a fixed kernel size. Additionally, we tap into the transfer learning capabilities provided by pre-trained models like VGG and ResNet. These models assist us in both classifying images and extracting features that can be used with classical machine learning models. We assess the model's performance by measuring its accuracy and convergence rate and visualizing the areas that significantly influence its predictions. These evaluations serve as a foundational benchmark for future assessments of the ADINKRA dataset. We hope this application exemplar inspires ideas on the various uses of AI in organizing our traditional and modern lives.Comment: 15 pages, 6 figures, 5 table

    GUDN: A novel guide network with label reinforcement strategy for extreme multi-label text classification

    Full text link
    In natural language processing, extreme multi-label text classification is an emerging but essential task. The problem of extreme multi-label text classification (XMTC) is to recall some of the most relevant labels for a text from an extremely large label set. Large-scale pre-trained models have brought a new trend to this problem. Though the large-scale pre-trained models have made significant achievements on this problem, the valuable fine-tuned methods have yet to be studied. Though label semantics have been introduced in XMTC, the vast semantic gap between texts and labels has yet to gain enough attention. This paper builds a new guide network (GUDN) to help fine-tune the pre-trained model to instruct classification later. Furthermore, GUDN uses raw label semantics combined with a helpful label reinforcement strategy to effectively explore the latent space between texts and labels, narrowing the semantic gap, which can further improve predicted accuracy. Experimental results demonstrate that GUDN outperforms state-of-the-art methods on Eurlex-4k and has competitive results on other popular datasets. In an additional experiment, we investigated the input lengths' influence on the Transformer-based model's accuracy. Our source code is released at https://t.hk.uy/aFSH.Comment: 12 pages, 6 figure

    A Fully Secure KP-ABE Scheme on Prime-Order Bilinear Groups through Selective Techniques

    No full text
    Key-policy attribute-based encryption (KP-ABE) is the cryptographic primitive which enables fine grained access control while still providing end-to-end encryption. Although traditional encryption schemes can provide end-to-end encryption, users have to either share the same decryption keys or the data have to be stored in multiple instances which are encrypted with different keys. Both of these options are undesirable. However, KP-ABE can provide less key overhead compared to the traditional encryption schemes. While there are a lot of KP-ABE schemes, none of them simultaneously supports multiuse of attributes, adaptive security, monotone span programs, and static security assumption. Hence, we propose a fully secure KP-ABE scheme for monotone span programs in prime-order group. This scheme uses selective security proof techniques to obtain the requisite ingredients for full security proof. This strengthens the correlation between selective and full security models and enables the transition of the best qualities in selective security models to fully secure systems. The security proof is based on decisional linear assumption and three-party Diffie–Hellman assumption

    Zero-Chain: A Blockchain-Based Identity for Digital City Operating System

    No full text
    The challenges of population management as urban density increase globally have compelled researchers and developers to consider more efficient means of managing resources in cities. Consequently, the smart city concept has emerged as a response to addressing the challenge of optimal resource utilization in urban centers. However, with digital technologies proliferating as key components of the solution, it is necessary to develop a digital identity solution for all components of the smart city environment. For completeness, the solution must encompass all entities, including physical and intangible assets, processes, and most importantly, its residents. Consequently, a unified, distributed data integration and efficient analysis platform is required: the digital city operating system. In this article, we focus on a key component of digital city management in the form of secure identification of individual residents. We collect user attributes and securely transmit them to other system components for verification. Upon successful completion of the verification process, a digital identity is created for the applying resident and the set of transactions leading to the ID creation are stored in the blockchain. Our system is secure and can serve as the basis for the development of a digital infrastructure for smart city management.This work was supported in part by the Natural Science Foundation of China under Grant U19A2066; in part by the Program of International Science and Technology Cooperation and Exchange of Sichuan Province under Grant 2017HH0028, Grant 2018HH0102, Grant 2019YFH0014, and Grant 2020YFH0030; in part by the Science and Technology Program of Sichuan Province under Grant 2020YFSY0061; and in part by CCF-Tencent Open Research Fund WeBank Special Funding. (Corresponding author: Jianbin Gao.

    A Blockchain-Based Crowdsourcing Loan Platform for Funding Higher Education in Developing Countries

    No full text
    In developing countries, funding is a significant obstacle to receiving higher education. Brilliant but needy students cannot complete their studies since their parents are unemployed and their countries’ economies are poor. As a result, the students’ talents are not harnessed to their full potential. In order to help students obtain higher education and harness their full potential, governments provide student loans to students in higher education. The government provides loans to students through the ministry of education. The students pay back the loan with interest when they start working. Governments have been the sole funders of student loans. The emergence of COVID-19 and the Russia-Ukraine war have resulted in a global economic crisis. Because of the global economic crisis, the government’s spending has increased. In order to help reduce the burden of government and thereby reduce spending, we intend to revolutionize the student loan program through blockchain and crowdsourcing. This work presents a blockchain-based crowdsourcing decentralized loan platform where investors will be brought on board to provide funds for students in higher education. The platform will allow students to apply for loans from investors through registered financial institutions. The students will pay back the loans with interest when they enter the workforce. The proposed platform will allow students to fund their education, investors will get interest on the money they invest, and governments can channel the money they put into student loan programs into other avenues. We perform a thorough security analysis and back the efficiency of our work with numerical results

    ExCrowd: A Blockchain Framework for Exploration-Based Crowdsourcing

    No full text
    Because of the rise of cryptocurrencies and decentralized apps, blockchain technology has generated a lot of interest. Among these is the emergent blockchain-based crowdsourcing paradigm, which eliminates the centralized conventional mechanism servers in favor of smart contracts for task and reward allocation. However, there are a few crucial challenges that must be resolved properly. For starters, most reputation-based systems favor high-performing employees. Secondly, the crowdsourcing platform’s expensive service charges may obstruct the growth of crowdsourcing. Finally, unequal evaluation and reward allocation might lead to job dissatisfaction. As a result, the aforementioned issues will substantially impede the development of blockchain-based crowdsourcing systems. In this study, we introduce ExCrowd, a blockchain-based crowdsourcing system that employs a smart contract as a trustworthy authority to properly select workers, assess inputs, and award incentives while maintaining user privacy. Exploration-based crowdsourcing employs the hyperbolic learning curve model based on the conduct of workers and analyzes worker performance patterns using a decision tree technique. We specifically present the architecture of our framework, on which we establish a concrete scheme. Using a real-world dataset, we implement our model on the Ethereum public test network leveraging its reliability, adaptability, scalability, and rich statefulness. The results of our experiments demonstrate the efficiency, usefulness, and adaptability of our proposed system
    corecore