6 research outputs found
Adinkra Symbol Recognition using Classical Machine Learning and Deep Learning
Artificial intelligence (AI) has emerged as a transformative influence,
engendering paradigm shifts in global societies, spanning academia and
industry. However, in light of these rapid advances, addressing the
underrepresentation of black communities and African countries in AI is
crucial. Boosting enthusiasm for AI can be effectively accomplished by
showcasing straightforward applications around tasks like identifying and
categorizing traditional symbols, such as Adinkra symbols, or familiar objects
within the community. In this research endeavor, we dived into classical
machine learning and harnessed the power of deep learning models to tackle the
intricate task of classifying and recognizing Adinkra symbols. The idea led to
a newly constructed ADINKRA dataset comprising 174,338 images meticulously
organized into 62 distinct classes, each representing a singular and emblematic
symbol. We constructed a CNN model for classification and recognition using six
convolutional layers, three fully connected (FC) layers, and optional dropout
regularization. The model is a simpler and smaller version of VGG, with fewer
layers, smaller channel sizes, and a fixed kernel size. Additionally, we tap
into the transfer learning capabilities provided by pre-trained models like VGG
and ResNet. These models assist us in both classifying images and extracting
features that can be used with classical machine learning models. We assess the
model's performance by measuring its accuracy and convergence rate and
visualizing the areas that significantly influence its predictions. These
evaluations serve as a foundational benchmark for future assessments of the
ADINKRA dataset. We hope this application exemplar inspires ideas on the
various uses of AI in organizing our traditional and modern lives.Comment: 15 pages, 6 figures, 5 table
GUDN: A novel guide network with label reinforcement strategy for extreme multi-label text classification
In natural language processing, extreme multi-label text classification is an
emerging but essential task. The problem of extreme multi-label text
classification (XMTC) is to recall some of the most relevant labels for a text
from an extremely large label set. Large-scale pre-trained models have brought
a new trend to this problem. Though the large-scale pre-trained models have
made significant achievements on this problem, the valuable fine-tuned methods
have yet to be studied. Though label semantics have been introduced in XMTC,
the vast semantic gap between texts and labels has yet to gain enough
attention. This paper builds a new guide network (GUDN) to help fine-tune the
pre-trained model to instruct classification later. Furthermore, GUDN uses raw
label semantics combined with a helpful label reinforcement strategy to
effectively explore the latent space between texts and labels, narrowing the
semantic gap, which can further improve predicted accuracy. Experimental
results demonstrate that GUDN outperforms state-of-the-art methods on Eurlex-4k
and has competitive results on other popular datasets. In an additional
experiment, we investigated the input lengths' influence on the
Transformer-based model's accuracy. Our source code is released at
https://t.hk.uy/aFSH.Comment: 12 pages, 6 figure
A Fully Secure KP-ABE Scheme on Prime-Order Bilinear Groups through Selective Techniques
Key-policy attribute-based encryption (KP-ABE) is the cryptographic primitive which enables fine grained access control while still providing end-to-end encryption. Although traditional encryption schemes can provide end-to-end encryption, users have to either share the same decryption keys or the data have to be stored in multiple instances which are encrypted with different keys. Both of these options are undesirable. However, KP-ABE can provide less key overhead compared to the traditional encryption schemes. While there are a lot of KP-ABE schemes, none of them simultaneously supports multiuse of attributes, adaptive security, monotone span programs, and static security assumption. Hence, we propose a fully secure KP-ABE scheme for monotone span programs in prime-order group. This scheme uses selective security proof techniques to obtain the requisite ingredients for full security proof. This strengthens the correlation between selective and full security models and enables the transition of the best qualities in selective security models to fully secure systems. The security proof is based on decisional linear assumption and three-party Diffie–Hellman assumption
Zero-Chain: A Blockchain-Based Identity for Digital City Operating System
The challenges of population management as urban density increase globally have compelled researchers and developers to consider more efficient means of managing resources in cities. Consequently, the smart city concept has emerged as a response to addressing the challenge of optimal resource utilization in urban centers. However, with digital technologies proliferating as key components of the solution, it is necessary to develop a digital identity solution for all components of the smart city environment. For completeness, the solution must encompass all entities, including physical and intangible assets, processes, and most importantly, its residents. Consequently, a unified, distributed data integration and efficient analysis platform is required: the digital city operating system. In this article, we focus on a key component of digital city management in the form of secure identification of individual residents. We collect user attributes and securely transmit them to other system components for verification. Upon successful completion of the verification process, a digital identity is created for the applying resident and the set of transactions leading to the ID creation are stored in the blockchain. Our system is secure and can serve as the basis for the development of a digital infrastructure for smart city management.This work was supported in part by the Natural Science Foundation of China under Grant U19A2066; in part by the Program of International Science and Technology Cooperation and Exchange of Sichuan Province under Grant 2017HH0028, Grant 2018HH0102, Grant 2019YFH0014, and Grant 2020YFH0030; in part by the Science and Technology Program of Sichuan Province under Grant 2020YFSY0061; and in part by CCF-Tencent Open Research Fund WeBank Special Funding. (Corresponding author: Jianbin Gao.
A Blockchain-Based Crowdsourcing Loan Platform for Funding Higher Education in Developing Countries
In developing countries, funding is a significant obstacle to receiving higher education. Brilliant but needy students cannot complete their studies since their parents are unemployed and their countries’ economies are poor. As a result, the students’ talents are not harnessed to their full potential. In order to help students obtain higher education and harness their full potential, governments provide student loans to students in higher education. The government provides loans to students through the ministry of education. The students pay back the loan with interest when they start working. Governments have been the sole funders of student loans. The emergence of COVID-19 and the Russia-Ukraine war have resulted in a global economic crisis. Because of the global economic crisis, the government’s spending has increased. In order to help reduce the burden of government and thereby reduce spending, we intend to revolutionize the student loan program through blockchain and crowdsourcing. This work presents a blockchain-based crowdsourcing decentralized loan platform where investors will be brought on board to provide funds for students in higher education. The platform will allow students to apply for loans from investors through registered financial institutions. The students will pay back the loans with interest when they enter the workforce. The proposed platform will allow students to fund their education, investors will get interest on the money they invest, and governments can channel the money they put into student loan programs into other avenues. We perform a thorough security analysis and back the efficiency of our work with numerical results
ExCrowd: A Blockchain Framework for Exploration-Based Crowdsourcing
Because of the rise of cryptocurrencies and decentralized apps, blockchain technology has generated a lot of interest. Among these is the emergent blockchain-based crowdsourcing paradigm, which eliminates the centralized conventional mechanism servers in favor of smart contracts for task and reward allocation. However, there are a few crucial challenges that must be resolved properly. For starters, most reputation-based systems favor high-performing employees. Secondly, the crowdsourcing platform’s expensive service charges may obstruct the growth of crowdsourcing. Finally, unequal evaluation and reward allocation might lead to job dissatisfaction. As a result, the aforementioned issues will substantially impede the development of blockchain-based crowdsourcing systems. In this study, we introduce ExCrowd, a blockchain-based crowdsourcing system that employs a smart contract as a trustworthy authority to properly select workers, assess inputs, and award incentives while maintaining user privacy. Exploration-based crowdsourcing employs the hyperbolic learning curve model based on the conduct of workers and analyzes worker performance patterns using a decision tree technique. We specifically present the architecture of our framework, on which we establish a concrete scheme. Using a real-world dataset, we implement our model on the Ethereum public test network leveraging its reliability, adaptability, scalability, and rich statefulness. The results of our experiments demonstrate the efficiency, usefulness, and adaptability of our proposed system