{"title":"Detecting Depression in Social Media using Machine Learning","authors":"Ruoxi Ding, Yu Sun","doi":"10.5121/csit.2022.121223","DOIUrl":"https://doi.org/10.5121/csit.2022.121223","url":null,"abstract":"Social Media Depression Detection is an Intelligent System to automate the detection of Youth Depression with social media (Instagram) using AI and Deep Learning. The student is the targeted group because most students with depression express themselves on social media rather than seeking help from doctors. This app gathers captions and images from the user's personal Instagram profile through web scraping using Instagram private API to check whether or not the posts are depressive. The google cloud dataset supports the captions and pictures analysis performed by the app [6]. Caption sentiment analysis depends on sentiment analysis, and the pictures analysis depends on classifying images by custom labels. The app reports the image and the caption analysis results back to the user. Python is used for the back-end functionality, while Dart and Flutter are used for the front-end. It was tested by 2 experiments, the first experiments returned the feedback of 15 students demonstrates that the program has the capability of detecting depression through the captions with relatively high accuracy. The second experiment of testing the app functionality on the same account demonstrates that the program is stable and consistent. The purpose of the app is to detect depression at an early stage to prevent the condition from worsening.","PeriodicalId":174755,"journal":{"name":"Artificial Intelligence and Machine Learning","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124826090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Online Graphical User Interface Application to Remove Barriers in the Process of Learning Neural Networks and Deep Learning Concepts Using Tensorflow","authors":"Justin D. Li, Yu Sun","doi":"10.5121/csit.2022.121215","DOIUrl":"https://doi.org/10.5121/csit.2022.121215","url":null,"abstract":"Over the years, neural networks have become increasingly important and complex due to the rising popularity of artificial intelligence technologies. It allows for complex decision prediction making, and is an essential part in the modern AI industry. However, due to the complex nature of neural networks, a lot of complex math and logic has to be well understood along with a proficiency in programming in order for one to make anything practical with this technology. This is unfortunate, however, that many do not have the required high level math skill, or the proficiency in coding, blocking a lot of people from reaching and experimenting with this technology. My method attempts to eliminate the complexity that developing neural networks bring, and bring a clearer picture of what the user may be creating and working with. With the help of modern web technologies such as JavaScript and tensorflow.js, I was able to create a GUI program that can create, train, and test a neural network right on a browser, and without writing any code with a comparable result [13].","PeriodicalId":174755,"journal":{"name":"Artificial Intelligence and Machine Learning","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128173932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ChatForSenior: An Intelligent ChatBot Communication System for Depression Relief using Artificial Intelligence and Natural Language Processing","authors":"Hanwen Mai, Yu Sun","doi":"10.5121/csit.2022.121221","DOIUrl":"https://doi.org/10.5121/csit.2022.121221","url":null,"abstract":"In recent years, loneliness has appeared in lives for both young and old individuals. As cases of the COVID-19 virus are going up people have dealt more with loneliness and depression especially the seniors [5]. Some have even changed their whole lifestyle because they feel empty and isolated. Others will either try to isolate themselves more or use dangerous ways to quickly get rid of the feeling.To solve this major problem, I have created a digital online communication app which young individuals can have long chats with seniors who are alone and lonely. My application uses real time communication systems which can directly be sent to other users without any issues [6]. Our main goal is to have users have their own way of communicating, using familiar designs of applications we all have used before. By using new features we have created a more user-friendly based user experience which can be experienced throughout our application. Using immersive layouts of applications designs, advanced network connections, visual and data based analytic we are able to solve this major problem.","PeriodicalId":174755,"journal":{"name":"Artificial Intelligence and Machine Learning","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124962879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey of Secure Network Protocols: United States Related Domains","authors":"DeJean Dunbar","doi":"10.5121/csit.2022.121207","DOIUrl":"https://doi.org/10.5121/csit.2022.121207","url":null,"abstract":"Over time, the HTTP Protocol has undergone significant evolution. HTTP was the internet's foundation for data communication. When network security threats became prevalent, HTTPS became a widely accepted technology for assisting in a domain’s defense. HTTPS supported two security protocols: secure socket layer (SSL) and transport layer security (TLS). Additionally, the HTTP Strict Transport Security (HSTS) protocol was included to strengthen the HTTPS protocol. Numerous cyber-attacks occurred in the United States, and many of these attacks could have been avoided simply by implementing domains with the most up-to-date HTTP security mechanisms. This study seeks to accomplish two objectives: 1. Determine the degree to which US-related domains are configured optimally for HTTP security protocol setup; 2. Create a generic scoring system for a domain's network security based on the following factors: SSL version, TLS version, and presence of HSTS to easily determine where a domain stands. We found through our analysis and scoring system incorporation that US-related domains showed a positive trend for secure network protocol setup, but there is still room for improvement. In order to safeguard unwanted cyber-attacks, current HTTP domains need to be extensively investigated to identify if they possess security-related components. Due to the infrequent occurrence of HSTS in the evaluated domains, the computer science community necessitates further HSTS education.","PeriodicalId":174755,"journal":{"name":"Artificial Intelligence and Machine Learning","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128448985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-View Human Tracking and 3D Localization in Retail","authors":"Akash Jadhav","doi":"10.5121/csit.2022.121214","DOIUrl":"https://doi.org/10.5121/csit.2022.121214","url":null,"abstract":"In recent years, retail stores have seen traction in bringing online shopping experience to offline stores via autonomous checkouts. Autonomous checkouts is a computer vision-based technology that needs to understand three human elements within the store: who, where, and doing what. This paper addresses two of the three elements: who and where. It presents an approach to track and localize humans in a multi-view camera system. Traditional methods have limitations as they: (1) fail to overcome substantial occlusion of humans; (2) suffer a lengthy processing time; (3) require a planar homography constraint between camera frames; (4) suffer swapping of labels assigned to a human. The proposed method in this paper handles all the aforementioned limitations. The key idea is to use a hierarchical association model for tracking, which uses each human's clothing features, human pose orientation, and relative depth of joints, and runs at over 23fps.","PeriodicalId":174755,"journal":{"name":"Artificial Intelligence and Machine Learning","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123172920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
David Emmanuel Katz, C. Guyeux, A. Haimovici, Bastian Silva, Lionel Chamorro, Raul Barriga Rubio, Mahuna Akplogan
{"title":"Learning Structured Information from Small Datasets of Heterogeneous Unstructured Multipage Invoices","authors":"David Emmanuel Katz, C. Guyeux, A. Haimovici, Bastian Silva, Lionel Chamorro, Raul Barriga Rubio, Mahuna Akplogan","doi":"10.5121/csit.2022.121220","DOIUrl":"https://doi.org/10.5121/csit.2022.121220","url":null,"abstract":"We propose an end to end approach using graph construction and semantic representation learning to solve the problem of structured information extraction from heterogeneous, semi-structured, and high noise human readable documents. Our system first converts PDF documents into single connected graphs where we represent each token on the page as a node, with vertices consisting of the inverse euclidean distances between tokens. Token, lines, and individual character nodes are augmented with dense text model vectors. We then proceed to represent each node as a vector using a tailored GraphSAGE algorithm that is then used downstream by a simple feedforward network. Using our approach, we achieve state-of-the-art methods when benchmarked against our dataset of 205 PDF invoices. Along with generally published metrics, we introduce a highly punitive yet application specific informative metric that we use to further measure the performance of our model.","PeriodicalId":174755,"journal":{"name":"Artificial Intelligence and Machine Learning","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115774955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Crypto your Belongings by Two Pin Authentication using Ant Algorithm based Technique","authors":"Janaki Raman Palaniappan","doi":"10.5121/csit.2022.121210","DOIUrl":"https://doi.org/10.5121/csit.2022.121210","url":null,"abstract":"Everyone realize data is one of the important strategic for any company to run and win the business. Let it be a mobile apps, websites and so on, there are more chances that our personal data like images, videos, texts get expose while we share across for different purposes. Even though the company says app, website forms are encrypted, the said company itself uses the data internally for their business development. This research presents how one can secure own’s data themselves before sending. There are many cryptography methods that has evolved from time to time. Upon researching and analyzing, I present a unique method to encrypt and decrypt the data, using combination of techniques such as Cryptographic technique, ANT Algorithm based formula and logic gates that would provide stronger protection to the data. Secure your images, videos with a 2-pin authentication and protection to encrypt and decrypt the data. A user must provide 2 different symmetric pins to encrypt and decrypt, where first pin shall be up to 4-digit secret pin and a second pin is a single digit pin. Single digit pin acts on how many stages the encryption takes place. The proposed method had been experimented on several images and videos. This study reveals, A combination of secret keys, ANT algorithm and Logic gates makes difficult for anyone to hack the data. This unique methodology helps us to protect our data more safely at source device itself.","PeriodicalId":174755,"journal":{"name":"Artificial Intelligence and Machine Learning","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131084092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Data-Driven Mobile Community Application for Book Recommendation and Personalization using AI and Machine Learning","authors":"Lulu Zha","doi":"10.5121/csit.2022.121218","DOIUrl":"https://doi.org/10.5121/csit.2022.121218","url":null,"abstract":"Knowing a movie or a book fits your flavor without finishing the whole film or the book? Although there are many ways to find a summary of a film or a book, having an app that generates needed information according to the genre will make things much more manageable. This paper develops a mobile app named Book and Movie Search that uses API or the online database to generalize data such as authors, plots, overview, and more with a few clicks. The results show that within seconds, a list of information will show according to movies and books, and a qualified way to find information using the Book And Movie Search app. For example, if one decided to buy a book named Flipped and did not have time to finish the whole book, he can enter the name on the app. It will generate a book summary that quickly gives him more information about it and help him decide whether he wishes to make the purchase.","PeriodicalId":174755,"journal":{"name":"Artificial Intelligence and Machine Learning","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128153348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Are your Sensitive Inputs Secure in Android Applications?","authors":"Trishla Shah, Raghav V. Sampangi, Angela Siegel","doi":"10.5121/csit.2022.121206","DOIUrl":"https://doi.org/10.5121/csit.2022.121206","url":null,"abstract":"Android applications may request for users’ sensitive information through the GUI. Developer guidelines for designing applications mandate that information must be masked/encrypted before storing or leaving the system. However not all applications adhere to the guidelines. As a prerequisite to tracking sensitive input data, it is essential to identify the widgets that request it. Previous research has focused on identifying the sensitive input widgets, but the extraction of all layouts, including images and unused layouts, is fundamental. In this paper, we propose an automated framework that finds sensitive user input widgets from Android application layouts and validates the masking of these inputs. Our design includes novel techniques for resolving the user semantics, extraction of resources, identification of potential data leaks and helping users to prioritize the sharing of sensitive information, resulting in significant improvement over prior work. We also train track the obtained sensitive input widgets and check for unencrypted transmission or storage of sensitive data. Based on a preliminary evaluation of our framework with some applications from the Google Play store, we observe notable improvement over prior work in this domain.","PeriodicalId":174755,"journal":{"name":"Artificial Intelligence and Machine Learning","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121231660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Intelligent Lock System to Improve Learning Efficiency using Artificial Intelligence and Internet of Things","authors":"Ivy Chen, Ang Li","doi":"10.5121/csit.2022.121204","DOIUrl":"https://doi.org/10.5121/csit.2022.121204","url":null,"abstract":"According to recent statistics, 75.4% of people with access to the internet are addicted to their phones. 78 percent of teenagers check their mobile devices at least hourly [2]. The purpose of this paper is to propose a tool that lowers users’ dependence on their electronic devices. The tool named Phone Cage is created with the aim of locking electronic device for a set period of time. The application involves the user setting a specific mobile application for a specified amount of time. The phone cage provides the user a display countdown of the remaining time frame through which the locked application is inaccessible. The app provides access only when the set timer reaches the zero mark. This tool is created using Tinker cad, 3D- printer, Thunkable, Firebase console, and Raspberry Pi Zero. This will act as perfect remedy for individuals with addiction to their phones. It will also be a way for parents to control their children’s use of mobile phones. Therefore, noting that a significant number of people lack selfcontrol when it comes to cell phone usage, the cage will be of great help. The project will therefore have great impact to the community by allowing families to spend more time together and not on their phones. It will also help adults place more focus on their jobs and not on their phones.","PeriodicalId":174755,"journal":{"name":"Artificial Intelligence and Machine Learning","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126006611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}