InformationPub Date : 2024-07-08DOI: 10.3390/info15070395
Virinchi Roy Surabhi, Rajat Sadhukhan, Md Raz, H. Pearce, P. Krishnamurthy, Joshua Trujillo, Ramesh Karri, F. Khorrami
{"title":"FEINT: Automated Framework for Efficient INsertion of Templates/Trojans into FPGAs","authors":"Virinchi Roy Surabhi, Rajat Sadhukhan, Md Raz, H. Pearce, P. Krishnamurthy, Joshua Trujillo, Ramesh Karri, F. Khorrami","doi":"10.3390/info15070395","DOIUrl":"https://doi.org/10.3390/info15070395","url":null,"abstract":"Field-Programmable Gate Arrays (FPGAs) play a significant and evolving role in various industries and applications in the current technological landscape. They are widely known for their flexibility, rapid prototyping, reconfigurability, and design development features. FPGA designs are often constructed as compositions of interconnected modules that implement the various features/functionalities required in an application. This work develops a novel tool FEINT, which facilitates this module composition process and automates the design-level modifications required when introducing new modules into an existing design. The proposed methodology is architected as a “template” insertion tool that operates based on a user-provided configuration script to introduce dynamic design features as plugins at different stages of the FPGA design process to facilitate rapid prototyping, composition-based design evolution, and system customization. FEINT can be useful in applications where designers need to tailor system behavior without requiring expert FPGA programming skills or significant manual effort. For example, FEINT can help insert defensive monitoring, adversarial Trojan, and plugin-based functionality enhancement features. FEINT is scalable, future-proof, and cross-platform without a dependence on vendor-specific file formats, thus ensuring compatibility with FPGA families and tool versions and being integrable with commercial tools. To assess FEINT’s effectiveness, our tests covered the injection of various types of templates/modules into FPGA designs. For example, in the Trojan insertion context, our tests consider diverse Trojan behaviors and triggers, including key leakage and denial of service Trojans. We evaluated FEINT’s applicability to complex designs by creating an FPGA design that features a MicroBlaze soft-core processor connected to an AES-accelerator via an AXI-bus interface. FEINT can successfully and efficiently insert various templates into this design at different FPGA design stages.","PeriodicalId":510156,"journal":{"name":"Information","volume":"120 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141666533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InformationPub Date : 2024-07-08DOI: 10.3390/info15070394
Ibomoiye Domor Mienye, N. Jere
{"title":"Optimized Ensemble Learning Approach with Explainable AI for Improved Heart Disease Prediction","authors":"Ibomoiye Domor Mienye, N. Jere","doi":"10.3390/info15070394","DOIUrl":"https://doi.org/10.3390/info15070394","url":null,"abstract":"Recent advances in machine learning (ML) have shown great promise in detecting heart disease. However, to ensure the clinical adoption of ML models, they must not only be generalizable and robust but also transparent and explainable. Therefore, this research introduces an approach that integrates the robustness of ensemble learning algorithms with the precision of Bayesian optimization for hyperparameter tuning and the interpretability offered by Shapley additive explanations (SHAP). The ensemble classifiers considered include adaptive boosting (AdaBoost), random forest, and extreme gradient boosting (XGBoost). The experimental results on the Cleveland and Framingham datasets demonstrate that the optimized XGBoost model achieved the highest performance, with specificity and sensitivity values of 0.971 and 0.989 on the Cleveland dataset and 0.921 and 0.975 on the Framingham dataset, respectively.","PeriodicalId":510156,"journal":{"name":"Information","volume":" 390","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141669625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InformationPub Date : 2024-07-08DOI: 10.3390/info15070393
Dimitrios Effrosynidis, Georgios Sylaios, Avi Arampatzis
{"title":"The Effect of Training Data Size on Disaster Classification from Twitter","authors":"Dimitrios Effrosynidis, Georgios Sylaios, Avi Arampatzis","doi":"10.3390/info15070393","DOIUrl":"https://doi.org/10.3390/info15070393","url":null,"abstract":"In the realm of disaster-related tweet classification, this study presents a comprehensive analysis of various machine learning algorithms, shedding light on crucial factors influencing algorithm performance. The exceptional efficacy of simpler models is attributed to the quality and size of the dataset, enabling them to discern meaningful patterns. While powerful, complex models are time-consuming and prone to overfitting, particularly with smaller or noisier datasets. Hyperparameter tuning, notably through Bayesian optimization, emerges as a pivotal tool for enhancing the performance of simpler models. A practical guideline for algorithm selection based on dataset size is proposed, consisting of Bernoulli Naive Bayes for datasets below 5000 tweets and Logistic Regression for larger datasets exceeding 5000 tweets. Notably, Logistic Regression shines with 20,000 tweets, delivering an impressive combination of performance, speed, and interpretability. A further improvement of 0.5% is achieved by applying ensemble and stacking methods.","PeriodicalId":510156,"journal":{"name":"Information","volume":" 1239","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141668894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InformationPub Date : 2024-07-05DOI: 10.3390/info15070392
Zhiyuan Ou, Bingqing Wang, Bin Meng, Changsheng Shi, Dongsheng Zhan
{"title":"Research on Resident Behavioral Activities Based on Social Media Data: A Case Study of Four Typical Communities in Beijing","authors":"Zhiyuan Ou, Bingqing Wang, Bin Meng, Changsheng Shi, Dongsheng Zhan","doi":"10.3390/info15070392","DOIUrl":"https://doi.org/10.3390/info15070392","url":null,"abstract":"With the support of big data mining techniques, utilizing social media data containing location information and rich semantic text information can construct large-scale daily activity OD flows for urban populations, providing new data resources and research perspectives for studying urban spatiotemporal structures. This paper employs the ST-DBSCAN algorithm to identify the residential locations of Weibo users in four communities and then uses the BERT model for activity-type classification of Weibo texts. Combined with the TF-IDF method, the results are analyzed from three aspects: temporal features, spatial features, and semantic features. The research findings indicate: ① Spatially, residents’ daily activities are mainly centered around their residential locations, but there are significant differences in the radius and direction of activity among residents of different communities; ② In the temporal dimension, the activity intensities of residents from different communities exhibit uniformity during different time periods on weekdays and weekends; ③ Based on semantic analysis, the differences in activities and venue choices among residents of different communities are deeply influenced by the comprehensive characteristics of the communities. This study explores methods for OD information mining based on social media data, which is of great significance for expanding the mining methods of residents’ spatiotemporal behavior characteristics and enriching research on the configuration of public service facilities based on community residents’ activity spaces and facility demands.","PeriodicalId":510156,"journal":{"name":"Information","volume":" 24","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141673952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InformationPub Date : 2024-07-03DOI: 10.3390/info15070390
Fansheng Kong, Seungjun Ahn
{"title":"Use of Knowledge Graphs for Construction Safety Management: A Systematic Literature Review","authors":"Fansheng Kong, Seungjun Ahn","doi":"10.3390/info15070390","DOIUrl":"https://doi.org/10.3390/info15070390","url":null,"abstract":"Effective safety management is crucial in the construction industry. The growing interest in employing Knowledge Graphs (KGs) for safety management in construction is driven by the need for efficient computing-aided safety practices. This paper systematically reviews the literature related to automating safety management processes through knowledge base systems, focusing on the creation and utilization of KGs for construction safety. It captures current methodologies for developing and using KGs in construction safety management, outlining the techniques for each phase of KG development, including scope identification, integration of external data, ontological modeling, data extraction, and KG completion. This provides structured guidance on building a KG for safety management. Moreover, this paper discusses the challenges and limitations that hinder the wider adoption of KGs in construction safety management, leading to the identification of goals and considerations for future research.","PeriodicalId":510156,"journal":{"name":"Information","volume":"57 S271","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141683270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InformationPub Date : 2024-07-03DOI: 10.3390/info15070391
Jing Liu, Huailin Liu, Pengju Wang, Yang Wu, Keqin Li
{"title":"DIPA: Adversarial Attack on DNNs by Dropping Information and Pixel-Level Attack on Attention","authors":"Jing Liu, Huailin Liu, Pengju Wang, Yang Wu, Keqin Li","doi":"10.3390/info15070391","DOIUrl":"https://doi.org/10.3390/info15070391","url":null,"abstract":"Deep neural networks (DNNs) have shown remarkable performance across a wide range of fields, including image recognition, natural language processing, and speech processing. However, recent studies indicate that DNNs are highly vulnerable to well-crafted adversarial samples, which can cause incorrect classifications and predictions. These samples are so similar to the original ones that they are nearly undetectable by human vision, posing a significant security risk to DNNs in the real world due to the impact of adversarial attacks. Currently, the most common adversarial attack methods explicitly add adversarial perturbations to image samples, often resulting in adversarial samples that are easier to distinguish by humans. To address this issue, we are motivated to develop more effective methods for generating adversarial samples that remain undetectable to human vision. This paper proposes a pixel-level adversarial attack method based on attention mechanism and high-frequency information separation, named DIPA. Specifically, our approach involves constructing an attention suppression loss function and utilizing gradient information to identify and perturb sensitive pixels. By suppressing the model’s attention to the correct classes, the neural network is misled to focus on irrelevant classes, leading to incorrect judgments. Unlike previous studies, DIPA enhances the attack of adversarial samples by separating the imperceptible details in image samples to more effectively hide the adversarial perturbation while ensuring a higher attack success rate. Our experimental results demonstrate that under the extreme single-pixel attack scenario, DIPA achieves higher attack success rates for neural network models with various architectures. Furthermore, the visualization results and quantitative metrics illustrate that the DIPA can generate more imperceptible adversarial perturbation.","PeriodicalId":510156,"journal":{"name":"Information","volume":"97 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141681726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InformationPub Date : 2024-07-02DOI: 10.3390/info15070387
Vincenzo Manca
{"title":"Artificial Neural Network Learning, Attention, and Memory","authors":"Vincenzo Manca","doi":"10.3390/info15070387","DOIUrl":"https://doi.org/10.3390/info15070387","url":null,"abstract":"The learning equations of an ANN are presented, giving an extremely concise derivation based on the principle of backpropagation through the descendent gradient. Then, a dual network is outlined acting between synapses of a basic ANN, which controls the learning process and coordinates the subnetworks selected by attention mechanisms toward purposeful behaviors. Mechanisms of memory and their affinity with comprehension are considered, by emphasizing the common role of abstraction and the interplay between assimilation and accommodation, in the spirit of Piaget’s analysis of psychological acquisition and genetic epistemology. Learning, comprehension, and knowledge are expressed as different levels of organization of informational processes inside cognitive systems. It is argued that formal analyses of cognitive artificial systems could shed new light on typical mechanisms of “natural intelligence” and, in a specular way, that models of natural cognition processes could promote further developments of ANN models. Finally, new possibilities of chatbot interaction are briefly discussed.","PeriodicalId":510156,"journal":{"name":"Information","volume":"5 5‐6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141686578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InformationPub Date : 2024-07-02DOI: 10.3390/info15070389
Joaquim Miguel, Pedro Mendonça, Agnelo Quelhas, J. M. L. P. Caldeira, V. N. Soares
{"title":"The Development of a Prototype Solution for Collecting Information on Cycling and Hiking Trail Users","authors":"Joaquim Miguel, Pedro Mendonça, Agnelo Quelhas, J. M. L. P. Caldeira, V. N. Soares","doi":"10.3390/info15070389","DOIUrl":"https://doi.org/10.3390/info15070389","url":null,"abstract":"Hiking and cycling have gained popularity as ways of promoting well-being and physical activity. This has not gone unnoticed by Portuguese authorities, who have invested in infrastructure to support these activities and to boost sustainable and nature-based tourism. However, the lack of reliable data on the use of these infrastructures prevents us from recording attendance rates and the most frequent types of users. This information is important for the authorities responsible for managing, maintaining, promoting and using these infrastructures. In this sense, this study builds on a previous study by the same authors which identified computer vision as a suitable technology to identify and count different types of users of cycling and hiking routes. The performance tests carried out led to the conclusion that the YOLOv3-Tiny convolutional neural network has great potential for solving this problem. Based on this result, this paper describes the proposal and implementation of a prototype demonstrator. It is based on a Raspberry Pi 4 platform with YOLOv3-Tiny, which is responsible for detecting and classifying user types. An application available on users’ smartphones implements the concept of opportunistic networks, allowing information to be collected over time, in scenarios where there is no end-to-end connectivity. This aggregated information can then be consulted on an online platform. The prototype was subjected to validation and functional tests and proved to be a viable low-cost solution.","PeriodicalId":510156,"journal":{"name":"Information","volume":"28 46","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141685241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InformationPub Date : 2024-07-02DOI: 10.3390/info15070388
J. Juang
{"title":"Stability and Motion Patterns of Two Interactive Oscillating Agents","authors":"J. Juang","doi":"10.3390/info15070388","DOIUrl":"https://doi.org/10.3390/info15070388","url":null,"abstract":"This paper investigates the stability and motion of two interactive oscillating agents. Multiple agents can be controlled in a centralized and/or distributed manner to form specific patterns in cooperative tracking, pursuit, and evasion games, as well as environmental exploration. This paper studies the behavior of two oscillating agents due to their interaction. It shows that, through a combination of selecting oscillation centers and interaction gain, a variety of motions, including limit-cycles and stationary behavior, can be realized.","PeriodicalId":510156,"journal":{"name":"Information","volume":"106 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141686965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InformationPub Date : 2024-07-01DOI: 10.3390/info15070384
Metwally Rashad, Doaa M. Alebiary, Mohammed Aldawsari, Ahmed A. El-Sawy, Ahmed H. AbuEl-Atta
{"title":"CCNN-SVM: Automated Model for Emotion Recognition Based on Custom Convolutional Neural Networks with SVM","authors":"Metwally Rashad, Doaa M. Alebiary, Mohammed Aldawsari, Ahmed A. El-Sawy, Ahmed H. AbuEl-Atta","doi":"10.3390/info15070384","DOIUrl":"https://doi.org/10.3390/info15070384","url":null,"abstract":"The expressions on human faces reveal the emotions we are experiencing internally. Emotion recognition based on facial expression is one of the subfields of social signal processing. It has several applications in different areas, specifically in the interaction between humans and computers. This study presents a simple CCNN-SVM automated model as a viable approach for FER. The model combines a Convolutional Neural Network for feature extraction, certain image preprocessing techniques, and Support Vector Machine (SVM) for classification. Firstly, the input image is preprocessed using face detection, histogram equalization, gamma correction, and resizing techniques. Secondly, the images go through custom single Deep Convolutional Neural Networks (CCNN) to extract deep features. Finally, SVM uses the generated features to perform the classification. The suggested model was trained and tested on four datasets, CK+, JAFFE, KDEF, and FER. These datasets consist of seven primary emotional categories, which encompass anger, disgust, fear, happiness, sadness, surprise, and neutrality for CK+, and include contempt for JAFFE. The model put forward demonstrates commendable performance in comparison to existing facial expression recognition techniques. It achieves an impressive accuracy of 99.3% on the CK+ dataset, 98.4% on the JAFFE dataset, 87.18% on the KDEF dataset, and 88.7% on the FER.","PeriodicalId":510156,"journal":{"name":"Information","volume":"4 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141715340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}