Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 4 de 4
Filter
Add more filters










Database
Language
Publication year range
1.
Sensors (Basel) ; 23(8)2023 Apr 12.
Article in English | MEDLINE | ID: mdl-37112249

ABSTRACT

Social media applications, such as Twitter and Facebook, allow users to communicate and share their thoughts, status updates, opinions, photographs, and videos around the globe. Unfortunately, some people utilize these platforms to disseminate hate speech and abusive language. The growth of hate speech may result in hate crimes, cyber violence, and substantial harm to cyberspace, physical security, and social safety. As a result, hate speech detection is a critical issue for both cyberspace and physical society, necessitating the development of a robust application capable of detecting and combating it in real-time. Hate speech detection is a context-dependent problem that requires context-aware mechanisms for resolution. In this study, we employed a transformer-based model for Roman Urdu hate speech classification due to its ability to capture the text context. In addition, we developed the first Roman Urdu pre-trained BERT model, which we named BERT-RU. For this purpose, we exploited the capabilities of BERT by training it from scratch on the largest Roman Urdu dataset consisting of 173,714 text messages. Traditional and deep learning models were used as baseline models, including LSTM, BiLSTM, BiLSTM + Attention Layer, and CNN. We also investigated the concept of transfer learning by using pre-trained BERT embeddings in conjunction with deep learning models. The performance of each model was evaluated in terms of accuracy, precision, recall, and F-measure. The generalization of each model was evaluated on a cross-domain dataset. The experimental results revealed that the transformer-based model, when directly applied to the classification task of the Roman Urdu hate speech, outperformed traditional machine learning, deep learning models, and pre-trained transformer-based models in terms of accuracy, precision, recall, and F-measure, with scores of 96.70%, 97.25%, 96.74%, and 97.89%, respectively. In addition, the transformer-based model exhibited superior generalization on a cross-domain dataset.


Subject(s)
Hate , Speech , Humans , Awareness , Computer Security , Language
2.
Sensors (Basel) ; 23(1)2022 Dec 23.
Article in English | MEDLINE | ID: mdl-36616745

ABSTRACT

Augmented reality (AR) has gained enormous popularity and acceptance in the past few years. AR is indeed a combination of different immersive experiences and solutions that serve as integrated components to assemble and accelerate the augmented reality phenomena as a workable and marvelous adaptive solution for many realms. These solutions of AR include tracking as a means for keeping track of the point of reference to make virtual objects visible in a real scene. Similarly, display technologies combine the virtual and real world with the user's eye. Authoring tools provide platforms to develop AR applications by providing access to low-level libraries. The libraries can thereafter interact with the hardware of tracking sensors, cameras, and other technologies. In addition to this, advances in distributed computing and collaborative augmented reality also need stable solutions. The various participants can collaborate in an AR setting. The authors of this research have explored many solutions in this regard and present a comprehensive review to aid in doing research and improving different business transformations. However, during the course of this study, we identified that there is a lack of security solutions in various areas of collaborative AR (CAR), specifically in the area of distributed trust management in CAR. This research study also proposed a trusted CAR architecture with a use-case of tourism that can be used as a model for researchers with an interest in making secure AR-based remote communication sessions.


Subject(s)
Augmented Reality , Humans , Technology , Commerce , Communication , Research Personnel
3.
Cureus ; 12(11): e11357, 2020 Nov 06.
Article in English | MEDLINE | ID: mdl-33178542

ABSTRACT

With the growing global rates of diabetes and hypertension, chronic kidney disease (CKD) appears to be a major contributor to morbidity and all-cause mortality. In recent years, there has been growing controversy regarding the optimal timing for the initiation of hemodialysis in this patient cohort. In this report, we present the case of a 52-year-old female with a 15-year history of CKD who was admitted to the hospital with clinical manifestations of uremia, volume overload, and symptomatic anemia. The patient presented with fatigue, nausea, progressive shortness of breath, and lightheadedness for two weeks, which had limited the activities of daily living. For the past eight years, her estimated glomerular filtration rate (GFR) had ranged from 5 to 15 mL/min/1.73 m2, consistent with kidney failure seen in stage 5 CKD. Prior to her recent admission, the patient had been grossly asymptomatic and had been responsive to medical therapy. After appropriate management with hemodialysis, a transfusion of packed red blood cells, and medication adjustment, the patient was scheduled for maintenance dialysis through an arteriovenous fistula. She had no further complaints and her laboratory abnormalities were found normalized at the six-month follow-up. This case report presents the survival and outcome of a patient with stage 5 CKD, who was only initiated on hemodialysis eight years after her diagnosis.

4.
PeerJ Comput Sci ; 5: e216, 2019.
Article in English | MEDLINE | ID: mdl-33816869

ABSTRACT

Conventional paper currency and modern electronic currency are two important modes of transactions. In several parts of the world, conventional methodology has clear precedence over its electronic counterpart. However, the identification of forged currency paper notes is now becoming an increasingly crucial problem because of the new and improved tactics employed by counterfeiters. In this paper, a machine assisted system-dubbed DeepMoney-is proposed which has been developed to discriminate fake notes from genuine ones. For this purpose, state-of-the-art models of machine learning called Generative Adversarial Networks (GANs) are employed. GANs use unsupervised learning to train a model that can then be used to perform supervised predictions. This flexibility provides the best of both worlds by allowing unlabelled data to be trained on whilst still making concrete predictions. This technique was applied to Pakistani banknotes. State-of-the-art image processing and feature recognition techniques were used to design the overall approach of a valid input. Augmented samples of images were used in the experiments which show that a high-precision machine can be developed to recognize genuine paper money. An accuracy of 80% has been achieved. The code is available as an open source to allow others to reproduce and build upon the efforts already made.

SELECTION OF CITATIONS
SEARCH DETAIL
...