Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Citizen science and artificial intelligence (AI) complement each other by harnessing the strengths of both human and machine capabilities. Citizen science generates terabytes of raw numerical, text, and image data, the analysis of which requires automated techniques to process in an efficient manner. Conversely, AI computer vision technology can require tens of thousands of images during the training process, and citizen science projects are well suited to provide large libraries of data. Herein, we describe how AI tools are being applied across the GLOBE Observer citizen science data ecosystem, where image recognition algorithms are supporting data ingest processes, protecting user privacy and improving data fidelity. GLOBE citizen science data has been used to develop automated data classification routines that enable information discovery of mosquito larvae and land cover labels. These advances position GLOBE citizen scientist data for discovery and use in environmental and health research, as well as by machine learning scientists working in the general field of GeoAI.more » « less
-
Abstract The ability to distinguish between the abdominal conditions of adult female mosquitoes has important utility for the surveillance and control of mosquito-borne diseases. However, doing so requires entomological training and time-consuming manual effort. Here, we design computer vision techniques to determine stages in the gonotrophic cycle of female mosquitoes from images. Our dataset was collected from 139 adult female mosquitoes across three medically important species—Aedes aegypti,Anopheles stephensi, andCulex quinquefasciatus—and all four gonotrophic stages of the cycle (unfed, fully fed, semi-gravid, and gravid). From these mosquitoes and stages, a total of 1959 images were captured on a plain background via multiple smartphones. Subsequently, we trained four distinct AI model architectures (ResNet50,MobileNetV2,EfficientNet-B0, andConvNeXtTiny), validated them using unseen data, and compared their overall classification accuracies. Additionally, we analyzed t-SNE plots to visualize the formation of decision boundaries in a lower-dimensional space. Notably,ResNet50andEfficientNet-B0demonstrated outstanding performance with an overall accuracy of 97.44% and 93.59%, respectively.EfficientNet-B0demonstrated the best overall performance considering computational efficiency, model size, training speed, and t-SNE decision boundaries. We also assessed the explainability of thisEfficientNet-B0model, by implementing Grad-CAMs—a technique that highlights pixels in an image that were prioritized for classification. We observed that the highest weight was for those pixels representing the mosquito abdomen, demonstrating that our AI model has indeed learned correctly. Our work has significant practical impact. First, image datasets for gonotrophic stages of mosquitoes are not yet available. Second, our algorithms can be integrated with existing citizen science platforms that enable the public to record and upload biological observations. With such integration, our algorithms will enable the public to contribute to mosquito surveillance and gonotrophic stage identification. Finally, we are aware of work today that uses computer vision techniques for automated mosquito species identification, and our algorithms in this paper can augment these efforts by enabling the automated detection of gonotrophic stages of mosquitoes as well.more » « less
-
Even as novel technologies emerge and medicines advance, pathogen-transmitting mosquitoes pose a deadly and accelerating public health threat. Detecting and mitigating the spread of Anopheles stephensi in Africa is now critical to the fight against malaria, as this invasive mosquito poses urgent and unprecedented risks to the continent. Unlike typical African vectors of malaria, An. stephensi breeds in both natural and artificial water reservoirs, and flourishes in urban environments. With An. stephensi beginning to take hold in heavily populated settings, citizen science surveillance supported by novel artificial intelligence (AI) technologies may offer impactful opportunities to guide public health decisions and community-based interventions. Coalitions like the Global Mosquito Alert Consortium (GMAC) and our freely available digital products can be incorporated into enhanced surveillance of An. stephensi and other vector-borne public health threats. By connecting local citizen science networks with global databases that are findable, accessible, interoperable, and reusable (FAIR), we are leveraging a powerful suite of tools and infrastructure for the early detection of, and rapid response to, (re)emerging vectors and diseases.more » « less
-
Mosquito-borne diseases continue to ravage humankind with >700 million infections and nearly one million deaths every year. Yet only a small percentage of the >3500 mosquito species transmit diseases, necessitating both extensive surveillance and precise identification. Unfortunately, such efforts are costly, time-consuming, and require entomological expertise. As envisioned by the Global Mosquito Alert Consortium, citizen science can provide a scalable solution. However, disparate data standards across existing platforms have thus far precluded truly global integration. Here, utilizing Open Geospatial Consortium standards, we harmonized four data streams from three established mobile apps—Mosquito Alert, iNaturalist, and GLOBE Observer’s Mosquito Habitat Mapper and Land Cover—to facilitate interoperability and utility for researchers, mosquito control personnel, and policymakers. We also launched coordinated media campaigns that generated unprecedented numbers and types of observations, including successfully capturing the first images of targeted invasive and vector species. Additionally, we leveraged pooled image data to develop a toolset of artificial intelligence algorithms for future deployment in taxonomic and anatomical identification. Ultimately, by harnessing the combined powers of citizen science and artificial intelligence, we establish a next-generation surveillance framework to serve as a united front to combat the ongoing threat of mosquito-borne diseases worldwide.more » « less
-
Abuse in cyber space is a problem requiring immediate attention. Unfortunately, despite advances in Natural Language Processing techniques, there are clear limitations in detecting instances of cyber abuse today. Challenges arising due to different languages that teens communicate with today, and usage of codes along with code mixing and code switching make the design of a comprehensive approach very hard. Existing NLP based approaches for detecting cyber abuse thus suffer from a high degree of false negatives and positives. In this paper, we investigate a new approach to detect instances of cyber abuse. Our approach is motivated by the premise that abusers tend to have unique facial expressions while engaging in an actual abuse episode, and if we are successful, such an approach will be language-agnostic. Here, using only four carefully identified facial features without any language processing, and realistic experiments with 15 users, our system proposed in this paper achieves 98% accuracy for same-user evaluation and up to 74% accuracy for cross-user evaluation in detecting instances of cyber abuse.more » « less
-
Lying is a (practically) unavoidable component of our day to day interactions with other people, and it includes both oral and textual communications (e.g. text entered via smartphones). Detecting when a person is lying has important applications, especially with the ubiquity of messaging via smart-phones, coupled with rampant increases in (intentional) spread of mis-information today. In this paper, we design a technique to detect whether or not a person's textual inputs when typed via a smartphone indicate lying. To do so, first, we judiciously develop a smartphone based survey that guarantees any participant to provide a mix of true and false responses. While the participant is texting out responses to each question, the smartphone measures readings from its inbuilt inertial sensors, and then computes features like shaking, acceleration, tilt angle, typing speed etc. experienced by it. Subsequently, for each participant (47 in total), we glean the true and false responses using our own experiences with them, and also via informal discussions with each participant. By comparing the responses of each participant, along with the corresponding motion features computed by the smartphone, we implement several machine learning algorithms to detect when a participant is lying, and our accuracy is around 70% in the most stringent leave-one-out evaluation strategy. Later, utilizing findings of our analysis, we develop an architecture for real-time lie detection using smartphones. Yet another user evaluation of our lie detection system yields 84%-90% accuracy in detecting false responses.more » « less
-
Demand for fast data sharing among smart devices is rapidly increasing. This trend creates challenges towards ensuring essential security for online shared data while maintaining the resource usage at a reasonable level. Existing research studies attempt to leverage compression based encryption for enabling such secure and fast data transmission replacing the traditional resource-heavy encryption schemes. Current compression-based encryption methods mainly focus on error insensitive digital data formats and prone to be vulnerable to different attacks. Therefore, in this paper, we propose and implement a new Huffman compression based Encryption scheme using lightweight dynamic Order Statistic tree (HEliOS) for digital data transmission. The core idea of HEliOS involves around finding a secure encoding method based on a novel notion of Huffman coding, which compresses the given digital data using a small sized "secret" (called as secret_intelligence in our study). HEliOS does this in such a way that, without the possession of the secret intelligence, an attacker will not be able to decode the encoded compressed data. Hence, by encrypting only the small-sized intelligence, we can secure the whole compressed data. Moreover, our rigorous real experimental evaluation for downloading and uploading digital data to and from a personal cloud storage Dropbox server validates efficacy and lightweight nature of HEliOS.more » « less
-
In this empirical study, a framework was developed for binary and multi-class classification of Twitter data. We first introduce a manually built gold standard dataset of 4000 tweets related to the environmental health hazards in Barbados for the period 2014 - 2018. Then, the binary classification was used to categorize each tweet as relevant or irrelevant. Next, the multiclass classification was then used to further classify relevant tweets into four types of community engagement: reporting information, expressing negative engagement, expressing positive engagement, and asking for information. Results indicate that (combination of TF-IDF, psychometric, linguistic, sentiment and Twitter-specific features) using a Random Forest algorithm is the best feature for detecting and predicting binary classification with (87% F1 score). For multi-class classification, TF-IDF using Decision Tree algorithm was the best with (74% F1 score).more » « less
An official website of the United States government
