scholarly journals Training Machines to Identify Species using GBIF-mediated Datasets

Author(s):  
Tim Robertson ◽  
Serge Belongie ◽  
Hartwig Adam ◽  
Christine Kaeser-Chen ◽  
Chenyang Zhang ◽  
...  

Advances in machine vision technology are rapidly enabling new and innovative uses within the field of biodiversity. Computers are now able to use images to identify tens of thousands of species across a wide range of taxonomic groups in real time, notably demonstrated by iNaturalist.org, which suggests species IDs to users (https://www.inaturalist.org/pages/computer_vision_demo) as they create observation records. Soon it will be commonplace to detect species in video feeds or use the camera in a mobile device to search for species-related content on the Internet. The Global Biodiversity Information Facility (GBIF) has an important role to play in advancing and improving this technology, whether in terms of data, collaboration across teams, or citation practice. But in the short term, the most important role may relate to initiating a cultural shift in accepted practices for the use of GBIF-mediated data for training of artificial intelligence (AI). “Training datasets” play a critical role in achieving species recognition capability in any machine vision system. These datasets compile representative images containing the explicit, verifiable identifications of the species they include. High-powered computers run algorithms on these training datasets, analysing the imagery and building complex models that characterize defining features for each species or taxonomic group. Researchers can, in turn, apply the resulting models to new images, determining what species or group they likely contain. Current research in machine vision is exploring (a) the use of location and date information to further improve model results, (b) identification methods beyond species-level into attribute, character, trait, or part-level ID, with an eye toward human interpretability, and (c) expertise modeling for improved determination of “research grade” images and metadata. The GBIF community has amassed one of the largest datasets of labelled species images available on the internet: more than 33 million species occurrence records in GBIF.org have one or more images (https://www.gbif.org/occurrence/gallery). Machine vision models, when integrated into the data collection tools in use across the GBIF network, can improve the user experience. For example, in citizen science applications like iNaturalist, automated species suggestion helps even novice users contribute occurrence records to GBIF. Perhaps most importantly, GBIF has implemented uniform (and open) data licensing, established guidelines on citation and provided consistent methods for tracking data use through the Digital Object Identifiers (DOI) citation chain. GBIF would like to build on the lessons learned in these activities while striving to assist with this technology research and increase its power and availability. We envisage an approach as follows: To assist in developing and refining machine vision models, GBIF plans to provide training datasets, taking effort to ensure license and citation practice are respected. The training datasets will be issued with a DOI, and the contributing datasets will be linked through the DOI citation graph. To assist application developers, Google and Visipedia plan to build and publish openly-licensed models and tutorials for how to adapt them for localized use. Together we will strive to ensure that data is being used responsibly and transparently, to close the gap between machine vision scientists, application developers, and users and to share taxonomic trees capturing the taxon rank to which machine vision models can identify with confidence based on an image’s visual characteristics. To assist in developing and refining machine vision models, GBIF plans to provide training datasets, taking effort to ensure license and citation practice are respected. The training datasets will be issued with a DOI, and the contributing datasets will be linked through the DOI citation graph. To assist application developers, Google and Visipedia plan to build and publish openly-licensed models and tutorials for how to adapt them for localized use. Together we will strive to ensure that data is being used responsibly and transparently, to close the gap between machine vision scientists, application developers, and users and to share taxonomic trees capturing the taxon rank to which machine vision models can identify with confidence based on an image’s visual characteristics.

Author(s):  
Irvin Renzell Heard ◽  
Norman R Ardila

For nearly two decades, desktops dominated as the primary means of accessing the internet until 2007, the era of mobile phones with touchscreens capability entered the market by Apple Inc. Currently, the high demand of accessibility and mobility through mobile technology is adding more pressure on application developers leaving them to focus more on “meeting deadlines than application security,” which is a critical component as hybrid applications play a significant role in the advancement of IoT and cross-platform compatibility. New technologies are adopting unresolved security issues from the latter. This article aims to initiate discussions within the development and research community regarding hybrid mobile app security, market, role in IoT, advantages, disadvantages, security challenges and the best practices as society enters into a new paradigm envisioned as a ubiquitous global network.


2021 ◽  
Vol 11 (9) ◽  
pp. 459
Author(s):  
Shahnawaz Saikat ◽  
Jaspaljeet Singh Dhillon ◽  
Wan Fatimah Wan Ahmad ◽  
Robiatul A’dawiah Jamaluddin

Following the COVID-19 outbreak, teaching and learning have been forced to move fully to the Internet rather than the conventional offline medium. As a result, the use of M-learning has risen dramatically, which was neither expected or anticipated. The challenges and benefits of such widespread usage are beginning to emerge in front of us. Thus, in this paper, we systematically review the benefits and challenges of leveraging M-learning for Science and Technology courses during the COVID-19 pandemic by educators and learners. Related articles were obtained from various databases, namely, IEEE, ACM Digital Library, ScienceDirect, and Springer. In total, 4210 related articles were initially found. Upon executing careful selection criteria, 22 articles were selected for review. After that, the advantages and threats were identified and discussed. As per our findings, it was determined that M-learning has excellent potential to be an effective platform for education provided that the identified shortcomings are resolved. This review will be helpful for education stakeholders and institutions to gauge the impact of leveraging M-learning as the only means for education to proceed. Moreover, it reveals the strengths and shortcomings that would aid in adjusting the relevant policies administered by the institutions. Furthermore, application developers will be able to comprehend the expected features that should be included in novel M-learning platforms.


Author(s):  
Tim Gerhard ◽  
Dennis Schwerdel ◽  
Paul Müller

AbstractThe Internet is a successful network that connects people all over the world. However, it has some fundamental architectural problems which require application developers and service providers to spend a tremendous effort in combating these. Examples for these efforts are content delivery networks or mobile TCP. Thus, it can be said that the Internet is currently not fulfilling the requirements on the global network anymore. The Internet of the future, or its replacement, must solve these problems.There are multiple clean-slate approaches for information-centric networking. However, they are inherently incompatible to the Internet or applications building on it.This work presents a novel resource transport protocol that is optimized for detection by software-defined networks and may be re-routed to in-network processors. Furthermore, it is shown how this protocol can be used to support concepts of ICN even in today’s Internet. Moreover, the resource format that is used in this work is independent from the underlying network, resulting in possible reuse in other networks as well. Applications and protocols building on this resource format can thus easily be re-used in clean-slate networks like NDN.


2018 ◽  
Vol 32 (3) ◽  
pp. 1317-1331 ◽  
Author(s):  
Shuai Wang ◽  
Shubing Zhang ◽  
Ruoding Ma ◽  
E. Jin ◽  
Xinhui Liu ◽  
...  

2021 ◽  
Vol 2 (6) ◽  
Author(s):  
Anika Seufert ◽  
Svenja Schröder ◽  
Michael Seufert

AbstractTo deliver the best user experience (UX), the human-centered design cycle (HCDC) serves as a well-established guideline to application developers. However, it does not yet cover network-specific requirements, which become increasingly crucial, as most applications deliver experience over the Internet. The missing network-centric view is provided by Quality of Experience (QoE), which could team up with UX towards an improved overall experience. By considering QoE aspects during the development process, it can be achieved that applications become network-aware by design. In this paper, the Quality of Experience Centered Design Cycle (QoE-CDC) is proposed, which provides guidelines on how to design applications with respect to network-specific requirements and QoE. Its practical value is showcased for popular application types and validated by outlining the design of a new smartphone application. We show that combining HCDC and QoE-CDC will result in an application design, which reaches a high UX and avoids QoE degradation.


2020 ◽  
Vol 4 (2) ◽  
pp. 63
Author(s):  
Rian Andrian ◽  
Ahmad Fauzi

In software engineering, web applications are software that are accessed using a web browser through a network such as the Internet or intranet. Web applications are applications that can be relied on by users to do many useful activities. Despite the awareness of web application developers about safe programming practices, there are still many aspect in web applications that can be exploited by attacker. The development of web applications and the Internet causes the movement of information systems to use them as a basis. Security is needed to protect the contents of web applications that are sensitive and provide a safe process of sending data, therefore application security must be applied to all infrastructure that supports web applications, including the web application itself. Most organizations today have some kind of web application security program or try to build/ improve. But most of these programs do not get the results expected for the organization, are not durable or are not able to provide value continuously and efficiently and also cannot improve the mindset of developers to build/ design secure web applications. This research aims to develop a web application security scanner that can help overcome security problems in web applications.


Author(s):  
Irvin Renzell Heard ◽  
Norman R Ardila

For nearly two decades, desktops dominated as the primary means of accessing the internet until 2007, the era of mobile phones with touchscreens capability entered the market by Apple Inc. Currently, the high demand of accessibility and mobility through mobile technology is adding more pressure on application developers leaving them to focus more on “meeting deadlines than application security,” which is a critical component as hybrid applications play a significant role in the advancement of IoT and cross-platform compatibility. New technologies are adopting unresolved security issues from the latter. This article aims to initiate discussions within the development and research community regarding hybrid mobile app security, market, role in IoT, advantages, disadvantages, security challenges and the best practices as society enters into a new paradigm envisioned as a ubiquitous global network.


Author(s):  
James Bankoski ◽  
Matthew Frost ◽  
Adrian Grange

In this paper, we present the argument in favor of an open source, a royalty-free video codec that will keep pace with the evolution of video traffic. Additionally, we argue that the availability of a state-of-the-art, royalty-free codec levels the playing field, allowing small content owners, and application developers to compete with the larger companies that operate in this space.


Sign in / Sign up

Export Citation Format

Share Document