Cognitive Computing Safety: the New Horizon for Reliability

Total Page:16

File Type:pdf, Size:1020Kb

Cognitive Computing Safety: the New Horizon for Reliability Expert Opinion ................................................................................................................................................................ Cognitive Computing Safety: The New Horizon for Reliability YUHAO ZHU VIJAY JANAPA REDDI University of Texas at Austin ......Recent advances in cognitive Safety in Cognitive models, and form a long accuracy tail dis- computing have brought widespread Computing Systems tribution that is hard to curtail. excitement for various machine lear- Safety in cognitive computing is inher- Tail accuracy leads to poor worst-case ning–based intelligent services, ranging ently associated with the accuracy issue accuracy guarantees. In mission-critical from autonomous vehicles to smart traf- in machine learning. Just as with any sys- systems, worst-case accuracy is known fic-light systems. To push such cognitive tem-level behavior, accuracy can be clas- to raise serious safety concerns. For services closer to reality, recent research sified into two categories: average-case example, the autopilot system in a self- has focused extensively on improving and worst-case accuracy. The latter driving car might be working ideally for the performance, energy efficiency, pri- determines a cognitive computing sys- millions of miles, but it only takes one life- vacy, and security of cognitive comput- tem’s safety. Improving the worst-case threatening incident to cause significant ing platforms. accuracy, however, is hard due to the distrust in such autonomous systems.2 Among all the issues, a rapidly rising lack of interpretability in machine learn- and critical challenge to address is the ing. Machine learning algorithms are Worst-Case Accuracy practice of safe cognitive computing— inherently stochastic approximations of The issue of tolerating worst-case accu- that is, how to architect machine lear- the ground truth. racy is not unique to the cognitive ning–based systems to be robust against computing domain. For instance, in the uncertainty and failure to guarantee that aviation industry, engineers constantly they perform as intended without causing Meaning of Safety address the issue of safety. But there is Most machine learning systems today harmful behavior. Addressing the safety a notable difference between cognitive focus on the average-case accuracy. In issue will involve close collaboration systems and today’s prevalent aviation mature machine learning–based applica- among different computing communities, systems that make it fundamentally hard tion domains, such as image classifica- and we believe computer architects must to guarantee safety in cognitive comput- tion, the average accuracy of well-trained play a key role. In this position paper, we ing—that is, the system interpretability. machine learning models could be 99 first discuss the meaning of safety and System interpretability means the percent. However, just as datacenter the severe implications of the safety issue ability to rationalize and identify the root systems suffer from the long-tail latency in cognitive computing. We then provide cause of a system failure. From time to issue,1 machine learning systems suffer a framework to reason about safety, and time, the aviation industry suffers from from tail accuracy, in which a few we outline several opportunities for the mid-air tragedies, but for every such trag- requests exhibit poor accuracy due to architecture community to help make edy, investigators can understand what uncertainties in the machine learning cognitive computing safer. exactly went wrong, how to fix it, and, most importantly, how to prevent such incidents from happening again in the Editor's note: We invited some domain experts to discuss the opportunities and future. This is because flight control is challenges surrounding cognitive architectures. The following are their views on based on interpretable control theory, the topic. —Alper Buyuktosunoglu and Pradip Bose physics, and aerodynamics. For exam- ple, in the case of Air France Flight 447, ............................................................ 2 Published by the IEEE Computer Society 0272-1732/17/$33.00 c 2017 IEEE unclear how we would improve a self- thus introduces error in certain scenarios. The safety gap driving car—a multicomponent system For instance, an image classifier mistak- involving several decision-making enly recognizing a cat in an image as a Oracle model stages—to prevent even the same inci- dog is the result of the learning gap. The dent that led to a particular crash from learning gap is typically introduced during recurring. the model training stage. Using reliability lingo, errors intro- Learning Bridging the Safety Gap duced by the learning gap can be gap Safety in cognitive computing systems is regarded as a form of permanent (as a multidisciplinary problem. However, opposed to transient) faults caused by computer architects are no strangers to design bugs. Therefore, they are not building safe systems. We commonly amenable to traditional backward error- Best-trained machine refer to it as “reliability.” For decades, the recovery techniques (such as check- learning model computer architecture community has pointing), nor to forward error-recovery managed to build highly resilient and fault- techniques (such as TMR or execution tolerant architectures. For instance, we duplication6). Execution guardband, or allocate a large operating The execution gap, on the other hand, gap margin, to tolerate process, thermal, and is introduced during the model execution voltage variations.4 We have also estab- (inference) stage. The execution gap is lished fundamental redundancy-based introduced in two forms. First, to improve techniques, such as triple module redun- the performance and energy efficiency of Hardware- accelerated machine dancy (TMR) and instruction duplication, model inference, hardware architects learning model to detect and recover from errors.5 often build specialized accelerators that Resilient architectures and safe cog- rely on various optimizations, such as nitive systems share a similar goal: guar- weight compression, data quantization, Figure 1. The safety gap in cognitive anteeing expected system behaviors in and static RAM fault injection.7,8 These computing. the event of a failure. Therefore, archi- optimizations are unsafe because they tects have the unique opportunities to intentionally trade off accuracy with exe- cution efficiency. Second, model execu- investigators were able to accurately transfer the experience of building resil- ient architectures to building safe cogni- tion could also suffer from traditional attribute the crash to an aerodynamic tive computing architectures, and to reliability emergencies, such as memory stall, which was then attributed to the design new solutions to overcome new failures, circuit defects, and real-time vio- mishandling of the pitot tubes being safety challenges. To that end, we intro- lations.9,15 Overall, hardware execution obstructed by ice crystals. The whole duce the notion of the safety gap—a introduces additional sources of error, accident was a pivot point for the civil avi- framework for computer architects to exacerbating the worst-case accuracy. ation industry, leading to an overhaul of reason about the safety issue in cogni- To improve the safety of cognitive how measurement devices are installed tive computing. computing, computer architects should and how pilots are trained to handle have two objectives. First, we must instrument anomalies.3 The Safety Gap ensure that in building hardware acceler- In contrast, the same ability to find an A cognitive system’s safety gap refers ators, we do not introduce an execution incident’s root cause and learn from it to the gap between the worst-case gap, while still providing the performance cannot be said for cognitive systems accuracy guarantee that an oracle sys- and energy benefits of hardware special- because, at least at present, we lack a tem demands and the actual accuracy ization. Second, we must provide deep understanding of how and why that a particular implementation pro- vehicles that help improve model learn- machine learning model works in the first vides. The safety gap is the composition ing accuracy and thereby minimize the place. The lack of system interpretability of two gaps: learning and execution learning gap. will only worsen as we begin to compose (see Figure 1). To that end, we discuss a few poten- many such systems together, effectively The learning gap refers to the gap tial directions under both objectives to increasing the system’s opaqueness. If between the oracle and the best-trained foster research in this emerging and we cannot explain how each component machine learning model. The learning gap important topic. Broadly, our suggestions works, we cannot attribute the root exists because even the best machine involve tools, architecture-level design, cause of a whole system failure to a par- learning model is likely not a perfect rep- and principles that dictate accountable ticular component. For example, it is resentation of the objective reality, and system operation. ................................................................. JANUARY/FEBRUARY 2017 3 .............................................................................................................................................................................................. EXPERT OPINION Avoiding the Execution Gap and speed up the process of closing the research in building safe cognitive We must build
Recommended publications
  • Intelligent Cognitive Assistants (ICA) Workshop Summary and Research Needs Collaborative Machines to Enhance Human Capabilities
    February 7, 2018 Intelligent Cognitive Assistants (ICA) Workshop Summary and Research Needs Collaborative Machines to Enhance Human Capabilities Abstract: The research needs and opportunities to create physico-cognitive systems which work collaboratively with people are presented. Workshop Dates and Venue: November 14-15, 2017, IBM Almaden Research Center, San Jose, CA Workshop Websites: https://www.src.org/program/ica https://www.nsf.gov/nano Oakley, John / SRC [email protected] [Feb 7, 2018] ICA-2: Intelligent Cognitive Assistants Workshop Summary and Research Needs Table of Contents Executive Summary .................................................................................................................... 2 Workshop Details ....................................................................................................................... 3 Organizing Committee ............................................................................................................ 3 Background ............................................................................................................................ 3 ICA-2 Workshop Outline ......................................................................................................... 6 Research Areas Presentations ................................................................................................. 7 Session 1: Cognitive Psychology ........................................................................................... 7 Session 2: Approaches to Artificial
    [Show full text]
  • Potential of Cognitive Computing and Cognitive Systems Ahmed K
    Old Dominion University ODU Digital Commons Modeling, Simulation & Visualization Engineering Modeling, Simulation & Visualization Engineering Faculty Publications 2015 Potential of Cognitive Computing and Cognitive Systems Ahmed K. Noor Old Dominion University, [email protected] Follow this and additional works at: https://digitalcommons.odu.edu/msve_fac_pubs Part of the Artificial Intelligence and Robotics Commons, Cognition and Perception Commons, and the Engineering Commons Repository Citation Noor, Ahmed K., "Potential of Cognitive Computing and Cognitive Systems" (2015). Modeling, Simulation & Visualization Engineering Faculty Publications. 18. https://digitalcommons.odu.edu/msve_fac_pubs/18 Original Publication Citation Noor, A. K. (2015). Potential of cognitive computing and cognitive systems. Open Engineering, 5(1), 75-88. doi:10.1515/ eng-2015-0008 This Article is brought to you for free and open access by the Modeling, Simulation & Visualization Engineering at ODU Digital Commons. It has been accepted for inclusion in Modeling, Simulation & Visualization Engineering Faculty Publications by an authorized administrator of ODU Digital Commons. For more information, please contact [email protected]. DE GRUYTER OPEN Open Eng. 2015; 5:75–88 Vision Article Open Access Ahmed K. Noor* Potential of Cognitive Computing and Cognitive Systems Abstract: Cognitive computing and cognitive technologies 1 Introduction are game changers for future engineering systems, as well as for engineering practice and training. They are ma- The history of computing can be divided into three eras jor drivers for knowledge automation work, and the cre- ([1, 2], and Figure 1). The first was the tabulating era, with ation of cognitive products with higher levels of intelli- the early 1900 calculators and tabulating machines made gence than current smart products.
    [Show full text]
  • Introduction to Gpus for Data Analytics Advances and Applications for Accelerated Computing
    Compliments of Introduction to GPUs for Data Analytics Advances and Applications for Accelerated Computing Eric Mizell & Roger Biery Introduction to GPUs for Data Analytics Advances and Applications for Accelerated Computing Eric Mizell and Roger Biery Beijing Boston Farnham Sebastopol Tokyo Introduction to GPUs for Data Analytics by Eric Mizell and Roger Biery Copyright © 2017 Kinetica DB, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://oreilly.com/safari). For more information, contact our corporate/institutional sales department: 800-998-9938 or [email protected]. Editor: Shannon Cutt Interior Designer: David Futato Production Editor: Justin Billing Cover Designer: Karen Montgomery Copyeditor: Octal Publishing, Inc. Illustrator: Rebecca Demarest September 2017: First Edition Revision History for the First Edition 2017-08-29: First Release See http://oreilly.com/catalog/errata.csp?isbn=9781491998038 for release details. The O’Reilly logo is a registered trademark of O’Reilly Media, Inc. Introduction to GPUs for Data Analytics, the cover image, and related trade dress are trademarks of O’Reilly Media, Inc. While the publisher and the authors have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the publisher and the authors disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work. Use of the information and instructions contained in this work is at your own risk.
    [Show full text]
  • Cognitive Computing Systems: Potential and Future
    Cognitive Computing Systems: Potential and Future Venkat N Gudivada, Sharath Pankanti, Guna Seetharaman, and Yu Zhang March 2019 1 Characteristics of Cognitive Computing Systems Autonomous systems are self-contained and self-regulated entities which continually evolve them- selves in real-time in response to changes in their environment. Fundamental to this evolution is learning and development. Cognition is the basis for autonomous systems. Human cognition refers to those processes and systems that enable humans to perform both mundane and specialized tasks. Machine cognition refers to similar processes and systems that enable computers perform tasks at a level that rivals human performance. While human cognition employs biological and nat- ural means – brain and mind – for its realization, machine cognition views cognition as a type of computation. Cognitive Computing Systems are autonomous systems and are based on machine cognition. A cognitive system views the mind as a highly parallel information processor, uses vari- ous models for representing information, and employs algorithms for transforming and reasoning with the information. In contrast with conventional software systems, cognitive computing systems effectively deal with ambiguity, and conflicting and missing data. They fuse several sources of multi-modal data and incorporate context into computation. In making a decision or answering a query, they quantify uncertainty, generate multiple hypotheses and supporting evidence, and score hypotheses based on evidence. In other words, cognitive computing systems provide multiple ranked decisions and answers. These systems can elucidate reasoning underlying their decisions/answers. They are stateful, and understand various nuances of communication with humans. They are self-aware, and continuously learn, adapt, and evolve.
    [Show full text]
  • Artificial Intelligence, Real Results Cognitive Computing Capabilities Can Help Member Firm Clients Make Smarter, Faster Choices
    Artificial intelligence, real results Cognitive computing capabilities can help member firm clients make smarter, faster choices Home It’s no longer a question of when computers will be able to learn, “think,” and provide reasoned responses. Making an impact They already can. that matters The question now—from Deloitte’s perspective—is, “How can cognitive computing be used to benefit member firm clients and our network?” A software application Watch Cindy Hook, Deloitte named the Delivering service developed by the Deloitte US Innovation group, in close collaboration with the Audit that matters and Consulting M&A practices of Deloitte US, already is helping organizations save Deloitte Australia leader in Analytics IT Cognitive computing = time and money. Yet, to those who dream the future, it may be but an early step in a CEO, talk about why Consulting by Kennedy. long journey. smarter, faster choices disruption matters to Source: Kennedy Consulting Research & Global capabilities and “We’re at the beginning of a true paradigm shift. Instead of merely querying Advisory; IT Consulting: Analytics 2014 leaders in the digital era. report. © 2014 Kennedy Information, LLC. China’s State Grid structured data, we are demanding insights from unstructured data that will inform Reproduced under license. decision making,” says Forrest Danson, Deloitte US Principal and Analytics Integrated Cyber resilience begins in Market Offering Leader. “Deloitte US is among the vanguard in this arena because the boardroom we understand how artificial intelligence
    [Show full text]
  • Cognitive Computing
    word2vec\Tomas Mikolov Slides by Omer Levy and Guy Rapaport 1 Word Similarity & Relatedness • 2 Approaches for Representing Words Distributional Semantics (Count) Word Embeddings (Predict) • Used since the 90’s • Inspired by deep learning • Sparse word-context PMI/PPMI matrix • word2vec (Mikolov et al., 2013) • Decomposed with SVD Underlying Theory: The Distributional Hypothesis (Harris, ’54; Firth, ‘57) “Similar words occur in similar contexts” 3 Approaches for Representing Words Both approaches: • Rely on the same linguistic theory • Use the same data • Are mathematically related • “Neural Word Embedding as Implicit Matrix Factorization” (NIPS 2014) • How come word embeddings are so much better? • “Don’t Count, Predict!” (Baroni et al., ACL 2014) 4 Background 5 Distributional Semantics 6 Distributional Semantics Marco saw a furry little wampimuk hiding in the tree. 7 Distributional Semantics Marco saw a furry little wampimuk hiding in the tree. 8 Distributional Semantics Marco saw a furry little wampimuk hiding in the tree. words contexts wampimuk furry wampimuk little wampimuk hiding wampimuk in … … 9 Distributional Semantics • 10 Distributional Semantics • 11 Distributional Semantics • 12 What is word2vec? 13 What is word2vec? How is it related to PMI? 14 What is word2vec? • word2vec is not a single algorithm • It is a software package for representing words as vectors, containing: • Tw o d i s t i n c t m o d e l s • CBoW • Skip-Gram • Various training methods • Negative Sampling • Hierarchical Softmax • A rich preprocessing pipeline • Dynamic Context Windows • Subsampling • Deleting Rare Words 15 What is word2vec? • word2vec is not a single algorithm • It is a software package for representing words as vectors, containing: • Tw o d i s t i n c t m o d e l s • CBoW • Skip-Gram (SG) • Various training methods • Negative Sampling (NS) • Hierarchical Softmax • A rich preprocessing pipeline • Dynamic Context Windows • Subsampling • Deleting Rare Words 16 Skip-Grams with Negative Sampling (SGNS) Marco saw a furry little wampimuk hiding in the tree.
    [Show full text]
  • Wearable Affective Robot
    UNDER PROOF: IEEE ACCESS, VOL. XX, NO. YY, MONTH 20XX 1 Wearable Affective Robot Min Chen, Jun Zhou, Guangming Tao, Jun Yang, Long Hu Abstract—With the development of the artificial intelligence omy and people’s livelihood [3]. According to the forecasts, (AI), the AI applications have influenced and changed people’s by 2025, the AI-based medical treatment industry will occupy daily life greatly. Here, a wearable affective robot that integrates one fifth of the market scale. Although the AI and Medical the affective robot, social robot, brain wearable, and wearable 2.0 is proposed for the first time. The proposed wearable affective treatment in China has started a little later than in some other robot is intended for a wide population, and we believe that it can countries, it is expected that it will reach 20 billion Chinese improve the human health on the spirit level, meeting the fashion Yuan of the market size in China by 2018. requirements at the same time. In this paper, the architecture and The AI-based medical treatment interdiscipline plays an design of an innovative wearable affective robot, which is dubbed important role in the development of the artificial intelligent- as Fitbot, are introduced in terms of hardware and algorithm’s perspectives. In addition, the important functional component of based human health diagnosis and treatment [4] [5]. In 2011, it the robot-brain wearable device is introduced from the aspect was found by the research personnel from the Langone Health of the hardware design, EEG data acquisition and analysis, user of New York University that, the analysis and matching of behavior perception, and algorithm deployment, etc.
    [Show full text]
  • Construction of Feed Forward Multilayer Perceptron Model for Genetic Dataset in Leishmaniasis Using Cognitive Computing
    bioRxiv preprint doi: https://doi.org/10.1101/411363; this version posted September 7, 2018. The copyright holder for this preprint (which was not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available under aCC-BY-NC-ND 4.0 International license. Construction of Feed Forward MultiLayer Perceptron Model For Genetic Dataset in Leishmaniasis Using Cognitive Computing Sundar Mahalingam #, Ritika Kabra $and Shailza Singh$* #Kamaraj College of Engineering andTechnology , S.P.G.Chidambara Nadar – C.Nagammal Campus, S.P.G.C.Nagar, K.Vellakulam - 625 701 Near Virudhunagar, Madurai District, INDIA $National Centre for Cell Science, NCCS Complex, Ganeshkhind, SP Pune University Campus, Pune-411007, INDIA Abstract Leishmaniasis is an endemic parasitic disease, predominantly found in the poor locality of Africa, Asia and Latin America. It is associated with malnutrition, weak immune system of people and their housing locality. At present, it is diagnosed by microscopic identification, molecular and biochemical characterisation or serum analysis for parasitic compounds. In this study, we present a new approach for diagnosing Leishmaniasis using cognitive computing. The Genetic datasets of leishmaniasis are collected from Gene Expression Omnibus database and it’s then processed. The algorithm for training and developing a model, based on the data is prepared and coded using python. The algorithm and their corresponding datasets are integrated using TensorFlow dataframe. A feed forward Artificial Neural Network trained model with multi-layer perceptron is developed as a diagnosing model for Leishmaniasis, using genetic dataset. It is developed using recurrent neural network.
    [Show full text]
  • Resiliency in the Cognitive Era
    RESILIENCY IN THE COGNITIVE ERA IN AN ALWAYS-ON WORLD, REAL-TIME DATA FLOW AND CONTINUOUSLY CONNECTED COGNITIVE APPLICATIONS WILL BE ESSENTIAL IN ASSOCIATION WITH: CONTENTS Executive summary ........................................................ 2 Key points ................................................................. 3 Introduction ...............................................................4 What changes in the cognitive era? .......................................... 7 Always on: The importance of continuous availability in the cognitive era....... 9 The benefits will be breathtaking. So should the resiliency. ....................11 How cognitive capabilities can improve resiliency .............................13 Conclusion.................................................................15 Acknowledgments ........................................................ 16 EXECUTIVE SUMMARY Cognition enables a new level of engagement with technology and a new class of products and services that sense, reason and learn about their users and the world around them. A cognitive system capitalizes on data from internal and external sources for continuous learning and better forecasting for real-time analytics in a fraction of the time it would take a human. To take full advantage of these capabilities requires a high degree of resilience; data must be accurate, available, accessible and auditable. New cognitive applications are increasing expectations and raising resiliency requirements for the overall enterprise as well as its IT and data
    [Show full text]
  • OCR (Optical Character Recognition)
    How to deploy AI for delivering new levels of insights AI Powered Resume Recognition 1 Aress Software and Education Technologies Pvt Ltd www.aress.com Need for AI powered Resume Recognition Manual resume screening takes a lot of time & effort, especially when there are a number of resumes to go through in a short span of time Resumes could vary in formats like word, pdf, image files etc and could pose a challenge to quickly manage and sort Retrieving relevant CV’s based on key criteria like job description, years of experience, location etc could be difficult Need for AI powered OCR Impossible to perform operations like editing, searching operation on docx and pdf files With OCR one can digitise printed texts enabling us to electronically store and search text content Uses techniques including machine learning processes such as artificial intelligence, computer vision, cognitive computing, machine translation, data/ information identification and extraction and text mining 2 Aress Software and Education Technologies Pvt Ltd www.aress.com AI Based Resume Recognition – The Process Character Post- Pre-Processing Output Resumes Files recognition Processing (pdf, docx, non- (using OpenCV (text, json, (using NLP editable) libraries) (using TensorFlow xml) libraries) Techniques ) Dashboard, Aress Software and Education Technologies Pvt Ltd www.aress.com 3 Reports Click the link below and our AI team member will get in touch with you within 24 hours I’m interested in getting resumes processed with AI powered solution Aress Software and Education Technologies Pvt Ltd www.aress.com 4.
    [Show full text]
  • Experiences in Building GPU Enabled HPC Clusters
    Building a Successful Deep Learning Platform: Experiences in Building GPU Enabled HPC Clusters Brian Michael Belgodere Software Engineer Cognitive Computing Cluster 1 Agenda • Who am I • Why should you listen to IBM Research • What did we build • Why did we do this • How do we keep our users productive • How do we keep it running • Future Work 2 IBM 5/10/17 About Me • Software Engineer • IBM Research • HPC and ML/Deep Learning • DevOps • Background in Computational Finance and Economics • Law Degree • Coffee and Beer Enthusiast • I Love Solving Problems 3 IBM 5/10/17 Why should you listen to IBM Research? 4 IBM 5/10/17 5 6 7 Bluemix Services 8 In 2 short years IBM Research... • 20+ high value patents submitted • 50+ Papers Accepted at Top Conferences • NIPS, COLING, INTERSPEECH, AISTATS, EACL, ICASSP, EMNLP, etc. • Several Commercialized Services and Client Engagements • 5 Moonshots 9 IBM 5/10/17 What did we build? 10 IBM 5/10/17 Cognitive Computing Cluster 11 IBM 5/10/17 What did we build? "' ! !!!!!!!!!!!!!!! ! !!!!!!!!!!!!!!! "& ! !!!!!!!!!!!!!!! " ( ! # !!!!!!!!!!!!!!! ! !!!!!!!!!!!!!!! !% !!!!!!!!!!!!!!! !!!!!!!!!!!!!! !!!!!!!!!!!!!! !!!!!!!!!!!!!! ! $$$$$$$$$$ ! !!!!!!!!!! 12 !!!!!!!!!! What did we build? • 263 x86 Compute Nodes • 130 P8 Compute Nodes • 946 GPU Devices • 3.45 Petabytes of Storage • 10GbE + Infiniband • 750+ Active Users 13 • 1.2IBM Million5/10/17 Jobs a Month Off the Shelf Parts IBM Software Defined Open Source Frameworks Infrastructure 14 Why did we do this? • Users of BluegeneQ, Speech, and several other cluster looking for next-gen compute platform • Colocation of Data and Workload across Disciplines • Centralization of Management, Cost, and Workload Visibility • Advanced Scheduling to Maximize Cluster Utilization 15 • DemandIBM for5/10/17 Deep Learning & GPUs Why did we do this? • The Cognitive Computing Cluster was built to explore the enormous possibilities of Deep Learning in order to accelerate the velocity of our researchers' experiments.
    [Show full text]
  • An Assessment of Deep Learning Models and Word Embeddings for Toxicity Detection Within Online Textual Comments
    electronics Article An Assessment of Deep Learning Models and Word Embeddings for Toxicity Detection within Online Textual Comments Danilo Dessì 1,2,*,† , Diego Reforgiato Recupero 3,† and Harald Sack 1,2,† 1 FIZ Karlsruhe–Leibniz Institute for Information Infrastructure, Hermann-von-Helmholtz-Platz 1, 76344 Eggenstein-Leopoldshafen, Germany; harald.sack@fiz-karlsruhe.de 2 Karlsruhe Institute of Technology, Institute AIFB, Kaiserstraße 89, 76133 Karlsruhe, Germany 3 Department of Mathematics and Computer Science, University of Cagliari, 09124 Cagliari, Italy; [email protected] * Correspondence: danilo.dessi@fiz-karlsruhe.de † The authors equally contributed to the research performed in this paper. Abstract: Today, increasing numbers of people are interacting online and a lot of textual comments are being produced due to the explosion of online communication. However, a paramount inconve- nience within online environments is that comments that are shared within digital platforms can hide hazards, such as fake news, insults, harassment, and, more in general, comments that may hurt some- one’s feelings. In this scenario, the detection of this kind of toxicity has an important role to moderate online communication. Deep learning technologies have recently delivered impressive performance within Natural Language Processing applications encompassing Sentiment Analysis and emotion detection across numerous datasets. Such models do not need any pre-defined hand-picked features, but they learn sophisticated features from the input datasets by themselves. In such a domain, word Citation: Dessì, D.; Reforgiato Recupero, D.; Sack, H. An embeddings have been widely used as a way of representing words in Sentiment Analysis tasks, Assessment of Deep Learning Models proving to be very effective.
    [Show full text]