Preprint
Article

A Survey System for Artificial Intelligence-Based Painting Using Generative Adversarial Network Techniques

Altmetrics

Downloads

51

Views

32

Comments

0

A peer-reviewed article of this preprint also exists.

This version is not peer-reviewed

Submitted:

14 September 2024

Posted:

16 September 2024

You are already at the latest version

Alerts
Abstract
The purpose of this paper is to construct an evaluation system for AI painting software based on generative adversarial network technology, which optimizes the performance of the related software in terms of functionality, ease of use, system performance and safety. The results of the questionnaires are statistically analyzed. In addition, exploratory factor analysis was supported to extract the data of the study, which was ultimately used to calculate the weight and importance of each index through fuzzy hierarchical analysis method. The study constructed an evaluation system for AI painting software based on generative adversarial network technology, including 16 indicators of functionality, 16 indicators of ease of use, 7 indicators of system performance, and 8 indicators of safety respectively that their alpha coefficients were 0.882, 0.962, 0.932, 0.932, and 0.932, respectively. In addition, the accumulated explanatory variances of their coefficients were 84.405%, 84.897%, 84.013%, and 72.606%, respectively, 73.013%, and 72.606%, respectively. It is clear that the items included in each of the indicators are homogeneous, with a high degree of internal consistency. This paper suggests that the development of AI painting software focusing on functionality, ease of use, system performance and safety can enhance the market competitiveness of the software.
Keywords: 
Subject: Social Sciences  -   Cognitive Science

1. Introduction

Within the field of design studies, the development of AI drawing software has attracted a great deal of attention. Not only does AI drawing software offer new possibilities for artistic creativity, it also fulfils important roles in the process of design. Through advanced techniques such as Generative Adversarial Networks (GAN), these software can automatically generate photorealistic images and artworks in a variety of forms, including landscapes, people, and abstract art. This functionality allows designers to create art more easily, and it also brings new thinking and challenges to the development and practice of design studies. The AI painting software based on generative adversarial networks is a group of image generation tools that utilise deep learning techniques. These tools enable automatic image generation by training two neural network models containing generator and discriminator [3]. There has been a significant development in recent years in the technology and applications of ai painting software based on generative adversarial networks. The present researchers have investigated four dimensions of AI painting software based on Generative Adversarial Networks, which are functionality, ease of use, system performance, and security of the software. For example, Qiu, Yungen, Cao, et al. suggested that the relevant institutions should charge royalties for all the use of a particular AI ‘creation’ and distribute them to the relevant people [4]. Hu Yin investigated the functionality of the software that designed an AIGC cue card to quickly place predefined keywords during the text-to-image process so that creators could quickly generate the desired design through Midjourney [5]. Nervana Osama Hanafy studied the ease of use of the software. It was found that the AI drawing software using MidJourney fell short in its ease of use, and its interface was more complex and reliant on precise keywords [6]; Zhang Bin and Zhou Yuechuan et al. investigated the system performance of software and pointed out that the difficulty of GAN lies in the crashing problem of software [7].
Besides, there are some problems in the current study. For example, there is a lack of some important functions in terms of functionality, while in terms of ease of use, the coherence of the interface content has not been sufficiently considered, resulting in an inadequate overall experience of the software. If these issues are not addressed, it will negatively impact the development of AI painting software based on generative adversarial network techniques. However, few software can fully satisfy the requirements of the four aspects of functionality, ease of use, system performance and security. Therefore, it is necessary to introduce new ideas to solve the above problems.
The objectives of this study are:
(1) To optimise the AI painting software based on generative adversarial network technology in terms of functionality, ease of use, system performance and security, so as to make it more rich in functionality, more convenient in operation, more stable in performance and more reliable in security.
(2) To establish an evaluation system for AI painting software based on generative adversarial network technology to ensure that the software can fully integrate the four requirements of functionality, ease of use, system performance and security.
(3) To rank the functionality, ease of use, system performance and security of the software in order of importance through further research, which will help companies to invest more R&D time in the more important aspects.

2. LITERATURE REVIEW

2.1. Early studies on AI drawing software

AI painting software in the earlier times used an example of an image generation model based on a self-encoder mechanism. In 1986, Rumelhart et al first introduced the concept of AutoEncoder (AE) [8]. Kingma et al introduced the Variational Auto-Encoders (VAE) [9]. Vincent et al introduced a degradation process based on AE that proposed Denoising AutoEncoders (DAEs) which are designed to be more robust in terms of the extracted features by ameliorating the effect of noise [10]. Aaron et al suggested Vector Quantized Variational Autoencoder (VQ-VAE) [11]. It is advantageous that models for image generation based on self-encoder structures have no need for labelled data, only the input image, and can improve the quality of reconstruction, and robustness or diversity of implied representations. Weakness is that they do not guarantee the continuity and interpretability of the implicit representation.

2.2. Current status of AI drawing software

There are a number of highly regarded AI painting software such as DALL-E 2, Midjourney and Stable Diffusion that are widely known and influential in the field of artistic creativity. DALL-E 2 by OpenAI developed AI painting software based on GAN technology. Radford, Alec showed that DALL-E 2 can generate graphics from written descriptions by integrating naturally linguistic processing and computer vision algorithms [12].A. Ramesh studied that DALL-E 2 has a very simple interface with great ease of use, which allows people with little or no expertise in AI techniques that can quickly and easily make beautiful photographs [13];O'Meara noted that Dall-E 2 was highly artistic in creating surrealist works that were [14];There are, however, problems with gender stereotyping in Dall-E 2 as noted by Garcia-Ull [15]. This shows that the software has both advantages and disadvantages in terms of functionality. Midjourney which is a GAN-based AI mapping software that generates images based on text, was developed by the Midjourney Laboratory in San Francisco, California, USA which entered public beta testing on 12 July 2022. Liu, Vivaian pointed out that MidJourney is widely used to help designers and artists with quickly outlining concepts that can help people with visual impairments understand typographic content [16].Sukkar, Ahmad W. indicated that Midjourney has undertaken many explorations in the functionality of the software [17]. For example, users can use this software that easily generates highly realistic Islamic architecture, whether it's a grandiose complex or a beautifully detailed example of a fascinating old city, from famous mosques to ornate palaces, all of which are perfectly reproduced in this software. Moreover, Zhang, Yanbo pointed out that when using the software, users need to enter precise keywords into the programme, together with a series of complicated operating steps, in order to generate a picture that meets the user's needs [18]. This shows that the ease of use of the software needs to be improved; Stable Diffusion which is an AI painting software developed by startups Stability AI, CompVis and Runway. Although it uses a diffusion model rather than GAN technology, it is still a useful guide for the development of AI painting software based on Generative Adversarial Network technology. Zeyu Zhang showed that Stable Diffusion has better security [19]. The software adds an NSFW filter from LAION, which filters out pornographic content while protecting the copyrights of human artists. Stabilised diffusion is likely to leave much to be desired in terms of system performance as it requires longer sampling times and more complex optimisation, which potentially leads to inefficiencies or instability. In summary, there are advantages and disadvantages of the current AI painting software based on generative adversarial network technology in terms of functionality, ease of use, system performance and security. During the optimisation of software, we not only need to improve functionality, ease of use, system performance and security, but also be good at integrating the strengths of all aspects. Furthermore, we can incorporate the best of various types of software on the market in order to enhance the user experience and the comprehensive performance of the system.This not only makes full use of existing resources, but also avoids the shortcomings of the software on the market, thereby providing users with a more complete solution.

3. RESEARCH DESIGN AND METHOD

3.1. Introduction to the theory

3.1.1. Generating Adversarial Networks

Generative Adversarial Network(GAN) is that an implicit density generation model based on the direct approach, whose key structures are a generator G and a discriminator D: G is responsible for randomly sampling from the noisy distribution of the input data, while D is responsible for recognising and judging the authenticity of the samples generated by G, in conjunction with the real data. GANs contain various variants such as conditioned generative adversarial networks, deep convolutional generative adversarial networks, semi-supervised generative adversarial networks, informative generative adversarial networks, etc. [20]. The future research direction of GAN should focus on replacing traditional GAN with CGAN models, solving the semi-supervised learning problem [21], improving the training efficiency of GAN, and exploring the possibility of combining GAN with other models [22].

3.1.2. AI drawing software

The AI painting software is a tool that utilises artificial intelligence techniques to automatically generate realistic images and artworks, including landscapes, people and abstract art . Through technologies such as Generative Adversarial Networks (GAN), Variational Auto-Encoder (VAE), and Neural Style Migration, users can mimic the styles of famous artists, preview and adapt their works in real time, which plays an important role in the fields of creative design, education and learning, entertainment and social interaction. In contrast to traditional computer art tools, AI painting software focuses more on computer intelligence or autonomy [23]. There is a wide variety of these AI painting software such as Midjourney, Stable Diffusion, and DALL-E 2 with Disco Diffusion based on the Discord community [24]. With the continuous emergence and rapid updating of new AI drawing software, the progress of the software exhibits a dramatic growth. This phenomenon has triggered a wide-ranging discussion about the potential that AI has shown in the field of art creation [25].

3.1.3. Evaluation system

An evaluation system is a set of indicators containing rules for assessing, measuring or comparing things or behaviours. It usually consists of multi-level indicators, from the whole to the details, which are used to assess various aspects or characteristics of an object and provide a quantitative or qualitative evaluation of it. The construction of the evaluation system involves synthesising the data processing results of the multi-round consultation questionnaires and the suggestions made by the experts, modifying the initially established evaluation indicators, which subsequently leads to the formation of a sound system of evaluation indicators [26]. This process of questionnaire is usually carried out on the grounds of literature analysis, taking into account the attributes of the subject in the study, through the initial formulation of the evaluation indicators and the use of back-to-back correspondence between experts which ensures the independence of their opinions [27]. Scholars usually construct the evaluation model and design the index of evaluation system by means of the Delphi method, and then use the hierarchical analysis method to determine the weights of the evaluation indexes of IT the quality of service [28]. For example, when constructing an evaluation system for information security, the guideline layer can be divided into five parts: hardware security, information security, software security, management security and environmental security. While for the evaluation system of creative open data competition works, the first-level indicators are set as information content, functional design, interface design, system performance, open data development and utilisation, and the degree of compliance with the competition rules [29]. Zhao et al. pointed out that for the evaluation of creative competition entries, they have the following first-level indicators: information content, functional design, interface design, system performance, data development, competition rules, etc. [30].The design of such an evaluation system can reflect the characteristics and quality requirements of the evaluation object more comprehensively and improve the accuracy and credibility of the evaluation.

3.2. Research architecture

This study aims to construct an evaluation system for AI painting software based on Generative Adversarial Networks. The subjects of the study included three executives of domestic AI technology companies and five full-time professors in the department of computer science of undergraduate colleges and universities. Based on relevant theories, researches and literature, the questionnaire was constructed in a qualitative and quantitative parallel approach, including conducting individual in-depth interviews with experts, Delphi questionnaire survey method, and exploratory factor analysis method. the architecture of the questionnaire is shown in Figure 1. Following a discussion with the supervising professor, a research topic was identified. Various types of literature related to generative adversarial networks and AI painting software were summarised. To understand the function of AI drawing software, The characteristics and elements of Generative Adversarial Networks were used to form the basis for the first draft of the Delphi questionnaire and the outline of the interviews, and then development of the Delphi questionnaire for Round 1.As mentioned above, the results of the evaluation and comments on each of the items for the first round of questionnaires were analyzed which resulted in the second round of questionnaires. The questionnaire of this study was based on a Likert scale, with ‘1’ denoting ‘very unimportant’, ‘2’ denoting ‘unimportant’, ‘3’ denoting ‘not necessarily’, ‘4’ denoting ‘important’, and ‘5’ denoting ‘very important’, and ‘5’ denoting ‘very important’, and ‘5’ denoting ‘very important’. The degree of authority of the experts was used to assess the professionalism of the experts, which was represented by the authority coefficient Cr, Cr = (Ca + Cs) / 2, where Ca indicates the basis of judgement when experts score, and Cs indicates the familiarity of the experts with the issue. The quantitative scale of the basis of judgment and the familiarity are shown in Table 1. Coefficient of authority Cr between 0 and 1, Cr ≥ 0.7, indicating that the results of the expert opinion is reliable; Cr> 0.8, indicating that the experts have a greater grasp of the choice of content. The judgement of the degree of authority of experts is based on self-evaluation. In this study, the authority coefficient of expert opinion is 0.81, which indicates that the results are highly reliable. Further, it was confirmed by exploratory factor analysis and reliability test that each of the three-level indicators had met the criteria for retention in this study, whereby the evaluation system of ai painting software based on generative adversarial network was constructed. Finally, through the fuzzy hierarchical analysis and fuzzy comprehensive evaluation method, the weight and importance of each index are calculated. Further, it was confirmed by exploratory factor analysis and reliability test that each of the three-level indicators had met the criteria for retention in this study, whereby the evaluation system of ai painting software based on generative adversarial network was constructed. Finally, through the fuzzy hierarchical analysis and fuzzy comprehensive evaluation method, the weight and importance of each index are calculated.

3.3. Implementing procedures

The implementation procedure for the establishment of the indicators in this study is shown in Figure 2, which is summarized.Through literature collection and in-depth interviews with three experts, the results of the interviews were organized and analyzed. The information of the questionnaire was extracted and modified according to the suggestions of the supervising professors in order to fulfill the first round of the Delphi questionnaire. The Delphi Expert Panel consisted of 8 experts, including 3 executives from domestic AI technology companies and 5 full-time faculty members from computer science departments of undergraduate colleges and universities, who revised the Delphi questionnaire 2 times before distributing the first round of Delphi questionnaires. In response to the environmental protection and energy saving, the researcher used an email for the electronic questionnaire which was sent to each expert. Delphi questionnaires for Round 1 were mailed on August 31st with collections done on September 23rd. Round 2 Delphi questionnaires were mailed on October 1st to be collected on October 31st.There are 123 indicators in 4 dimensions of ai painting software based on generative adversarial network, including 57 indicators in functional dimension, 27 indicators in ease of use dimension, 20 indicators in system performance dimension and 19 indicators in safety dimension.

3.4. Implementing procedures

In this study, the results of the second questionnaire were analyzed using factor analysis, and exploratory factor analysis was implemented to screen the items, while principal component analysis was chosen to delete the items with low explanatory strength, and to extract the common factors. Thus, a reduction in the number of variables was achieved. The criteria for deleting items include: items with factor loadings less than 0.5; items covering two common factors; items containing less than two items and items with low reliability, which are all deleted; That is, the large number of variables is reduced to a smaller number of components and the smaller loadings are eliminated, while the distribution and accumulation of loadings for each latent common factor is understood; The maximum variance method was chosen to simplify the factor loading matrix, which allows us to understand the distribution and accumulation of variances for each factor, while allowing us to understand the correlation between individual items and the factors. This allowed us to assess the strength of the individual items using the Cronbach's alpha coefficient that is used to analyze the internal consistency of the dimensions. In short, the Delphi method is used to explore the opinions of experts on the evaluation indexes of AI drawing software based on generative adversarial network. Therefore, the evaluation system based on generative adversarial network can be established for the ai painting software in this study.

3.5. Fuzzy Hierarchy Analysis

3.5.1. To establish the complementary judgment matrix

We invite professionals to quantify the relative importance of the indicators at each level based on the scale of 0.1 to 0.9 as shown in Table 2. On the basis of the obtained scale value of each indicator, the complementary judgment matrix R of the next level relative to the previous level is constructed R:
R = r 11 r 12 . . . r 1 n r 21 r 22 . . . r 2 n . . . . . . . . . . . . r n 1 r n 2 . . . r n n
In Eq. (1), the matrix R consists of the rij composition, rij is the ith row and jth column scale values and satisfies the conditions: 0≤rij≤1, rij + rji =1, rii=0.5, i, j=1, 2,..,n.

3.5.2. Determining the weights of complementary judgment matrices

Let M i 1 (i=1, 2, ... , n) be the sum of the nth row of the judgment matrix in the dimension layer. M i j 2 (i=1, 2,... , n) (j=1, 2, ... , m) is the sum of the mth row of the nth judgment matrix in the criterion layer.
Let ω i 1 (i=1, 2,... , n) be the nth weight for indicator for primary layer , ω i j 2 i = 1 2 . . . n (j=1,2,...,m) is the mth weight for secondary layer in the nth primary indicator.
There are more than 10 methods for calculating the weights of fuzzy judgment matrices, and the use of equations 2-3 demonstrated in the literature [31] can reduce the amount of calculation while obtaining reasonable and effective results. Subsequently, ω i 1 and ω i j 2 are obtained according to equations 2-3.
ω i 1 = M i 1 + n 2 1 n n 1 i = 1 2 . . . n
ω i j 2 = M i j 2 + n 2 1 n n 1 i = 1 2 . . . n   j = 1 2 . . . m
Let W1 be the vector of primary indicator weights, W i 2 i = 1 2 . . . n be the vector of secondary indicator weights. W 1 = ω 1 1 ω 2 1 . . . ω n 1 T , W i 2 = ω i 1 2 ω i 2 2 . . . ω i m 2 T .
Finally, a consistency test was performed on the complementary judgment matrix. The consistency test helps to confirm that the expert's judgments are consistent when comparing the factors in pairs. For example, if the expert believes that A is more important than B and that B is more important than C, it is reasonable that A should be more important than C. In this study, if the difference between any row and the corresponding indicator data of other rows is the same constant then it is a consistency matrix, i.e., it passes the consistency test.

3.6. Calculation of fuzzy integrated evaluation

Fuzzy Comprehensive Evaluation (FCE) is a comprehensive evaluation method based on fuzzy mathematics. which transforms qualitative into quantitative evaluation according to the membership theory of fuzzy mathematics, that is, using fuzzy mathematics to make an overall evaluation of things or objects limited by multiple factors. It has the characteristics of clear results and strong systematicity, which is suitable for the evaluation of various multi-level and multi-factor uncertainty problems, such as the optimization of the program and the selection of important factors of influence on the project. For a complex system, there are often a large number of factors affecting the system, each of which has a different level of hierarchy. It is difficult to solve the problem by using simple evaluation to get reasonable judgment results, therefore, multilevel fuzzy comprehensive evaluation is proposed; Fuzzy comprehensive evaluation involves utilizing the principle of fuzzy linear transformation and the principle of maximum membership to make a reasonable comprehensive evaluation of the objects to be evaluated by taking into account the various factors related to them. As a rule, multi-layer fuzzy comprehensive evaluation was carried out on the basis of fuzzy comprehensive evaluation. It can also be used repeatedly as many times as needed. The architecture of this system includes objective hierarchies, conformation hierarchies and criterion hierarchies. The detailed processing steps of this system are as follows:

3.6.1. Establishment of indicator set

The indicator set is a collection of n indicators that affect the object of assessment, denoted by U, i.e. U = ( u1, u2, …, un).

3.6.2. Establish the evaluation set

An evaluation set is a collection of q possible evaluation results made by a reviewer who assesses an object, usually denoted by V, i.e. V=(v1, v2, …, vq).

3.6.3. Determining the vector of weights for primary and secondary indicators to establish the complementary judgment matrix

Since the measure of the degree of influence of each indicator on the assessment of things is not similar, some indicators may have a greater degree of influence in the total evaluation, while others may be smaller, therefore, the weight of each indicator in the total evaluation must be given when making a synthesized evaluation and form a vector of weights. In this study, the fuzzy hierarchical analysis method is used to obtain the weight vector of first-level indicators W1 and the weight vector of second-level indicators W i 2 .

3.6.4. The construction of a fuzzy evaluation matrix

Based on the opinions of experts or evaluators, the indicators are scored using fuzzy language, which is then converted into fuzzy numbers to form a fuzzy evaluation matrix Ri , expressed as follows:
R i = r 11 r 12 . . . r 1 q r 21 r 22 . . . r 2 q . . . . . . . . . . . . r n 1 r n 2 . . . r n q
where r n q denotes the menbership function of the nth factor corresponding to the mth evaluation level.

3.6.5. Deriving the matrix of fuzzy integrated evaluation

B i 2 (i=1,2,...,n)is the second level fuzzy integrated evaluation matrix and B1 is the first level fuzzy integrated evaluation matrix.
The weight vector W i 2 is subjected to fuzzy operation with the fuzzy evaluation matrix Ri which yields B i 2 , expressed as follows:
B i 2 = W i 2   · R i = ω i 1 2 ω i 2 2 . . . ω i n 2 · r 11 r 12 . . . r 1 q r 21 r 22 . . . r 2 q . . . . . . . . . . . . r n 1 r n 2 . . . r n q = ( b i 1 2 , b i 2 2 , , b i q 2 )
The weight vector W1 consisting of B i 2 and the weights of the first-level indicators is subjected to the synthesis operation of the fuzzy matrix that gives B1, which is expressed as follows:
B 1 = W 1   · B 1 2 B 2 2 . . . B n 2 = (   b 1 1 ,   b 2 1   ,   . . . ,   b q 1 )

3.6.6. Calculation of the scoring results

The weighted average method was used to carry out the calculations, which were carried out as follows:
S = j = 1 m b j v j
where bj is the jth value in the fuzzy comprehensive evaluation matrix ( b i 1 2 , b i 2 2 , ..., b i q 2 )and( b 1 1 , b 2 1 , ..., b q 1 ) , vj is the jth value in the evaluation set V, and q represents the number of evaluation factors in the evaluation set.

4. RESULTS AND DISCUSSION

4.1. Research results

4.1.1. Establishment of integrated evaluation system

As shown in Table 3, a total of 76 indicators were deleted and 47 were retained by applying principal component analysis in factor analysis in order to reduce the indicators.The four subscales include 16 indicators in the "functionality" dimension with an alpha coefficient of 0.912, 16 indicators in the "ease of use" dimension with an alpha coefficient of 0.923, 7 indicators in the "system performance" dimension with an alpha coefficient of 0.931, and 8 indicators in the "safety" dimension with an alpha coefficient of 0.929. The alpha coefficients of the four subscales are all above 0.80, and the alpha coefficient of the whole scale is as high as 0.952, which shows a high degree of reliability.The results of factor analysis are shown in Table 4 and Table 5. Functionality has four subscales with 16 indicators: subscale 1 contains a1211, a1210, a124, a127, and a126 totaling 5 indicators with an alpha value of 0.927, naming as “ image restoration function”; subscale 2 contains a152, a156, a155, and a154 totaling 4 indicators with an alpha value of 866, naming as “image editing function”; subscale 3 contains a117, a116, a114, and a113 totaling 4 indicators with an alpha value of 915, naming as “style conversion and migration function”; subscale 4 contains a1214, a1212, and a158 totaling 3 indicators with an alpha value of 0.802, naming as “multi-layer image restoration”. Their eigenvalues are 7.709, 4.706, 3.147 and 2.163 respectively. The five subscales of ease of use have a total of 16 indicators: subscale 1 contains a232, a237, a239, a242, a251, and a255 with 6 indicators and an alpha value of 0.926, naming as "Visual Harmony" ; subscale 2 contains a242, a245, and a244 with 3 indicators, and an alpha value of 0.931, naming as "Service Quality"; subscale 3 contains a224, a226, a222 with 3 indicators and an alpha value of 0.811, naming as "Interaction"; subscale 4 contains a234, a233, a235 with 3 indicators and an alpha value of 0.854, naming as "Media Suitability"; subscale 5 contains a216, a215, a217 with 3 indicators and an alpha value of 0.881, naming as "Pattern Recognition". The eigenvalues were 5.006, 4.248, 2.310, 1.915 and 1.538 respectively.The two subscales of system performance have 7 indicators: Subscale 1 contains 4 indicators, a326, a324, a333, a321, with an alpha value of 0.922, which is named as "Service Stability"; Subscale 2 contains 3 indicators, a322, a332, a323, with an alpha value of 0.947, which is named as "System Response Time". The eigenvalues are 3.573 and 1.538 respectively.The two subscales of security have 8 indicators: Subscale 1 contains 4 indicators, a412, a413, a411, a414, with an alpha value of 0.932, which is named as " Access Security"; Subscale 2 contains 4 indicators, a417, a418, a416, a423, with an alpha value of 0.911, which is named as " Privacy Security". Their eigenvalues are 3.186 and 2.623 respectively.
The results of the factor analysis are shown in Figure 3 and Figure 4. The explained variances of image restoration function, image editing function, style transfer and migration function, and multi-layer image restoration function are 28.017%, 23.254%, 20.705%, and 15.430%, respectively, which shows that the explained variances of image restoration function are higher than those of the other three indexes; the explained variances of visual harmony, quality of service, interaction, media applicability, and pattern recognition are 20.784%, 18.333%, 15.968%, 15.058%, and 14.755%, respectively. Visual harmony, service quality, interaction, media suitability, and pattern recognition are 20.784%, 18.333%, 15.968%, 15.058%, and 14.755%, respectively, which shows that the explained variance of visual harmony is higher than that of the other four Indicators; the explained variances of service stability, and system response time are 42.007% and 31.006%, respectively, which shows that the explained variance of service stability is higher than that of system response time; the explained variances of access security, and privacy security are 36.564% and 36.043% respectively, which shows that the difference between the explained variances of access security and privacy security is not obvious. Therefore, the scales have good construct validity, and the importance of image restoration function in "functionality" is greater than that of the remaining three indicators; the importance of visual harmony in "ease of use" is greater than that of the remaining four indicators; the importance of service stability in "system performance" is greater than that of system response time; and in the area of "security", the importance of access security and privacy security is similar. Overall, the Cronbach's alpha coefficients of all the dimensions in this study are higher than 0.80, while that of the whole scale is as high as 0.952. The cumulative variance is significantly higher, which indicates that the indicators included in each factor in the factor analysis have homogeneity, and that there is a high degree of internal consistency among the indicators. This indicates that the indicators contained in each factor in the factor analysis have homogeneity. In addition, there is a high degree of internal consistency among the indicators.

4.1.2. Fuzzy analytical hierarchical process to calculate weights of indicator

Three executives of domestic AI technology enterprises and five full-time teachers of computer department are invited to make a two-by-two comparison of the first-level and second-level indicators, which give the consistency results shown in Table 6 and Table 7. The weight calculation of the functionality in Table 6 is taken as an example; the matrix is a fourth-order matrix, n=4, and the calculation for weight is as follows:
ω 1 1 = M 1 1 + n 2 1 n n 1 = 0.50 + 0.65 + 0.80 + 0.69 + 4 2 1 4 4 3 = 0.30
The difference between any row of the data and the corresponding indicator data of other rows in this study is the identical constant, which indicates that there is a consistency test in this study.
In the case of functionality, ease of use, system performance, and security, for example, the difference between the corresponding data of the indicators of the two groups is 0.15, which has got equal values.
The results of factor analysis are shown in Figure 3 and Figure 4. The weights of functionality, ease of use, system performance, and security are 0.3, 0.25, 0.2, and 0.24 respectively, which shows that functionality has a stronger influence; the weights of multi-layer image restoration, style transfer and migration, image editing, and image restoration are 0.19, 0.22, 0.29, and 0.3 respectively, which shows that image restoration is more powerful than the other three indicators; media applicability, service quality, image editing, and image restoration are more important than the other three indicators. The weights of media applicability, service quality, interaction, visual harmony, and pattern recognition are 0.18, 0.2, 0.19, 0.26, and 0.17 respectively, which shows that the weights of the five indicators are not significant.
By comparing the weights, it can be seen that the importance of functionality is greater than the other indicators in the first level of indicators, because if the functions of a software cannot meet the needs of users, it will be useless to users; in the second level of indicators, the importance of image restoration function is greater than the rest of the three indicators in the second level of indicators, because the function of image restoration is not only applied to artistic creation, but also widely used in photography, medical imaging and other fields. This is because image restoration is not only applied to artistic creation, but also widely used in photography, medical imaging and other fields, and providing powerful image restoration functions can attract a wider user group; this study ranked the importance of the indicators by fuzzy hierarchical analysis and factor analysis, and the results show that the conclusions from the two methods are consistent, which reflects the stability and high credibility of the data in this study.

4.1.3. An evaluation of fuzzy integration

The evaluation set in this study consists of four evaluation results, which are represented by V, i.e., V={Important, Important, General, Unimportant}. Each evaluation result in the evaluation set was converted into a specific value, where "very important" = 100, "important" = 80, "average" = 60, "unimportant" = 50. "Not important" = 50. TheW1 indicates the weight vector of the primary indicator and W 1 2 W 2 2 W 3 2 a n d W 4 2 indicates the weight vector of the secondary indicator. Above weight are determined as shown in Table 6 and Table 7.
W 1 = ( 0.30 , 0.25 , 0.20 , 0.24 ) ; W 1 2 = ( 0.19 , 0.22 , 0.29 , 0.30 ) ;
W 2 2 = ( 0.18 , 0.20 , 0.19 , 0.26 , 0.17 ) ; W 3 2 = ( 0.57 , 0.43 ) ; W 4 2 = ( 0.40 , 0.60 )
The fuzzy evaluation matrix Ri is calculated for each indicator as follows. R1, R2, R3 and R4 are the fuzzy evaluation matrices for functionality, ease of use, system performance and safety, respectively.
R 1 = 0.50 0.32 0.1 0.08 0.55 0.30 0.1 0.05 0.59 0.36 0.05 0 0.63 0.36 0.01 0   R 2 = 0.24 0.56 0.2 0 0.32 0.62 0.05 0.01 0.25 0.60 0.1 0.05 0.32 0.66 0.02 0 0.24 0.55 0.21 0
R 3 = 0.25 0.26 0.48 0.01 0.30 0.22 0.44 0.04   R 4 = 0.29 0.28 0.43 0 0.27 0.33 0.40 0
Let B 1 2 B 2 2 B 3 2 a n d B 4 2 be the second layer of fuzzy integrated evaluation matrix and B1 be the first layer of fuzzy integrated evaluation matrix.
B 1 2 = W 1 2 · R 1 = ( 0.19 , 0.22 , 0.29 , 0.30 ) · 0.50 0.32 0.1 0.08 0.55 0.30 0.1 0.05 0.59 0.36 0.05 0 0.63 0.36 0.01 0 = ( 0.58 , 0.34 , 0.06 , 0.03 )
B 2 2 = W 2 2 · R 2 = ( 0.18 , 0.20 , 0.19 , 0.26 , 0.17 ) · 0.24 0.56 0.2 0 0.32 0.62 0.05 0.01 0.25 0.60 0.1 0.05 0.32 0.66 0.02 0 0.24 0.55 0.21 0 = ( 0.28 , 0.60 , 0.11 , 0.01 )
B 3 2 = W 3 2 · R 3 = ( 0.57 , 0.43 ) · 0.25 0.26 0.48 0.01 0.30 0.22 0.44 0.04 = ( 0.27 , 0.24 , 0.46 , 0.02 )
B 4 2 = W 4 2 · R 4 = ( 0.40 , 0.60 ) · 0.29 0.28 0.43 0 0.27 0.33 0.40 0 = ( 0.28 , 0.31 , 0.41 , 0 )
As shown in Table 6, W1=(0.30,0.25,0.20,0.24), B1is obtained.
B 1 = W 1   · B 1 2 B 2 2 B 3 2 B 4 2 = ( 0.30 , 0.25 , 0.20 , 0.24 ) · 0.58 0.34 0.06 0.03 0.28 0.60 0.11 0.01 0.27 0.24 0.46 0.02 0.28 0.31 0.41 0 = ( 0.37 , 0.38 , 0.24 , 0.02 )
As shown in Table 8, S 1 2 , S 2 2 , S 3 2 , and S 4 2 denote the scores of the fuzzy integrated evaluation in terms of functionality, ease of use, system performance, and safety, respectively; S 1denotes the score of the fuzzy integrated evaluation of the evaluation indexes of the AI painting tool based on the generative adversarial network.The calculated results are as follows.
S 1 2 = j = 1 4 b j v j = 0.58 × 100 + 0.34 × 80 + 0.06 × 60 + 0.03 × 50 = 89.53
S 2 2 = j = 1 4 b j v j = 0.28 × 100 + 0.60 × 80 + 0.11 × 60 + 0.01 × 50 = 83.10
S 3 2 = j = 1 4 b j v j = 0.27 × 100 + 0.24 × 80 + 0.46 × 60 + 0.02 × 50 = 75.48
S 4 2 = j = 1 4 b j v j = 0.28 × 100 + 0.31 × 80 + 0.41 × 60 + 0 × 50 = 77.32
S 1 = j = 1 4 b j v j = 0.37 × 100 + 0.38 × 80 + 0.24 × 60 + 0.02 × 50 = 82.23

4.2. Integrated Discussion

4.2.1. Establishment and analysis of evaluation system

The evaluation system of AI painting software based on generative adversarial network constructed in this research is based on a large number of relevant literature at home and abroad, and combined with the actual situation in the field of AIGC to amend and transform, to formulate the initial index of the structure and indicators, after 3 experts and scholars in related fields to evaluate and provide modification opinions, and then 5 experts and scholars Delphi questionnaire correction adjustment index index, the questionnaire is completed. The questionnaire was then screened according to the plan, and principal component analysis and reliability analysis were conducted to screen out the indicators with higher explanatory power before forming the official indicators; the development process was very rigorous, so this indicator has good content validity; the Cronbach's alpha coefficients of the subscales and the full scale were all greater than 0.8, which is also a very good level of reliability.
The factor loadings of the principal components and the questionnaire items were all higher than 0.7, indicating a high degree of representativeness of the indicators. The evaluation indexes developed in this study show that excellent ai painting software should not only have rich functions, but also allow users to get a sense of coordination and aesthetics when operating, and the software should maintain stability and security during the process of users' use. Therefore, AI technology enterprises are required to meet the above indicators when developing related software.

4.2.2. Indicator importance ranking results and analysis

As can be seen from Table 6 and Table 7, the weights of the dimension layer are W1=(0.30,0.25,0.20,0.24), and the weights of the criterion layer are W 1 2 =(0.19,0.22,0.29,0.30), W 2 2 =(0.18,0.20,0.19,0.26,0.17), W 3 2 =(0.57,0.43), and W 4 2 =(0.40,0.60), respectively , all judgment matrices meet consistency. Table 8 shows that the total score of the evaluation index of AI painting tool based on generative adversarial network is 82.23, and the score corresponds to the evaluation level of "important", which indicates that the evaluation indexes constructed in this study have important reference value. Among the four first-level evaluation indexes, the score of functionality is 89.53, ranking first, and developers must prioritize the functionality indexes of the relevant software; the score of ease of use is 83.10, ranking second, which indicates that a good operating experience will have an important impact on customer selection, and it is important to pay attention to the ease of use indexes; the scores of security and system performance are 77.32 and 75.48, ranking third and fourth, which indicates the importance of these two indexes. The scores of security and system performance are 77.32 and 75.48 respectively, ranking third and fourth, which indicates that the importance of these two is far less than that of functionality and ease of use indicators. However, enterprises should fully consider system performance and security indicators when developing related software to further optimize the user experience.

5. CONCLUSIONS

Generative adversarial network is one of the important technologies in the field of artificial intelligence at present, it generates realistic data through adversarial training generator and discriminator, and has achieved great success in the fields of image generation, image restoration, image super resolution and so on. The development of ai painting software based on generative adversarial networks is of great significance, which can not only help individuals and enterprises to maintain competitiveness in related fields and improve the efficiency of creation and the quality of works, but also help the country to realize the bending of the road in the art, design and other related fields, and to promote the development of the creative industry and the enhancement of the country's soft power. The development of these tools will provide artists, designers and creators with a broader creative space, promote the integration of art and technology, and promote innovation and cultural heritage and development. This study aims to construct an evaluation system for ai painting software based on generative adversarial network, which provides more reference standards for AI technology companies that are developing related software.
Based on the results of literature exploration, in-depth interviews, questionnaire analysis of indicator construction by secondary Delphi method, exploratory factor analysis, fuzzy hierarchical analysis and fuzzy comprehensive evaluation, the evaluation system of ai painting software based on generative adversarial network includes 4 dimensions, 13 subscales and 47 indicators. 4 dimensions are: functionality, ease of use, system performance, safety; 13 subscales are: image repair function, image editing function, image editing function, image editing function, image repair function, image editing function, image editing function, image editing function and image editing function. The 13 subscales are: image restoration function, image editing function, style conversion and migration function, multi-layer image restoration, visual harmony, service quality, interaction, media applicability, pattern recognition, service stability, system response time, access security, privacy security.Based on the evaluation system of ai painting software based on generative adversarial network constructed in this research, it is found that the functionality indicators are more important than the indicators of ease of use, security, and system performance. This is because the primary criterion for users to choose software is whether its functions can solve their problems or achieve their goals. If the software lacks the necessary functionality, no matter how user-friendly the interface design is, how superior the performance is, or how high the security is, it will not be able to compensate for this fundamental flaw.
The evaluation system established in this study has unique implications in the field of ai painting. Focusing the ai drawing software on functionality, ease of use, system performance and security can make the software more competitive in the market. Rich and practical functions, intuitive and simple interface, smooth and efficient operation and safe and reliable protection will attract more users and enhance user satisfaction and loyalty, thus enhancing the market competitiveness of the software.
On the other hand, enterprises will put more R&D resources on the functionality of the software can further enhance the creativity and expressiveness of artists. Powerful functionality can provide more and richer creative tools and features to help artists better express their creativity and ideas, promote the development of artistic creation, and bring more diverse and rich works.

References

  1. Heidrich, D.; Schreiber, A. Visualizing source code as comics using generative AI. In Proceedings of the 2023 IEEE Working Conference on Software Visualization, Melbourne, Australia, 3-4 October 2023. [Google Scholar] [CrossRef]
  2. Phillips, C.; Jiao, J.; Clubb, E. Testing the capability of AI art tools for urban design. In Proceedings of the IEEE Computer Graphics and Applications Conference, Singapore, 17-19 March 2024. [Google Scholar] [CrossRef]
  3. Chen, F.; Zhu, F.; Wu, Q.; Zheng, J.; Zhang, X. A review of generative adversarial networks and their applications in image generation. Journal of Computer Science 2021, 44, 347–369. [Google Scholar]
  4. Qiu, R.; Cao, Y.; Law, S.O.; University, N. On Copyright Protection of AI Creation. Journal of Nanchang University (Humanities and Social Sciences) 2019, 2, 35–43. [Google Scholar]
  5. Yin, H.; Zhang, Z.; Liu, Y. The exploration of integrating the midjourney artificial intelligence generated content tool into design systems to direct designers towards future-oriented innovation. Systems 2023, 11, 566. [Google Scholar] [CrossRef]
  6. Hanafy, N.O. Artificial intelligence's effects on design process creativity: A study on used AI Text-to-Image in architecture. Journal of Building Engineering 2023, 80, 107999. [Google Scholar] [CrossRef]
  7. Zhang, B.; Zhou, Y.; Zhang, M.; Chen, H.; Li, J. Review of research on improvement and application of generative adversarial networks. Application Research of Computers 2023, 40, 649–658. [Google Scholar]
  8. Rumelhart, D.E.; Hinton, G.E.; Williams, R.J. Learning representations by back-propagating errors. Nature 1986, 323, 533–536. [Google Scholar] [CrossRef]
  9. Kingma, D.P. Auto-encoding variational bayes. arXiv Preprint 2013, arXiv:1312.6114. [Google Scholar] [CrossRef]
  10. Vincent, P.; Larochelle, H.; Lajoie, I.; Bengio, Y.; Manzagol, P.-A.; Bottou, L. Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion. Journal of Machine Learning Research 2010, 11, 3371–3408. [Google Scholar]
  11. Van Den Oord, A.; Vinyals, O. Neural discrete representation learning. Advances in Neural Information Processing Systems 2017, 30. [Google Scholar] [CrossRef]
  12. Radford, A.; Kim, J.W.; Hallacy, C.; Ramesh, A.; Goh, G.; Agarwal, S.; Sastry, G.; et al. Learning transferable visual models from natural language supervision. In Proceedings of the International Conference on Machine Learning, Vienna, Austria, 18-24 July 2021. [Google Scholar] [CrossRef]
  13. Ramesh, A.; Pavlov, M.; Goh, G.; Gray, S.; Voss, C.; Radford, A.; Chen, M.; Sutskever, I. Zero-shot text-to-image generation. In Proceedings of the International Conference on Machine Learning, Vienna, Austria, 18-24 July 2021. [Google Scholar] [CrossRef]
  14. O'Meara, J.; Murphy, C. Aberrant AI creations: co-creating surrealist body horror using the DALL-E Mini text-to-image generator. Convergence 2023, 29, 1070–1096. [Google Scholar] [CrossRef]
  15. García-Ull, F.J.; Melero-Lázaro, M. Gender stereotypes in AI-generated images. Profesional de la Información 2023, 32, 5. [Google Scholar] [CrossRef]
  16. Liu, V.; Chilton, L.B. Design guidelines for prompt engineering text-to-image generative models. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April-5 May 2022. [Google Scholar] [CrossRef]
  17. Sukkar, A.W.; Fareed, M.W.; Yahia, M.W.; Abdalla, S.B.; Ibrahim, I.; Senjab, K.A.K. Analytical evaluation of Midjourney architectural virtual lab: defining major current limits in AI-generated representations of Islamic architectural heritage. Buildings 2024, 14, 786. [Google Scholar] [CrossRef]
  18. Zhang, Y.; Liu, C. Unlocking the potential of artificial intelligence in fashion design and e-commerce applications: the case of Midjourney. Journal of Theoretical and Applied Electronic Commerce Research 2024, 19, 654–670. [Google Scholar] [CrossRef]
  19. Zhang, Z.; Wang, T.; Guo, X.; Liu, Z.; Chen, Y. Survey of AI painting. Journal of Frontiers of Computer Science and Technology 2024, 1–22. http://kns.cnki.net/kcms/detail/11.5602.TP.20240328.1901.006.html.
  20. Zhang, Y. A survey on generative adversarial networks. Electronic Design Engineering 2018, 26, 34–37. [Google Scholar] [CrossRef]
  21. Odena, A.; Olah, C.; Shlens, J. Conditional image synthesis with auxiliary classifier GANs. In Proceedings of the International Conference on Machine Learning, Sydney, Australia, 6-11 August 2017. [Google Scholar] [CrossRef]
  22. Cheng, X.; Xie, L.; Zhu, J.; Chen, X. Review of Generative Adversarial Network. Computer Science 2019, 3, 74–81. [Google Scholar] [CrossRef]
  23. Tao, F. Artificial intelligence visual arts research. Literary Debate 2019, 7, 73–81. [Google Scholar]
  24. Liu, S. On the impact of AI painting on the field of cultural creativity. Contemporary Animation 2023, 2, 91–95. [Google Scholar]
  25. Schetinger, V.; Di Bartolomeo, S.; El-Assady, M.; McNutt, A.; Miller, M.; Passos, J.P.A.; Adams, J.L. Doom or deliciousness: Challenges and opportunities for visualization in the age of generative models. Computer Graphics Forum 2023, 42, 423–435. [Google Scholar] [CrossRef]
  26. Liu, W.; Wang, Y.; Zhao, M.; Zhang, X.; Sun, X. Developing evaluative indicators for educational games. Open Education Research 2017, 2, 111–120. [Google Scholar] [CrossRef]
  27. Huang, B.; Yang, X.; Lu, M. Construction and application research of evaluation index system of platform education App. The Chinese Journal of ICT in Education 2019, 16, 75–81. [Google Scholar]
  28. Liu, Z.; Yu, Y.; Wang, Y.; Li, X.; He, Q. Design and application of enterprise IT service quality evaluation index system. Journal of Hubei University (Natural Science) 2013, 4, 527–532. [Google Scholar] [CrossRef]
  29. Liu, R.; Meng, X. Information system security evaluation method. Journal of Liaoning Technical University (Natural Science) 2013, 11, 1517–1522. [Google Scholar] [CrossRef]
  30. Zhao, Y.; Liu, Z.; Liu, W.; Sun, X.; Wang, X. Building the evaluation index for creative open data competitions: A case study on the project of digital humanities. Journal of Library Science in China 2020, 2, 75–95. [Google Scholar] [CrossRef]
  31. Xu, Z. Algorithm for priority of fuzzy complementary judgment matrix. Journal of Systems Engineering 2001, 4, 311–314. [Google Scholar] [CrossRef]
Figure 1. Architecture of the evaluation system of AI painting software based on generative adversarial network.
Figure 1. Architecture of the evaluation system of AI painting software based on generative adversarial network.
Preprints 118240 g001
Figure 2. Indicator establishment flow chart.
Figure 2. Indicator establishment flow chart.
Preprints 118240 g002
Figure 3. Structure of factor analysis.
Figure 3. Structure of factor analysis.
Preprints 118240 g003aPreprints 118240 g003b
Figure 4. Structure of factor analysis.
Figure 4. Structure of factor analysis.
Preprints 118240 g004
Table 1. Quantitative table ofjudgment basis and familiarity.
Table 1. Quantitative table ofjudgment basis and familiarity.
Basis of
judgment (Ca)
Quantified
value
Familiarity
(Cs)
Quantified
value
Practical
experience
0.8 Very familiar 1
Theoretical
analysis
0.6 Familiarize 0.8
Peer
understanding
0.4 General 0.4
Intuition 0.2 Less familiar 0.2
Table 2. Scale valuer.
Table 2. Scale valuer.
Scale valuer Description of relative importance
0.5 a i is as important as a j
0.6 a i is slightly more important than a j
0.7 a i is significantly more important than a j
0.8 a i is strongly more important than a j
0.9 a i is extremely important than a j
0.1~0.4 The inverse of the above comparison
Table 3. Reliability analysis of the second questionnaire.
Table 3. Reliability analysis of the second questionnaire.
No Subscale of factors No. of items Cronbach’s α Cronbach’s α of Subscale
1 Image repair function 5 0.927 0.912
2 Image editing function 4 0.866
3 Style conversion and
transfer function
4 0.915
4 Multi-layer image repair 3 0.802
5 Visual harmony 4 0.926 0.923
6 Service quality 3 0.931
7 Interaction 3 0.811
8 Media suitability 3 0.854
9 Pattern recognition 3 0.881
10 Service stability 5 0.922 0.931
11 System response time 2 0.947
12 Access security 7 0.932 0.929
13 Privacy security 1 0.911
14 Coefficient of Cronbach's alpha
for the whole scales
47 0.952
Table 4. Reliability analysis of the second questionnaire.
Table 4. Reliability analysis of the second questionnaire.
Primary index Secondary index Three-level index I.D.
Functionality Image repair function 1-2-4 lmage Completion: Complete the missing parts of the image to make the image complete. a124
1-2-6 Smart Contrast repair: Automatically adjust the contrast ofimages to improve image clarity。 a126
1-2-7 Color Repair: Repair damaged colors in images and restore true colors. a127
1-2-10 Automatic lmage Enhancement: The model automatically enhances all aspects of the image. a1210
1-2-11 Intelligent Local repair: Intelligent repair for image local defects. a1211
Image editing function 1-5-2 Transparency Adiustment: Adiust the transparency ofthe elements in the image to achieve a cascading effect. a152
1-5-4 Contrast and brightness adjustment: Adjust the contrast and brightness of images to optimize visual effects. a154
1-5-5 lmage Cutting and pasting: Precise cutting of images and pasting them into other images. a155
1-5-6 Color Balance Adjustment: Balance the colors in the image,adjusting hue, saturation, and brightness. a156
Style conversion and transfer function 1-1-3 Convert to oil painting Effect: Convert the image to an artistic effect that mimics oil painting to enhance the artistic sense of the image. a113
1-1-4 Sketch Conversion: Transform images into a sketch style that highlights lines and outlines. a114
1-1-6 Specific artist style: lmitate the creative style of specific artists,such as Van Gogh, Picasso. a116
1-1-7 Era style conversion: Transform images into styles of different historical eras,such as retro, futuristic. a117
Multi-layer image repair 1-2-12 Multi-model repair comparison: Use multiple models for image repair and compare. a1212
1-2-14 Image repair mode selection: Provide different repair modes for users to choose to meet different needs. a1214
1-5-8 Multi-Layer editing: Allows you to create and edit multiple layers on an image for more complex designs. a158
Ease of use Visual harmony 2-1-1 color coordination: To ensure that the entire interface color coordination, to avoid the color is too harsh or do not match the combination. a211
2-1-2 Color and theme matching: The color of the interface should match the theme and positioning of the image generation model. a212
2-1-3 Font: Select a suitable font so that users can easily read and understand the text information on the interface. a213
2-1-10 Consistent distribution of modules: Ensure the consistent distribution of modules in the interface of the image generation model, so that users can easily find similar layouts under different pages or functions. a2110
Service quality 2-4-2 Service Usefulness: The interface provides high service quality and helps to solve current problems. a242
2-4-4 Service integration: The services provided by the interface and the interface are integrated together. a244
2-4-5 Service intelligence: The interface can help users solve questions with intelligent question answering robots. a245
Interaction 2-2-2 Component arrangement: The components in the picture are placed reasonably, in line with learners' habits, and easy to operate. a222
2-2-4 Interaction in a timely manner: Ensures that the user's interaction with the model can be responded within a reasonable time, avoiding the user's feeling of delay or waiting. a224
2-2-6 Interactive personalization: Provide personalized interactive experience according to the user's preferences and usage habits. a226
Media suitability 2-3-3 Sound: Clear sound and good sound quality. a233
2-3-4 Video animation: The video animation is clear and smooth. a234
2-3-5 Synchronization of text, pictures, sound and video animation: it means that the music, text and the content of the picture are displayed in the same rhythm. a235
Pattern recognition 2-1-5 Humanistic elements: Integrate humanistic elements into the interface, such as ICONS, illustrations, etc., to enhance users' emotional resonance and sense of participation. a215
2-1-6 Pattern and theme matching: Ensure that the pattern in the interface matches the theme of the image generation model. a216
2-1-7 Pattern aesthetics: The design of the pattern should meet aesthetic standards. a217
System performance Service stability 3-2-1 No flash or crash: The image generation model does not flash or crash during operation. a321
3-2-2 Links are valid: The links provided by the image generation model are valid and users can access and use the related resources smoothly. a322
3-2-3 Stable provision of resources: resources (such as data, model files, etc.) required for image generation models can be provided to users stably and reliably. a323
3-2-4 Complete service: Analyze user needs, design and develop complete functional modules, constantly optimize and improve service content, and provide comprehensive solutions. a324
3-2-6 Effective service: Continuously improve the algorithm and model, optimize the service process and user experience, and improve the accuracy and quality of the generated effect to ensure the effectiveness of the service. a326
System response time 3-3-2 Stable response time: Ensure that the response time of the image generation model remains stable under different loads and situations to avoid the decline of user experience due to load fluctuations. a332
3-3-3 Timely response rate: Measures the system's ability to respond immediately to user requests, ensuring that users can quickly receive processing and feedback after submitting requests. a333
Security Access security 4-1-1 Authentication: Verify the user's identity through a valid authentication method. a411
4-1-2 Access Control: Manage and control user access to image generation models, ensuring that only authorized users can perform certain actions. a412
4-1-3 Information Encryption: Encrypts sensitive information during transmission and storage to protect user data security. a413
4-1-4 Anti-repudiation: Prevent users from denying their operations in the system, and ensure that users' operations are traceable and immutable. a414
4-1-6 Data Privacy Settings: Provides users with Settings to control the level of privacy of their data. a416
4-1-7 Anti-Cheating measures: Prevent users or systems from being affected by fraud or misconduct. a417
4-1-8 Identity ambiguity: Provides ambiguity to protect the identity of a user or object. a418
Privacy security 4-2-3 Application Software Security: Protect the application software used by the image generation model from malicious attacks, exploits, and unauthorized access. a423
Table 5. Results of factor analysis.
Table 5. Results of factor analysis.
Dimension Factor naming Item number Sum of problems Factor load Communality Eigenvalue Explanatory variance Cumulative explanatory variance
Functionality Image repair function a1211 5 0.879 0.858 7.709 28.017% 87.405%
a1210 0.875 0.930
a124 0.822 0.907
a127 0.820 0.919
a126 0.816 0.802
Image editing function a152 4 0.899 0.838 4.706 23.254%
a156 0.878 0.841
a155 0.845 0.848
a154 0.779 0.771
Style conversion and transfer function a117 4 0.950 0.963 3.147 20.705%
a116 0.856 0.868
a114 0.848 0.849
a113 0.814 0.843
Multilayer image repair a1214 3 0.969 0.979 2.163 15.430%
a1212 0.858 0.931
a158 0.781 0.789
Ease of use Visual harmony a213 4 0.882 0.846 5.006 20.784% 84.897%
a2110 0.873 0.875
a212 0.868 0.825
a211 0.784 0.836
Service quality a242 3 0.928 0.985 4.248 18.333%
a245 0.905 0.881
a244 0.743 0.703
Interaction a224 3 0.940 0.946 2.310 15.968%
a226 0.816 0.933
a222 0.815 0.954
Media suitability a234 3 0.919 0.928 1.915 15.058%
a233 0.913 0.905
a235 0.825 0.826
Pattern recognition a216 3 0.811 0.777 1.803 14.755%
a215 0.725 0.667
a217 0.712 0.844
System performance Servicestability a326 4 0.957 0.918 3.573 42.007% 73.013%
a324 0.83 0.774
a333 0.806 0.720
a321 0.743 0.584
System response time a322 3 0.84 0.705 1.538 31.006%
a332 0.839 0.782
a323 0.756 0.628
Security Access security a412 4 0.878 0.772 3.186 36.564% 72.606%
a413 0.848 0.740
a411 0.844 0.790
a414 0.795 0.633
Privacy security a417 4 0.932 0.873 2.623 36.043%
a418 0.904 0.857
a416 0.772 0.637
a423 0.708 0.507
Table 6. Evaluation matrix and weights of first-level evaluation indicators.
Table 6. Evaluation matrix and weights of first-level evaluation indicators.
Scale valuer Functi
-onality
Ease of use System performance Security ω i 1
Functionality 0.50 0.65 0.80 0.69 0.30
Ease of use 0.35 0.50 0.65 0.54 0.25
System performance 0.20 0.35 0.50 0.39 0.20
Security 0.31 0.46 0.61 0.50 0.24
Table 7. Evaluation matrix and weight of secondary evaluation.
Table 7. Evaluation matrix and weight of secondary evaluation.
Functionality Scale valuer Multilayer
image repair
Style transfer andtransfer
function
Image editing
function
Image repair function ω 1 j 2
Multi-layer
image repair
0.5 0.42 0.22 0.2 0.19
Style transfer andtransfer
function
0.58 0.5 0.3 0.28 0.22
Image editing
function
0.78 0.7 0.5 0.48 0.29
Image repair
function
0.8 0.72 0.52 0.5 0.3
Ease of
use
Scale valuer Media
suitability
Service
quality
Interaction Visual
harmony
Pattern
recognition
ω 2 j 2
Media
suitability
0.5 0.43 0.45 0.17 0.53 0.18
Service
quality
0.57 0.5 0.52 0.24 0.6 0.2
Interaction 0.55 0.48 0.5 0.22 0.58 0.19
Visual
harmony
0.83 0.76 0.78 0.5 0.86 0.26
Pattern
recognition
0.47 0.4 0.42 0.14 0.5 0.17
System
performance
Scale
valuer
Service stability System response time ω 3 j 2
Service
stability
0.5 0.65 0.57
System response time 0.35 0.5 0.43
Security Scale
valuer
Privacy
security
Access security ω 4 j 2
Privacy
security
0.5 0.29 0.4
Access security 0.71 0.5 0.6
Table 8. Integrated evaluation and scoring values for indicators.
Table 8. Integrated evaluation and scoring values for indicators.
Destination layer Synthesis score Primary index Score of each indicator
The assessment system of AI painting software based on generative adversarial network technology; S 1 82.23 Functionality; S 1 2 89.53
Ease of use; S 2 2 83.1
System performance; S 3 2 75.48
Security; S 4 2 77.32
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

© 2024 MDPI (Basel, Switzerland) unless otherwise stated