Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1861 - 1890 of 6720

Full-Text Articles in Physical Sciences and Mathematics

Ezlog: Data Visualization For Logistics, Aldy Gunawan, Benjamin Gan, Jin An Tan, Sheena L.S.L Villanueva, Timothy K.J. Wen Aug 2019

Ezlog: Data Visualization For Logistics, Aldy Gunawan, Benjamin Gan, Jin An Tan, Sheena L.S.L Villanueva, Timothy K.J. Wen

Research Collection School Of Computing and Information Systems

With the increasing availability of data in the logistics industry due to the digitalization trend, interest and opportunities for leveraging analytics in supply chain management to make data-driven decisions is growing rapidly. In this paper, we introduce EzLog, an integrated visualization prototype platform for supply chain analytics. This web-based platform built by two undergraduate student teams for their capstone course can be used for data wrangling and rapid analysis of data from different business units of a major logistics company. Other functionalities of the system include standard processes to perform data analysis such as supervised extraction, transformation, loading (ETL), data …


Trust Architecture And Reputation Evaluation For Internet Of Things, Juan Chen, Zhihong Tian, Xiang Cui, Lihua Yin, Xianzhi Wang Aug 2019

Trust Architecture And Reputation Evaluation For Internet Of Things, Juan Chen, Zhihong Tian, Xiang Cui, Lihua Yin, Xianzhi Wang

Research Collection School Of Computing and Information Systems

Internet of Things (IoT) represents a fundamental infrastructure and set of techniques that support innovative services in various application domains. Trust management plays an important role in enabling the reliable data collection and mining, context-awareness, and enhanced user security in the IoT. The main tasks of trust management include trust architecture design and reputation evaluation. However, existing trust architectures and reputation evaluation solutions cannot be directly applied to the IoT, due to the large number of physical entities, the limited computation ability of physical entities, and the highly dynamic nature of the network. In comparison, it generally requires a general …


Gradient Boosting With Piece-Wise Linear Regression Trees, Yu Shi, Jian Li, Zhize Li Aug 2019

Gradient Boosting With Piece-Wise Linear Regression Trees, Yu Shi, Jian Li, Zhize Li

Research Collection School Of Computing and Information Systems

Gradient Boosted Decision Trees (GBDT) is a very successful ensemble learning algorithm widely used across a variety of applications. Recently, several variants of GBDT training algorithms and implementations have been designed and heavily optimized in some very popular open sourced toolkits including XGBoost, LightGBM and CatBoost. In this paper, we show that both the accuracy and efficiency of GBDT can be further enhanced by using more complex base learners. Specifically, we extend gradient boosting to use piecewise linear regression trees (PL Trees), instead of piecewise constant regression trees, as base learners. We show that PL Trees can accelerate convergence of …


Learning Multiple Maps From Conditional Ordinal Triplets, Duy Dung Le, Hady Wirawan Lauw Aug 2019

Learning Multiple Maps From Conditional Ordinal Triplets, Duy Dung Le, Hady Wirawan Lauw

Research Collection School Of Computing and Information Systems

Ordinal embedding seeks a low-dimensional representation of objects based on relative comparisons of their similarities. This low-dimensional representation lends itself to visualization on a Euclidean map. Classical assumptions admit only one valid aspect of similarity. However, there are increasing scenarios involving ordinal comparisons that inherently reflect multiple aspects of similarity, which would be better represented by multiple maps. We formulate this problem as conditional ordinal embedding, which learns a distinct low-dimensional representation conditioned on each aspect, yet allows collaboration across aspects via a shared representation. Our geometric approach is novel in its use of a shared spherical representation and multiple …


Correlation-Sensitive Next-Basket Recommendation, Duc Trong Le, Hady Wirawan Lauw, Yuan Fang Aug 2019

Correlation-Sensitive Next-Basket Recommendation, Duc Trong Le, Hady Wirawan Lauw, Yuan Fang

Research Collection School Of Computing and Information Systems

Items adopted by a user over time are indicative ofthe underlying preferences. We are concerned withlearning such preferences from observed sequencesof adoptions for recommendation. As multipleitems are commonly adopted concurrently, e.g., abasket of grocery items or a sitting of media consumption, we deal with a sequence of baskets asinput, and seek to recommend the next basket. Intuitively, a basket tends to contain groups of relateditems that support particular needs. Instead of recommending items independently for the next basket, we hypothesize that incorporating informationon pairwise correlations among items would help toarrive at more coherent basket recommendations.Towards this objective, we develop a …


Adapting Bert For Target-Oriented Multimodal Sentiment Classification, Jianfei Yu, Jing Jiang Aug 2019

Adapting Bert For Target-Oriented Multimodal Sentiment Classification, Jianfei Yu, Jing Jiang

Research Collection School Of Computing and Information Systems

As an important task in Sentiment Analysis, Target-oriented Sentiment Classification (TSC) aims to identify sentiment polarities over each opinion target in a sentence. However, existing approaches to this task primarily rely on the textual content, but ignoring the other increasingly popular multimodal data sources (e.g., images), which can enhance the robustness of these text-based models. Motivated by this observation and inspired by the recently proposed BERT architecture, we study Target-oriented Multimodal Sentiment Classification (TMSC) and propose a multimodal BERT architecture. To model intra-modality dynamics, we first apply BERT to obtain target-sensitive textual representations. We then borrow the idea from self-attention …


Multimodal Transformer Networks For End-To-End Video-Grounded Dialogue Systems, Hung Le, Doyen Sahoo, Nancy F. Chen, Steven C. H. Hoi Aug 2019

Multimodal Transformer Networks For End-To-End Video-Grounded Dialogue Systems, Hung Le, Doyen Sahoo, Nancy F. Chen, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

Developing Video-Grounded Dialogue Systems (VGDS), where a dialogue is conducted based on visual and audio aspects of a given video, is significantly more challenging than traditional image or text-grounded dialogue systems because (1) feature space of videos span across multiple picture frames, making it difficult to obtain semantic information; and (2) a dialogue agent must perceive and process information from different modalities (audio, video, caption, etc.) to obtain a comprehensive understanding. Most existing work is based on RNNs and sequence-to-sequence architectures, which are not very effective for capturing complex long-term dependencies (like in videos). To overcome this, we propose Multimodal …


Kgat: Knowledge Graph Attention Network For Recommendation, Xiang Wang, Xiangnan He, Yixin Cao, Meng Liu, Tat-Seng Chua Aug 2019

Kgat: Knowledge Graph Attention Network For Recommendation, Xiang Wang, Xiangnan He, Yixin Cao, Meng Liu, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

To provide more accurate, diverse, and explainable recommendation, it is compulsory to go beyond modeling user-item interactions and take side information into account. Traditional methods like factorization machine (FM) cast it as a supervised learning problem, which assumes each interaction as an independent instance with side information encoded. Due to the overlook of the relations among instances or items (e.g., the director of a movie is also an actor of another movie), these methods are insufficient to distill the collaborative signal from the collective behaviors of users. In this work, we investigate the utility of knowledge graph (KG), which breaks …


Improving Urban Crowd Flow Prediction On Flexible Region Partition, Xu Wang, Zimu Zhou, Yi Zhao, Xinglin Zhang, Kai Xing, Fu Xiao, Zheng Yang, Yunhao Liu Aug 2019

Improving Urban Crowd Flow Prediction On Flexible Region Partition, Xu Wang, Zimu Zhou, Yi Zhao, Xinglin Zhang, Kai Xing, Fu Xiao, Zheng Yang, Yunhao Liu

Research Collection School Of Computing and Information Systems

Accurate forecast of citywide crowd flows on flexible region partition benefits urban planning, traffic management, and public safety. Previous research either fails to capture the complex spatiotemporal dependencies of crowd flows or is restricted on grid region partition that loses semantic context. In this paper, we propose DeepFlowFlex, a graph-based model to jointly predict inflows and outflows for each region of arbitrary shape and size in a city. Analysis on cellular datasets covering 2.4 million users in China reveals dependencies and distinctive patterns of crowd flows in not only the conventional space and time domains, but also the speed domain, …


Creating Top Ranking Options In The Continuous Option And Preference Space, Bo Tang, Kyriakos Mouratidis, Man Lung Yiu, Zhenyu Chen Aug 2019

Creating Top Ranking Options In The Continuous Option And Preference Space, Bo Tang, Kyriakos Mouratidis, Man Lung Yiu, Zhenyu Chen

Research Collection School Of Computing and Information Systems

Top-k queries are extensively used to retrieve the k most relevantoptions (e.g., products, services, accommodation alternatives, etc)based on a weighted scoring function that captures user preferences. In this paper, we take the viewpoint of a business owner whoplans to introduce a new option to the market, with a certain type ofclientele in mind. Given a target region in the consumer spectrum,we determine what attribute values the new option should have,so that it ranks among the top-k for any user in that region. Ourmethodology can also be used to improve an existing option, at theminimum modification cost, so that it ranks …


Inspect: Iterated Local Search For Solving Path Conditions, Fuxiang Chen, Aldy Gunawan, David Lo, Sunghun Kim Aug 2019

Inspect: Iterated Local Search For Solving Path Conditions, Fuxiang Chen, Aldy Gunawan, David Lo, Sunghun Kim

Research Collection School Of Computing and Information Systems

Automated test case generation is attractive as it can reduce developer workload. To generate test cases, many Symbolic Execution approaches first produce Path Conditions (PCs), a set of constraints, and pass them to a Satisfiability Modulo Theories (SMT) solver. Despite numerous prior studies, automated test case generation by Symbolic Execution is still slow, partly due to SMT solvers’ high computationally complexity. We introduce InSPeCT, a Path Condition solver, that leverages elements of ILS (Iterated Local Search) and Tabu List. ILS is not computational intensive and focuses on generating solutions in search spaces while Tabu List prevents the use of previously …


Evaluating Vulnerability To Fake News In Social Networks: A Community Health Assessment Model, Bhavtosh Rath, Wei Gao, Jaideep Srivastava Aug 2019

Evaluating Vulnerability To Fake News In Social Networks: A Community Health Assessment Model, Bhavtosh Rath, Wei Gao, Jaideep Srivastava

Research Collection School Of Computing and Information Systems

Understanding the spread of false information in social networks has gained a lot of recent attention. In this paper, we explore the role community structures play in determining how people get exposed to fake news. Inspired by approaches in epidemiology, we propose a novel Community Health Assessment model, whose goal is to understand the vulnerability of communities to fake news spread. We define the concepts of neighbor, boundary and core nodes of a community and propose appropriate metrics to quantify the vulnerability of nodes (individual-level) and communities (group-level) to spreading fake news. We evaluate our model on communities identified using …


Cold-Start Aware Deep Memory Networks For Multi-Entity Aspect-Based Sentiment Analysis, Kaisong Song, Wei Gao, Lujun Zhao, Changlong Sun, Xiaozhong Liu Aug 2019

Cold-Start Aware Deep Memory Networks For Multi-Entity Aspect-Based Sentiment Analysis, Kaisong Song, Wei Gao, Lujun Zhao, Changlong Sun, Xiaozhong Liu

Research Collection School Of Computing and Information Systems

Various types of target information have been considered in aspect-based sentiment analysis, such as entities and aspects. Existing research has realized the importance of targets and developed methods with the goal of precisely modeling their contexts via generating target-specific representations. However, all these methods ignore that these representations cannot be learned well due to the lack of sufficient human-annotated target-related reviews, which leads to the data sparsity challenge, a.k.a. cold-start problem here. In this paper, we focus on a more general multiple entity aspect-based sentiment analysis (ME-ABSA) task which aims at identifying the sentiment polarity of different aspects of multiple …


Designing The Arriving Refugee Informatics Surveillance And Epidemiology (Arive) System: A Web-Based Electronic Database For Epidemiological Surveillance, William A. Mattingly, Ruth M. Carrico, Timothy L. Wiemken, Robert R. Kelley, Rebecca A. Ford, Rahel Bosson, Kimberley A. Buckner, Julio A. Ramirez Jul 2019

Designing The Arriving Refugee Informatics Surveillance And Epidemiology (Arive) System: A Web-Based Electronic Database For Epidemiological Surveillance, William A. Mattingly, Ruth M. Carrico, Timothy L. Wiemken, Robert R. Kelley, Rebecca A. Ford, Rahel Bosson, Kimberley A. Buckner, Julio A. Ramirez

Journal of Refugee & Global Health

Objectives: We design and implement the Arriving Refugee Informatics surVeillance and Epidemiology (ARIVE) system to improve the health of refugees undergoing resettlement and enhance existing health surveillance networks.

Materials and Methods: Using the REDCap electronic data capture software as a basis we create a refugee health database incorporating data from the Center for Disease Control and Prevention’s Electronic Disease Notification (EDN) system and domestic screening data from refugee health care providers.

Results: Domestic screening and EDN refugee health data have been integrated for 13,824 refugees resettled from 35 different countries into the state of Kentucky from the years 2013-2016.

Discussion: …


The Rise Of Citizen Science In Health And Biomedical Research, Andrea Wiggins, John Wilbanks Jul 2019

The Rise Of Citizen Science In Health And Biomedical Research, Andrea Wiggins, John Wilbanks

Information Systems and Quantitative Analysis Faculty Publications

Citizen science models of public participation in scientific research represent a growing area of opportunity for health and biomedical research, as well as new impetus for more collaborative forms of engagement in large-scale research. However, this also surfaces a variety of ethical issues that both fall outside of and build upon the standard human subjects concerns in bioethics. This article provides background on citizen science, examples of current projects in the field, and discussion of established and emerging ethical issues for citizen science in health and biomedical research.


Mathematical And Computer Simulation Of The Processes Of Two-Phase Joint Gas Filtration And Water In A Porous Environment, Elmira Nazirova Jul 2019

Mathematical And Computer Simulation Of The Processes Of Two-Phase Joint Gas Filtration And Water In A Porous Environment, Elmira Nazirova

Bulletin of TUIT: Management and Communication Technologies

A mathematical model, methods and algorithms for the numerical solution of problems of joint gas-water filtration in porous media are considered. The mathematical model of the process of non-stationary joint gas-water filtration in a porous medium is described by a system of nonlinear differential equations of parabolic type. In the numerical solution of the boundary value problem of gas displacement by water in a porous medium, the differential sweeping method is used for systems of differential-difference equations. The system of differential-difference equations with respect to the gas pressure function is nonlinear, therefore, an iterative method is used for it, based …


Iamhappy: Towards An Iot Knowledge-Based Cross-Domain Well-Being Recommendation System For Everyday Happiness, Amelia Gyrard, Amit Sheth Jul 2019

Iamhappy: Towards An Iot Knowledge-Based Cross-Domain Well-Being Recommendation System For Everyday Happiness, Amelia Gyrard, Amit Sheth

Kno.e.sis Publications

Nowadays, healthy lifestyle, fitness, and diet habits have become central applications in our daily life. Positive psychology such as well-being and happiness is the ultimate dream of everyday people’s feelings (even without being aware of it). Wearable devices are being increasingly employed to support well-being and fitness. Those devices produce physiological signals that are analyzed by machines to understand emotions and physical state. The Internetof Things (IoT) technology connects (wearable) devices to the Internet to easily access and process data, even using Web technologies (aka Web of Things).

We design IAMHAPPY, an innovative IoT-based well-being recommendation system to encourage every …


An Architecture For Blockchain-Based Collaborative Signature-Based Intrusion Detection System, Daniel Laufenberg Jul 2019

An Architecture For Blockchain-Based Collaborative Signature-Based Intrusion Detection System, Daniel Laufenberg

Master of Science in Information Technology Theses

Collaborative intrusion detection system (CIDS), where IDS hosts work with each other and share resources, have been proposed to cope with the increasingly sophisticated cyberattacks. Despite the promising benefits such as expanded signature databases and alert data from multiple sites, trust management and consensus building remain as challenges for a CIDS to work effectively. The blockchain technology with built-in immutability and consensus building capability provides a viable solution to the issues of CIDS. In this paper, we introduce an architecture for a blockchain-enabled signature-based collaborative IDS, discuss the implementation strategy of the proposed architecture and developed a prototype using Hyperledger …


An Exploration Of Turkish Kindergarten Early Career Stage Teachers’ Technology Beliefs And Practices, Ozge Ozel Jul 2019

An Exploration Of Turkish Kindergarten Early Career Stage Teachers’ Technology Beliefs And Practices, Ozge Ozel

USF Tampa Graduate Theses and Dissertations

The purpose of this study was to explore Turkish kindergarten early career stage teachers’ self-efficacy beliefs towards technology and their technology integration practices in their classrooms by answering: What are self-efficacy beliefs of Turkish kindergarten early career stage teachers towards technology? How do Turkish kindergarten early career teachers integrate technology into their classrooms’ instructions? The study was designed as a qualitative multiple case study and guided by Bandura’s (1986) social cognitive theory and Mishra and Koehler’s (2006) TPACK conceptual framework. I conducted this study in Istanbul, where is the most crowded and metropolitan city in Turkey. The schools were chosen …


A Scalable Approach To Joint Cyber Insurance And Security-As-A-Service Provisioning In Cloud Computing, Jonathan David Chase, Dusit Niyato, Ping Wang, Sivadon Chaisiri, Ryan K. L. Ko Jul 2019

A Scalable Approach To Joint Cyber Insurance And Security-As-A-Service Provisioning In Cloud Computing, Jonathan David Chase, Dusit Niyato, Ping Wang, Sivadon Chaisiri, Ryan K. L. Ko

Research Collection School Of Computing and Information Systems

As computing services are increasingly cloud-based, corporations are investing in cloud-based security measures. The Security-as-a-Service (SECaaS) paradigm allows customers to outsource security to the cloud, through the payment of a subscription fee. However, no security system is bulletproof, and even one successful attack can result in the loss of data and revenue worth millions of dollars. To guard against this eventuality, customers may also purchase cyber insurance to receive recompense in the case of loss. To achieve cost effectiveness, it is necessary to balance provisioning of security and insurance, even when future costs and risks are uncertain. To this end, …


Model And Analysis Of Labor Supply For Ride-Sharing Platforms In The Presence Of Sample Self-Selection And Endogeneity, Hao Sun, Hai Wang, Zhixi Wan Jul 2019

Model And Analysis Of Labor Supply For Ride-Sharing Platforms In The Presence Of Sample Self-Selection And Endogeneity, Hao Sun, Hai Wang, Zhixi Wan

Research Collection School Of Computing and Information Systems

With the popularization of ride-sharing services, drivers working as freelancers on ride-sharing platforms can design their schedules flexibly. They make daily decisions regard- ing whether to participate in work, and if so, how many hours to work. Factors such as hourly income rate affect both the participation decision and working-hour decision, and evaluation of the impacts of hourly income rate on labor supply becomes important. In this paper, we propose an econometric framework with closed-form measures to estimate both the participation elasticity (i.e., extensive margin elasticity) and working-hour elasticity (i.e., intensive margin elasticity) of labor supply. We model the sample …


An Intelligent Platform With Automatic Assessment And Engagement Features For Active Online Discussions, Michelle L. F. Cheong, Yun-Chen Chen, Bing Tian Dai Jul 2019

An Intelligent Platform With Automatic Assessment And Engagement Features For Active Online Discussions, Michelle L. F. Cheong, Yun-Chen Chen, Bing Tian Dai

Research Collection School Of Computing and Information Systems

In a universitycontext, discussion forums are mostly available in Learning and ManagementSystems (LMS) but are often ineffective in encouraging participation due topoorly designed user interface and the lack of motivating factors toparticipate. Our integrated platform with the Telegram mobile app and aweb-based forum, is capable of automatic thoughtfulness assessment of questionsand answers posted, using text mining and Natural Language Processing (NLP)methodologies. We trained and applied the Random Forest algorithm to provideinstant thoughtfulness score prediction for the new posts contributed by thestudents, and prompted the students to improve on their posts, thereby invokingdeeper thinking resulting in better quality contributions. In addition, …


Social Media Text Mining Framework For Drug Abuse: An Opioid Crisis Case Analysis, Tareq Nasralah Jul 2019

Social Media Text Mining Framework For Drug Abuse: An Opioid Crisis Case Analysis, Tareq Nasralah

Masters Theses & Doctoral Dissertations

Social media is considered as a promising and viable source of data for gaining insights into various disease conditions, patients’ attitudes and behaviors, and medications. The daily use of social media provides new opportunities for analyzing several aspects of communication. Social media as a big data source can be used to recognize communication and behavioral themes of problematic use of prescription drugs. Mining and analyzing such media have challenges and limitations with respect to topic deduction and data quality. There is a need for a structured approach to efficiently and effectively analyze social media content related to drug abuse in …


Multi-Channel Graph Neural Network For Entity Alignment, Yixin Cao, Zhiyuan Liu, Chengjiang Li, Zhiyuan Liu, Juanzi Li, Tat-Seng Chua Jul 2019

Multi-Channel Graph Neural Network For Entity Alignment, Yixin Cao, Zhiyuan Liu, Chengjiang Li, Zhiyuan Liu, Juanzi Li, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

Entity alignment typically suffers from the issues of structural heterogeneity and limited seed alignments. In this paper, we propose a novel Multi-channel Graph Neural Network model (MuGNN) to learn alignment-oriented knowledge graph (KG) embeddings by robustly encoding two KGs via multiple channels. Each channel encodes KGs via different relation weighting schemes with respect to self-attention towards KG completion and cross-KG attention for pruning exclusive entities respectively, which are further combined via pooling techniques. Moreover, we also infer and transfer rule knowledge for completing two KGs consistently. MuGNN is expected to reconcile the structural differences of two KGs, and thus make …


Securing Messaging Services Through Efficient Signcryption With Designated Equality Test, Yujue Wang, Hwee Hwa Pang, Robert H. Deng, Yong Ding, Qianhong Wu, Bo Qin Jul 2019

Securing Messaging Services Through Efficient Signcryption With Designated Equality Test, Yujue Wang, Hwee Hwa Pang, Robert H. Deng, Yong Ding, Qianhong Wu, Bo Qin

Research Collection School Of Computing and Information Systems

To address security and privacy issues in messaging services, we present a public key signcryption scheme with designated equality test on ciphertexts (PKS-DET) in this paper. The scheme enables a sender to simultaneously encrypt and sign (signcrypt) messages, and to designate a tester to perform equality test on ciphertexts, i.e., to determine whether two ciphertexts signcrypt the same underlying plaintext message. We introduce the PKS-DET framework, present a concrete construction and formally prove its security against three types of adversaries, representing two security requirements on message confidentiality against outsiders and the designated tester, respectively, and a requirement on message unforgeability …


Redpc: A Residual Error-Based Density Peak Clustering Algorithm, Milan Parmar, Di Wang, Xiaofeng Zhang, Ah-Hwee Tan, Chunyan Miao, You Zhou Jul 2019

Redpc: A Residual Error-Based Density Peak Clustering Algorithm, Milan Parmar, Di Wang, Xiaofeng Zhang, Ah-Hwee Tan, Chunyan Miao, You Zhou

Research Collection School Of Computing and Information Systems

The density peak clustering (DPC) algorithm was designed to identify arbitrary-shaped clusters by finding density peaks in the underlying dataset. Due to its aptitudes of relatively low computational complexity and a small number of control parameters in use, DPC soon became widely adopted. However, because DPC takes the entire data space into consideration during the computation of local density, which is then used to generate a decision graph for the identification of cluster centroids, DPC may face difficulty in differentiating overlapping clusters and in dealing with low-density data points. In this paper, we propose a residual error-based density peak clustering …


Early Information Access To Alleviate Emergency Department Congestion, Anjee Gorkhali Jul 2019

Early Information Access To Alleviate Emergency Department Congestion, Anjee Gorkhali

Theses and Dissertations in Business Administration

Alleviating Emergency Department (ED) congestion results in shorter hospital stay which not only reduces the cost of medical procedure but also increase the hospital performance. Length of patient stay is used to determine the hospital performance. Organization Information Processing (OIPT) Theory is used to explain the impact of information access and availability on the information processing need and ability of a hospital. Technical devices such as RFID that works as “Auto Identification tags” is suggested to increase the information availability as well as the information processing capability of the hospitals. This study suggests that the OIPT needs to be further …


Data-Driven Database Education: A Quantitative Study Of Sql Learning In An Introductory Database Course, Andrew C. Von Dollen Jul 2019

Data-Driven Database Education: A Quantitative Study Of Sql Learning In An Introductory Database Course, Andrew C. Von Dollen

Master's Theses

The Structured Query Language (SQL) is widely used and challenging to master. Within the context of lab exercises in an introductory database course, this thesis analyzes the student learning process and seeks to answer the question: ``Which SQL concepts, or concept combinations, trouble students the most?'' We provide comprehensive taxonomies of SQL concepts and errors, identify common areas of student misunderstanding, and investigate the student problem-solving process. We present an interactive web application used by students to complete SQL lab exercises. In addition, we analyze data collected by this application and we offer suggestions for improvement to database lab activities.


Personalized Fashion Recommendation With Visual Explanations Based On Multimodal Attention Network: Towards Visually Explainable Recommendation, Xu Chen, Hanxiong Chen, Hongteng Xu, Yongfeng Zhang, Yixin Cao, Zheng Qin, Hongyuan Zha Jul 2019

Personalized Fashion Recommendation With Visual Explanations Based On Multimodal Attention Network: Towards Visually Explainable Recommendation, Xu Chen, Hanxiong Chen, Hongteng Xu, Yongfeng Zhang, Yixin Cao, Zheng Qin, Hongyuan Zha

Research Collection School Of Computing and Information Systems

Fashion recommendation has attracted increasing attention from both industry and academic communities. This paper proposes a novel neural architecture for fashion recommendation based on both image region-level features and user review information. Our basic intuition is that: for a fashion image, not all the regions are equally important for the users, i.e., people usually care about a few parts of the fashion image. To model such human sense, we learn an attention model over many pre-segmented image regions, based on which we can understand where a user is really interested in on the image, and correspondingly, represent the image in …


One-Class Order Embedding For Dependency Relation Prediction, Meng-Fen Chiang, Ee-Peng Lim, Wang-Chien Lee, Xavier Jayaraj Siddarth Ashok, Philips Kokoh Prasetyo Jul 2019

One-Class Order Embedding For Dependency Relation Prediction, Meng-Fen Chiang, Ee-Peng Lim, Wang-Chien Lee, Xavier Jayaraj Siddarth Ashok, Philips Kokoh Prasetyo

Research Collection School Of Computing and Information Systems

Learning the dependency relations among entities and the hierarchy formed by these relations by mapping entities into some order embedding space can effectively enable several important applications, including knowledge base completion and prerequisite relations prediction. Nevertheless, it is very challenging to learn a good order embedding due to the existence of partial ordering and missing relations in the observed data. Moreover, most application scenarios do not provide non-trivial negative dependency relation instances. We therefore propose a framework that performs dependency relation prediction by exploring both rich semantic and hierarchical structure information in the data. In particular, we propose several negative …