Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2101 - 2130 of 7454

Full-Text Articles in Physical Sciences and Mathematics

The Dark Side Of Sustainability Orientation For Sme Performance, Teemu Kautonen, Simon J.D. Schillebeeckx, Johannes Gartner, Henri Hakata, Katariina Salmela-Aro, Kirsi Snellmand Nov 2020

The Dark Side Of Sustainability Orientation For Sme Performance, Teemu Kautonen, Simon J.D. Schillebeeckx, Johannes Gartner, Henri Hakata, Katariina Salmela-Aro, Kirsi Snellmand

Research Collection Lee Kong Chian School Of Business

This article examines how a firm’s willingness to make trade-offs that favour sustainability over commercial goals attenuates the relationship between firm-level sustainability orientation and subsequent performance. The hypothesis development draws on stakeholder theory and the literature on mission and revenue drifts, while the empirical analysis is based on two waves of original survey data on Finnish manufacturing SMEs. We find that sustainability orientation is positively associated with performance only when the willingness to make sustainability trade-offs is low, whereas the relationship becomes negative when the willingness to make such trade-offs is high. Our findings thus suggest that the popular adage …


Api Method Recommendation Via Explicit Matching Of Functionality Verb Phrases, Wenkai Xie, Xin Peng, Mingwei Liu, Christoph Treude, Zhenchang Xing, Xiaoxin Zhang, Wenyun Zhao Nov 2020

Api Method Recommendation Via Explicit Matching Of Functionality Verb Phrases, Wenkai Xie, Xin Peng, Mingwei Liu, Christoph Treude, Zhenchang Xing, Xiaoxin Zhang, Wenyun Zhao

Research Collection School Of Computing and Information Systems

Due to the lexical gap between functionality descriptions and user queries, documentation-based API retrieval often produces poor results. Verb phrases and their phrase patterns are essential in both describing API functionalities and interpreting user queries. Thus we hypothesize that API retrieval can be facilitated by explicitly recognizing and matching between the fine-grained structures of functionality descriptions and user queries. To verify this hypothesis, we conducted a large-scale empirical study on the functionality descriptions of 14,733 JDK and Android API methods. We identified 356 different functionality verbs from the descriptions, which were grouped into 87 functionality categories, and we extracted 523 …


Archives Of Societies And Historical Climatology In East And Southeast Asia, Fiona Williamson, Qing Pei Nov 2020

Archives Of Societies And Historical Climatology In East And Southeast Asia, Fiona Williamson, Qing Pei

Research Collection School of Social Sciences

Major sources of social archives for paleoclimatology in East and Southeast Asia include ancient annals and chronicles, instrumental records from government, military or missionary bodies, and private records such as diaries. Records are rich but scattered and of inconsistent quality, often requiring different forms of cross-validation and homogenization from those in the Western world. This article discusses these source types.


A Question Of Scale: Making Meteorological Knowledge And Nation In Imperial Asia, Fiona Williamson, Vladimir Jankovic Nov 2020

A Question Of Scale: Making Meteorological Knowledge And Nation In Imperial Asia, Fiona Williamson, Vladimir Jankovic

Research Collection School of Social Sciences

This special issue of History of Meteorology explores processes of making, communicating, and embedding modern meteorological knowledge in late nineteenth and early twentieth century imperial Asia. Its focus is on the institutionalisation of meteorology in key nation-building activities such as developing agricultural services, synoptic mapping to predict storms, and participation in scientific organisations and initiatives. Collectively, the essays explore the intersection of local, regional, and international scales and processes in generating new forms of state-sponsored meteorological practices and institutions, though complex multi-layered networks involving different actors and modes of information flow across multiple scales. In so doing, they reveal the …


Sfuzz: An Efficient Adaptive Fuzzer For Solidity Smart Contracts, Tai D. Nguyen, Long H. Pham, Jun Sun, Yun Lin, Minh Quang Tran Nov 2020

Sfuzz: An Efficient Adaptive Fuzzer For Solidity Smart Contracts, Tai D. Nguyen, Long H. Pham, Jun Sun, Yun Lin, Minh Quang Tran

Research Collection School Of Computing and Information Systems

Smart contracts are Turing-complete programs that execute on the infrastructure of the blockchain, which often manage valuable digital assets. Solidity is one of the most popular programming languages for writing smart contracts on the Ethereum platform. Like traditional programs, smart contracts may contain vulnerabilities. Unlike traditional programs, smart contracts cannot be easily patched once they are deployed. It is thus important that smart contracts are tested thoroughly before deployment. In this work, we present an adaptive fuzzer for smart contracts on the Ethereum platform called sFuzz. Compared to existing Solidity fuzzers, sFuzz combines the strategy in the AFL fuzzer and …


A Survey Of Typical Attributed Graph Queries, Yanhao Wang, Yuchen Li, Ju Fan, Chang Ye, Mingke Chai Nov 2020

A Survey Of Typical Attributed Graph Queries, Yanhao Wang, Yuchen Li, Ju Fan, Chang Ye, Mingke Chai

Research Collection School Of Computing and Information Systems

Graphs are commonly used for representing complex structures such as social relationships, biological interactions, and knowledge bases. In many scenarios, graphs not only represent topological relationships but also store the attributes that denote the semantics associated with their vertices and edges, known as attributed graphs. Attributed graphs can meet demands for a wide range of applications, and thus a variety of queries on attributed graphs have been proposed. However, these diverse types of attributed graph queries have not been systematically investigated yet. In this paper, we provide an extensive survey of several typical types of attributed graph queries. We propose …


Online Traffic Signal Control Through Sample-Based Constrained Optimization, Srishti Dhamija, Alolika Gon, Pradeep Varakantham, William Yeoh Oct 2020

Online Traffic Signal Control Through Sample-Based Constrained Optimization, Srishti Dhamija, Alolika Gon, Pradeep Varakantham, William Yeoh

Research Collection School Of Computing and Information Systems

Traffic congestion reduces productivity of individuals by increasing time spent in traffic and also increases pollution. To reduce traffic congestion by better handling dynamic traffic patterns, recent work has focused on online traffic signal control. Typically, the objective in traffic signal control is to minimize expected delay over all vehicles given the uncertainty associated with the vehicle turn movements at intersections. In order to ensure responsiveness in decision making, a typical approach is to compute a schedule that minimizes the delay for the expected scenario of vehicle movements instead of minimizing expected delay over the feasible vehicle movement scenarios. Such …


Revisiting The Law Of Confidence In Singapore And A Proposal For A New Tort Of Misuse Of Private Information, Cheng Lim Saw, Zheng Wen Samuel Chan, Wen Min Chai Oct 2020

Revisiting The Law Of Confidence In Singapore And A Proposal For A New Tort Of Misuse Of Private Information, Cheng Lim Saw, Zheng Wen Samuel Chan, Wen Min Chai

Research Collection Yong Pung How School Of Law

This article critically examines the recent Court of Appeal decision in I-Admin (Singapore) Pte Ltd v Hong Ying Ting [2020] 1 SLR 1130 and its implications for the law of confidence. The article begins by setting out the decision at first instance, and then on appeal. It argues that the Court of Appeal’s “modified approach” fails to meaningfully engage the plaintiff ’s wrongful gain interest and places the law’s emphasis primarily, if not wholly, on the plaintiff ’s wrongful loss interest. The new framework also appears to have been influenced by English jurisprudence, which has had a long but unhelpful …


Knowledge Enhanced Neural Fashion Trend Forecasting, Yunshan Ma, Yujuan Ding, Xun Yang, Lizi Liao, Wai Keung Wong, Tat-Seng Chua Oct 2020

Knowledge Enhanced Neural Fashion Trend Forecasting, Yunshan Ma, Yujuan Ding, Xun Yang, Lizi Liao, Wai Keung Wong, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

Fashion trend forecasting is a crucial task for both academia and industry. Although some efforts have been devoted to tackling this challenging task, they only studied limited fashion elements with highly seasonal or simple patterns, which could hardly reveal the real fashion trends. Towards insightful fashion trend forecasting, this work focuses on investigating fine-grained fashion element trends for specific user groups. We first contribute a large-scale fashion trend dataset (FIT) collected from Instagram with extracted time series fashion element records and user information. Furthermore, to effectively model the time series data of fashion elements with rather complex patterns, we propose …


Activity River: Visualizing Planned And Logged Personal Activities For Reflection, Bon Adriel Aseniero, Charles Perin, Wesley Willett, Anthony Tang, Sheelagh Carpendale Oct 2020

Activity River: Visualizing Planned And Logged Personal Activities For Reflection, Bon Adriel Aseniero, Charles Perin, Wesley Willett, Anthony Tang, Sheelagh Carpendale

Research Collection School Of Computing and Information Systems

We present Activity River, a personal visualization tool which enables individuals to plan, log, and reflect on their self-defined activities. We are interested in supporting this type of reflective practice as prior work has shown that reflection can help people plan and manage their time effectively. Hence, we designed Activity River based on five design goals (visualize historical and contextual data, facilitate comparison of goals and achievements, engage viewers with delightful visuals, support authorship, and enable flexible planning and logging) which we distilled from the Information Visualization and Human-Computer Interaction literature. To explore our approach's strengths and limitations, we conducted …


Fakepolisher: Making Deepfakes More Detection-Evasive By Shallow Reconstruction, Yihao Huang, Felix Juefei-Xu, Run Wang, Qing Guo, Lei Ma, Xiaofei Xie, Jianwen Li, Weikai Miao, Yang Liu, Geguang Pu Oct 2020

Fakepolisher: Making Deepfakes More Detection-Evasive By Shallow Reconstruction, Yihao Huang, Felix Juefei-Xu, Run Wang, Qing Guo, Lei Ma, Xiaofei Xie, Jianwen Li, Weikai Miao, Yang Liu, Geguang Pu

Research Collection School Of Computing and Information Systems

At this moment, GAN-based image generation methods are still imperfect, whose upsampling design has limitations in leaving some certain artifact patterns in the synthesized image. Such artifact patterns can be easily exploited (by recent methods) for difference detection of real and GAN-synthesized images. However, the existing detection methods put much emphasis on the artifact patterns, which can become futile if such artifact patterns were reduced.Towards reducing the artifacts in the synthesized images, in this paper, we devise a simple yet powerful approach termed FakePolisher that performs shallow reconstruction of fake images through a learned linear dictionary, intending to effectively and …


Amora: Black-Box Adversarial Morphing Attack, Run Wang, Felix Juefei-Xu, Qing Guo, Yihao Huang, Xiaofei Xie, Lei Ma, Yang Liu Oct 2020

Amora: Black-Box Adversarial Morphing Attack, Run Wang, Felix Juefei-Xu, Qing Guo, Yihao Huang, Xiaofei Xie, Lei Ma, Yang Liu

Research Collection School Of Computing and Information Systems

Nowadays, digital facial content manipulation has become ubiquitous and realistic with the success of generative adversarial networks (GANs), making face recognition (FR) systems suffer from unprecedented security concerns. In this paper, we investigate and introduce a new type of adversarial attack to evade FR systems by manipulating facial content, called adversarial morphing attack (a.k.a. Amora). In contrast to adversarial noise attack that perturbs pixel intensity values by adding human-imperceptible noise, our proposed adversarial morphing attack works at the semantic level that perturbs pixels spatially in a coherent manner. To tackle the black-box attack problem, we devise a simple yet effective …


Annapurna: An Automated Smartwatch-Based Eating Detection And Food Journaling System, Sougata Sen, Vigneshwaran Subbaraju, Archan Misra, Rajesh Krishna Balan, Youngki Lee Oct 2020

Annapurna: An Automated Smartwatch-Based Eating Detection And Food Journaling System, Sougata Sen, Vigneshwaran Subbaraju, Archan Misra, Rajesh Krishna Balan, Youngki Lee

Research Collection School Of Computing and Information Systems

Maintaining a food journal can allow an individual to monitor eating habits, including unhealthy eating sessions, food items causing severe reactions, or portion size related information. However, manually maintaining a food journal can be burdensome. In this paper, we explore the vision of a pervasive, automated, completely unobtrusive, food journaling system using a commodity smartwatch. We present a prototype system — Annapurna— which is composed of three key components: (a) a smartwatch-based gesture recognizer that can robustly identify eating-specific gestures occurring anywhere, (b) a smartwatch-based image captor that obtains a small set of relevant images (containing views of the food …


Central Inspection Teams And The Enforcement Of Environmental Regulations In China, C. Xiang, Terry Van Gevelt Oct 2020

Central Inspection Teams And The Enforcement Of Environmental Regulations In China, C. Xiang, Terry Van Gevelt

Research Collection College of Integrative Studies

Despite the existence of a comprehensive set of environmental regulations, China’s environmental issues continue largely unabated and are increasingly leading to discontent among its citizens. Mirroring recent governance trends in China, the central government has increasingly taken a more hands-on-role to ensure the enforcement of environmental regulations by local government officials. One manifestation of this effort to re-centralize environmental institutions has been the establishment and deployment of Central Environmental Inspection Teams (CEITs). CEITs report directly to the central government and are dispatched to carry out crackdowns where the central government has reason to believe that environmental regulations are not being …


Hierarchical Identity-Based Signature In Polynomial Rings, Zhichao Yang, Dung H. Duong, Willy Susilo, Guomin Yang, Chao Li, Rongmao Chen Oct 2020

Hierarchical Identity-Based Signature In Polynomial Rings, Zhichao Yang, Dung H. Duong, Willy Susilo, Guomin Yang, Chao Li, Rongmao Chen

Research Collection School Of Computing and Information Systems

Hierarchical identity-based signature (HIBS) plays a core role in a large community as it significantly reduces the workload of the root private key generator. To make HIBS still available and secure in post-quantum era, constructing lattice-based schemes is a promising option. In this paper, we present an efficient HIBS scheme in polynomial rings. Although there are many lattice-based signatures proposed in recent years, to the best of our knowledge, our HIBS scheme is the first ring-based construction. In the center of our construction are two new algorithms to extend lattice trapdoors to higher dimensions, which are non-trivial and of independent …


Catch You If You Deceive Me: Verifiable And Privacy-Aware Truth Discovery In Crowdsensing Systems, Guowen Xu, Hongwei Li, Shengmin Xu, Hao Ren, Yonghui Zhang, Jianfei Sun, Robert H. Deng Oct 2020

Catch You If You Deceive Me: Verifiable And Privacy-Aware Truth Discovery In Crowdsensing Systems, Guowen Xu, Hongwei Li, Shengmin Xu, Hao Ren, Yonghui Zhang, Jianfei Sun, Robert H. Deng

Research Collection School Of Computing and Information Systems

Truth Discovery (TD) is to infer truthful information by estimating the reliability of users in crowdsensing systems. To protect data privacy, many Privacy-Preserving Truth Discovery (PPTD) approaches have been proposed. However, all existing PPTD solutions do not consider a fundamental issue of trust. That is, if the data aggregator (e.g., the cloud server) is not trustworthy, how can an entity be convinced that the data aggregator has correctly performed the PPTD? A "lazy"cloud server may partially follow the deployed protocols to save its computing and communication resources, or worse, maliciously forge the results for some shady deals. In this paper, …


Efficient Sampling Algorithms For Approximate Temporal Motif Counting, Jingjing Wang, Yanhao Wang, Wenjun Jiang, Yuchen Li, Kian-Lee Tan Oct 2020

Efficient Sampling Algorithms For Approximate Temporal Motif Counting, Jingjing Wang, Yanhao Wang, Wenjun Jiang, Yuchen Li, Kian-Lee Tan

Research Collection School Of Computing and Information Systems

A great variety of complex systems ranging from user interactions in communication networks to transactions in financial markets can be modeled as temporal graphs, which consist of a set of vertices and a series of timestamped and directed edges. Temporal motifs in temporal graphs are generalized from subgraph patterns in static graphs which take into account edge orderings and durations in addition to structures. Counting the number of occurrences of temporal motifs is a fundamental problem for temporal network analysis. However, existing methods either cannot support temporal motifs or suffer from performance issues. In this paper, we focus on approximate …


Livesnippets: Voice-Based Live Authoring Of Multimedia Articles About Experiences, Hyeongcheol Kim, Shengdong Zhao, Can Liu, Kotaro Hara Oct 2020

Livesnippets: Voice-Based Live Authoring Of Multimedia Articles About Experiences, Hyeongcheol Kim, Shengdong Zhao, Can Liu, Kotaro Hara

Research Collection School Of Computing and Information Systems

We transform traditional experience writing into in-situ voice-based multimedia authoring. Documenting experiences digitally in blogs and journals is a common activity that allows people to socially connect with others by sharing their experiences (e.g. travelogue). However, documenting such experiences can be time-consuming and cognitively demanding as it is typically done OUT-OF-CONTEXT (after the actual experience). We propose in-situ voice-based multimedia authoring (IVA), an alternative workflow to allow IN-CONTEXT experience documentation. Unlike the traditional approach, IVA encourages in-context content creations using voice-based multimedia input and stores them in multi-modal "snippets". The snippets can be rearranged to form multimedia articles and can …


Reinforcement Learning For Zone Based Multiagent Pathfinding Under Uncertainty, Jiajing Ling, Tarun Gupta, Akshat Kumar Oct 2020

Reinforcement Learning For Zone Based Multiagent Pathfinding Under Uncertainty, Jiajing Ling, Tarun Gupta, Akshat Kumar

Research Collection School Of Computing and Information Systems

We address the problem of multiple agents finding their paths from respective sources to destination nodes in a graph (also called MAPF). Most existing approaches assume that all agents move at fixed speed, and that a single node accommodates only a single agent. Motivated by the emerging applications of autonomous vehicles such as drone traffic management, we present zone-based path finding (or ZBPF) where agents move among zones, and agents' movements require uncertain travel time. Furthermore, each zone can accommodate multiple agents (as per its capacity). We also develop a simulator for ZBPF which provides a clean interface from the …


Dual-Slam: A Framework For Robust Single Camera Navigation, Huajian Huang, Wen-Yan Lin, Siying Liu, Dong Zhang, Sai-Kit Yeung Oct 2020

Dual-Slam: A Framework For Robust Single Camera Navigation, Huajian Huang, Wen-Yan Lin, Siying Liu, Dong Zhang, Sai-Kit Yeung

Research Collection School Of Computing and Information Systems

SLAM (Simultaneous Localization And Mapping) seeks to provide a moving agent with real-time self-localization. To achieve real-time speed, SLAM incrementally propagates position estimates. This makes SLAM fast but also makes it vulnerable to local pose estimation failures. As local pose estimation is ill-conditioned, local pose estimation failures happen regularly, making the overall SLAM system brittle. This paper attempts to correct this problem. We note that while local pose estimation is ill-conditioned, pose estimation over longer sequences is well-conditioned. Thus, local pose estimation errors eventually manifest themselves as mapping inconsistencies. When this occurs, we save the current map and activate two …


Hysia: Serving Dnn-Based Video-To-Retail Applications In Cloud, Huaizheng Zhang, Yuanming Li, Qiming Ai, Yong Luo, Yonggang Wen, Yichao Jin, Nguyen Binh Duong Ta Oct 2020

Hysia: Serving Dnn-Based Video-To-Retail Applications In Cloud, Huaizheng Zhang, Yuanming Li, Qiming Ai, Yong Luo, Yonggang Wen, Yichao Jin, Nguyen Binh Duong Ta

Research Collection School Of Computing and Information Systems

Combining video streaming and online retailing (V2R) has been a growing trend recently. In this paper, we provide practitioners and researchers in multimedia with a cloud-based platform named Hysia for easy development and deployment of V2R applications. The system consists of: 1) a back-end infrastructure providing optimized V2R related services including data engine, model repository, model serving and content matching; and 2) an application layer which enables rapid V2R application prototyping. Hysia addresses industry and academic needs in large-scale multimedia by: 1) seamlessly integrating state-of-the-art libraries including NVIDIA video SDK, Facebook faiss, and gRPC; 2) efficiently utilizing GPU computation; and …


Federated Topic Discovery: A Semantic Consistent Approach, Yexuan Shi, Yongxin Tong, Zhiyang Su, Di Jiang, Zimu Zhou, Wenbin Zhang Oct 2020

Federated Topic Discovery: A Semantic Consistent Approach, Yexuan Shi, Yongxin Tong, Zhiyang Su, Di Jiang, Zimu Zhou, Wenbin Zhang

Research Collection School Of Computing and Information Systems

General-purpose topic models have widespread industrial applications. Yet high-quality topic modeling is becoming increasingly challenging because accurate models require large amounts of training data typically owned by multiple parties, who are often unwilling to share their sensitive data for collaborative training without guarantees on their data privacy. To enable effective privacy-preserving multiparty topic modeling, we propose a novel federated general-purpose topic model named private and consistent topic discovery (PC-TD). On the one hand, PC-TD seamlessly integrates differential privacy in topic modeling to provide privacy guarantees on sensitive data of different parties. On the other hand, PC-TD exploits multiple sources of …


Compact Bilinear Augmented Query Structured Attention For Sport Highlights Classification, Yanbin Hao, Hao Zhang, Chong-Wah Ngo, Qing Liu, Xiaojun Hu Oct 2020

Compact Bilinear Augmented Query Structured Attention For Sport Highlights Classification, Yanbin Hao, Hao Zhang, Chong-Wah Ngo, Qing Liu, Xiaojun Hu

Research Collection School Of Computing and Information Systems

Understanding fine-grained activities, such as sport highlights, is a problem being overlooked and receives considerably less research attention. Potential reasons include absences of specific fine-grained action benchmark datasets, research preferences to general supercategorical activities classification, and challenges of large visual similarities between fine-grained actions. To tackle these, we collect and manually annotate two sport highlights datasets, i.e., Basketball8 & Soccer-10, for fine-grained action classification. Sample clips in the datasets are annotated with professional sub-categorical actions like “dunk”, “goalkeeping” and etc. We also propose a Compact Bilinear Augmented Query Structured Attention (CBA-QSA) module and stack it on top of general three-dimensional …


Person-Level Action Recognition In Complex Events Via Tsd-Tsm Networks, Yanbin Hao, Zi-Niu Liu, Hao Zhang, Bin Zhu, Jingjing Chen, Yu-Gang Jiang, Chong-Wah Ngo Oct 2020

Person-Level Action Recognition In Complex Events Via Tsd-Tsm Networks, Yanbin Hao, Zi-Niu Liu, Hao Zhang, Bin Zhu, Jingjing Chen, Yu-Gang Jiang, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

The task of person-level action recognition in complex events aims to densely detect pedestrians and individually predict their actions from surveillance videos. In this paper, we present a simple yet efficient pipeline for this task, referred to as TSD-TSM networks. Firstly, we adopt the TSD detector for the pedestrian localization on each single keyframe. Secondly, we generate the sequential ROIs for a person proposal by replicating the adjusted bounding box coordinates around the keyframe. Particularly, we propose to conduct straddling expansion and region squaring on the original bounding box of a person proposal to widen the potential space of motion …


Towards Systematically Deriving Defence Mechanisms From Functional Requirements Of Cyber-Physical Systems, Cheah Huei Yoong, Venkata Reddy Palleti, Arlindo Silva, Christopher M. Poskitt Oct 2020

Towards Systematically Deriving Defence Mechanisms From Functional Requirements Of Cyber-Physical Systems, Cheah Huei Yoong, Venkata Reddy Palleti, Arlindo Silva, Christopher M. Poskitt

Research Collection School Of Computing and Information Systems

The threats faced by cyber-physical systems (CPSs) in critical infrastructure have motivated the development of different attack detection mechanisms, such as those that monitor for violations of invariants, i.e. properties that always hold in normal operation. Given the complexity of CPSs, several existing approaches focus on deriving invariants automatically from data logs, but these can miss possible system behaviours if they are not represented in that data. Furthermore, resolving any design flaws identified in this process is costly, as the CPS is already built. In this position paper, we propose a systematic method for deriving invariants before a CPS is …


Foodbot: A Goal-Oriented Just-In-Time Healthy Eating Interventions Chatbot, Philips Kokoh Prasetyo, Palakorn Achananuparp, Ee-Peng Lim Oct 2020

Foodbot: A Goal-Oriented Just-In-Time Healthy Eating Interventions Chatbot, Philips Kokoh Prasetyo, Palakorn Achananuparp, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Recent research has identified a few design flaws in popular mobile health (mHealth) applications for promoting healthy eating lifestyle, such as mobile food journals. These include tediousness of manual food logging, inadequate food database coverage, and a lack of healthy dietary goal setting. To address these issues, we present Foodbot, a chatbot-based mHealth application for goal-oriented just-in-time (JIT) healthy eating interventions. Powered by a large-scale food knowledge graph, Foodbot utilizes automatic speech recognition and mobile messaging interface to record food intake. Moreover, Foodbot allows users to set goals and guides their behavior toward the goals via JIT notification prompts, interactive …


Sentiment Analysis For Software Engineering: How Far Can Pre-Trained Transformer Models Go?, Ting Zhang, Bowen Xu, Thung Ferdian, Stefanus Agus Haryono, David Lo, Lingxiao Jiang Oct 2020

Sentiment Analysis For Software Engineering: How Far Can Pre-Trained Transformer Models Go?, Ting Zhang, Bowen Xu, Thung Ferdian, Stefanus Agus Haryono, David Lo, Lingxiao Jiang

Research Collection School Of Computing and Information Systems

Extensive research has been conducted on sentiment analysis for software engineering (SA4SE). Researchers have invested much effort in developing customized tools (e.g., SentiStrength-SE, SentiCR) to classify the sentiment polarity for Software Engineering (SE) specific contents (e.g., discussions in Stack Overflow and code review comments). Even so, there is still much room for improvement. Recently, pre-trained Transformer-based models (e.g., BERT, XLNet) have brought considerable breakthroughs in the field of natural language processing (NLP). In this work, we conducted a systematic evaluation of five existing SA4SE tools and variants of four state-of-the-art pre-trained Transformer-based models on six SE datasets. Our work is …


Crossasr: Efficient Differential Testing Of Automatic Speech Recognition Via Text-To-Speech, Muhammad Hilmi Asyrofi, Thung Ferdian, David Lo, Lingxiao Jiang Oct 2020

Crossasr: Efficient Differential Testing Of Automatic Speech Recognition Via Text-To-Speech, Muhammad Hilmi Asyrofi, Thung Ferdian, David Lo, Lingxiao Jiang

Research Collection School Of Computing and Information Systems

Automatic speech recognition (ASR) systems are ubiquitous parts of modern life. It can be found in our smartphones, desktops, and smart home systems. To ensure its correctness in recognizing speeches, ASR needs to be tested. Testing ASR requires test cases in the form of audio files and their transcribed texts. Building these test cases manually, however, is tedious and time-consuming.To deal with the aforementioned challenge, in this work, we propose CrossASR, an approach that capitalizes the existing Text-To-Speech (TTS) systems to automatically generate test cases for ASR systems. CrossASR is a differential testing solution that compares outputs of multiple ASR …


Automated Discussion Analysis - Framework For Knowledge Analysis From Class Discussions, Swapna Gottipati, Venky Shankararaman, Mallikan Gokarn Nitin Oct 2020

Automated Discussion Analysis - Framework For Knowledge Analysis From Class Discussions, Swapna Gottipati, Venky Shankararaman, Mallikan Gokarn Nitin

Research Collection School Of Computing and Information Systems

This research full paper, describes knowledge management of class discussions using an analytics based framework. Discussions, either live classroom or through online forums, when used as a teaching method can help stimulate critical thinking. It allows the teacher to explore in-depth the key concepts covered in the course, motivates students to articulate their ideas clearly and challenge the students to think more deeply. Analysing the discussions helps instructors gain better insights on the personal and collaborative learning behaviour of students. However, knowledge from in-class discussions and online forums is not effectively captured and mined due to lack of appropriate automated …


Deep Reinforcement Learning Approach To Solve Dynamic Vehicle Routing Problem With Stochastic Customers, Waldy Joe, Hoong Chuin Lau Oct 2020

Deep Reinforcement Learning Approach To Solve Dynamic Vehicle Routing Problem With Stochastic Customers, Waldy Joe, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

In real-world urban logistics operations, changes to the routes and tasks occur in response to dynamic events. To ensure customers’ demands are met, planners need to make these changes quickly (sometimes instantaneously). This paper proposes the formulation of a dynamic vehicle routing problem with time windows and both known and stochastic customers as a route-based Markov Decision Process. We propose a solution approach that combines Deep Reinforcement Learning (specifically neural networks-based TemporalDifference learning with experience replay) to approximate the value function and a routing heuristic based on Simulated Annealing, called DRLSA. Our approach enables optimized re-routing decision to be generated …