Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2371 - 2400 of 7454

Full-Text Articles in Physical Sciences and Mathematics

Rankbooster: Visual Analysis Of Ranking Predictions, Abishek Puri, Bon Kyung Ku, Yong Wang, Huamin Qu May 2020

Rankbooster: Visual Analysis Of Ranking Predictions, Abishek Puri, Bon Kyung Ku, Yong Wang, Huamin Qu

Research Collection School Of Computing and Information Systems

Ranking is a natural and ubiquitous way to facilitate decision-making in various applications. However, different rankings are often used for the same set of entities, with each ranking method placing emphasis on different factors. These factors can also be multi-dimensional in nature, compounding the problem. This complexity can make it challenging for an entity which is being ranked to understand what they can do to improve their rankings, and to analyze the effect of changes in various factors to their overall rank. In this paper, we present RankBooster, a novel visual analytics system to help users conveniently investigate ranking predictions. …


Hierarchical Multiagent Reinforcement Learning For Maritime Traffic Management, Arambam James Singh, Akshat Kumar, Hoong Chuin Lau May 2020

Hierarchical Multiagent Reinforcement Learning For Maritime Traffic Management, Arambam James Singh, Akshat Kumar, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

Increasing global maritime traffic coupled with rapid digitization and automation in shipping mandate developing next generation maritime traffic management systems to mitigate congestion, increase safety of navigation, and avoid collisions in busy and geographically constrained ports (such as Singapore's). To achieve these objectives, we model the maritime traffic as a large multiagent system with individual vessels as agents, and VTS (Vessel Traffic Service) authority as a regulatory agent. We develop a hierarchical reinforcement learning approach where vessels first select a high level action based on the underlying traffic flow, and then select the low level action that determines their future …


Automated Identification Of Libraries From Vulnerability Data, Chen Yang, Andrew Santosa, Asankhaya Sharma, David Lo May 2020

Automated Identification Of Libraries From Vulnerability Data, Chen Yang, Andrew Santosa, Asankhaya Sharma, David Lo

Research Collection School Of Computing and Information Systems

Software Composition Analysis (SCA) has gained traction in recent years with a number of commercial offerings from various companies. SCA involves vulnerability curation process where a group of security researchers, using various data sources, populate a database of open-source library vulnerabilities, which is used by a scanner to inform the end users of vulnerable libraries used by their applications. One of the data sources used is the National Vulnerability Database (NVD). The key challenge faced by the security researchers here is in figuring out which libraries are related to each of the reported vulnerability in NVD. In this article, we …


Statistical Modeling Of Harassment Against Reddit Moderators, Hamad Bin Khalifa University, Haewoon Kwak Apr 2020

Statistical Modeling Of Harassment Against Reddit Moderators, Hamad Bin Khalifa University, Haewoon Kwak

Research Collection School Of Computing and Information Systems

Despite the dedication that some volunteer moderators of online communities display when performing their moderation duties, they become targets of hate and harassment by other users. To understand what causes the change in moderator role from heroes to victims, we analyze the responses of 1,818 moderators on Reddit to an online survey about moderation practices and harassment. We built a statistical model and found 6 significant independent variables that affect harassment on moderators, such as the knowledge of community norms, which increases harassment on moderators the most. Our findings imply that vulnerable moderators in toxic communities need countermeasures against harassment.


Text Analytics, Nlp, And Accounting Research, Richard M. Crowley Apr 2020

Text Analytics, Nlp, And Accounting Research, Richard M. Crowley

Research Collection School Of Accountancy

The presentation covered: What is text analytics and NLP?; How text analytics has evolved in the accounting literature since the 1980s; What current (as of 2020) methods are used in the literature; What methods are on the horizon.


Green Bonds For Financing Renewable Energy And Energy Efficiency In South-East Asia: A Review Of Policies, Dina Azhgaliyeva, Anant Kapoor, Yang Liu Apr 2020

Green Bonds For Financing Renewable Energy And Energy Efficiency In South-East Asia: A Review Of Policies, Dina Azhgaliyeva, Anant Kapoor, Yang Liu

Research Collection Lee Kong Chian School Of Business

Mobilizing private finance for renewable energy and energy efficiency is critical for Association of South-East Asian Nations (ASEAN) not only for the reduction of global temperature rise but also for meeting fast-growing energy demand. Two-thirds of green bonds issued in ASEAN were used to finance renewable energy and energy efficiency projects. This paper provides a review of green bond issuance and green bond policies in ASEAN. Issuance of green bonds in top three green bond issuing countries in ASEAN, i.e. Indonesia, Malaysia and Singapore, are reviewed in detail. Green bond policies in ASEAN are effective in promoting green bond issuance. …


Are These Comments Triggering? Predicting Triggers Of Toxicity In Online Discussions, Hind Almerekhi, Haewoon Kwak, Joni Salminen, Bernard J. Jansen Apr 2020

Are These Comments Triggering? Predicting Triggers Of Toxicity In Online Discussions, Hind Almerekhi, Haewoon Kwak, Joni Salminen, Bernard J. Jansen

Research Collection School Of Computing and Information Systems

Understanding the causes or triggers of toxicity adds a new dimension to the prevention of toxic behavior in online discussions. In this research, we define toxicity triggers in online discussions as a non-toxic comment that lead to toxic replies. Then, we build a neural network-based prediction model for toxicity trigger. The prediction model incorporates text-based features and derived features from previous studies that pertain to shifts in sentiment, topic flow, and discussion context. Our findings show that triggers of toxicity contain identifiable features and that incorporating shift features with the discussion context can be detected with a ROC-AUC score of …


How To And How Much? Teaching Ethics In An Interaction Design Course, Bimlesh Wadhwa, Eng Lieh Ouh, Benjamin Gan Apr 2020

How To And How Much? Teaching Ethics In An Interaction Design Course, Bimlesh Wadhwa, Eng Lieh Ouh, Benjamin Gan

Research Collection School Of Computing and Information Systems

How much is sufficient and how should one teach ethics in an Interaction Design curriculum in undergraduate computing program has been a point of dilemma for many HCI educators. We conducted a preliminary study using a mixed method to gather perception on ethics in our interaction design courses at two of the leading Singapore Universities. We answer three research questions specific to an undergraduate HCI course: Is there a need for ethics? Is there sufficient ethics coverage? and how to teach ethics? We surveyed 140 students and interviewed six teachers in two Singapore Universities. Our findings suggest that 92% of …


Attribute-Based Cloud Data Integrity Auditing For Secure Outsourced Storage, Yong Yu, Yannan Li, Bo Yang, Willy Susilo, Guomin Yang, Jian Bai Apr 2020

Attribute-Based Cloud Data Integrity Auditing For Secure Outsourced Storage, Yong Yu, Yannan Li, Bo Yang, Willy Susilo, Guomin Yang, Jian Bai

Research Collection School Of Computing and Information Systems

Outsourced storage such as cloud storage can significantly reduce the burden of data management of data owners. Despite of a long list of merits of cloud storage, it triggers many security risks at the same time. Data integrity, one of the most burning challenges in secure cloud storage, is a fundamental and pivotal element in outsourcing services. Outsourced data auditing protocols enable a verifier to efficiently check the integrity of the outsourced files without downloading the entire file from the cloud, which can dramatically reduce the communication overhead between the cloud server and the verifier. Existing protocols are mostly based …


Improving Neural Relation Extraction With Implicit Mutual Relations, Jun Kuang, Yixin Cao, Jianbing Zheng, Xiangnan He, Ming Gao, Aoying Zhou Apr 2020

Improving Neural Relation Extraction With Implicit Mutual Relations, Jun Kuang, Yixin Cao, Jianbing Zheng, Xiangnan He, Ming Gao, Aoying Zhou

Research Collection School Of Computing and Information Systems

Relation extraction (RE) aims at extracting the relation between two entities from the text corpora. It is a crucial task for Knowledge Graph (KG) construction. Most existing methods predict the relation between an entity pair by learning the relation from the training sentences, which contain the targeted entity pair. In contrast to existing distant supervision approaches that suffer from insufficient training corpora to extract relations, our proposal of mining implicit mutual relation from the massive unlabeled corpora transfers the semantic information of entity pairs into the RE model, which is more expressive and semantically plausible. After constructing an entity proximity …


On The Robustness Of Cascade Diffusion Under Node Attacks, Alvis Logins, Yuchen Li, Panagiotis Karras Apr 2020

On The Robustness Of Cascade Diffusion Under Node Attacks, Alvis Logins, Yuchen Li, Panagiotis Karras

Research Collection School Of Computing and Information Systems

How can we assess a network's ability to maintain its functionality under attacks? Network robustness has been studied extensively in the case of deterministic networks. However, applications such as online information diffusion and the behavior of networked public raise a question of robustness in probabilistic networks. We propose three novel robustness measures for networks hosting a diffusion under the Independent Cascade (IC) model, susceptible to node attacks. The outcome of such a process depends on the selection of its initiators, or seeds, by the seeder, as well as on two factors outside the seeder's discretion: the attack strategy and the …


Designing A Smart Internet Of Things Solution For Point Of Use Water Filtration Management System In Residential, Commercial And Public Settings, Tristan Lim, Hwee-Pink Tan, Chin Sin Ong, Rahul Belani, Siddhant S. K. Agrawal Apr 2020

Designing A Smart Internet Of Things Solution For Point Of Use Water Filtration Management System In Residential, Commercial And Public Settings, Tristan Lim, Hwee-Pink Tan, Chin Sin Ong, Rahul Belani, Siddhant S. K. Agrawal

Research Collection School Of Computing and Information Systems

The use of water filtration Point-of-Use (POU) systems are extensive, ranging from water dispensers in public estates, to household POU water systems. Manufacturers typically recommend filtration cartridges to be changed (i) after their useful life, or (ii) when the water flow volume have exceeded certain capacity, whichever is earlier. However, filtration mechanisms are typically not changed with sufficient regularity. Overused filters can result in negative health effects, over and above the deterioration and loss of filtration benefits of the POU water system. Presently most existing water purification systems do not have smart connected Internet of Things (IoT) means of informing …


Maptransfer: Urban Air Quality Map Generation For Downscaled Sensor Deployments, Yun Cheng, Xiaoxi He, Zimu Zhou, Lothar Thiele Apr 2020

Maptransfer: Urban Air Quality Map Generation For Downscaled Sensor Deployments, Yun Cheng, Xiaoxi He, Zimu Zhou, Lothar Thiele

Research Collection School Of Computing and Information Systems

Dense deployments of commodity air quality sensors have proven effective to provide spatially-resolved information on urban air pollution in real-time. However, long-term operation of a dense sensor deployment incurs enormous maintenance expenses and efforts. A cost-effective alternative is to first collect measurements with an initial dense deployment and then rely on a small subset of sensors for air quality map generation. To avoid dramatic accuracy degradation in air quality maps generated using the downscaled sparse deployment, we design MapTransfer, an air quality map generation scheme which augments the current sensor measurements from the downscaled sparse deployment with appropriate historical data …


Techniques To Visualize Occluded Graph Elements For 2.5d Map Editing, Kazuyuki Fujita, Daigo Hayashi, Kotaro Hara, Kazuki Takashima, Yoshifumi Kitamura Apr 2020

Techniques To Visualize Occluded Graph Elements For 2.5d Map Editing, Kazuyuki Fujita, Daigo Hayashi, Kotaro Hara, Kazuki Takashima, Yoshifumi Kitamura

Research Collection School Of Computing and Information Systems

We propose an interface with two novel techniques to visualize occluded graph nodes and edges that help the user edit map data with a 2.5D geographical structure (e.g., multi-floor indoor maps). We first design a visualization technique —Repel Signification— that employs micro-animation to signify the graph elements that are overlapping with each other (and potentially erroneous). We also design a technique that enables the user to edit the occluded components with Expansion Interaction, which simultaneously visualizes both in-floor and across-floor occluded connections between the map elements. The combination of the two methods would enable the map editors (non-experts) to effectively …


Leakage-Resilient Biometric-Based Remote User Authentication With Fuzzy Extractors, Yangguang Tian, Yingjiu Li, Binanda Sengupta, Nan Li, Chunhua Su Apr 2020

Leakage-Resilient Biometric-Based Remote User Authentication With Fuzzy Extractors, Yangguang Tian, Yingjiu Li, Binanda Sengupta, Nan Li, Chunhua Su

Research Collection School Of Computing and Information Systems

Fuzzy extractors convert biometrics and other noisy data into a cryptographic key for security applications such as remote user authentication. Leakage attacks, such as side channel attacks, have been extensively modelled and studied in the literature. However, to the best of our knowledge, leakage attacks to biometric-based remote user authentication with fuzzy extractors have never been studied rigorously. In this paper, we propose a generic framework of leakage-resilient and privacy-preserving biometric-based remote user authentication that allows an authorized user to securely authenticate herself to a remote authentication server using her biometrics. In particular, the authorized user relies only on her …


A New Construction For Linkable Secret Handshake, Yangguang Tian, Yingjiu Li, Robert H. Deng, Nan Li, Guomin Yang, Zheng Yang Apr 2020

A New Construction For Linkable Secret Handshake, Yangguang Tian, Yingjiu Li, Robert H. Deng, Nan Li, Guomin Yang, Zheng Yang

Research Collection School Of Computing and Information Systems

In this paper, we introduce a new construction for linkable secret handshake that allows authenticated users to perform handshake anonymously within allowable times. We define formal security models for the new construction, and prove that it can achieve session key security, anonymity, untraceability and linkable affiliation-hiding. In particular, the proposed construction ensures that (i) anyone can trace the real identities of dishonest users who perform handshakes for more than k times; and (ii) an optimal communication cost between authorized users is achieved by exploiting the proof of knowledges.


Poster Abstract: Data Communication Using Switchable Privacy Glass, Changshuo Hu, Dong Ma, Mahbub Hassan, Wen Hu Apr 2020

Poster Abstract: Data Communication Using Switchable Privacy Glass, Changshuo Hu, Dong Ma, Mahbub Hassan, Wen Hu

Research Collection School Of Computing and Information Systems

Switchable privacy glass can electronically change its state between opaque and transparent. In this work, we propose to exploit the electronic configurability of switchable glass to modulate natural light, which can be demodulated by a nearby receiver with light sensing capability to realise data communication over natural light. A key advantage is that no energy is used to generate light, as it simply modulates the existing light in the nature. We demonstrate that the proposed data communication using switchable glass modulation can achieve 33.33 bits per second communication with a bit rate below 1% under a wide range of ambient …


Energy-Efficient Distance-Bounding With Residual Charge Computation, Yunhui Zhuang, Anjia Yang, Gerhard Hancke, Duncan S. Wong, Guomin Yang Apr 2020

Energy-Efficient Distance-Bounding With Residual Charge Computation, Yunhui Zhuang, Anjia Yang, Gerhard Hancke, Duncan S. Wong, Guomin Yang

Research Collection School Of Computing and Information Systems

Real-time location systems are often required in industrial applications. In addition to securely determining an item's location, these systems also need to accommodate energy-limited tracking tokens. Distance-bounding protocols enable a Verifier to cryptographically determine an upper-bound on the physical distance to a Prover by measuring the round-trip time of specially designed challenge-response messages. This type of protocols serve as countermeasure to three common attacks on location-based systems and have been extensively studied with the goal of achieving optimal security bounds for the respective attacks. In this paper, we propose a new energy-efficient distance-bounding protocol that protects against all three common …


On The Security Of Lwe Cryptosystem Against Subversion Attacks, Zhichao Yang, Rongmao Chen, Chao Li, Longjiang Qu, Guomin Yang Apr 2020

On The Security Of Lwe Cryptosystem Against Subversion Attacks, Zhichao Yang, Rongmao Chen, Chao Li, Longjiang Qu, Guomin Yang

Research Collection School Of Computing and Information Systems

Subversion of cryptography has received wide attentions especially after the Snowden Revelations in 2013. Most of the currently proposed subversion attacks essentially rely on the freedom of randomness choosing in the cryptographic protocol to hide backdoors embedded in the cryptosystems. Despite the fact that significant progresses in this line of research have been made, most of them mainly considered the classical setting, while the research gap regarding subversion attacks against post-quantum cryptography remains tremendous. Inspired by this observation, we investigate a subversion attack against existing protocol that is proved post-quantum secure. Particularly, we show an efficient way to undetectably subvert …


Reinforced Negative Sampling Over Knowledge Graph For Recommendation, Xiang Wang, Yaokun Xu, Xiangnan He, Yixin Cao, Meng Wang, Tat-Seng Chua Apr 2020

Reinforced Negative Sampling Over Knowledge Graph For Recommendation, Xiang Wang, Yaokun Xu, Xiangnan He, Yixin Cao, Meng Wang, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

Properly handling missing data is a fundamental challenge in recommendation. Most present works perform negative sampling from unobserved data to supply the training of recommender models with negative signals. Nevertheless, existing negative sampling strategies, either static or adaptive ones, are insufficient to yield high-quality negative samples — both informative to model training and reflective of user real needs. In this work, we hypothesize that item knowledge graph (KG), which provides rich relations among items and KG entities, could be useful to infer informative and factual negative samples. Towards this end, we develop a new negative sampling model, Knowledge Graph Policy …


Google Summer Of Code: Student Motivations And Contributions, Jefferson O. Silva, Igor Scaliante Wiese, Daniel M. Germán, Christoph Treude, Marco Aurélio Gerosa, Igor Steinmacher Apr 2020

Google Summer Of Code: Student Motivations And Contributions, Jefferson O. Silva, Igor Scaliante Wiese, Daniel M. Germán, Christoph Treude, Marco Aurélio Gerosa, Igor Steinmacher

Research Collection School Of Computing and Information Systems

Several open source software (OSS) projects participate in engagement programs like Summers of Code expecting to foster newcomers’ onboarding and receive contributions. However, scant empirical evidence identifies why students join such programs. In this paper, we study the well-established Google Summer of Code (GSoC), which is a 3-month OSS engagement program that offers stipends and mentorship to students willing to contribute to OSS projects. We combined a survey (of students and mentors) and interviews (of students) to understand what motivates students to enter GSoC. Our results show that students enter GSoC for an enriching experience, and not necessarily to become …


A Cue Adaptive Decoder For Controllable Neural Response Generation, Weichao Wang, Shi Feng, Wei Gao, Daling Wang, Yifei Zhang Apr 2020

A Cue Adaptive Decoder For Controllable Neural Response Generation, Weichao Wang, Shi Feng, Wei Gao, Daling Wang, Yifei Zhang

Research Collection School Of Computing and Information Systems

In open-domain dialogue systems, dialogue cues such as emotion, persona, and emoji can be incorporated into conversation models for strengthening the semantic relevance of generated responses. Existing neural response generation models either incorporate dialogue cue into decoder’s initial state or embed the cue indiscriminately into the state of every generated word, which may cause the gradients of the embedded cue to vanish or disturb the semantic relevance of generated words during back propagation. In this paper, we propose a Cue Adaptive Decoder (CueAD) that aims to dynamically determine the involvement of a cue at each generation step in the decoding. …


Raising Funds In The Era Of Digital Economy, Deserina Sulaeman Apr 2020

Raising Funds In The Era Of Digital Economy, Deserina Sulaeman

Dissertations and Theses Collection (Open Access)

The rapid advancement in technology and internet penetration have substantially increased the number of economic transactions conducted online. Platforms that connect economic agents play an important role in this digital economy. The unbridled proliferation of digital platforms calls for a closer examination of the factors that could affect the welfare of the increasing number of economic agents who participate in them.

This dissertation examines the factors that could affect the welfare of agents using the setting of a crowdfunding platform where fundraisers develop campaigns to solicit funding from potential donors. These factors can be broadly categorized into three distinct groups: …


Identity-Based Encryption Transformation For Flexible Sharing Of Encrypted Data In Public Cloud, Robert H. Deng, Zheng Qin, Qianhong Wu, Zhenyu Guan, Robert H. Deng, Yujue Wang, Yunya Zhou Apr 2020

Identity-Based Encryption Transformation For Flexible Sharing Of Encrypted Data In Public Cloud, Robert H. Deng, Zheng Qin, Qianhong Wu, Zhenyu Guan, Robert H. Deng, Yujue Wang, Yunya Zhou

Research Collection School Of Computing and Information Systems

With the rapid development of cloud computing, an increasing number of individuals and organizations are sharing data in the public cloud. To protect the privacy of data stored in the cloud, a data owner usually encrypts his data in such a way that certain designated data users can decrypt the data. This raises a serious problem when the encrypted data needs to be shared to more people beyond those initially designated by the data owner. To address this problem, we introduce and formalize an identity-based encryption transformation (IBET) model by seamlessly integrating two well-established encryption mechanisms, namely identity-basedencryption (IBE) and …


A Generalized Formal Semantic Framework For Smart Contracts, Jiao Jiao, Shang-Wei Lin, Jun Sun Apr 2020

A Generalized Formal Semantic Framework For Smart Contracts, Jiao Jiao, Shang-Wei Lin, Jun Sun

Research Collection School Of Computing and Information Systems

Smart contracts can be regarded as one of the most popular blockchain-based applications. The decentralized nature of the blockchain introduces vulnerabilities absent in other programs. Furthermore, it is very difficult, if not impossible, to patch a smart contract after it has been deployed. Therefore, smart contracts must be formally verified before they are deployed on the blockchain to avoid attacks exploiting these vulnerabilities. There is a recent surge of interest in analyzing and verifying smart contracts. While most of the existing works either focus on EVM bytecode or translate Solidity contracts into programs in intermediate languages for analysis and verification, …


Artificial Intelligence-Enhanced Predictive Insights For Advancing Financial Inclusion: A Human-Centric Ai-Thinking Approach, Meng Leong How, Sin Mei Cheah, Aik Cheow Khor, Yong Jiet Chan Apr 2020

Artificial Intelligence-Enhanced Predictive Insights For Advancing Financial Inclusion: A Human-Centric Ai-Thinking Approach, Meng Leong How, Sin Mei Cheah, Aik Cheow Khor, Yong Jiet Chan

Research Collection Lee Kong Chian School Of Business

According to the World Bank, a key factor to poverty reduction and improving prosperity is financial inclusion. Financial service providers (FSPs) offering financially-inclusive solutions need to understand how to approach the underserved successfully. The application of artificial intelligence (AI) on legacy data can help FSPs to anticipate how prospective customers may respond when they are approached. However, it remains challenging for FSPs who are not well-versed in computer programming to implement AI projects. This paper proffers a no-coding human-centric AI-based approach to simulate the possible dynamics between the financial profiles of prospective customers collected from 45,211 contact encounters and predict …


Review-Guided Helpful Answer Identification In E-Commerce, Wenxuan Zhang, Wai Lam, Yang Deng, Jing Ma Apr 2020

Review-Guided Helpful Answer Identification In E-Commerce, Wenxuan Zhang, Wai Lam, Yang Deng, Jing Ma

Research Collection School Of Computing and Information Systems

Product-specific community question answering platforms can greatly help address the concerns of potential customers. However, the user-provided answers on such platforms often vary a lot in their qualities. Helpfulness votes from the community can indicate the overall quality of the answer, but they are often missing. Accurately predicting the helpfulness of an answer to a given question and thus identifying helpful answers is becoming a demanding need. Since the helpfulness of an answer depends on multiple perspectives instead of only topical relevance investigated in typical QA tasks, common answer selection algorithms are insufficient for tackling this task. In this paper, …


A Global Regression Method For Thermal Sharpening Of Urban Land Surface Temperatures From Modis And Landsat, James. W. Wang, Winston T. L. Chow, Yi-Chen Wang Apr 2020

A Global Regression Method For Thermal Sharpening Of Urban Land Surface Temperatures From Modis And Landsat, James. W. Wang, Winston T. L. Chow, Yi-Chen Wang

Research Collection School of Social Sciences

Land surface temperatures (LST) in urban landscapes are typically more heterogeneous than can be monitored by the spatial resolution of satellite-based thermal infrared sensors. Thermal sharpening (TS) methods permit the disaggregation of LST based on finer-grained multispectral information, but there is continued debate over which spectral indices are most appropriate for urban TS, and how they should be configured in a predictive regression framework. In this study, we evaluate the stability of various TS kernels with respect to LST at different spatial (Landsat 8) and diurnal (MODIS) scales, and present a new TS method, global regression for urban thermal sharpening …


Recipegpt: Generative Pre-Training Based Cooking Recipe Generation And Evaluation System, Helena Huey Chong Lee, Ke Shu, Palakorn Achananuparp, Philips Kokoh Prasetyo, Yue Liu, Ee-Peng Lim, Lav R. Varshney Apr 2020

Recipegpt: Generative Pre-Training Based Cooking Recipe Generation And Evaluation System, Helena Huey Chong Lee, Ke Shu, Palakorn Achananuparp, Philips Kokoh Prasetyo, Yue Liu, Ee-Peng Lim, Lav R. Varshney

Research Collection School Of Computing and Information Systems

Interests in the automatic generation of cooking recipes have been growing steadily over the past few years thanks to a large amount of online cooking recipes. We present RecipeGPT, a novel online recipe generation and evaluation system. The system provides two modes of text generations: (1) instruction generation from given recipe title and ingredients; and (2) ingredient generation from recipe title and cooking instructions. Its back-end text generation module comprises a generative pre-trained language model GPT-2 fine-tuned on a large cooking recipe dataset. Moreover, the recipe evaluation module allows the users to conveniently inspect the quality of the generated recipe …


Incorporating A Reverse Logistics Scheme In A Vehicle Routing Problem With Cross-Docking Network: A Modelling Approach, Audrey Tedja Widjaja, Aldy Gunawan, Panca Jodiawan, Vincent F. Yu Apr 2020

Incorporating A Reverse Logistics Scheme In A Vehicle Routing Problem With Cross-Docking Network: A Modelling Approach, Audrey Tedja Widjaja, Aldy Gunawan, Panca Jodiawan, Vincent F. Yu

Research Collection School Of Computing and Information Systems

Reverse logistics has been implemented by various companies because of its ability to gain more profit and maintain the competitiveness of the company. However, extensive studies on the vehicle routing problem with cross-docking (VRPCD) only considered the forward flow instead of the reverse flow. Motivated by the ability of a VRPCD network to minimize the distribution cost in the forward flow, this research incorporates the reverse logistics scheme in a VRPCD network, namely the VRP with reverse cross-docking (VRP-RCD). We propose a VRP-RCD mathematical model for a four-level supply chain network that involves suppliers, cross-dock, customers, and outlets. The main …