Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (7226)
- Databases and Information Systems (2961)
- Software Engineering (1895)
- Artificial Intelligence and Robotics (1081)
- Numerical Analysis and Scientific Computing (963)
-
- Information Security (937)
- Engineering (795)
- Social and Behavioral Sciences (774)
- Graphics and Human Computer Interfaces (676)
- Business (671)
- Theory and Algorithms (454)
- Computer Engineering (410)
- Operations Research, Systems Engineering and Industrial Engineering (366)
- Programming Languages and Compilers (310)
- Communication (301)
- OS and Networks (300)
- Social Media (244)
- Public Affairs, Public Policy and Public Administration (203)
- Environmental Sciences (169)
- Data Storage Systems (164)
- Medicine and Health Sciences (163)
- Transportation (163)
- International and Area Studies (153)
- Management Information Systems (153)
- Asian Studies (151)
- Education (145)
- Technology and Innovation (126)
- E-Commerce (120)
- Finance and Financial Management (98)
- Keyword
-
- Deep learning (109)
- Machine learning (105)
- Artificial intelligence (77)
- Singapore (77)
- Social media (73)
-
- Data mining (62)
- Cloud computing (57)
- Reinforcement learning (54)
- Optimization (51)
- Security (51)
- Privacy (50)
- Twitter (49)
- Online learning (48)
- Software engineering (47)
- Visualization (46)
- Deep Learning (45)
- Empirical study (45)
- Neural networks (45)
- Task analysis (44)
- Access control (41)
- Feature extraction (41)
- Algorithms (40)
- Blockchain (39)
- Semantics (39)
- Sustainability (39)
- Classification (38)
- Android (35)
- Anomaly detection (35)
- Clustering (35)
- Collaboration (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (6891)
- Dissertations and Theses Collection (Open Access) (128)
- Research Collection Lee Kong Chian School Of Business (94)
- Research Collection School of Social Sciences (49)
- Research Collection College of Integrative Studies (44)
-
- Perspectives@SMU (38)
- Asian Management Insights (35)
- Research Collection Yong Pung How School Of Law (30)
- Research Collection School Of Accountancy (23)
- Research Collection School Of Economics (22)
- Dissertations and Theses Collection (15)
- SMU Press Releases (12)
- MITB Thought Leadership Series (11)
- Research@SMU: Connecting the Dots (10)
- Research Collection School of Computing and Information Systems (9)
- LARC Research Publications (7)
- Research Collection Library (6)
- Social Space (5)
- SMU Research Data (4)
- Sim Kee Boon Institute for Financial Economics (4)
- 2024 AI for Research Week (3)
- Centre for Computational Law (3)
- CMP Research (2)
- Centre for AI & Data Governance (2)
- Research Collection Office of Research (2)
- Library Events (1)
- Oral History Collection (1)
- ROSA Journal Articles and Publications (1)
- Research Collection School of Accountancy (1)
- Research@SMU Infographics (1)
- Publication Type
- File Type
Articles 2371 - 2400 of 7454
Full-Text Articles in Physical Sciences and Mathematics
Rankbooster: Visual Analysis Of Ranking Predictions, Abishek Puri, Bon Kyung Ku, Yong Wang, Huamin Qu
Rankbooster: Visual Analysis Of Ranking Predictions, Abishek Puri, Bon Kyung Ku, Yong Wang, Huamin Qu
Research Collection School Of Computing and Information Systems
Ranking is a natural and ubiquitous way to facilitate decision-making in various applications. However, different rankings are often used for the same set of entities, with each ranking method placing emphasis on different factors. These factors can also be multi-dimensional in nature, compounding the problem. This complexity can make it challenging for an entity which is being ranked to understand what they can do to improve their rankings, and to analyze the effect of changes in various factors to their overall rank. In this paper, we present RankBooster, a novel visual analytics system to help users conveniently investigate ranking predictions. …
Hierarchical Multiagent Reinforcement Learning For Maritime Traffic Management, Arambam James Singh, Akshat Kumar, Hoong Chuin Lau
Hierarchical Multiagent Reinforcement Learning For Maritime Traffic Management, Arambam James Singh, Akshat Kumar, Hoong Chuin Lau
Research Collection School Of Computing and Information Systems
Increasing global maritime traffic coupled with rapid digitization and automation in shipping mandate developing next generation maritime traffic management systems to mitigate congestion, increase safety of navigation, and avoid collisions in busy and geographically constrained ports (such as Singapore's). To achieve these objectives, we model the maritime traffic as a large multiagent system with individual vessels as agents, and VTS (Vessel Traffic Service) authority as a regulatory agent. We develop a hierarchical reinforcement learning approach where vessels first select a high level action based on the underlying traffic flow, and then select the low level action that determines their future …
Automated Identification Of Libraries From Vulnerability Data, Chen Yang, Andrew Santosa, Asankhaya Sharma, David Lo
Automated Identification Of Libraries From Vulnerability Data, Chen Yang, Andrew Santosa, Asankhaya Sharma, David Lo
Research Collection School Of Computing and Information Systems
Software Composition Analysis (SCA) has gained traction in recent years with a number of commercial offerings from various companies. SCA involves vulnerability curation process where a group of security researchers, using various data sources, populate a database of open-source library vulnerabilities, which is used by a scanner to inform the end users of vulnerable libraries used by their applications. One of the data sources used is the National Vulnerability Database (NVD). The key challenge faced by the security researchers here is in figuring out which libraries are related to each of the reported vulnerability in NVD. In this article, we …
Statistical Modeling Of Harassment Against Reddit Moderators, Hamad Bin Khalifa University, Haewoon Kwak
Statistical Modeling Of Harassment Against Reddit Moderators, Hamad Bin Khalifa University, Haewoon Kwak
Research Collection School Of Computing and Information Systems
Despite the dedication that some volunteer moderators of online communities display when performing their moderation duties, they become targets of hate and harassment by other users. To understand what causes the change in moderator role from heroes to victims, we analyze the responses of 1,818 moderators on Reddit to an online survey about moderation practices and harassment. We built a statistical model and found 6 significant independent variables that affect harassment on moderators, such as the knowledge of community norms, which increases harassment on moderators the most. Our findings imply that vulnerable moderators in toxic communities need countermeasures against harassment.
Text Analytics, Nlp, And Accounting Research, Richard M. Crowley
Text Analytics, Nlp, And Accounting Research, Richard M. Crowley
Research Collection School Of Accountancy
The presentation covered: What is text analytics and NLP?; How text analytics has evolved in the accounting literature since the 1980s; What current (as of 2020) methods are used in the literature; What methods are on the horizon.
Green Bonds For Financing Renewable Energy And Energy Efficiency In South-East Asia: A Review Of Policies, Dina Azhgaliyeva, Anant Kapoor, Yang Liu
Green Bonds For Financing Renewable Energy And Energy Efficiency In South-East Asia: A Review Of Policies, Dina Azhgaliyeva, Anant Kapoor, Yang Liu
Research Collection Lee Kong Chian School Of Business
Mobilizing private finance for renewable energy and energy efficiency is critical for Association of South-East Asian Nations (ASEAN) not only for the reduction of global temperature rise but also for meeting fast-growing energy demand. Two-thirds of green bonds issued in ASEAN were used to finance renewable energy and energy efficiency projects. This paper provides a review of green bond issuance and green bond policies in ASEAN. Issuance of green bonds in top three green bond issuing countries in ASEAN, i.e. Indonesia, Malaysia and Singapore, are reviewed in detail. Green bond policies in ASEAN are effective in promoting green bond issuance. …
Are These Comments Triggering? Predicting Triggers Of Toxicity In Online Discussions, Hind Almerekhi, Haewoon Kwak, Joni Salminen, Bernard J. Jansen
Are These Comments Triggering? Predicting Triggers Of Toxicity In Online Discussions, Hind Almerekhi, Haewoon Kwak, Joni Salminen, Bernard J. Jansen
Research Collection School Of Computing and Information Systems
Understanding the causes or triggers of toxicity adds a new dimension to the prevention of toxic behavior in online discussions. In this research, we define toxicity triggers in online discussions as a non-toxic comment that lead to toxic replies. Then, we build a neural network-based prediction model for toxicity trigger. The prediction model incorporates text-based features and derived features from previous studies that pertain to shifts in sentiment, topic flow, and discussion context. Our findings show that triggers of toxicity contain identifiable features and that incorporating shift features with the discussion context can be detected with a ROC-AUC score of …
How To And How Much? Teaching Ethics In An Interaction Design Course, Bimlesh Wadhwa, Eng Lieh Ouh, Benjamin Gan
How To And How Much? Teaching Ethics In An Interaction Design Course, Bimlesh Wadhwa, Eng Lieh Ouh, Benjamin Gan
Research Collection School Of Computing and Information Systems
How much is sufficient and how should one teach ethics in an Interaction Design curriculum in undergraduate computing program has been a point of dilemma for many HCI educators. We conducted a preliminary study using a mixed method to gather perception on ethics in our interaction design courses at two of the leading Singapore Universities. We answer three research questions specific to an undergraduate HCI course: Is there a need for ethics? Is there sufficient ethics coverage? and how to teach ethics? We surveyed 140 students and interviewed six teachers in two Singapore Universities. Our findings suggest that 92% of …
Attribute-Based Cloud Data Integrity Auditing For Secure Outsourced Storage, Yong Yu, Yannan Li, Bo Yang, Willy Susilo, Guomin Yang, Jian Bai
Attribute-Based Cloud Data Integrity Auditing For Secure Outsourced Storage, Yong Yu, Yannan Li, Bo Yang, Willy Susilo, Guomin Yang, Jian Bai
Research Collection School Of Computing and Information Systems
Outsourced storage such as cloud storage can significantly reduce the burden of data management of data owners. Despite of a long list of merits of cloud storage, it triggers many security risks at the same time. Data integrity, one of the most burning challenges in secure cloud storage, is a fundamental and pivotal element in outsourcing services. Outsourced data auditing protocols enable a verifier to efficiently check the integrity of the outsourced files without downloading the entire file from the cloud, which can dramatically reduce the communication overhead between the cloud server and the verifier. Existing protocols are mostly based …
Improving Neural Relation Extraction With Implicit Mutual Relations, Jun Kuang, Yixin Cao, Jianbing Zheng, Xiangnan He, Ming Gao, Aoying Zhou
Improving Neural Relation Extraction With Implicit Mutual Relations, Jun Kuang, Yixin Cao, Jianbing Zheng, Xiangnan He, Ming Gao, Aoying Zhou
Research Collection School Of Computing and Information Systems
Relation extraction (RE) aims at extracting the relation between two entities from the text corpora. It is a crucial task for Knowledge Graph (KG) construction. Most existing methods predict the relation between an entity pair by learning the relation from the training sentences, which contain the targeted entity pair. In contrast to existing distant supervision approaches that suffer from insufficient training corpora to extract relations, our proposal of mining implicit mutual relation from the massive unlabeled corpora transfers the semantic information of entity pairs into the RE model, which is more expressive and semantically plausible. After constructing an entity proximity …
On The Robustness Of Cascade Diffusion Under Node Attacks, Alvis Logins, Yuchen Li, Panagiotis Karras
On The Robustness Of Cascade Diffusion Under Node Attacks, Alvis Logins, Yuchen Li, Panagiotis Karras
Research Collection School Of Computing and Information Systems
How can we assess a network's ability to maintain its functionality under attacks? Network robustness has been studied extensively in the case of deterministic networks. However, applications such as online information diffusion and the behavior of networked public raise a question of robustness in probabilistic networks. We propose three novel robustness measures for networks hosting a diffusion under the Independent Cascade (IC) model, susceptible to node attacks. The outcome of such a process depends on the selection of its initiators, or seeds, by the seeder, as well as on two factors outside the seeder's discretion: the attack strategy and the …
Designing A Smart Internet Of Things Solution For Point Of Use Water Filtration Management System In Residential, Commercial And Public Settings, Tristan Lim, Hwee-Pink Tan, Chin Sin Ong, Rahul Belani, Siddhant S. K. Agrawal
Designing A Smart Internet Of Things Solution For Point Of Use Water Filtration Management System In Residential, Commercial And Public Settings, Tristan Lim, Hwee-Pink Tan, Chin Sin Ong, Rahul Belani, Siddhant S. K. Agrawal
Research Collection School Of Computing and Information Systems
The use of water filtration Point-of-Use (POU) systems are extensive, ranging from water dispensers in public estates, to household POU water systems. Manufacturers typically recommend filtration cartridges to be changed (i) after their useful life, or (ii) when the water flow volume have exceeded certain capacity, whichever is earlier. However, filtration mechanisms are typically not changed with sufficient regularity. Overused filters can result in negative health effects, over and above the deterioration and loss of filtration benefits of the POU water system. Presently most existing water purification systems do not have smart connected Internet of Things (IoT) means of informing …
Maptransfer: Urban Air Quality Map Generation For Downscaled Sensor Deployments, Yun Cheng, Xiaoxi He, Zimu Zhou, Lothar Thiele
Maptransfer: Urban Air Quality Map Generation For Downscaled Sensor Deployments, Yun Cheng, Xiaoxi He, Zimu Zhou, Lothar Thiele
Research Collection School Of Computing and Information Systems
Dense deployments of commodity air quality sensors have proven effective to provide spatially-resolved information on urban air pollution in real-time. However, long-term operation of a dense sensor deployment incurs enormous maintenance expenses and efforts. A cost-effective alternative is to first collect measurements with an initial dense deployment and then rely on a small subset of sensors for air quality map generation. To avoid dramatic accuracy degradation in air quality maps generated using the downscaled sparse deployment, we design MapTransfer, an air quality map generation scheme which augments the current sensor measurements from the downscaled sparse deployment with appropriate historical data …
Techniques To Visualize Occluded Graph Elements For 2.5d Map Editing, Kazuyuki Fujita, Daigo Hayashi, Kotaro Hara, Kazuki Takashima, Yoshifumi Kitamura
Techniques To Visualize Occluded Graph Elements For 2.5d Map Editing, Kazuyuki Fujita, Daigo Hayashi, Kotaro Hara, Kazuki Takashima, Yoshifumi Kitamura
Research Collection School Of Computing and Information Systems
We propose an interface with two novel techniques to visualize occluded graph nodes and edges that help the user edit map data with a 2.5D geographical structure (e.g., multi-floor indoor maps). We first design a visualization technique —Repel Signification— that employs micro-animation to signify the graph elements that are overlapping with each other (and potentially erroneous). We also design a technique that enables the user to edit the occluded components with Expansion Interaction, which simultaneously visualizes both in-floor and across-floor occluded connections between the map elements. The combination of the two methods would enable the map editors (non-experts) to effectively …
Leakage-Resilient Biometric-Based Remote User Authentication With Fuzzy Extractors, Yangguang Tian, Yingjiu Li, Binanda Sengupta, Nan Li, Chunhua Su
Leakage-Resilient Biometric-Based Remote User Authentication With Fuzzy Extractors, Yangguang Tian, Yingjiu Li, Binanda Sengupta, Nan Li, Chunhua Su
Research Collection School Of Computing and Information Systems
Fuzzy extractors convert biometrics and other noisy data into a cryptographic key for security applications such as remote user authentication. Leakage attacks, such as side channel attacks, have been extensively modelled and studied in the literature. However, to the best of our knowledge, leakage attacks to biometric-based remote user authentication with fuzzy extractors have never been studied rigorously. In this paper, we propose a generic framework of leakage-resilient and privacy-preserving biometric-based remote user authentication that allows an authorized user to securely authenticate herself to a remote authentication server using her biometrics. In particular, the authorized user relies only on her …
A New Construction For Linkable Secret Handshake, Yangguang Tian, Yingjiu Li, Robert H. Deng, Nan Li, Guomin Yang, Zheng Yang
A New Construction For Linkable Secret Handshake, Yangguang Tian, Yingjiu Li, Robert H. Deng, Nan Li, Guomin Yang, Zheng Yang
Research Collection School Of Computing and Information Systems
In this paper, we introduce a new construction for linkable secret handshake that allows authenticated users to perform handshake anonymously within allowable times. We define formal security models for the new construction, and prove that it can achieve session key security, anonymity, untraceability and linkable affiliation-hiding. In particular, the proposed construction ensures that (i) anyone can trace the real identities of dishonest users who perform handshakes for more than k times; and (ii) an optimal communication cost between authorized users is achieved by exploiting the proof of knowledges.
Poster Abstract: Data Communication Using Switchable Privacy Glass, Changshuo Hu, Dong Ma, Mahbub Hassan, Wen Hu
Poster Abstract: Data Communication Using Switchable Privacy Glass, Changshuo Hu, Dong Ma, Mahbub Hassan, Wen Hu
Research Collection School Of Computing and Information Systems
Switchable privacy glass can electronically change its state between opaque and transparent. In this work, we propose to exploit the electronic configurability of switchable glass to modulate natural light, which can be demodulated by a nearby receiver with light sensing capability to realise data communication over natural light. A key advantage is that no energy is used to generate light, as it simply modulates the existing light in the nature. We demonstrate that the proposed data communication using switchable glass modulation can achieve 33.33 bits per second communication with a bit rate below 1% under a wide range of ambient …
Energy-Efficient Distance-Bounding With Residual Charge Computation, Yunhui Zhuang, Anjia Yang, Gerhard Hancke, Duncan S. Wong, Guomin Yang
Energy-Efficient Distance-Bounding With Residual Charge Computation, Yunhui Zhuang, Anjia Yang, Gerhard Hancke, Duncan S. Wong, Guomin Yang
Research Collection School Of Computing and Information Systems
Real-time location systems are often required in industrial applications. In addition to securely determining an item's location, these systems also need to accommodate energy-limited tracking tokens. Distance-bounding protocols enable a Verifier to cryptographically determine an upper-bound on the physical distance to a Prover by measuring the round-trip time of specially designed challenge-response messages. This type of protocols serve as countermeasure to three common attacks on location-based systems and have been extensively studied with the goal of achieving optimal security bounds for the respective attacks. In this paper, we propose a new energy-efficient distance-bounding protocol that protects against all three common …
On The Security Of Lwe Cryptosystem Against Subversion Attacks, Zhichao Yang, Rongmao Chen, Chao Li, Longjiang Qu, Guomin Yang
On The Security Of Lwe Cryptosystem Against Subversion Attacks, Zhichao Yang, Rongmao Chen, Chao Li, Longjiang Qu, Guomin Yang
Research Collection School Of Computing and Information Systems
Subversion of cryptography has received wide attentions especially after the Snowden Revelations in 2013. Most of the currently proposed subversion attacks essentially rely on the freedom of randomness choosing in the cryptographic protocol to hide backdoors embedded in the cryptosystems. Despite the fact that significant progresses in this line of research have been made, most of them mainly considered the classical setting, while the research gap regarding subversion attacks against post-quantum cryptography remains tremendous. Inspired by this observation, we investigate a subversion attack against existing protocol that is proved post-quantum secure. Particularly, we show an efficient way to undetectably subvert …
Reinforced Negative Sampling Over Knowledge Graph For Recommendation, Xiang Wang, Yaokun Xu, Xiangnan He, Yixin Cao, Meng Wang, Tat-Seng Chua
Reinforced Negative Sampling Over Knowledge Graph For Recommendation, Xiang Wang, Yaokun Xu, Xiangnan He, Yixin Cao, Meng Wang, Tat-Seng Chua
Research Collection School Of Computing and Information Systems
Properly handling missing data is a fundamental challenge in recommendation. Most present works perform negative sampling from unobserved data to supply the training of recommender models with negative signals. Nevertheless, existing negative sampling strategies, either static or adaptive ones, are insufficient to yield high-quality negative samples — both informative to model training and reflective of user real needs. In this work, we hypothesize that item knowledge graph (KG), which provides rich relations among items and KG entities, could be useful to infer informative and factual negative samples. Towards this end, we develop a new negative sampling model, Knowledge Graph Policy …
Google Summer Of Code: Student Motivations And Contributions, Jefferson O. Silva, Igor Scaliante Wiese, Daniel M. Germán, Christoph Treude, Marco Aurélio Gerosa, Igor Steinmacher
Google Summer Of Code: Student Motivations And Contributions, Jefferson O. Silva, Igor Scaliante Wiese, Daniel M. Germán, Christoph Treude, Marco Aurélio Gerosa, Igor Steinmacher
Research Collection School Of Computing and Information Systems
Several open source software (OSS) projects participate in engagement programs like Summers of Code expecting to foster newcomers’ onboarding and receive contributions. However, scant empirical evidence identifies why students join such programs. In this paper, we study the well-established Google Summer of Code (GSoC), which is a 3-month OSS engagement program that offers stipends and mentorship to students willing to contribute to OSS projects. We combined a survey (of students and mentors) and interviews (of students) to understand what motivates students to enter GSoC. Our results show that students enter GSoC for an enriching experience, and not necessarily to become …
A Cue Adaptive Decoder For Controllable Neural Response Generation, Weichao Wang, Shi Feng, Wei Gao, Daling Wang, Yifei Zhang
A Cue Adaptive Decoder For Controllable Neural Response Generation, Weichao Wang, Shi Feng, Wei Gao, Daling Wang, Yifei Zhang
Research Collection School Of Computing and Information Systems
In open-domain dialogue systems, dialogue cues such as emotion, persona, and emoji can be incorporated into conversation models for strengthening the semantic relevance of generated responses. Existing neural response generation models either incorporate dialogue cue into decoder’s initial state or embed the cue indiscriminately into the state of every generated word, which may cause the gradients of the embedded cue to vanish or disturb the semantic relevance of generated words during back propagation. In this paper, we propose a Cue Adaptive Decoder (CueAD) that aims to dynamically determine the involvement of a cue at each generation step in the decoding. …
Raising Funds In The Era Of Digital Economy, Deserina Sulaeman
Raising Funds In The Era Of Digital Economy, Deserina Sulaeman
Dissertations and Theses Collection (Open Access)
The rapid advancement in technology and internet penetration have substantially increased the number of economic transactions conducted online. Platforms that connect economic agents play an important role in this digital economy. The unbridled proliferation of digital platforms calls for a closer examination of the factors that could affect the welfare of the increasing number of economic agents who participate in them.
This dissertation examines the factors that could affect the welfare of agents using the setting of a crowdfunding platform where fundraisers develop campaigns to solicit funding from potential donors. These factors can be broadly categorized into three distinct groups: …
Identity-Based Encryption Transformation For Flexible Sharing Of Encrypted Data In Public Cloud, Robert H. Deng, Zheng Qin, Qianhong Wu, Zhenyu Guan, Robert H. Deng, Yujue Wang, Yunya Zhou
Identity-Based Encryption Transformation For Flexible Sharing Of Encrypted Data In Public Cloud, Robert H. Deng, Zheng Qin, Qianhong Wu, Zhenyu Guan, Robert H. Deng, Yujue Wang, Yunya Zhou
Research Collection School Of Computing and Information Systems
With the rapid development of cloud computing, an increasing number of individuals and organizations are sharing data in the public cloud. To protect the privacy of data stored in the cloud, a data owner usually encrypts his data in such a way that certain designated data users can decrypt the data. This raises a serious problem when the encrypted data needs to be shared to more people beyond those initially designated by the data owner. To address this problem, we introduce and formalize an identity-based encryption transformation (IBET) model by seamlessly integrating two well-established encryption mechanisms, namely identity-basedencryption (IBE) and …
A Generalized Formal Semantic Framework For Smart Contracts, Jiao Jiao, Shang-Wei Lin, Jun Sun
A Generalized Formal Semantic Framework For Smart Contracts, Jiao Jiao, Shang-Wei Lin, Jun Sun
Research Collection School Of Computing and Information Systems
Smart contracts can be regarded as one of the most popular blockchain-based applications. The decentralized nature of the blockchain introduces vulnerabilities absent in other programs. Furthermore, it is very difficult, if not impossible, to patch a smart contract after it has been deployed. Therefore, smart contracts must be formally verified before they are deployed on the blockchain to avoid attacks exploiting these vulnerabilities. There is a recent surge of interest in analyzing and verifying smart contracts. While most of the existing works either focus on EVM bytecode or translate Solidity contracts into programs in intermediate languages for analysis and verification, …
Artificial Intelligence-Enhanced Predictive Insights For Advancing Financial Inclusion: A Human-Centric Ai-Thinking Approach, Meng Leong How, Sin Mei Cheah, Aik Cheow Khor, Yong Jiet Chan
Artificial Intelligence-Enhanced Predictive Insights For Advancing Financial Inclusion: A Human-Centric Ai-Thinking Approach, Meng Leong How, Sin Mei Cheah, Aik Cheow Khor, Yong Jiet Chan
Research Collection Lee Kong Chian School Of Business
According to the World Bank, a key factor to poverty reduction and improving prosperity is financial inclusion. Financial service providers (FSPs) offering financially-inclusive solutions need to understand how to approach the underserved successfully. The application of artificial intelligence (AI) on legacy data can help FSPs to anticipate how prospective customers may respond when they are approached. However, it remains challenging for FSPs who are not well-versed in computer programming to implement AI projects. This paper proffers a no-coding human-centric AI-based approach to simulate the possible dynamics between the financial profiles of prospective customers collected from 45,211 contact encounters and predict …
Review-Guided Helpful Answer Identification In E-Commerce, Wenxuan Zhang, Wai Lam, Yang Deng, Jing Ma
Review-Guided Helpful Answer Identification In E-Commerce, Wenxuan Zhang, Wai Lam, Yang Deng, Jing Ma
Research Collection School Of Computing and Information Systems
Product-specific community question answering platforms can greatly help address the concerns of potential customers. However, the user-provided answers on such platforms often vary a lot in their qualities. Helpfulness votes from the community can indicate the overall quality of the answer, but they are often missing. Accurately predicting the helpfulness of an answer to a given question and thus identifying helpful answers is becoming a demanding need. Since the helpfulness of an answer depends on multiple perspectives instead of only topical relevance investigated in typical QA tasks, common answer selection algorithms are insufficient for tackling this task. In this paper, …
A Global Regression Method For Thermal Sharpening Of Urban Land Surface Temperatures From Modis And Landsat, James. W. Wang, Winston T. L. Chow, Yi-Chen Wang
A Global Regression Method For Thermal Sharpening Of Urban Land Surface Temperatures From Modis And Landsat, James. W. Wang, Winston T. L. Chow, Yi-Chen Wang
Research Collection School of Social Sciences
Land surface temperatures (LST) in urban landscapes are typically more heterogeneous than can be monitored by the spatial resolution of satellite-based thermal infrared sensors. Thermal sharpening (TS) methods permit the disaggregation of LST based on finer-grained multispectral information, but there is continued debate over which spectral indices are most appropriate for urban TS, and how they should be configured in a predictive regression framework. In this study, we evaluate the stability of various TS kernels with respect to LST at different spatial (Landsat 8) and diurnal (MODIS) scales, and present a new TS method, global regression for urban thermal sharpening …
Recipegpt: Generative Pre-Training Based Cooking Recipe Generation And Evaluation System, Helena Huey Chong Lee, Ke Shu, Palakorn Achananuparp, Philips Kokoh Prasetyo, Yue Liu, Ee-Peng Lim, Lav R. Varshney
Recipegpt: Generative Pre-Training Based Cooking Recipe Generation And Evaluation System, Helena Huey Chong Lee, Ke Shu, Palakorn Achananuparp, Philips Kokoh Prasetyo, Yue Liu, Ee-Peng Lim, Lav R. Varshney
Research Collection School Of Computing and Information Systems
Interests in the automatic generation of cooking recipes have been growing steadily over the past few years thanks to a large amount of online cooking recipes. We present RecipeGPT, a novel online recipe generation and evaluation system. The system provides two modes of text generations: (1) instruction generation from given recipe title and ingredients; and (2) ingredient generation from recipe title and cooking instructions. Its back-end text generation module comprises a generative pre-trained language model GPT-2 fine-tuned on a large cooking recipe dataset. Moreover, the recipe evaluation module allows the users to conveniently inspect the quality of the generated recipe …
Incorporating A Reverse Logistics Scheme In A Vehicle Routing Problem With Cross-Docking Network: A Modelling Approach, Audrey Tedja Widjaja, Aldy Gunawan, Panca Jodiawan, Vincent F. Yu
Incorporating A Reverse Logistics Scheme In A Vehicle Routing Problem With Cross-Docking Network: A Modelling Approach, Audrey Tedja Widjaja, Aldy Gunawan, Panca Jodiawan, Vincent F. Yu
Research Collection School Of Computing and Information Systems
Reverse logistics has been implemented by various companies because of its ability to gain more profit and maintain the competitiveness of the company. However, extensive studies on the vehicle routing problem with cross-docking (VRPCD) only considered the forward flow instead of the reverse flow. Motivated by the ability of a VRPCD network to minimize the distribution cost in the forward flow, this research incorporates the reverse logistics scheme in a VRPCD network, namely the VRP with reverse cross-docking (VRP-RCD). We propose a VRP-RCD mathematical model for a four-level supply chain network that involves suppliers, cross-dock, customers, and outlets. The main …