Screening Through A Broad Pool: Towards Better Diversity For Lexically Constrained Text Generation, 2024 Singapore Management University
Screening Through A Broad Pool: Towards Better Diversity For Lexically Constrained Text Generation, Changsen Yuan, Heyan Huang, Yixin Cao, Qianwen Cao
Research Collection School Of Computing and Information Systems
Lexically constrained text generation (CTG) is to generate text that contains given constrained keywords. However, the text diversity of existing models is still unsatisfactory. In this paper, we propose a lightweight dynamic refinement strategy that aims at increasing the randomness of inference to improve generation richness and diversity while maintaining a high level of fluidity and integrity. Our basic idea is to enlarge the number and length of candidate sentences in each iteration, and choose the best for subsequent refinement. On the one hand, different from previous works, which carefully insert one token between two words per action, we insert …
Simulated Annealing With Reinforcement Learning For The Set Team Orienteering Problem With Time Windows, 2024 Singapore Management University
Simulated Annealing With Reinforcement Learning For The Set Team Orienteering Problem With Time Windows, Vincent F. Yu, Nabila Y. Salsabila, Shih-W Lin, Aldy Gunawan
Research Collection School Of Computing and Information Systems
This research investigates the Set Team Orienteering Problem with Time Windows (STOPTW), a new variant of the well-known Team Orienteering Problem with Time Windows and Set Orienteering Problem. In the STOPTW, customers are grouped into clusters. Each cluster is associated with a profit attainable when a customer in the cluster is visited within the customer's time window. A Mixed Integer Linear Programming model is formulated for STOPTW to maximizing total profit while adhering to time window constraints. Since STOPTW is an NP-hard problem, a Simulated Annealing with Reinforcement Learning (SARL) algorithm is developed. The proposed SARL incorporates the core concepts …
Music Genre Classification Capabilities Of Enhanced Neural Network Architectures, 2024 University of Minnesota Morris
Music Genre Classification Capabilities Of Enhanced Neural Network Architectures, Joshua Engelkes
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
With the increase of digital music audio uploads, applications that deal with music information have been widely requested by streaming platforms. Automatic music genre classification is an important function of music recommendation and music search applications. Since the music genre categorization criteria continually shift, data-driven methods such as neural networks have been proven especially useful to music information retrieval. An enhanced CNN architecture, the Bottom-up Broadcast Neural Network, uses mel-spectrograms to push music data through a network where important low-level information is preserved. An enhanced RNN architecture, the Independent Recurrent Neural Network for Music Genre Classification, takes advantage of the …
Reverse Multi-Choice Dialogue Commonsense Inference With Graph-Of-Thought, 2024 Singapore Management University
Reverse Multi-Choice Dialogue Commonsense Inference With Graph-Of-Thought, Li Zheng, Hao Fei, Fei Li, Bobo Li, Lizi Liao, Donghong Ji, Chong Teng
Research Collection School Of Computing and Information Systems
With the proliferation of dialogic data across the Internet, the Dialogue Commonsense Multi-choice Question Answering (DC-MCQ) task has emerged as a response to the challenge of comprehending user queries and intentions. Although prevailing methodologies exhibit effectiveness in addressing single-choice questions, they encounter difficulties in handling multi-choice queries due to the heightened intricacy and informational density. In this paper, inspired by the human cognitive process of progressively excluding options, we propose a three-step Reverse Exclusion Graph-of-Thought (ReX-GoT) framework, including Option Exclusion, Error Analysis, and Combine Information. Specifically, our ReX-GoT mimics human reasoning by gradually excluding irrelevant options and learning the reasons …
Imitate The Good And Avoid The Bad: An Incremental Approach To Safe Reinforcement Learning, 2024 Singapore Management University
Imitate The Good And Avoid The Bad: An Incremental Approach To Safe Reinforcement Learning, Minh Huy Hoang, Mai Anh Tien, Pradeep Varakantham
Research Collection School Of Computing and Information Systems
A popular framework for enforcing safe actions in Reinforcement Learning (RL) is Constrained RL, where trajectory based constraints on expected cost (or other cost measures) are employed to enforce safety and more importantly these constraints are enforced while maximizing expected reward. Most recent approaches for solving Constrained RL convert the trajectory based cost constraint into a surrogate problem that can be solved using minor modifications to RL methods. A key drawback with such approaches is an over or underestimation of the cost constraint at each state. Therefore, we provide an approach that does not modify the trajectory based cost constraint …
Foodmask: Real-Time Food Instance Counting, Segmentation And Recognition, 2024 Singapore Management University
Foodmask: Real-Time Food Instance Counting, Segmentation And Recognition, Huu-Thanh Nguyen, Yu Cao, Chong-Wah Ngo, Wing-Kwong Chan
Research Collection School Of Computing and Information Systems
Food computing has long been studied and deployed to several applications. Understanding a food image at the instance level, including recognition, counting and segmentation, is essential to quantifying nutrition and calorie consumption. Nevertheless, existing techniques are limited to either category-specific instance detection, which does not reflect precisely the instance size at the pixel level, or category-agnostic instance segmentation, which is insufficient for dish recognition. This paper presents a compact and fast multi-task network, namely FoodMask, for clustering-based food instance counting, segmentation and recognition. The network learns a semantic space simultaneously encoding food category distribution and instance height at pixel basis. …
Handling Long And Richly Constrained Tasks Through Constrained Hierarchical Reinforcement Learning, 2024 Singapore Management University
Handling Long And Richly Constrained Tasks Through Constrained Hierarchical Reinforcement Learning, Yuxiao Lu, Arunesh Sinha, Pradeep Varakantham
Research Collection School Of Computing and Information Systems
Safety in goal directed Reinforcement Learning (RL) settings has typically been handled through constraints over trajectories and have demonstrated good performance in primarily short horizon tasks. In this paper, we are specifically interested in the problem of solving temporally extended decision making problems such as robots cleaning different areas in a house while avoiding slippery and unsafe areas (e.g., stairs) and retaining enough charge to move to a charging dock; in the presence of complex safety constraints. Our key contribution is a (safety) Constrained Search with Hierarchical Reinforcement Learning (CoSHRL) mechanism that combines an upper level constrained search agent (which …
Recommendations With Minimum Exposure Guarantees: A Post-Processing Framework, 2024 Singapore Management University
Recommendations With Minimum Exposure Guarantees: A Post-Processing Framework, Ramon Lopes, Rodrigo Alves, Antoine Ledent, Rodrygo L. T. Santos, Marius Kloft
Research Collection School Of Computing and Information Systems
Relevance-based ranking is a popular ingredient in recommenders, but it frequently struggles to meet fairness criteria because social and cultural norms may favor some item groups over others. For instance, some items might receive lower ratings due to some sort of bias (e.g. gender bias). A fair ranking should balance the exposure of items from advantaged and disadvantaged groups. To this end, we propose a novel post-processing framework to produce fair, exposure-aware recommendations. Our approach is based on an integer linear programming model maximizing the expected utility while satisfying a minimum exposure constraint. The model has fewer variables than previous …
When Evolutionary Computation Meets Privacy, 2024 Singapore Management University
When Evolutionary Computation Meets Privacy, Bowen Zhao, Wei-Neng Chen, Xiaoguo Li, Ximeng Liu, Qingqi Pei, Jun Zhang
Research Collection School Of Computing and Information Systems
Recently, evolutionary computation (EC) has experienced significant advancements due to the integration of machine learning, distributed computing, and big data technologies. These developments have led to new research avenues in EC, such as distributed EC and surrogate-assisted EC. While these advancements have greatly enhanced the performance and applicability of EC, they have also raised concerns regarding privacy leakages, specifically the disclosure of optimal results and surrogate models. Consequently, the combination of evolutionary computation and privacy protection becomes an increasing necessity. However, a comprehensive exploration of privacy concerns in evolutionary computation is currently lacking, particularly in terms of identifying the object, …
What Does One Billion Dollars Look Like?: Visualizing Extreme Wealth, 2024 The Graduate Center, City University of New York
What Does One Billion Dollars Look Like?: Visualizing Extreme Wealth, William Mahoney Luckman
Dissertations, Theses, and Capstone Projects
The word “billion” is a mathematical abstraction related to “big,” but it is difficult to understand the vast difference in value between one million and one billion; even harder to understand the vast difference in purchasing power between one billion dollars, and the average U.S. yearly income. Perhaps most difficult to conceive of is what that purchasing power and huge mass of capital translates to in terms of power. This project blends design, text, facts, and figures into an interactive narrative website that helps the user better understand their position in relation to extreme wealth: https://whatdoesonebilliondollarslooklike.website/
The site incorporates …
A Computational Profile Of Invasive Lionfish In Belize: A New Insight On A Destructive Species, 2024 Purdue University
A Computational Profile Of Invasive Lionfish In Belize: A New Insight On A Destructive Species, Joshua E. Balan
The Journal of Purdue Undergraduate Research
Since their discovery in the region in 2009, invasive Indonesian-native lionfish have been taking over the Belize Barrier Reef. As a result, populations of local species have dwindled as they are either eaten or outcompeted by the invaders. This has led to devastating losses ecologically and economically; massive industries in the local nations, such as fisheries and tourism, have suffered greatly. Attempting to combat this, local organizations, from nonprofits to ecotourism companies, have been manually spear-hunting them on scuba dives to cull the population. One such company, Reef Conservation Institute (ReefCI), operating out of Tom Owens Caye outside of Placencia, …
Strategic Research On Information Technology Promoting National Governance Modernization—Review On The S70th Xiangshan Science Conferences, 2024 Institutes of Science and Development, Chinese Academy of Sciences, Beijing 100190, China
Strategic Research On Information Technology Promoting National Governance Modernization—Review On The S70th Xiangshan Science Conferences, Chao Zhang, Weiyu Duan, Kaihua Chen, Xiaoguang Yang, Yuntao Long
Bulletin of Chinese Academy of Sciences (Chinese Version)
This study systematically summarizes the reports and speeches of the S70th Xiangshan Science Conferences on the theme of “Strategic Research on Information Technology Promoting the National Governance Modernization” and summarizes the consensus of the conference in the following three aspects. (1) Important progress and achievements have been made in the four typical areas, i.e., smart justice, internet governance, data governance, and emergency management. (2) Using information technology to promote the modernization of national governance is confronted with unprecedented opportunities and challenges. And (3) it is necessary to take a series of effective measures to promote information technology to facilitate the …
Student Attitudes And Intentions To Use Continuous Authentication Methods Applied To Mitigate Impersonation Attacks During E-Assessments, 2024 Nova Southeastern University
Student Attitudes And Intentions To Use Continuous Authentication Methods Applied To Mitigate Impersonation Attacks During E-Assessments, Andrea E. Green
CCE Theses and Dissertations
No solution can ultimately eliminate cheating in online courses. However, universities reserve funding for authentication systems to minimize the threat of cheating in online courses. Most higher education institutions use a combination of authentication methods to secure systems against impersonation attacks during online examinations. Authentication technologies ensure that an online course is protected from impersonation attacks. However, it is important that authentication methods secure systems against impersonation attacks with minimal disruption during an examination. Authentication methods applied to secure e-assessments against impersonation attacks may impact a student’s attitude and intentions to use the e-examination system.
In this regard, the research …
Predicting Viral Rumors And Vulnerable Users With Graph-Based Neural Multi-Task Learning For Infodemic Surveillance, 2024 Singapore Management University
Predicting Viral Rumors And Vulnerable Users With Graph-Based Neural Multi-Task Learning For Infodemic Surveillance, Xuan Zhang, Wei Gao
Research Collection School Of Computing and Information Systems
In the age of the infodemic, it is crucial to have tools for effectively monitoring the spread of rampant rumors that can quickly go viral, as well as identifying vulnerable users who may be more susceptible to spreading such misinformation. This proactive approach allows for timely preventive measures to be taken, mitigating the negative impact of false information on society. We propose a novel approach to predict viral rumors and vulnerable users using a unified graph neural network model. We pre-train network-based user embeddings and leverage a cross-attention mechanism between users and posts, together with a community-enhanced vulnerability propagation (CVP) …
Quantifying The Competitiveness Of A Dataset In Relation To General Preferences, 2024 Singapore Management University
Quantifying The Competitiveness Of A Dataset In Relation To General Preferences, Kyriakos Mouratidis, Keming Li, Bo Tang
Research Collection School Of Computing and Information Systems
Typically, a specific market (e.g., of hotels, restaurants, laptops, etc.) is represented as a multi-attribute dataset of the available products. The topic of identifying and shortlisting the products of most interest to a user has been well-explored. In contrast, in this work we focus on the dataset, and aim to assess its competitiveness with regard to different possible preferences. We define measures of competitiveness, and represent them in the form of a heat-map in the domain of preferences. Our work finds application in market analysis and in business development. These applications are further enhanced when the competitiveness heat-map is used …
Reducing Food Scarcity: The Benefits Of Urban Farming, 2023 Brigham Young University
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Journal of Nonprofit Innovation
Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.
Imagine Doris, who is …
Movie Recommendation System Using Content Based Filtering, 2023 Information Technology, Swami Vivekananda Institute of Technology, Secunderabad, India, 500003
Movie Recommendation System Using Content Based Filtering, Sribhashyam Rakesh
Al-Bahir Journal for Engineering and Pure Sciences
The movie recommendation system plays a crucial role in assisting movie enthusiasts in finding movies that match their interests, saving them from the overwhelming task of sifting through countless options. In this paper, we present a content-grounded movie recommendation system that leverages an attribute-based approach to offer personalized movie suggestions to users. The proposed method focuses on attributes such as cast, keywords, crew, and genres of movies to predict users' preferences accurately. Through extensive evaluation, our content-grounded recommendation system demonstrated significant improvements in performance compared to conventional methods. The precision and recall scores increased by an average of 20% and …
A Conceptual Decentralized Identity Solution For State Government, 2023 Mississippi State University
A Conceptual Decentralized Identity Solution For State Government, Martin Duclos
Theses and Dissertations
In recent years, state governments, exemplified by Mississippi, have significantly expanded their online service offerings to reduce costs and improve efficiency. However, this shift has led to challenges in managing digital identities effectively, with multiple fragmented solutions in use. This paper proposes a Self-Sovereign Identity (SSI) framework based on distributed ledger technology. SSI grants individuals control over their digital identities, enhancing privacy and security without relying on a centralized authority. The contributions of this research include increased efficiency, improved privacy and security, enhanced user satisfaction, and reduced costs in state government digital identity management. The paper provides background on digital …
Unmasking Shadows: Unraveling Crime Patterns In Nyc's Boroughs, 2023 CUNY New York City College of Technology
Unmasking Shadows: Unraveling Crime Patterns In Nyc's Boroughs, Jack Hachicho, Muhammad Hassan Butt
Publications and Research
New York City's crime dynamics have been on the rise for decades. Brooklyn and The Bronx have been disproportionately affected. This research aims to understand the crime landscape in these boroughs to formulate effective policies. Using crime data from official sources, statistical analyses, and data visualizations, the study identifies patterns and trends. The data encompasses over 400,000 reported incidents collected over the past 10 years, meticulously categorized by borough, crime type, and demographic information. Brooklyn has the highest overall crime rate, followed by The Bronx. Most shooting victims are Black. This highlights the need for holistic community programs to address …
Les Expositions Turnus, Une Page D’Histoire Transnationale Des Beaux-Arts En Suisse À La Fin Du Xixe Siècle. Et Comment Découvrir Les Humanités Numériques, 2023 Université de Genève, Switzerland
Les Expositions Turnus, Une Page D’Histoire Transnationale Des Beaux-Arts En Suisse À La Fin Du Xixe Siècle. Et Comment Découvrir Les Humanités Numériques, Béatrice Joyeux-Prunel
Artl@s Bulletin
Cet article présente le travail de la classe d’introduction aux humanités numériques de l’Université de Genève sur les expositions Turnus en Suisse à partir des années 1840. Près de 50 catalogues ont été retranscrits, décrits et structurés à l’aide de scripts Python, puis géolocalisés. Les données ont été ajoutées à BasArt, le répertoire mondial de catalogues d’expositions d’Artl@s (https://artlas.huma-num.fr/map). Elles permettent de mieux comprendre les premières années de ces expositions et leurs dynamiques locales, fédérales et internationales. Le Turnus fut une plaque tournante pour les artistes suisses, voire un tremplin vers le marché européen de l’art.