Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

2018

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 31 - 60 of 364

Full-Text Articles in Databases and Information Systems

An Economic Analysis Of Incentivized Positive Reviews, Jianqing Chen, Zhiling Guo, Jian Huang Dec 2018

An Economic Analysis Of Incentivized Positive Reviews, Jianqing Chen, Zhiling Guo, Jian Huang

Research Collection School Of Computing and Information Systems

It becomes increasingly popular that some large online retailers such as Amazon open their platforms to allow third-party retail competitors to sell on their own platforms. We develop an analytical model to examine this retailer marketplace model and its business impact. We assume that a leading retailer has both valuation advantage that may come from its reputation and information advantage that may come from its brand awareness. We find that the availability of relatively low-cost advertising through social media or search engine can effectively reduce the leading retailer's information advantage, and thus be an important driving force for its strategic …


Improving Strategic It Investment Decisions By Reducing Information Asymmetry, Thomas P. Stablein Nov 2018

Improving Strategic It Investment Decisions By Reducing Information Asymmetry, Thomas P. Stablein

USF Tampa Graduate Theses and Dissertations

The unprecedented ubiquity with which technological advancements, such as blockchain, the Internet of things (IoT), big data, machine learning, and artificial intelligence (AI), are impacting the world has forced large organizations to rethink their information technology roadmaps. Their decisions about how they invest in technology have become more important. It is against this backdrop that companies must decide how much to invest in their aging technologies versus these new potentially transformational ones. A decision is only as good as the information available to the decision-makers when they make it. This research project seeks to understand the effects that information asymmetry …


Enhancing The Design Of A Cybersecurity Risk Management Solution For Communities Of Trust, James E. Fulford Jr. Nov 2018

Enhancing The Design Of A Cybersecurity Risk Management Solution For Communities Of Trust, James E. Fulford Jr.

USF Tampa Graduate Theses and Dissertations

Research into cybersecurity risks and various methods of evaluating those threats has become an increasingly important area of academic and practitioner investigations. Of particular interest in this field is enhancing the designs and informing capabilities of cybersecurity risk management solutions for users who desire to understand how organizations are impacted when such risks are exploited. Many of the cybersecurity risk management solutions are extremely technical and require their users to have a commensurate level of technical acumen. In the situation evaluated during this research project, the founders of the company being researched had created a highly technical risk management solution …


Performance Indicators Analysis Inside A Call Center Using A Simulation Program, Ditila Ekmekçiu, Markela Muça, Adrian Naço Nov 2018

Performance Indicators Analysis Inside A Call Center Using A Simulation Program, Ditila Ekmekçiu, Markela Muça, Adrian Naço

International Journal of Business and Technology

This paper deals with and shows the results of different performance indicators analyses made utilizing the help of Simulation and concentrated on dimensioning problems of handling calls capacity in a call center. The goal is to measure the reactivity of the call center’s performance to potential changes of critical variables. The literature related to the employment of this kind of instrument in call centers is reviewed, and the method that this problem is treated momentarily is precisely described. The technique used to obtain this paper’s goal implicated a simulation model using Arena Contact Center software that worked as a key …


Modelling Business And Management Systems Using Fuzzy Cognitive Maps: A Critical Overview, Peter P. Groumpos Nov 2018

Modelling Business And Management Systems Using Fuzzy Cognitive Maps: A Critical Overview, Peter P. Groumpos

International Journal of Business and Technology

A critical overview of modelling Business and Management (B&M) Systems using Fuzzy Cognitive Maps is presented. A limited but illustrative number of specific applications of Fuzzy Cognitive Maps in diverse B&M systems, such as e business, performance assessment, decision making, human resources management, planning and investment decision making processes is provided and briefly analyzed. The limited survey is given in a table with statics of using FCMs in B&M systems during the last 15 years. The limited survey shows that the applications of Fuzzy Cognitive Maps to today’s Business and Management studies has been steadily increased especially during the last …


Personalized Microblog Sentiment Classification Via Adversarial Cross-Lingual Learning, Weichao Wang, Shi Feng, Wei Gao, Daling Wang, Yifei Zhang Nov 2018

Personalized Microblog Sentiment Classification Via Adversarial Cross-Lingual Learning, Weichao Wang, Shi Feng, Wei Gao, Daling Wang, Yifei Zhang

Research Collection School Of Computing and Information Systems

Sentiment expression in microblog posts can be affected by user’s personal character, opinion bias, political stance and so on. Most of existing personalized microblog sentiment classification methods suffer from the insufficiency of discriminative tweets for personalization learning. We observed that microblog users have consistent individuality and opinion bias in different languages. Based on this observation, in this paper we propose a novel user-attention-based Convolutional Neural Network (CNN) model with adversarial cross-lingual learning framework. The user attention mechanism is leveraged in CNN model to capture user’s language-specific individuality from the posts. Then the attention-based CNN model is incorporated into a novel …


Cross-Border Interbank Payments And Settlements: Emerging Opportunities For Digital Transformation, Yi Meng Lau, Et Al Nov 2018

Cross-Border Interbank Payments And Settlements: Emerging Opportunities For Digital Transformation, Yi Meng Lau, Et Al

Research Collection School Of Computing and Information Systems

The report “Cross-Border Interbank Payments and Settlements” is a cross-jurisdictional industry collaboration between Canada, Singapore and the United Kingdom to examine the existing challenges and frictions that arise when undertaking crossborder payments. This report explores proposals for new and more efficient models for processing cross-border transactions.


Double Learning Or Double Blinding: An Investigation Of Vendor Private Information Acquisition And Consumer Learning Via Online Reviews, Nan Hu, Kevin E. Dow, Alain Yee Loong Chong, Ling Liu Nov 2018

Double Learning Or Double Blinding: An Investigation Of Vendor Private Information Acquisition And Consumer Learning Via Online Reviews, Nan Hu, Kevin E. Dow, Alain Yee Loong Chong, Ling Liu

Research Collection School Of Computing and Information Systems

In this paper, building upon information acquisition theory and using portfolio methods and system equations, we made an empirical investigation into how online vendors and consumers are learning from each other, and how online reviews, prices, and sales interact among each other. First, this study shows that vendors acquire information from both private and public channels to learn the quality of their products to make price adjustment. Second, for the more popular products and newly released products, vendors are more motivated to acquire private information that is more precise than the average precision to adjust their price. Third, we document …


Vpsearch: Achieving Verifiability For Privacy-Preserving Multi-Keyword Search Over Encrypted Cloud Data, Zhiguo Wan, Robert H. Deng Nov 2018

Vpsearch: Achieving Verifiability For Privacy-Preserving Multi-Keyword Search Over Encrypted Cloud Data, Zhiguo Wan, Robert H. Deng

Research Collection School Of Computing and Information Systems

Although cloud computing offers elastic computation and storage resources, it poses challenges on verifiability of computations and data privacy. In this work we investigate verifiability for privacy-preserving multi-keyword search over outsourced documents. As the cloud server may return incorrect results due to system faults or incentive to reduce computation cost, it is critical to offer verifiability of search results and privacy protection for outsourced data at the same time. To fulfill these requirements, we design aVerifiablePrivacy-preserving keywordSearch scheme, called VPSearch, by integrating an adapted homomorphic MAC technique with a privacy-preserving multi-keyword search scheme. The proposed scheme enables the client to …


Latent Dirichlet Allocation For Textual Student Feedback Analysis, Swapna Gottipati, Venky Shankararaman, Jeff Lin Nov 2018

Latent Dirichlet Allocation For Textual Student Feedback Analysis, Swapna Gottipati, Venky Shankararaman, Jeff Lin

Research Collection School Of Computing and Information Systems

Education institutions collect feedback from students upon course completion and analyse it to improve curriculum design, delivery methodology and students' learning experience. A large part of feedback comes in the form textual comments, which pose a challenge in quantifying and deriving insights. In this paper, we present a novel approach of the Latent Dirichlet Allocation (LDA) model to address this difficulty in handling textual student feedback. The analysis of quantitative part of student feedback provides generalratings and helps to identify aspects of the teaching that are successful and those that can improve. The reasons for the failure or success, however, …


Heterogeneous Embedding Propagation For Large-Scale E-Commerce User Alignment, Vincent W. Zheng, Mo Sha, Yuchen Li, Hongxia Yang, Yuan Fang, Zhenjie Zhang, Kian-Lee Tan, Kevin Chen-Chuan Chang Nov 2018

Heterogeneous Embedding Propagation For Large-Scale E-Commerce User Alignment, Vincent W. Zheng, Mo Sha, Yuchen Li, Hongxia Yang, Yuan Fang, Zhenjie Zhang, Kian-Lee Tan, Kevin Chen-Chuan Chang

Research Collection School Of Computing and Information Systems

We study the important problem of user alignment in e-commerce: to predict whether two online user identities that access an e-commerce site from different devices belong to one real-world person. As input, we have a set of user activity logs from Taobao and some labeled user identity linkages. User activity logs can be modeled using a heterogeneous interaction graph (HIG), and subsequently the user alignment task can be formulated as a semi-supervised HIG embedding problem. HIG embedding is challenging for two reasons: its heterogeneous nature and the presence of edge features. To address the challenges, we propose a novel Heterogeneous …


Linky: Visualizing User Identity Linkage Results For Multiple Online Social Networks (Demo), Roy Ka-Wei Lee, Ming Shan Hee, Philips Kokoh Prasetyo, Ee-Peng Lim Nov 2018

Linky: Visualizing User Identity Linkage Results For Multiple Online Social Networks (Demo), Roy Ka-Wei Lee, Ming Shan Hee, Philips Kokoh Prasetyo, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

User identity linkage across online social networks is an emerging research topic that has attracted attention in recent years. Many user identity linkage methods have been proposed so far and most of them utilize user profile, content and network information to determine if two social media accounts belong to the same person. In most cases, user identity linkage methods are evaluated by performing some prediction tasks with the results presented using some overall accuracy measures. However, the methods are rarely compared at the individual user level where a predicted matched (or linked) pair of user identities from different online social …


Is There Space For Violence?: A Data-Driven Approach To The Exploration Of Spatial-Temporal Dimensions Of Conflict, Tin Seong Kam, Vincent Zhi Nov 2018

Is There Space For Violence?: A Data-Driven Approach To The Exploration Of Spatial-Temporal Dimensions Of Conflict, Tin Seong Kam, Vincent Zhi

Research Collection School Of Computing and Information Systems

With recent increases in incidences of political violence globally, the world has now become more uncertain and less predictable. Of particular concern is the case of violence against civilians, who are often caught in the crossfire between armed state or non-state actors. Classical methods of studying political violence and international relations need to be updated. Adopting the use of data analytic tools and techniques of studying big data would enable academics and policy makers to make sense of a rapidly changing world.


Comparing Elm With Svm In The Field Of Sentiment Classification Of Social Media Text Data, Zhihuan Chen, Zhaoxia Wang, Zhiping Lin, Ting Yang Nov 2018

Comparing Elm With Svm In The Field Of Sentiment Classification Of Social Media Text Data, Zhihuan Chen, Zhaoxia Wang, Zhiping Lin, Ting Yang

Research Collection School Of Computing and Information Systems

Machine learning has been used in various fields with thousands of applications. Extreme learning machine (ELM), which is the most recently developed machine learning algorithm, has become increasingly popular for its good generalization ability. However, it has been relatively less applied to the domain of social media. Support Vector Machine (SVM), another popular learning-based algorithm, has been applied for sentiment classification of social media text data and has obtained good results. This paper investigates and compares the capabilities of these two learning-based methods in the field of sentiment classification of social media. The results indicate that SVM can obtain good …


An Interpretable Neural Fuzzy Inference System For Predictions Of Underpricing In Initial Public Offerings, Di Wang, Xiaolin Qian, Chai Quek, Ah-Hwee Tan, Chunyan Miao, Xiaofeng Zhang, Geok See Ng, You Zhou Nov 2018

An Interpretable Neural Fuzzy Inference System For Predictions Of Underpricing In Initial Public Offerings, Di Wang, Xiaolin Qian, Chai Quek, Ah-Hwee Tan, Chunyan Miao, Xiaofeng Zhang, Geok See Ng, You Zhou

Research Collection School Of Computing and Information Systems

Due to their aptitude in both accurate data processing and human comprehensible reasoning, neural fuzzy inference systems have been widely adopted in various application domains as decision support systems. Especially in real-world scenarios such as decision making in financial transactions, the human experts may be more interested in knowing the comprehensive reasons of certain advices provided by a decision support system in addition to how confident the system is on such advices. In this paper, we apply an integrated autonomous computational model termed genetic algorithm and rough set incorporated neural fuzzy inference system (GARSINFIS) to predict underpricing in initial public …


River: A Real-Time Influence Monitoring System On Social Media Stream, Mo Sha, Yuchen Li, Yanhao Wang, Wentian Guo, Kian-Lee Tan Nov 2018

River: A Real-Time Influence Monitoring System On Social Media Stream, Mo Sha, Yuchen Li, Yanhao Wang, Wentian Guo, Kian-Lee Tan

Research Collection School Of Computing and Information Systems

Social networks generate a massive amount of interaction data among users in the form of streams. To facilitate social network users to consume the continuously generated stream and identify preferred viral social contents, we present a real-time monitoring system called River to track a small set of influential social contents from high-speed streams in this demo. River has four novel features which distinguish itself from existing social monitoring systems: (1) River extracts a set of contents which collectively have the most significant influence coverage while reducing the influence overlaps; (2) River is topic-based and monitors the contents which are relevant …


Unsupervised User Identity Linkage Via Factoid Embedding, Wei Xie, Xin Mu, Roy Ka Wei Lee, Feida Zhu, Ee-Peng Lim Nov 2018

Unsupervised User Identity Linkage Via Factoid Embedding, Wei Xie, Xin Mu, Roy Ka Wei Lee, Feida Zhu, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

User identity linkage (UIL), the problem of matching user account across multiple online social networks (OSNs), is widely studied and important to many real-world applications. Most existing UIL solutions adopt a supervised or semisupervised approach which generally suffer from scarcity of labeled data. In this paper, we propose Factoid Embedding, a novel framework that adopts an unsupervised approach. It is designed to cope with different profile attributes, content types and network links of different OSNs. The key idea is that each piece of information about a user identity describes the real identity owner, and thus distinguishes the owner from other …


Improving Multi-Label Emotion Classification Via Sentiment Classification With Dual Attention Transfer Network, Jianfei Yu, Luis Marujo, Jing Jiang, Pradeep Karuturi, William Brendel Nov 2018

Improving Multi-Label Emotion Classification Via Sentiment Classification With Dual Attention Transfer Network, Jianfei Yu, Luis Marujo, Jing Jiang, Pradeep Karuturi, William Brendel

Research Collection School Of Computing and Information Systems

In this paper, we target at improving the performance of multi-label emotion classification with the help of sentiment classification. Specifically, we propose a new transfer learning architecture to divide the sentence representation into two different feature spaces, which are expected to respectively capture the general sentiment words and the other important emotion-specific words via a dual attention mechanism. Extensive experimental results demonstrate that our transfer learning approach can outperform several strong baselines and achieve the state-of-the-art performance on two benchmark datasets.


Joint Representation Learning Of Cross-Lingual Words And Entities Via Attentive Distant Supervision, Yixin Cao, Lei Hou, Juanzi Li, Zhiyuan Liu, Chengjiang Li, Xu Chen, Tiansi Dong Nov 2018

Joint Representation Learning Of Cross-Lingual Words And Entities Via Attentive Distant Supervision, Yixin Cao, Lei Hou, Juanzi Li, Zhiyuan Liu, Chengjiang Li, Xu Chen, Tiansi Dong

Research Collection School Of Computing and Information Systems

Joint representation learning of words and entities benefits many NLP tasks, but has not been well explored in cross-lingual settings. In this paper, we propose a novel method for joint representation learning of cross-lingual words and entities. It captures mutually complementary knowledge, and enables cross-lingual inferences among knowledge bases and texts. Our method does not require parallel corpora, and automatically generates comparable data via distant supervision using multi-lingual knowledge bases. We utilize two types of regularizers to align cross-lingual words and entities, and design knowledge attention and crosslingual attention to further reduce noises. We conducted a series of experiments on …


Imaginary People Representing Real Numbers: Generating Personas From Online Social Media Data, Jisun An, Haewoon Kwak, Soongyo Jung, Joni Salminen, M. Admad, Bernard J. Jansen Nov 2018

Imaginary People Representing Real Numbers: Generating Personas From Online Social Media Data, Jisun An, Haewoon Kwak, Soongyo Jung, Joni Salminen, M. Admad, Bernard J. Jansen

Research Collection School Of Computing and Information Systems

We develop a methodology to automate creating imaginary people, referred to as personas, by processing complex behavioral and demographic data of social media audiences. From a popular social media account containing more than 30 million interactions by viewers from 198 countries engaging with more than 4,200 online videos produced by a global media corporation, we demonstrate that our methodology has several novel accomplishments, including: (a) identifying distinct user behavioral segments based on the user content consumption patterns; (b) identifying impactful demographics groupings; and (c) creating rich persona descriptions by automatically adding pertinent attributes, such as names, photos, and personal characteristics. …


Learning Generalized Video Memory For Automatic Video Captioning, Poo-Hee Chang, Ah-Hwee Tan Nov 2018

Learning Generalized Video Memory For Automatic Video Captioning, Poo-Hee Chang, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Recent video captioning methods have made great progress by deep learning approaches with convolutional neural networks (CNN) and recurrent neural networks (RNN). While there are techniques that use memory networks for sentence decoding, few work has leveraged on the memory component to learn and generalize the temporal structure in video. In this paper, we propose a new method, namely Generalized Video Memory (GVM), utilizing a memory model for enhancing video description generation. Based on a class of self-organizing neural networks, GVM’s model is able to learn new video features incrementally. The learned generalized memory is further exploited to decode the …


Jobsense: A Data-Driven Career Knowledge Exploration Framework And System, Xavier Jayaraj Siddarth Ashok, Ee-Peng Lim, Philips Kokoh Prasetyo Nov 2018

Jobsense: A Data-Driven Career Knowledge Exploration Framework And System, Xavier Jayaraj Siddarth Ashok, Ee-Peng Lim, Philips Kokoh Prasetyo

Research Collection School Of Computing and Information Systems

Today’s job market sees rapid changes due to technology and business model disruptions. To fully tap on one’s potential in career development, one has to acquire job and skill knowledge through working on different jobs. Another approach is to seek consultation with career coaches who are trained to offer career advice in various industry sectors. The above two approaches, nevertheless, suffer from several shortcomings. The on-the-job career development approach is highly inefficient for today’s fast changing job market. The latter career coach assisted approach could help to speed up knowledge acquisition but it relies on expertise of career coaches but …


Vulnerability Assessment & Penetration Testing: Case Study On Web Application Security, Gazmend Krasniqi, Veton Bejtullahu Oct 2018

Vulnerability Assessment & Penetration Testing: Case Study On Web Application Security, Gazmend Krasniqi, Veton Bejtullahu

UBT International Conference

Complexity of information systems are increasing day by day. The security of information systems that are connected to public networks can be compromised by unauthorized, and usually anonymous, attempts to access them. By using public networks businesses and other institutions are exposed to numerous risks. This leads to more and more vulnerabilities in Information Systems. This situation calls for test methods that are devised from the attacker’s perspective to ensure that test conditions are as realistic as possible. In this paper we will describe complete stages of Vulnerability Assessment and Penetration Testing on some systems in UBT and proactive action …


Effective Visualization Approaches For Ultra-High Dimensional Datasets, Gurminder Kaur Oct 2018

Effective Visualization Approaches For Ultra-High Dimensional Datasets, Gurminder Kaur

LSU Doctoral Dissertations

Multivariate informational data, which are abstract as well as complex, are becoming increasingly common in many areas such as scientific, medical, social, business, and so on. Displaying and analyzing large amounts of multivariate data with more than three variables of different types is quite challenging. Visualization of such multivariate data suffers from a high degree of clutter when the numbers of dimensions/variables and data observations become too large. We propose multiple approaches to effectively visualize large datasets of ultrahigh number of dimensions by generalizing two standard multivariate visualization methods, namely star plot and parallel coordinates plot. We refine three variants …


Research-Based Web Design & Usability Guidelines [2006 Edition], Michael O. Leavitt, Ben Shneiderman, Robert W. Bailey, Carol Barnum, John Bosley, Barbara Chaparro, Joseph Dumas, Melody Y. Ivory, Bonnie John, Hal Miller-Jacobs, Sanjay J. Koyani, James R. Lewis, Stanley Page, Judith Ramey, Janice (Ginny) Redish, Jean Scholtz, Steve Wigginton, Cari A. Wolfson, Larry E. Wood, Don Zimmerman Oct 2018

Research-Based Web Design & Usability Guidelines [2006 Edition], Michael O. Leavitt, Ben Shneiderman, Robert W. Bailey, Carol Barnum, John Bosley, Barbara Chaparro, Joseph Dumas, Melody Y. Ivory, Bonnie John, Hal Miller-Jacobs, Sanjay J. Koyani, James R. Lewis, Stanley Page, Judith Ramey, Janice (Ginny) Redish, Jean Scholtz, Steve Wigginton, Cari A. Wolfson, Larry E. Wood, Don Zimmerman

Barbara S. Chaparro

The new edition of the U.S. Department of Health and Human Services’ (HHS) Research-Based Web Design and Usability Guidelines. These guidelines reflect HHS’ commitment to identifying innovative, research-based approaches that result in highly responsive and easy-to-use Web sites for the public.

These guidelines help move us in that direction by providing practical, yet authoritative, guidance on a broad range of Web design and communication issues. Having access to the best available research helps to ensure we make the right decisions the first time around and reduces the possibility of errors and costly mistakes.


Building Iot Based Applications For Smart Cities: How Can Ontology Catalogs Help?, Amelia Gyrard, Antoine Zimmermann, Amit P. Sheth Oct 2018

Building Iot Based Applications For Smart Cities: How Can Ontology Catalogs Help?, Amelia Gyrard, Antoine Zimmermann, Amit P. Sheth

Kno.e.sis Publications

The Internet of Things (IoT) plays an ever-increasing role in enabling smart city applications. An ontology-based semantic approach can help improve interoperability between a variety of IoT-generated as well as complementary data needed to drive these applications. While multiple ontology catalogs exist, using them for IoT and smart city applications require significant amount of work. In this paper, we demonstrate how can ontology catalogs be more effectively used to design and develop smart city applications? We consider four ontology catalogs that are relevant for IoT and smart cities: 1) READY4SmartCities; 2) linked open vocabulary (LOV); 3) OpenSensingCity (OSC); and 4) …


Knowledge-Aware Multimodal Dialogue Systems, Lizi Liao, Yunshan Ma, Xiangnan He, Richang Hong, Tat-Seng Chua Oct 2018

Knowledge-Aware Multimodal Dialogue Systems, Lizi Liao, Yunshan Ma, Xiangnan He, Richang Hong, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

By offering a natural way for information seeking, multimodal dialogue systems are attracting increasing attention in several domains such as retail, travel etc. However, most existing dialogue systems are limited to textual modality, which cannot be easily extended to capture the rich semantics in visual modality such as product images. For example, in fashion domain, the visual appearance of clothes and matching styles play a crucial role in understanding the user's intention. Without considering these, the dialogue agent may fail to generate desirable responses for users. In this paper, we present a Knowledge-aware Multimodal Dialogue (KMD) model to address the …


Sufat: An Analytics Tool For Gaining Insights From Student Feedback Comments, Siddhant Pyasi, Swapna Gottipati, Venky Shankararaman Oct 2018

Sufat: An Analytics Tool For Gaining Insights From Student Feedback Comments, Siddhant Pyasi, Swapna Gottipati, Venky Shankararaman

Research Collection School Of Computing and Information Systems

Teacher evaluation is a vital element inimproving student learning outcomes. Course and instructor feedback given bystudents, provides insights that can help improve student learning outcomes andteaching quality. Teaching and course evaluation systems help to collectquantitative and qualitative feedback from students. Since manually analysingthe qualitative feedback is painstaking and a tedious process, usually, onlythe quantitative feedback is often used for evaluating the course and theinstructor. However, useful knowledge is hidden in the qualitative comments, inthe form of sentiments and suggestions that can provide valuable insights tohelp plan improvements in the course content and delivery. In order toefficiently gather, analyse and provide …


Exploiting The Interdependency Of Land Use And Mobility For Urban Planning, Kasthuri Jayarajah, Andrew Tan, Archan Misra Oct 2018

Exploiting The Interdependency Of Land Use And Mobility For Urban Planning, Kasthuri Jayarajah, Andrew Tan, Archan Misra

Research Collection School Of Computing and Information Systems

Urban planners and economists alike have strong interest in understanding the inter-dependency of land use and people flow. The two-pronged problem entails systematic modeling and understanding of how land use impacts crowd flow to an area and in turn, how the influx of people to an area (or lack thereof) can influence the viability of business entities in that area. With cities becoming increasingly sensor-rich, for example, digitized payments for public transportation and constant trajectory tracking of buses and taxis, understanding and modelling crowd flows at the city scale, as well as, at finer granularity such as at the neighborhood …


Inferring Trip Occupancies In The Rise Of Ride-Hailing Services, Meng-Fen Chiang, Ee-Peng Lim, Wang-Chien Lee, Tuan-Anh Hoang Oct 2018

Inferring Trip Occupancies In The Rise Of Ride-Hailing Services, Meng-Fen Chiang, Ee-Peng Lim, Wang-Chien Lee, Tuan-Anh Hoang

Research Collection School Of Computing and Information Systems

The knowledge of all occupied and unoccupied trips made by self-employed drivers are essential for optimized vehicle dispatch by ride-hailing services (e.g., Didi Dache, Uber, Lyft, Grab, etc.). However, the occupancy status of vehicles is not always known to the service operators due to adoption of multiple ride-hailing apps. In this paper, we propose a novel framework, Learning to INfer Trips (LINT), to infer occupancy of car trips by exploring characteristics of observed occupied trips. Two main research steps, stop point classification and structural segmentation, are included in LINT. In the stop point classification step, we represent a vehicle trajectory …