Artificial Intelligence, Consumers, And The Experience Economy,
2022
Singapore Management University
Artificial Intelligence, Consumers, And The Experience Economy, Hannah H. Chang, Anirban Mukherjee
Research Collection Lee Kong Chian School Of Business
The term Artificial Intelligence (AI) was first used by McCarthy, Minsky, Rochester, and Shannon in a proposal for a summer research project in 1955 (Solomonoff, 1985). It is widely and commonly defined to be “the science and engineering of making intelligent machines” (McCarthy, 2006). Recent technological advances and methodological developments have made AI pervasive in new marketing offerings, ranging from self-driving cars, intelligent voice assistants such as Amazon’s Alexa, to burger-making robots at restaurants and rack-moving robots inside warehouses such as Amazon’s family of robots (Kiva, Pegasus, Xanthus) and delivery drones. There is optimism, and perhaps even over-optimism, of the …
Evaluation Of Geo-Spebh Algorithm Based On Bandwidth For Big Data Retrieval In Cloud Computing,
2022
Department of Mathematical Sciences, Faculty of Science, Abubakar Tafawa Balewa University, Bauchi, Nigeria
Evaluation Of Geo-Spebh Algorithm Based On Bandwidth For Big Data Retrieval In Cloud Computing, Abubakar Usman Othman, Moses Timothy, Aisha Yahaya Umar, Abdullahi Salihu Audu, Boukari Souley, Abdulsalam Ya’U Gital
Al-Bahir Journal for Engineering and Pure Sciences
The fast increase in volume and speed of information created by mobile devices, along with the availability of web-based applications, has considerably contributed to the massive collection of data. Approximate Nearest Neighbor (ANN) is essential in big size databases for comparison search to offer the nearest neighbor of a given query in the field of computer vision and pattern recognition. Many hashing algorithms have been developed to improve data management and retrieval accuracy in huge databases. However, none of these algorithms took bandwidth into consideration, which is a significant aspect in information retrieval and pattern recognition. As a result, our …
Towards An Optimal Bus Frequency Scheduling: When The Waiting Time Matters,
2022
Wuhan University
Towards An Optimal Bus Frequency Scheduling: When The Waiting Time Matters, Songsong Mo, Zhifeng Bao, Baihua Zheng, Zhiyong Peng
Research Collection School Of Computing and Information Systems
Reorganizing bus frequencies to cater for actual travel demands can significantly save the cost of the public transport system. This paper studies the bus frequency optimization problem considering the user satisfaction. Specifically, for the first time to our best knowledge, we study how to schedule the buses such that the total number of passengers who could receive their bus services within the waiting time threshold can be maximized. We propose two variants of the problem, FAST and FASTCO, to cater for different application needs and prove that both are NP-hard. To solve FAST effectively and efficiently, we first present an …
Secure Deterministic Wallet And Stealth Address: Key-Insulated And Privacy-Preserving Signature Scheme With Publicly Derived Public Key,
2022
Singapore Management University
Secure Deterministic Wallet And Stealth Address: Key-Insulated And Privacy-Preserving Signature Scheme With Publicly Derived Public Key, Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang, Xiaorong Ke, Yining Liu
Research Collection School Of Computing and Information Systems
Deterministic Wallet (DW) and Stealth Address (SA) mechanisms have been widely adopted in the cryptocurrency community, due to their virtues on functionality and privacy protection, which come from a key derivation mechanism that allows an arbitrary number of derived keys to be generated from a master key. However, these algorithms suffer a vulnerability that, when one derived key is compromised somehow, the damage is not limited to the leaked derived key only, but to the master key and in consequence all derived keys are compromised. In this article, we introduce and formalize a new signature variant, called Key-Insulated and Privacy-Preserving …
An Attribute-Aware Attentive Gcn Model For Attribute Missing In Recommendation,
2022
Singapore Management University
An Attribute-Aware Attentive Gcn Model For Attribute Missing In Recommendation, Fan Liu, Zhiyong Cheng, Lei Zhu, Chenghao Liu, Liqiang Nie
Research Collection School Of Computing and Information Systems
As important side information, attributes have been widely exploited in the existing recommender system for better performance. However, in the real-world scenarios, it is common that some attributes of items/users are missing (e.g., some movies miss the genre data). Prior studies usually use a default value (i.e., "other") to represent the missing attribute, resulting in sub-optimal performance. To address this problem, in this paper, we present an attribute-aware attentive graph convolution network (A(2)-GCN). In particular, we first construct a graph, where users, items, and attributes are three types of nodes and their associations are edges. Thereafter, we leverage the graph …
Distance Based Image Classification: A Solution To Generative Classification’S Conundrum?,
2022
Singapore Management University
Distance Based Image Classification: A Solution To Generative Classification’S Conundrum?, Wen-Yan Lin, Siying Liu, Bing Tian Dai, Hongdong Li
Research Collection School Of Computing and Information Systems
Most classifiers rely on discriminative boundaries that separate instances of each class from everything else. We argue that discriminative boundaries are counter-intuitive as they define semantics by what-they-are-not; and should be replaced by generative classifiers which define semantics by what-they-are. Unfortunately, generative classifiers are significantly less accurate. This may be caused by the tendency of generative models to focus on easy to model semantic generative factors and ignore non-semantic factors that are important but difficult to model. We propose a new generative model in which semantic factors are accommodated by shell theory’s [25] hierarchical generative process and non-semantic factors by …
Does Social Media Accelerate Product Recalls? Evidence From The Pharmaceutical Industry,
2022
Singapore Management University
Does Social Media Accelerate Product Recalls? Evidence From The Pharmaceutical Industry, Yang Gao, Wenjing Duan, Huaxia Rui
Research Collection School Of Computing and Information Systems
Social media has become a vital platform for voicing product-related experiences that may not only reveal product defects but also impose pressure on firms to act more promptly than before. This study scrutinizes the rarely-studied relationship between these voices and the speed of product recalls in the context of the pharmaceutical industry where social media pharmacovigilance is becoming increasingly important for the detection of drug safety signals. Using Federal Drug Administration (FDA) drug enforcement reports and social media data crawled from online forums and Twitter, we investigate whether social media can accelerate the product recall process in the context of …
Deep Learning-Based Text Recognition Of Agricultural Regulatory Document,
2022
Singapore Management University
Deep Learning-Based Text Recognition Of Agricultural Regulatory Document, Hua Leong Fwa, Farn Haur Chan
Research Collection School Of Computing and Information Systems
In this study, an OCR system based on deep learning techniques was deployed to digitize scanned agricultural regulatory documents comprising of certificates and labels. Recognition of the certificatesand labels is challenging as they are scanned images of the hard copy form and the layout and size of the text as well as the languages vary between the various countries (due to diverse regulatory requirements). Weevaluated and compared between various state-of-the-art deep learningbased text detection and recognition model as well as a packaged OCR library – Tesseract. We then adopted a two-stage approach comprisingof text detection using Character Region Awareness For …
Secure Hierarchical Deterministic Wallet Supporting Stealth Address,
2022
Singapore Management University
Secure Hierarchical Deterministic Wallet Supporting Stealth Address, Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu
Research Collection School Of Computing and Information Systems
Over the past decade, cryptocurrency has been undergoing a rapid development. Digital wallet, as the tool to store and manage the cryptographic keys, is the primary entrance for the public to access cryptocurrency assets. Hierarchical Deterministic Wallet (HDW), proposed in Bitcoin Improvement Proposal 32 (BIP32), has attracted much attention and been widely used in the community, due to its virtues such as easy backup/recovery, convenient cold-address management, and supporting trust-less audits and applications in hierarchical organizations. While HDW allows the wallet owner to generate and manage his keys conveniently, Stealth Address (SA) allows a payer to generate fresh address (i.e., …
Performance Evaluation Of Aggregation-Based Group Recommender Systems For Ephemeral Groups,
2022
Singapore Management University
Performance Evaluation Of Aggregation-Based Group Recommender Systems For Ephemeral Groups, Edgar Ceh-Varela, Huiping Cao, Hady Wirawan Lauw
Research Collection School Of Computing and Information Systems
Recommender Systems (RecSys) provide suggestions in many decision-making processes. Given that groups of people can perform many real-world activities (e.g., a group of people attending a conference looking for a place to dine), the need for recommendations for groups has increased. A wide range of Group Recommender Systems (GRecSys) has been developed to aggregate individual preferences to group preferences. We analyze 175 studies related to GRecSys. Previous works evaluate their systems using different types of groups (sizes and cohesiveness), and most of such works focus on testing their systems using only one type of item, called Experience Goods (EG). As …
Constrained Multiagent Reinforcement Learning For Large Agent Population,
2022
Singapore Management University
Constrained Multiagent Reinforcement Learning For Large Agent Population, Jiajing Ling, Arambam James Singh, Nguyen Duc Thien, Akshat Kumar
Research Collection School Of Computing and Information Systems
Learning control policies for a large number of agents in a decentralized setting is challenging due to partial observability, uncertainty in the environment, and scalability challenges. While several scalable multiagent RL (MARL) methods have been proposed, relatively few approaches exist for large scale constrained MARL settings. To address this, we first formulate the constrained MARL problem in a collective multiagent setting where interactions among agents are governed by the aggregate count and types of agents, and do not depend on agents’ specific identities. Second, we show that standard Lagrangian relaxation methods, which are popular for single agent RL, do not …
Distinctive Features Of Nonverbal Behavior And Mimicry In Application Interviews Through Data Analysis And Machine Learning,
2022
Singapore Management University
Distinctive Features Of Nonverbal Behavior And Mimicry In Application Interviews Through Data Analysis And Machine Learning, Sanne Rogiers, Elias Corneillie, Filip Lievens, Frederik Anseel, Peter Veelaert, Wilfried Philips
Research Collection Lee Kong Chian School Of Business
This paper reveals the characteristics and effects of nonverbal behavior and human mimicry in the context of application interviews. It discloses a novel analyzation method for psychological research by utilizing machine learning. In comparison to traditional manual data analysis, machine learning proves to be able to analyze the data more deeply and to discover connections in the data invisible to the human eye. The paper describes an experiment to measure and analyze the reactions of evaluators to job applicants who adopt specific behaviors: mimicry, suppress, immediacy and natural behavior. First, evaluation of the applicant qualifications by the interviewer reveals …
Towards A Model On Digital Transformation Within The Higher Education Sector – A South African Perspective,
2022
Independent Institute of Education
Towards A Model On Digital Transformation Within The Higher Education Sector – A South African Perspective, Olusegun A. Ajigini
African Conference on Information Systems and Technology
Digital transformation is the application of technology to build new business models, processes, software and systems that result in more profitable revenue, greater competitive advantage and higher efficiency. The factors influencing digital transformation in the higher educational sector were examined in this study. Specifically, data was drawn from 400 respondents and the following variables: organizational IT application portfolio, organizational culture, organizational structure, leadership and ethics predict digital transformation in higher educational sector by using regression analysis. The researcher found that the organizational culture contribution was the highest by predicting 78.9% of digital transformation in the higher education sector.
Towards A Conceptual Model For Developing A Career Prediction System For Students’ Subject Selection At Secondary School Level,
2022
Makerere University
Towards A Conceptual Model For Developing A Career Prediction System For Students’ Subject Selection At Secondary School Level, Moses Kamondo Tuhame, Gilbert Maiga, Annabella Habinka, Barbara Kayondo
African Conference on Information Systems and Technology
Career choice prediction has been a complex phenomenon both in developed and developing countries. Though various theories that describe career prediction have emerged, their practical implementation in the form of a system has been hampered by the shortfalls that come along with each of them. However, there is no existing theoretically based holistic model that merges various theories that can inform the development of such a system in the developing world context. This paper, therefore, aims at proposing a holistic conceptual model that integrates a number of variables to inform the development of a career prediction system in the developing …
“I Think I Discovered A Military Base In The Middle Of The Ocean”—Null Island, The Most Real Of Fictional Places,
2022
Florida International University
“I Think I Discovered A Military Base In The Middle Of The Ocean”—Null Island, The Most Real Of Fictional Places, Levente Juhasz, Peter Mooney
GIS Center
This paper explores Null Island, a fictional place located at 0° latitude and 0° longitude in the WGS84 (World Geodetic System 1984) geographic coordinate system. Null Island is erroneously associated with large amounts of geographic data in a wide variety of location-based services, place databases, social media and web-based maps. Whereas it was originally considered a joke within the geospatial community, this article will demonstrate implications of its existence, both technological and social in nature, promoting Null Island as a fundamental issue of geographic information that requires more widespread awareness. The article summarizes error sources that lead to data being …
Automated Identification Of Astronauts On Board The International Space Station: A Case Study In Space Archaeology,
2022
Chapman University
Automated Identification Of Astronauts On Board The International Space Station: A Case Study In Space Archaeology, Rao Hamza Ali, Amir Kanan Kashefi, Alice C. Gorman, Justin St. P. Walsh, Erik J. Linstead
Art Faculty Articles and Research
We develop and apply a deep learning-based computer vision pipeline to automatically identify crew members in archival photographic imagery taken on-board the International Space Station. Our approach is able to quickly tag thousands of images from public and private photo repositories without human supervision with high degrees of accuracy, including photographs where crew faces are partially obscured. Using the results of our pipeline, we carry out a large-scale network analysis of the crew, using the imagery data to provide novel insights into the social interactions among crew during their missions.
(2022 Revision) Chapter 6: Essential Aspects Of Physical Design And Implementation Of Relational Databases,
2022
CUNY New York City College of Technology
(2022 Revision) Chapter 6: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Open Educational Resources
No abstract provided.
(2022 Revision) Appendix: Essential Aspects Of Physical Design And Implementation Of Relational Databases,
2022
CUNY New York City College of Technology
(2022 Revision) Appendix: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Open Educational Resources
No abstract provided.
(2022 Revision) Chapter 3: Essential Aspects Of Physical Design And Implementation Of Relational Databases,
2022
CUNY New York City College of Technology
(2022 Revision) Chapter 3: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Open Educational Resources
No abstract provided.
(2022 Revision) Chapter 1: Essential Aspects Of Physical Design And Implementation Of Relational Databases,
2022
CUNY New York City College of Technology
(2022 Revision) Chapter 1: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Open Educational Resources
No abstract provided.