Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

6,554 Full-Text Articles 8,879 Authors 3,346,977 Downloads 209 Institutions

All Articles in Databases and Information Systems

Faceted Search

6,554 full-text articles. Page 9 of 247.

Semantically Constitutive Entities In Knowledge Graphs, Chong Cher CHIA, Maksim TKACHENKO, Hady Wirawan LAUW 2023 Singapore Management University

Semantically Constitutive Entities In Knowledge Graphs, Chong Cher Chia, Maksim Tkachenko, Hady Wirawan Lauw

Research Collection School Of Computing and Information Systems

Knowledge graphs are repositories of facts about a world. In this work, we seek to distill the set of entities or nodes in a knowledge graph into a specified number of constitutive nodes, whose embeddings would be retained. Intuitively, the remaining accessory nodes could have their original embeddings “forgotten”, and yet reconstitutable from those of the retained constitutive nodes. The constitutive nodes thus represent the semantically constitutive entities, which retain the core semantics of the knowledge graph. We propose a formulation as well as algorithmic solutions to minimize the reconstitution errors. The derived constitutive nodes are validated empirically both in …


An Adaptive Large Neighborhood Search For Heterogeneous Vehicle Routing Problem With Time Windows, Minh Pham Kien NGUYEN, Aldy GUNAWAN, Vincent F. YU, Mustafa MISIR 2023 Singapore Management University

An Adaptive Large Neighborhood Search For Heterogeneous Vehicle Routing Problem With Time Windows, Minh Pham Kien Nguyen, Aldy Gunawan, Vincent F. Yu, Mustafa Misir

Research Collection School Of Computing and Information Systems

The heterogeneous vehicle routing problem with time windows (HVRPTW) employs various vehicles with different capacities to serve upcoming pickup and delivery orders. We introduce a HVRPTW variant for reflecting the practical needs of crowd-shipping by considering the mass-rapid-transit stations, as the additional terminal points. A mixed integer linear programming model is formulated. An Adaptive Large Neighborhood Search based meta-heuristic is also developed by utilizing a basic probabilistic selection strategy, i.e. roulette wheel, and Simulated Annealing. The proposed approach is empirically evaluated on a new set of benchmark instances. The computational results revealed that ALNS shows its clear advantage on the …


Deep Weakly-Supervised Anomaly Detection, Guansong PANG, Chunhua SHEN, Huidong JIN, Anton VAN DEN HENGEL 2023 Singapore Management University

Deep Weakly-Supervised Anomaly Detection, Guansong Pang, Chunhua Shen, Huidong Jin, Anton Van Den Hengel

Research Collection School Of Computing and Information Systems

Recent semi-supervised anomaly detection methods that are trained using small labeled anomaly examples and large unlabeled data (mostly normal data) have shown largely improved performance over unsupervised methods. However, these methods often focus on fitting abnormalities illustrated by the given anomaly examples only (i.e., seen anomalies), and consequently they fail to generalize to those that are not, i.e., new types/classes of anomaly unseen during training. To detect both seen and unseen anomalies, we introduce a novel deep weakly-supervised approach, namely Pairwise Relation prediction Network (PReNet), that learns pairwise relation features and anomaly scores by predicting the relation of any two …


Sparsity Brings Vulnerabilities: Exploring New Metrics In Backdoor Attacks, Jianwen TIAN, Kefan QIU, Debin GAO, Zhi WANG, Xiaohui KUANG, Gang ZHAO 2023 Singapore Management University

Sparsity Brings Vulnerabilities: Exploring New Metrics In Backdoor Attacks, Jianwen Tian, Kefan Qiu, Debin Gao, Zhi Wang, Xiaohui Kuang, Gang Zhao

Research Collection School Of Computing and Information Systems

Nowadays, using AI-based detectors to keep pace with the fast iterating of malware has attracted a great attention. However, most AI-based malware detectors use features with vast sparse subspaces to characterize applications, which brings significant vulnerabilities to the model. To exploit this sparsityrelated vulnerability, we propose a clean-label backdoor attack consisting of a dissimilarity metric-based candidate selection and a variation ratio-based trigger construction. The proposed backdoor is verified on different datasets, including a Windows PE dataset, an Android dataset with numerical and boolean feature values, and a PDF dataset. The experimental results show that the attack can slash the accuracy …


Single-View View Synthesis With Self-Rectified Pseudo-Stereo, Yang ZHOU, Hanjie WU, Wenxi LIU, Zheng XIONG, Jing QIN, Shengfeng HE 2023 Singapore Management University

Single-View View Synthesis With Self-Rectified Pseudo-Stereo, Yang Zhou, Hanjie Wu, Wenxi Liu, Zheng Xiong, Jing Qin, Shengfeng He

Research Collection School Of Computing and Information Systems

Synthesizing novel views from a single view image is a highly ill-posed problem. We discover an effective solution to reduce the learning ambiguity by expanding the single-view view synthesis problem to a multi-view setting. Specifically, we leverage the reliable and explicit stereo prior to generate a pseudo-stereo viewpoint, which serves as an auxiliary input to construct the 3D space. In this way, the challenging novel view synthesis process is decoupled into two simpler problems of stereo synthesis and 3D reconstruction. In order to synthesize a structurally correct and detail-preserved stereo image, we propose a self-rectified stereo synthesis to amend erroneous …


Geospatial Wildfire Risk Prediction Using Deep Learning, Abner Alberto Benavides 2023 California State University - San Bernardino

Geospatial Wildfire Risk Prediction Using Deep Learning, Abner Alberto Benavides

Electronic Theses, Projects, and Dissertations

This report introduces a thorough analysis of wildfire prediction using satellite imagery by applying deep learning techniques. To find wildfire-prone geographical data, we use U-Net, a convolutional neural network known for its effectiveness in biomedical image segmentation. The input to the model is the Sentinel-2 multispectral images to supply a complete view of the terrain features.

We evaluated the wildfire risk prediction model’s performance using several metrics. The model showed high accuracy, with a weighted average F1 score of 0.91 and an AUC-ROC score of 0.972. These results suggest that the model is exceptionally good at predicting the location of …


Interposition Based Container Optimization For Data Intensive Applications, Rohan Tikmany 2023 DePaul University

Interposition Based Container Optimization For Data Intensive Applications, Rohan Tikmany

College of Computing and Digital Media Dissertations

Reproducibility of applications is paramount in several scenarios such as collaborative work and software testing. Containers provide an easy way of addressing reproducibility by packaging the application's software and data dependencies into one executable unit, which can be executed multiple times in different environments. With the increased use of containers in industry as well as academia, current research has examined the provisioning and storage cost of containers and has shown that container deployments often include unnecessary software packages. Current methods to optimize the container size prune unnecessary data at the granularity of files and thus make binary decisions. We show …


How Technology May Be Used For Future Disease Predictions, Rich P. Manprisio 2023 Governors State University

How Technology May Be Used For Future Disease Predictions, Rich P. Manprisio

Journal of Applied Disciplines

Exasperated by the ongoing global pandemic, the healthcare system is grappling with the formidable challenges posed by proper and effective disease treatments. Nevertheless, amidst these growing difficulties, the healthcare field has witnessed significant technological advancements, offering promising avenues for disease prediction. Notably, a positive correlation exists between the utilization of technologies and their potential to serve as valuable tools for disease prediction. As our reliance on technological sophistication continues progressing, current research highlights numerous viable options to augment the healthcare sector. This review explores the current state of utilizing technologies and their potential to enhance healthcare, shedding light on their …


Analyzing Taxi Drivers’ Decision-Making And Recommending Strategies For Enhanced Performance: A Data-Driven Approach, Mengyu JI 2023 Singapore Management University

Analyzing Taxi Drivers’ Decision-Making And Recommending Strategies For Enhanced Performance: A Data-Driven Approach, Mengyu Ji

Dissertations and Theses Collection (Open Access)

This thesis focuses on analyzing the decision-making process of taxi drivers and providing data-driven strategies to enhance their performance. By examin- ing comprehensive historical data encompassing passenger demand patterns, drivers’ spatial dynamics, and fare structures, valuable insights are gained into drivers’ choices regarding optimal routes, timing, and areas with high demand. Integrating real-time information sources, such as GPS data and passenger updates, allows drivers to adapt their strategies dynamically to changing traffic conditions and emerging demand patterns. Predictive analytics models, includ- ing ARIMA, XGBoost, and Linear Regression, are utilized to forecast demand flow at key locations, enabling proactive decision-making and …


Multi-Target Backdoor Attacks For Code Pre-Trained Models, Yanzhou LI, Shangqing LIU, Kangjie CHEN, Xiaofei XIE, Tianwei ZHANG, Yang LIU 2023 Singapore Management University

Multi-Target Backdoor Attacks For Code Pre-Trained Models, Yanzhou Li, Shangqing Liu, Kangjie Chen, Xiaofei Xie, Tianwei Zhang, Yang Liu

Research Collection School Of Computing and Information Systems

Backdoor attacks for neural code models have gained considerable attention due to the advancement of code intelligence. However, most existing works insert triggers into task-specific data for code-related downstream tasks, thereby limiting the scope of attacks. Moreover, the majority of attacks for pre-trained models are designed for understanding tasks. In this paper, we propose task-agnostic backdoor attacks for code pre-trained models. Our backdoored model is pre-trained with two learning strategies (i.e., Poisoned Seq2Seq learning and token representation learning) to support the multi-target attack of downstream code understanding and generation tasks. During the deployment phase, the implanted backdoors in the victim …


Synthesizing Speech Test Cases With Text-To-Speech? An Empirical Study On The False Alarms In Automated Speech Recognition Testing, Julia Kaiwen LAU, Kelvin Kai Wen KONG, Julian Hao YONG, Per Hoong TAN, Zhou YANG, Zi Qian YONG, Joshua Chern Wey LOW, Chun Yong CHONG, Mei Kuan LIM, David LO 2023 Singapore Management University

Synthesizing Speech Test Cases With Text-To-Speech? An Empirical Study On The False Alarms In Automated Speech Recognition Testing, Julia Kaiwen Lau, Kelvin Kai Wen Kong, Julian Hao Yong, Per Hoong Tan, Zhou Yang, Zi Qian Yong, Joshua Chern Wey Low, Chun Yong Chong, Mei Kuan Lim, David Lo

Research Collection School Of Computing and Information Systems

Recent studies have proposed the use of Text-To-Speech (TTS) systems to automatically synthesise speech test cases on a scale and uncover a large number of failures in ASR systems. However, the failures uncovered by synthetic test cases may not reflect the actual performance of an ASR system when it transcribes human audio, which we refer to as false alarms. Given a failed test case synthesised from TTS systems, which consists of TTS-generated audio and the corresponding ground truth text, we feed the human audio stating the same text to an ASR system. If human audio can be correctly transcribed, an …


A Data-Driven Approach For Scheduling Bus Services Subject To Demand Constraints, BRAHMANAGE JANAKA CHATHURANGA THILAKARATHNA, Thivya KANDAPPU, Baihua ZHENG 2023 Singapore Management University

A Data-Driven Approach For Scheduling Bus Services Subject To Demand Constraints, Brahmanage Janaka Chathuranga Thilakarathna, Thivya Kandappu, Baihua Zheng

Research Collection School Of Computing and Information Systems

Passenger satisfaction is extremely important for the success of a public transportation system. Many studies have shown that passenger satisfaction strongly depends on the time they have to wait at the bus stop (waiting time) to get on a bus. To be specific, user satisfaction drops faster as the waiting time increases. Therefore, service providers want to provide a bus to the waiting passengers within a threshold to keep them satisfied. It is a two-pronged problem: (a) to satisfy more passengers the transport planner may increase the frequency of the buses, and (b) in turn, the increased frequency may impact …


An Efficient Hybrid Genetic Algorithm For The Quadratic Traveling Salesman Problem, Quang Anh PHAM, Hoong Chuin LAU, Minh Hoang HA, Lam VU 2023 Singapore Management University

An Efficient Hybrid Genetic Algorithm For The Quadratic Traveling Salesman Problem, Quang Anh Pham, Hoong Chuin Lau, Minh Hoang Ha, Lam Vu

Research Collection School Of Computing and Information Systems

The traveling salesman problem (TSP) is the most well-known problem in combinatorial optimization which hasbeen studied for many decades. This paper focuses on dealing with one of the most difficult TSP variants named thequadratic traveling salesman problem (QTSP) that has numerous planning applications in robotics and bioinformatics.The goal of QTSP is similar to TSP which finds a cycle visiting all nodes exactly once with minimum total costs. However, the costs in QTSP are associated with three vertices traversed in succession (instead of two like in TSP). This leadsto a quadratic objective function that is much harder to solve.To efficiently solve …


Take A Break In The Middle: Investigating Subgoals Towards Hierarhical Script Generation, Xinze LI, Yixin CAO, Muhao CHEN, Aixin SUN 2023 Singapore Management University

Take A Break In The Middle: Investigating Subgoals Towards Hierarhical Script Generation, Xinze Li, Yixin Cao, Muhao Chen, Aixin Sun

Research Collection School Of Computing and Information Systems

Goal-oriented Script Generation is a new task of generating a list of steps that can fulfill the given goal. In this paper, we propose to extend the task from the perspective of cognitive theory. Instead of a simple flat structure, the steps are typically organized hierarchically — Human often decompose a complex task into subgoals, where each subgoal can be further decomposed into steps. To establish the benchmark, we contribute a new dataset, propose several baseline methods, and set up evaluation metrics. Both automatic and human evaluation verify the high-quality of dataset, as well as the effectiveness of incorporating subgoals …


Large-Scale Correlation Analysis Of Automated Metrics For Topic Models, Jia Peng LIM, Hady Wirawan LAUW 2023 Singapore Management University

Large-Scale Correlation Analysis Of Automated Metrics For Topic Models, Jia Peng Lim, Hady Wirawan Lauw

Research Collection School Of Computing and Information Systems

Automated coherence metrics constitute an important and popular way to evaluate topic models. Previous works present a mixed picture of their presumed correlation with human judgement. In this paper, we conduct a large-scale correlation analysis of coherence metrics. We propose a novel sampling approach to mine topics for the purpose of metric evaluation, and conduct the analysis via three large corpora showing that certain automated coherence metrics are correlated. Moreover, we extend the analysis to measure topical differences between corpora. Lastly, we examine the reliability of human judgement by conducting an extensive user study, which is designed as an amalgamation …


Beyond Anthropomorphism: Unraveling The True Priorities Of Chatbot Usage In Smes, Tamas MAKANY, Sungjong ROH, Kotaro HARA, Jie Min HUA, Felicia Si Ying GOH, Wilson Yang Jie TEH 2023 Singapore Management University

Beyond Anthropomorphism: Unraveling The True Priorities Of Chatbot Usage In Smes, Tamas Makany, Sungjong Roh, Kotaro Hara, Jie Min Hua, Felicia Si Ying Goh, Wilson Yang Jie Teh

Research Collection Lee Kong Chian School Of Business

This study examined business communication practices with chatbots among various Small and Medium Enterprise (SME) stakeholders in Singapore, including business owners/employees, customers, and developers. Through qualitative interviews and chatbot transcript analysis, we investigated two research questions: (1) How do the expectations of SME stakeholders compare to the conversational design of SME chatbots? and (2) What are the business reasons for SMEs to add human-like features to their chatbots? Our findings revealed that functionality is more crucial than anthropomorphic characteristics, such as personality and name. Stakeholders preferred chatbots that explicitly identified themselves as machines to set appropriate expectations. Customers prioritized efficiency, …


Balancing Privacy And Flexibility Of Cloud-Based Personal Health Records Sharing System, Yudi ZHANG, Fuchun GUO, Willy SUSILO, Guomin YANG 2023 University of Wollongong

Balancing Privacy And Flexibility Of Cloud-Based Personal Health Records Sharing System, Yudi Zhang, Fuchun Guo, Willy Susilo, Guomin Yang

Research Collection School Of Computing and Information Systems

The Internet of Things and cloud services have been widely adopted in many applications, and personal health records (PHR) can provide tailored medical care. The PHR data is usually stored on cloud servers for sharing. Weighted attribute-based encryption (ABE) is a practical and flexible technique to protect PHR data. Under a weighted ABE policy, the data user's attributes will be “scored”, if and only if the score reaches the threshold value, he/she can access the data. However, while this approach offers a flexible access policy, the data owners have difficulty controlling their privacy, especially sharing PHR data in collaborative e-health …


Impact Of Difficult Negatives On Twitter Crisis Detection, Yuhao ZHANG, Siaw Ling LO, Phyo Yi WIN MYINT 2023 Singapore Management University

Impact Of Difficult Negatives On Twitter Crisis Detection, Yuhao Zhang, Siaw Ling Lo, Phyo Yi Win Myint

Research Collection School Of Computing and Information Systems

Twitter has become an alternative information source during a crisis. However, the short, noisy nature of tweets hinders information extraction. While models trained with standard Twitter crisis datasets accomplished decent performance, it remained a challenge to generalize to unseen crisis events. Thus, we proposed adding “difficult” negative examples during training to improve model generalization for Twitter crisis detection. Although adding random noise is a common practice, the impact of difficult negatives, i.e., negative data semantically similar to true examples, was never examined in NLP. Most of existing research focuses on the classification task, without considering the primary information need of …


Conference Report On 2022 Ieee Symposium Series On Computational Intelligence (Ieee Ssci 2022), Ah-hwee TAN, Dipti SRINIVASAN, Chunyan MIAO 2023 Singapore Management University

Conference Report On 2022 Ieee Symposium Series On Computational Intelligence (Ieee Ssci 2022), Ah-Hwee Tan, Dipti Srinivasan, Chunyan Miao

Research Collection School Of Computing and Information Systems

On behalf of the organizing committee, we are delighted to deliver this conference report for the 2022 IEEE Symposium Series on Computational Intelligence (SSCI 2022), which was held in Singapore from 4th to 7th December 2022. IEEE SSCI is an established flagship annual international series of symposia on computational intelligence (CI) sponsored by the IEEE Computational Intelligence Society (CIS) to promote and stimulate discussions on the latest theory, algorithms, applications, and emerging topics on computational intelligence. After two years of virtual conferences due to the global pandemic, IEEE SSCI returned as an in-person meeting with online elements in 2022.


Augmenting Low-Resource Text Classification With Graph-Grounded Pre-Training And Prompting, Zhihao WEN, Yuan FANG 2023 Singapore Management University

Augmenting Low-Resource Text Classification With Graph-Grounded Pre-Training And Prompting, Zhihao Wen, Yuan Fang

Research Collection School Of Computing and Information Systems

ext classification is a fundamental problem in information retrieval with many real-world applications, such as predicting the topics of online articles and the categories of e-commerce product descriptions. However, low-resource text classification, with few or no labeled samples, poses a serious concern for supervised learning. Meanwhile, many text data are inherently grounded on a network structure, such as a hyperlink/citation network for online articles, and a user-item purchase network for e-commerce products. These graph structures capture rich semantic relationships, which can potentially augment low-resource text classification. In this paper, we propose a novel model called Graph-Grounded Pre-training and Prompting (G2P2) …


Digital Commons powered by bepress