Tutorial on User Profiling with Graph Neural Networks and Related Beyond-Acc...Erasmo Purificato
Slide of the Tutorial on "User Profiling with Graph Neural Networks and Related Beyond-Accuracy Perspectives" @ UMAP'23: 31st ACM Conference on User Modeling, Adaptation and Personalization (June 26, 2023 | Limassol, Cyprus)
Leveraging Graph Neural Networks for User Profiling: Recent Advances and Open...Erasmo Purificato
Slide of the tutorial entitled "Leveraging Graph Neural Networks for User Profiling: Recent Advances and Open Challenges" held at CIKM'23: 32nd ACM International Conference on Information and Knowledge Management (October 21, 2023 | Birmingham, United Kingdom)
Review and analysis of machine learning and soft computing approaches for use...IJwest
The adequacy of user models depends mainly on the accuracy and precision of information that is retrieved to the user. The real challenge in user modelling studies is due to the inadequacy of data, improper use of techniques, noise within the data and imprecise nature of human behavior. For the best results of user modelling, one should choose an appropriate way to do it i.e. by selecting the best suitable approach for the desired domain. Machine learning and Soft computing Techniques have the ability to handle the uncertainty and are extensively being used for user modeling purpose. This paper reviews various approaches of user modeling and critically analyzes the machine learning and soft computing techniques that have successfully captured and formally modelled the human behavior.
Recent Advances in Fairness Analysis of User Profiling Approaches in E-Commer...Erasmo Purificato
Presentation of the paper "Recent Advances in Fairness Analysis of User Profiling Approaches in E-Commerce with Graph Neural Networks" co-authored with L. Boratto and E.W. De Luca @ AIxIA 2023: 22nd International Conference of the Italian Association for Artificial Intelligence, November 6-9, 2023, Rome, Italy.
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Following the user’s interests in mobile context aware recommender systemsBouneffouf Djallel
The wide development of mobile applications provides a considerable amount of data of all types (images, texts, sounds, videos, etc.). In this sense, Mobile Context-aware Recommender Systems (MCRS) suggest the user suitable information depending on her/his situation and interests. Two key questions have to be considered 1) how to recommend the user information that follows his/her interests evolution? 2) how to model the user’s situation and its related interests? To the best of our knowledge, no existing work proposing a MCRS tries to answer both questions as we do. This paper describes an ongoing work on the implementation of a MCRS based on the hybrid-ε-greedy algorithm we propose, which combines the standard ε-greedy algorithm and both content-based filtering and case-based reasoning techniques.
Do Graph Neural Networks Build Fair User Models? Assessing Disparate Impact a...Erasmo Purificato
Presentation for the paper published @ CIKM'22: 31st ACM International Conference on Information & Knowledge Management (October 17-21, 2022 | Atlanta, GA, USA)
Tutorial on User Profiling with Graph Neural Networks and Related Beyond-Acc...Erasmo Purificato
Slide of the Tutorial on "User Profiling with Graph Neural Networks and Related Beyond-Accuracy Perspectives" @ UMAP'23: 31st ACM Conference on User Modeling, Adaptation and Personalization (June 26, 2023 | Limassol, Cyprus)
Leveraging Graph Neural Networks for User Profiling: Recent Advances and Open...Erasmo Purificato
Slide of the tutorial entitled "Leveraging Graph Neural Networks for User Profiling: Recent Advances and Open Challenges" held at CIKM'23: 32nd ACM International Conference on Information and Knowledge Management (October 21, 2023 | Birmingham, United Kingdom)
Review and analysis of machine learning and soft computing approaches for use...IJwest
The adequacy of user models depends mainly on the accuracy and precision of information that is retrieved to the user. The real challenge in user modelling studies is due to the inadequacy of data, improper use of techniques, noise within the data and imprecise nature of human behavior. For the best results of user modelling, one should choose an appropriate way to do it i.e. by selecting the best suitable approach for the desired domain. Machine learning and Soft computing Techniques have the ability to handle the uncertainty and are extensively being used for user modeling purpose. This paper reviews various approaches of user modeling and critically analyzes the machine learning and soft computing techniques that have successfully captured and formally modelled the human behavior.
Recent Advances in Fairness Analysis of User Profiling Approaches in E-Commer...Erasmo Purificato
Presentation of the paper "Recent Advances in Fairness Analysis of User Profiling Approaches in E-Commerce with Graph Neural Networks" co-authored with L. Boratto and E.W. De Luca @ AIxIA 2023: 22nd International Conference of the Italian Association for Artificial Intelligence, November 6-9, 2023, Rome, Italy.
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Following the user’s interests in mobile context aware recommender systemsBouneffouf Djallel
The wide development of mobile applications provides a considerable amount of data of all types (images, texts, sounds, videos, etc.). In this sense, Mobile Context-aware Recommender Systems (MCRS) suggest the user suitable information depending on her/his situation and interests. Two key questions have to be considered 1) how to recommend the user information that follows his/her interests evolution? 2) how to model the user’s situation and its related interests? To the best of our knowledge, no existing work proposing a MCRS tries to answer both questions as we do. This paper describes an ongoing work on the implementation of a MCRS based on the hybrid-ε-greedy algorithm we propose, which combines the standard ε-greedy algorithm and both content-based filtering and case-based reasoning techniques.
Do Graph Neural Networks Build Fair User Models? Assessing Disparate Impact a...Erasmo Purificato
Presentation for the paper published @ CIKM'22: 31st ACM International Conference on Information & Knowledge Management (October 17-21, 2022 | Atlanta, GA, USA)
The document describes a proposed model for representing user profiles using ontologies for personalized web information gathering. The model uses both a world knowledge base (encoded from the Library of Congress Subject Headings) and a user's local instance repository to construct personalized ontologies representing the user's concept models and background knowledge. The proposed model is compared against existing benchmark models through experiments using a large standard dataset, and results show the proposed model improves web information gathering performance.
The document summarizes a research paper that proposes a customized ontological model for representing user profiles to improve web information gathering. The model uses both a global knowledge base and local user repositories to construct personalized ontologies. It introduces a multidimensional ontology mining method to analyze ontology concepts. The local repositories are then used to populate the personalized ontologies with background knowledge. An evaluation compares the proposed model to benchmarks and finds it successfully represents user profiles.
Personalized Real-Time Virtual Tours in Places with Cultural InterestUniversity of Piraeus
Virtual tours using drones enhance the experience the users perceive from a place with cultural interest. Drones equipped with 360o cameras perform real-time video streaming of the cultural sites. The user preferences about each monument type should be considered in order the appropriate flying route for the drone to be selected. This paper describes a scheme for supporting personalized real-time virtual tours in sites with cultural interest using drones. The user preferences are modeled using the MPEG-21 and the MPEG-7 standards, while Web Ontology Language (OWL) ontologies are used for the description of the metadata structure and semantics. The Metadata-aware Analytic Network Process (MANP) algorithm is proposed in order the weights about the user preferences for each monument type to be estimated. Subsequently, the Trapezoidal Fuzzy Topsis for Heritage Route Selection (TFT-HRS) algorithm accomplishes ranks the candidate heritage routes. Finally, after each virtual tour, the user preferences metadata are updated in order the scheme to continuously learn about the user preferences.
2009-Social computing-First steps to netviz nirvanaMarc Smith
This document summarizes two user studies that evaluated NodeXL, an open-source social network analysis tool integrated with Microsoft Excel, and its effectiveness for teaching SNA concepts. 21 graduate students with varying technical backgrounds used NodeXL to analyze online communities. The studies found that NodeXL was usable for a diverse range of users and its integrated metrics and visualizations helped spark insights and facilitated understanding of SNA techniques. Lessons learned can help educators, researchers, and developers improve SNA tools.
Character recognition of kannada text in scene images using neuralIAEME Publication
Character recognition in scene images is one of the most fascinating and challenging
areas of pattern recognition with various practical application potentials. It can contribute
immensely to the advancement of an automation process and can improve the interface
between man and machine in many applications. Some practical application potentials of
character recognition system are: reading aid for the blind, traffic guidance systems, tour
guide systems, location aware systems and many more. In this work, a novel method for
recognizing basic Kannada characters in natural scene images is proposed. The proposed
method uses zone wise horizontal and vertical profile based features of character images. The
method works in two phases. During training, zone wise vertical and horizontal profile based
features are extracted from training samples and neural network is trained. During testing, the
test image is processed to obtain features and recognized using neural network classifier. The
method has been evaluated on 490 Kannada character images captured from 2 Mega Pixels
cameras on mobile phones at various sizes 240x320, 600x800 and 900x1200, which contains
samples of different sizes, styles and with different degradations, and achieves an average
recognition accuracy of 92%. The system is efficient and insensitive to the variations in size
and font, noise, blur and other degradations.
Character recognition of kannada text in scene images using neuralIAEME Publication
The document summarizes a proposed method for recognizing Kannada characters in low resolution scene images using neural networks. It involves extracting zone-wise horizontal and vertical profile features from character images. During training, features are extracted from samples and used to train a neural network. During testing, features are extracted from test images and recognized using the trained neural network classifier. The method achieved an average recognition accuracy of 92% on 490 Kannada character images captured from mobile phones under varying conditions.
A MOBILE APPLICATION FOR HANDWRITING RECOGNITION USING MACHINE LEARNING AND I...IRJET Journal
This document describes a mobile application for handwriting recognition using machine learning and image processing. The application aims to improve handwriting education by providing real-time feedback to users as they practice. It collects a dataset of diverse handwriting samples to train a machine learning model for character recognition. The model analyzes preprocessed images using features extracted from the handwriting. It is integrated into a mobile application with an interactive interface to enable real-time recognition and feedback as users write, helping to improve their skills through personalized practice and recommendations. Testing achieved over 95% accuracy on a variety of handwriting styles.
New Research Articles 2020 November Issue International Journal of Software E...ijseajournal
The International Journal of Software Engineering & Applications (IJSEA) is a bi-monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Software Engineering & Applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern software engineering concepts & establishing new collaborations in these areas.
Projection Multi Scale Hashing Keyword Search in Multidimensional DatasetsIRJET Journal
The document discusses a novel method called ProMiSH (Projection and Multi Scale Hashing) for keyword search in multi-dimensional datasets. ProMiSH uses random projection and hash-based index structures to achieve high scalability and speedup of more than four orders over state-of-the-art tree-based techniques. Empirical studies on real and synthetic datasets of sizes up to 10 million objects and 100 dimensions show ProMiSH scales linearly with dataset size, dimension, query size, and result size. The method groups objects embedded in a vector space that are tagged with keywords matching a given query.
A recommender system-using novel deep network collaborative filteringIAESIJAI
The recommendation model aims to predict the user’s preferred items among million through analyzing the user-item relations; furthermore, Collaborative Filtering has been utilized as one of the successful recommendation approaches in last few years; however, it has the issue of sparsity. This research work develops a deep network collaborative filtering (DeepNCF), which incorporates graph neural network (GNN), and novel network collaborative filtering (NCF) for performance enhancement. At first user-item dual network is constructed, thereafter-custom weighted dual mode modularity is developed for edge clustering. Furthermore, GNN is utilized for capturing the complex relation between user and item. DeepNCF is evaluated considering the two distinctive. The experimental analysis is carried out on two datasets for Amazon and movielens dataset for recall@20 and recall@50 and the normalized discounted cumulative gain (NDCG) metric is evaluated for Amazon Dataset for NDCG@20 and NDCG@50. The proposed method outperforms the most relevant research and is accurate enough to give personalized recommendations and diversity.
FAMILY OF 2-SIMPLEX COGNITIVE TOOLS AND THEIR APPLICATIONS FOR DECISION-MAKIN...cscpconf
The urgency of application and development of cognitive graphic tools for usage in intelligent systems of data analysis, decision making and its justifications is given. Cognitive graphic tool “2-simplex prism" and examples of its usage are presented. Specificity of program realization of cognitive graphics tools invariant to problem areas is described. Most significant results are given and discussed. Future investigations are connected with usage of new approach to rendering, cross-platform realization, cognitive features improving and expanding of n-simplex
family.
FAMILY OF 2-SIMPLEX COGNITIVE TOOLS AND THEIR APPLICATIONS FOR DECISION-MAKIN...csandit
Urgency of application and development of cognitive graphic tools for usage in intelligent systems of data analysis, decision making and its justifications is given. Cognitive graphic tool
“2-simplex prism" and examples of its usage are presented. Specificity of program realization of cognitive graphics tools invariant to problem areas is described. Most significant results are given and discussed. Future investigations are connected with usage of new approach to rendering, cross-platform realization, cognitive features improving and expanding of n-simplex family
Aswin Suryanarayanan is a UX designer based in Bangalore, India. He has a Master's degree in Ergonomics from Loughborough University in the UK and a Master's in Biomedical Engineering from Manipal Institute of Technology in India. He has over 5 years of work experience in UX design roles at various companies. His skills include interaction design, information architecture, usability testing, and more. He has worked on projects in domains such as banking, travel, and healthcare.
Visualization of cartographic systems in mobile devices is a challenge due to the its own
limitations to show all the relevant information that the user needs on the screen. Within this paper we review
current state-of- the-art technological solutions to face this problem and we classify them in a novel typology. In
addition, it is shown an example case of a developed system for a logistic company specialized in dangerous
goods. The system is able to calculate optimal routes and communicate the drivers the best path in order to
achieve a great management of the company resources
Engelman.2011.exploring interaction modes for image retrievalmrgazer
This document discusses exploring different interaction modes for image retrieval. It describes developing a framework that allows multimodal interaction using techniques like eye tracking, voice recognition, and multi-touch. An experiment was conducted to compare the usability of different interaction methods for query by example image retrieval. Nine participants used four methods - anchor, gaze, mouse, and touch - to select regions in images. Metrics like accuracy, precision and time were measured. Preliminary results showed touch interaction had the most consistent performance and shortest completion times.
A survey on ontology based web personalizationeSAT Journals
Abstract Over the last decade the data on World Wide Web has been growing in an exponential manner. According to Google the data is accelerating with a speed of billion pages per day [24]. Internet has around 2 million users accessing the World Wide Web for various information [25].These numbers certainly raise a severe concern over information over load challenges for the users. Many researchers have been working to overcome the challenge with web personalization, many researchers are looking at ontology based web personalization as an answer to the information overload, as each individual is unique. In this paper we present an overview of ontology based web personalization, Challenges and a survey of the work. This paper also points future work in web personalization. Index Terms: Web Personalization, Ontology, User modeling, web usage mining.
This document summarizes research on ontology-based web personalization. It discusses how web personalization aims to personalize content based on a user's navigational behavior. Ontology-based approaches use formal domain knowledge to build more accurate user profiles than traditional web mining methods alone. The document surveys recent works applying ontologies to areas like user modeling, recommendation systems, and information retrieval. It also outlines challenges in developing personalized systems, such as building accurate user profiles and addressing privacy and scalability issues. Future work opportunities include better integrating ontology and web mining techniques to improve personalization over time as a user's interests evolve.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Construction Management (CM) has to deal with a variety of uncertainties related to Time, Cost, Quality, and Safety, to name a few. Such uncertainties make the entire construction process highly unpredictable. It, therefore, falls under the purview of artificial neural networks (ANNs) in which the given hazy information can be effectively interpreted in order to arrive at meaningful conclusions. This paper reviews the application of ANNs in construction activities related to the prediction of costs, risk, and safety, tender bids, as well as labor and equipment productivity. The review suggests that the ANN’s had been highly beneficial in correctly interpreting inadequate input information. It was seen that most of the investigators used the feed forward back propagation type of the network; however, if a single ANN architecture was found to be insufficient, then hybrid modeling in association with other machine learning tools such as genetic programming and support vector machines were much useful. It was however clear that the authenticity of data and experience of the modeler are important in obtaining good results.
Introducing BoxLang : A new JVM language for productivity and modularity!Ortus Solutions, Corp
Just like life, our code must adapt to the ever changing world we live in. From one day coding for the web, to the next for our tablets or APIs or for running serverless applications. Multi-runtime development is the future of coding, the future is to be dynamic. Let us introduce you to BoxLang.
Dynamic. Modular. Productive.
BoxLang redefines development with its dynamic nature, empowering developers to craft expressive and functional code effortlessly. Its modular architecture prioritizes flexibility, allowing for seamless integration into existing ecosystems.
Interoperability at its Core
With 100% interoperability with Java, BoxLang seamlessly bridges the gap between traditional and modern development paradigms, unlocking new possibilities for innovation and collaboration.
Multi-Runtime
From the tiny 2m operating system binary to running on our pure Java web server, CommandBox, Jakarta EE, AWS Lambda, Microsoft Functions, Web Assembly, Android and more. BoxLang has been designed to enhance and adapt according to it's runnable runtime.
The Fusion of Modernity and Tradition
Experience the fusion of modern features inspired by CFML, Node, Ruby, Kotlin, Java, and Clojure, combined with the familiarity of Java bytecode compilation, making BoxLang a language of choice for forward-thinking developers.
Empowering Transition with Transpiler Support
Transitioning from CFML to BoxLang is seamless with our JIT transpiler, facilitating smooth migration and preserving existing code investments.
Unlocking Creativity with IDE Tools
Unleash your creativity with powerful IDE tools tailored for BoxLang, providing an intuitive development experience and streamlining your workflow. Join us as we embark on a journey to redefine JVM development. Welcome to the era of BoxLang.
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxSunil Jagani
Discover how AI is transforming the workplace and learn strategies for reskilling and upskilling employees to stay ahead. This comprehensive guide covers the impact of AI on jobs, essential skills for the future, and successful case studies from industry leaders. Embrace AI-driven changes, foster continuous learning, and build a future-ready workforce.
Read More - https://bit.ly/3VKly70
More Related Content
Similar to Beyond-Accuracy Perspectives on Graph Neural Network-Based Models for Behavioural User Profiling
The document describes a proposed model for representing user profiles using ontologies for personalized web information gathering. The model uses both a world knowledge base (encoded from the Library of Congress Subject Headings) and a user's local instance repository to construct personalized ontologies representing the user's concept models and background knowledge. The proposed model is compared against existing benchmark models through experiments using a large standard dataset, and results show the proposed model improves web information gathering performance.
The document summarizes a research paper that proposes a customized ontological model for representing user profiles to improve web information gathering. The model uses both a global knowledge base and local user repositories to construct personalized ontologies. It introduces a multidimensional ontology mining method to analyze ontology concepts. The local repositories are then used to populate the personalized ontologies with background knowledge. An evaluation compares the proposed model to benchmarks and finds it successfully represents user profiles.
Personalized Real-Time Virtual Tours in Places with Cultural InterestUniversity of Piraeus
Virtual tours using drones enhance the experience the users perceive from a place with cultural interest. Drones equipped with 360o cameras perform real-time video streaming of the cultural sites. The user preferences about each monument type should be considered in order the appropriate flying route for the drone to be selected. This paper describes a scheme for supporting personalized real-time virtual tours in sites with cultural interest using drones. The user preferences are modeled using the MPEG-21 and the MPEG-7 standards, while Web Ontology Language (OWL) ontologies are used for the description of the metadata structure and semantics. The Metadata-aware Analytic Network Process (MANP) algorithm is proposed in order the weights about the user preferences for each monument type to be estimated. Subsequently, the Trapezoidal Fuzzy Topsis for Heritage Route Selection (TFT-HRS) algorithm accomplishes ranks the candidate heritage routes. Finally, after each virtual tour, the user preferences metadata are updated in order the scheme to continuously learn about the user preferences.
2009-Social computing-First steps to netviz nirvanaMarc Smith
This document summarizes two user studies that evaluated NodeXL, an open-source social network analysis tool integrated with Microsoft Excel, and its effectiveness for teaching SNA concepts. 21 graduate students with varying technical backgrounds used NodeXL to analyze online communities. The studies found that NodeXL was usable for a diverse range of users and its integrated metrics and visualizations helped spark insights and facilitated understanding of SNA techniques. Lessons learned can help educators, researchers, and developers improve SNA tools.
Character recognition of kannada text in scene images using neuralIAEME Publication
Character recognition in scene images is one of the most fascinating and challenging
areas of pattern recognition with various practical application potentials. It can contribute
immensely to the advancement of an automation process and can improve the interface
between man and machine in many applications. Some practical application potentials of
character recognition system are: reading aid for the blind, traffic guidance systems, tour
guide systems, location aware systems and many more. In this work, a novel method for
recognizing basic Kannada characters in natural scene images is proposed. The proposed
method uses zone wise horizontal and vertical profile based features of character images. The
method works in two phases. During training, zone wise vertical and horizontal profile based
features are extracted from training samples and neural network is trained. During testing, the
test image is processed to obtain features and recognized using neural network classifier. The
method has been evaluated on 490 Kannada character images captured from 2 Mega Pixels
cameras on mobile phones at various sizes 240x320, 600x800 and 900x1200, which contains
samples of different sizes, styles and with different degradations, and achieves an average
recognition accuracy of 92%. The system is efficient and insensitive to the variations in size
and font, noise, blur and other degradations.
Character recognition of kannada text in scene images using neuralIAEME Publication
The document summarizes a proposed method for recognizing Kannada characters in low resolution scene images using neural networks. It involves extracting zone-wise horizontal and vertical profile features from character images. During training, features are extracted from samples and used to train a neural network. During testing, features are extracted from test images and recognized using the trained neural network classifier. The method achieved an average recognition accuracy of 92% on 490 Kannada character images captured from mobile phones under varying conditions.
A MOBILE APPLICATION FOR HANDWRITING RECOGNITION USING MACHINE LEARNING AND I...IRJET Journal
This document describes a mobile application for handwriting recognition using machine learning and image processing. The application aims to improve handwriting education by providing real-time feedback to users as they practice. It collects a dataset of diverse handwriting samples to train a machine learning model for character recognition. The model analyzes preprocessed images using features extracted from the handwriting. It is integrated into a mobile application with an interactive interface to enable real-time recognition and feedback as users write, helping to improve their skills through personalized practice and recommendations. Testing achieved over 95% accuracy on a variety of handwriting styles.
New Research Articles 2020 November Issue International Journal of Software E...ijseajournal
The International Journal of Software Engineering & Applications (IJSEA) is a bi-monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Software Engineering & Applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern software engineering concepts & establishing new collaborations in these areas.
Projection Multi Scale Hashing Keyword Search in Multidimensional DatasetsIRJET Journal
The document discusses a novel method called ProMiSH (Projection and Multi Scale Hashing) for keyword search in multi-dimensional datasets. ProMiSH uses random projection and hash-based index structures to achieve high scalability and speedup of more than four orders over state-of-the-art tree-based techniques. Empirical studies on real and synthetic datasets of sizes up to 10 million objects and 100 dimensions show ProMiSH scales linearly with dataset size, dimension, query size, and result size. The method groups objects embedded in a vector space that are tagged with keywords matching a given query.
A recommender system-using novel deep network collaborative filteringIAESIJAI
The recommendation model aims to predict the user’s preferred items among million through analyzing the user-item relations; furthermore, Collaborative Filtering has been utilized as one of the successful recommendation approaches in last few years; however, it has the issue of sparsity. This research work develops a deep network collaborative filtering (DeepNCF), which incorporates graph neural network (GNN), and novel network collaborative filtering (NCF) for performance enhancement. At first user-item dual network is constructed, thereafter-custom weighted dual mode modularity is developed for edge clustering. Furthermore, GNN is utilized for capturing the complex relation between user and item. DeepNCF is evaluated considering the two distinctive. The experimental analysis is carried out on two datasets for Amazon and movielens dataset for recall@20 and recall@50 and the normalized discounted cumulative gain (NDCG) metric is evaluated for Amazon Dataset for NDCG@20 and NDCG@50. The proposed method outperforms the most relevant research and is accurate enough to give personalized recommendations and diversity.
FAMILY OF 2-SIMPLEX COGNITIVE TOOLS AND THEIR APPLICATIONS FOR DECISION-MAKIN...cscpconf
The urgency of application and development of cognitive graphic tools for usage in intelligent systems of data analysis, decision making and its justifications is given. Cognitive graphic tool “2-simplex prism" and examples of its usage are presented. Specificity of program realization of cognitive graphics tools invariant to problem areas is described. Most significant results are given and discussed. Future investigations are connected with usage of new approach to rendering, cross-platform realization, cognitive features improving and expanding of n-simplex
family.
FAMILY OF 2-SIMPLEX COGNITIVE TOOLS AND THEIR APPLICATIONS FOR DECISION-MAKIN...csandit
Urgency of application and development of cognitive graphic tools for usage in intelligent systems of data analysis, decision making and its justifications is given. Cognitive graphic tool
“2-simplex prism" and examples of its usage are presented. Specificity of program realization of cognitive graphics tools invariant to problem areas is described. Most significant results are given and discussed. Future investigations are connected with usage of new approach to rendering, cross-platform realization, cognitive features improving and expanding of n-simplex family
Aswin Suryanarayanan is a UX designer based in Bangalore, India. He has a Master's degree in Ergonomics from Loughborough University in the UK and a Master's in Biomedical Engineering from Manipal Institute of Technology in India. He has over 5 years of work experience in UX design roles at various companies. His skills include interaction design, information architecture, usability testing, and more. He has worked on projects in domains such as banking, travel, and healthcare.
Visualization of cartographic systems in mobile devices is a challenge due to the its own
limitations to show all the relevant information that the user needs on the screen. Within this paper we review
current state-of- the-art technological solutions to face this problem and we classify them in a novel typology. In
addition, it is shown an example case of a developed system for a logistic company specialized in dangerous
goods. The system is able to calculate optimal routes and communicate the drivers the best path in order to
achieve a great management of the company resources
Engelman.2011.exploring interaction modes for image retrievalmrgazer
This document discusses exploring different interaction modes for image retrieval. It describes developing a framework that allows multimodal interaction using techniques like eye tracking, voice recognition, and multi-touch. An experiment was conducted to compare the usability of different interaction methods for query by example image retrieval. Nine participants used four methods - anchor, gaze, mouse, and touch - to select regions in images. Metrics like accuracy, precision and time were measured. Preliminary results showed touch interaction had the most consistent performance and shortest completion times.
A survey on ontology based web personalizationeSAT Journals
Abstract Over the last decade the data on World Wide Web has been growing in an exponential manner. According to Google the data is accelerating with a speed of billion pages per day [24]. Internet has around 2 million users accessing the World Wide Web for various information [25].These numbers certainly raise a severe concern over information over load challenges for the users. Many researchers have been working to overcome the challenge with web personalization, many researchers are looking at ontology based web personalization as an answer to the information overload, as each individual is unique. In this paper we present an overview of ontology based web personalization, Challenges and a survey of the work. This paper also points future work in web personalization. Index Terms: Web Personalization, Ontology, User modeling, web usage mining.
This document summarizes research on ontology-based web personalization. It discusses how web personalization aims to personalize content based on a user's navigational behavior. Ontology-based approaches use formal domain knowledge to build more accurate user profiles than traditional web mining methods alone. The document surveys recent works applying ontologies to areas like user modeling, recommendation systems, and information retrieval. It also outlines challenges in developing personalized systems, such as building accurate user profiles and addressing privacy and scalability issues. Future work opportunities include better integrating ontology and web mining techniques to improve personalization over time as a user's interests evolve.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Construction Management (CM) has to deal with a variety of uncertainties related to Time, Cost, Quality, and Safety, to name a few. Such uncertainties make the entire construction process highly unpredictable. It, therefore, falls under the purview of artificial neural networks (ANNs) in which the given hazy information can be effectively interpreted in order to arrive at meaningful conclusions. This paper reviews the application of ANNs in construction activities related to the prediction of costs, risk, and safety, tender bids, as well as labor and equipment productivity. The review suggests that the ANN’s had been highly beneficial in correctly interpreting inadequate input information. It was seen that most of the investigators used the feed forward back propagation type of the network; however, if a single ANN architecture was found to be insufficient, then hybrid modeling in association with other machine learning tools such as genetic programming and support vector machines were much useful. It was however clear that the authenticity of data and experience of the modeler are important in obtaining good results.
Similar to Beyond-Accuracy Perspectives on Graph Neural Network-Based Models for Behavioural User Profiling (20)
Introducing BoxLang : A new JVM language for productivity and modularity!Ortus Solutions, Corp
Just like life, our code must adapt to the ever changing world we live in. From one day coding for the web, to the next for our tablets or APIs or for running serverless applications. Multi-runtime development is the future of coding, the future is to be dynamic. Let us introduce you to BoxLang.
Dynamic. Modular. Productive.
BoxLang redefines development with its dynamic nature, empowering developers to craft expressive and functional code effortlessly. Its modular architecture prioritizes flexibility, allowing for seamless integration into existing ecosystems.
Interoperability at its Core
With 100% interoperability with Java, BoxLang seamlessly bridges the gap between traditional and modern development paradigms, unlocking new possibilities for innovation and collaboration.
Multi-Runtime
From the tiny 2m operating system binary to running on our pure Java web server, CommandBox, Jakarta EE, AWS Lambda, Microsoft Functions, Web Assembly, Android and more. BoxLang has been designed to enhance and adapt according to it's runnable runtime.
The Fusion of Modernity and Tradition
Experience the fusion of modern features inspired by CFML, Node, Ruby, Kotlin, Java, and Clojure, combined with the familiarity of Java bytecode compilation, making BoxLang a language of choice for forward-thinking developers.
Empowering Transition with Transpiler Support
Transitioning from CFML to BoxLang is seamless with our JIT transpiler, facilitating smooth migration and preserving existing code investments.
Unlocking Creativity with IDE Tools
Unleash your creativity with powerful IDE tools tailored for BoxLang, providing an intuitive development experience and streamlining your workflow. Join us as we embark on a journey to redefine JVM development. Welcome to the era of BoxLang.
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxSunil Jagani
Discover how AI is transforming the workplace and learn strategies for reskilling and upskilling employees to stay ahead. This comprehensive guide covers the impact of AI on jobs, essential skills for the future, and successful case studies from industry leaders. Embrace AI-driven changes, foster continuous learning, and build a future-ready workforce.
Read More - https://bit.ly/3VKly70
"What does it really mean for your system to be available, or how to define w...Fwdays
We will talk about system monitoring from a few different angles. We will start by covering the basics, then discuss SLOs, how to define them, and why understanding the business well is crucial for success in this exercise.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
In our second session, we shall learn all about the main features and fundamentals of UiPath Studio that enable us to use the building blocks for any automation project.
📕 Detailed agenda:
Variables and Datatypes
Workflow Layouts
Arguments
Control Flows and Loops
Conditional Statements
💻 Extra training through UiPath Academy:
Variables, Constants, and Arguments in Studio
Control Flow in Studio
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfleebarnesutopia
So… you want to become a Test Automation Engineer (or hire and develop one)? While there’s quite a bit of information available about important technical and tool skills to master, there’s not enough discussion around the path to becoming an effective Test Automation Engineer that knows how to add VALUE. In my experience this had led to a proliferation of engineers who are proficient with tools and building frameworks but have skill and knowledge gaps, especially in software testing, that reduce the value they deliver with test automation.
In this talk, Lee will share his lessons learned from over 30 years of working with, and mentoring, hundreds of Test Automation Engineers. Whether you’re looking to get started in test automation or just want to improve your trade, this talk will give you a solid foundation and roadmap for ensuring your test automation efforts continuously add value. This talk is equally valuable for both aspiring Test Automation Engineers and those managing them! All attendees will take away a set of key foundational knowledge and a high-level learning path for leveling up test automation skills and ensuring they add value to their organizations.
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
2. Beyond-Accuracy Perspectives on Graph Neural
Network-Based Models for Behavioural User Profiling
◎ User profiling infers an indivisual’s interests, personality traits or behaviours
from generated data to create an efficient representation, i.e. a user model.
◎ Early profiling approaches considered only the analysis of static characteristics
(explicit user profiling), with data often coming from surveys.
◎ Modern systems focus on profiling users’ data based on individuals’ actions and
interactions (implicit user profiling).
3. Beyond-Accuracy Perspectives on Graph Neural
Network-Based Models for Behavioural User Profiling
◎ Graphs are a natural way to model behaviours (node/edge ≡ user/interaction).
◎ Graph Neural Networks (GNNs) are the perfect class of neural methods to deal
with data represented by graph data structures.
◎ Recent studies have demonstrated the effectiveness of GNNs in modelling
graph data on several domains, such as recommender systems, natural
language processing and user profiling.
4. Beyond-Accuracy Perspectives on Graph Neural
Network-Based Models for Behavioural User Profiling
◎ Existing approaches evaluate GNN-based user profiling models based on the
effectiveness of a classification task at predicting a user’s characteristics.
◎ I aim to look beyond the usual accuracy-based approaches by simultaneously
considering the perspectives of fairness, explainability and privacy.
◎ Only a few studies produced on these topics for GNNs and none of them
combine them together.
5. Main goal
Leverage GNN models to produce fair and
privacy-preserving user representations,
having the ability to provide tailored
explanations to the end-users through an
adaptive and personalised user interface
7. [RQ1] Privacy
How can we guarantee personal data protection on a graph data structure while
avoiding affecting user models construction and retaining the performance of the
recommender system built upon them?
8. [RQ2] Fairness
How do we build fair user representations from GNN-based user profiling models to
keep the input of the downstream recommender debiased?
9. [RQ3] Explainability
How can we personalise user interfaces to adapt the explanations to the needs,
demands and requirements of different end-user profiles, considering their distinct
knowledge, background and expertise?
10. Contributions to date
[RQ1]
E. Purificato, S. Wehnert, and E. W. De Luca.
Dynamic Privacy-Preserving
Recommendations on Academic Graph Data.
In Computers 10, 9 (2021), 107.
[RQ3]
E. Purificato, C. Musto, P. Lops, and E. W. De Luca.
First Workshop on Adaptive and Personalized
Explainable User Interfaces (APEx-UI 2022). In 27th
International Conference on Intelligent User Interfaces
(IUI ’22 Companion). ACM, New York, NY, USA, 1–3.
[RQ3]
E. Purificato, B. Aiyer, P. Karanam, M. Pattadkal, and E. W. De Luca.
Evaluating Explainable Interfaces for a Knowledge Graph-Based
Recommender System. In Proceedings of the 8th Joint Workshop
on Interfaces and Human Decision Making for Recommender
Systems, co-located with RecSys’21. 73–88.
[RQ2 – RQ3]
E. Purificato, F. Lorenzo, F. Fallucchi, and E. W. De Luca.
The Use of Responsible Artificial Intelligence in the
Context of Loan Approval Processes. In International
Journal of Human-Computer Interaction (2022), 1-20.
11. Thanks!
I am Erasmo Purificato
You can find me at:
https://erasmopurif.com
@erasmopurif11
erasmo.purificato@ovgu.de