scholarly journals Market-oriented job skill valuation with cooperative composition neural network

2021 ◽  
Vol 12 (1) ◽  
Author(s):  
Ying Sun ◽  
Fuzhen Zhuang ◽  
Hengshu Zhu ◽  
Qi Zhang ◽  
Qing He ◽  
...  

AbstractThe value assessment of job skills is important for companies to select and retain the right talent. However, there are few quantitative ways available for this assessment. Therefore, we propose a data-driven solution to assess skill value from a market-oriented perspective. Specifically, we formulate the task of job skill value assessment as a Salary-Skill Value Composition Problem, where each job position is regarded as the composition of a set of required skills attached with the contextual information of jobs, and the job salary is assumed to be jointly influenced by the context-aware value of these skills. Then, we propose an enhanced neural network with cooperative structure, namely Salary-Skill Composition Network (SSCN), to separate the job skills and measure their value based on the massive job postings. Experiments show that SSCN can not only assign meaningful value to job skills, but also outperforms benchmark models for job salary prediction.

Author(s):  
M. Fahim Ferdous Khan ◽  
Ken Sakamura

Context-awareness is a quintessential feature of ubiquitous computing. Contextual information not only facilitates improved applications, but can also become significant security parameters – which in turn can potentially ensure service delivery not to anyone anytime anywhere, but to the right person at the right time and place. Specially, in determining access control to resources, contextual information can play an important role. Access control models, as studied in traditional computing security, however, have no notion of context-awareness; and the recent works in the nascent field of context-aware access control predominantly focus on spatio-temporal contexts, disregarding a host of other pertinent contexts. In this paper, with a view to exploring the relationship of access control and context-awareness in ubiquitous computing, the authors propose a comprehensive context-aware access control model for ubiquitous healthcare services. They explain the design, implementation and evaluation of the proposed model in detail. They chose healthcare as a representative application domain because healthcare systems pose an array of non-trivial context-sensitive access control requirements, many of which are directly or indirectly applicable to other context-aware ubiquitous computing applications.


2021 ◽  
Author(s):  
Ali Riahi ◽  
Omar Elharrouss ◽  
Noor Almaadeed ◽  
Somaya Al-Maadeed

Abstract Coronavirus outbreak continues to spread around the world and none knows when it will stop. Therefore, from the first day of the virus identification in Wuhan, scientists have launched numerous research projects to understand the nature of the virus, how to detect it, and search for the right medicine to help and protect patients. A fast diagnostic and detection system is a priority and should be found to stop COVID-19 from spreading. Medical imaging techniques has been used for this purpose. The existing works used transfer learning by exploiting different backbones like VGG, ResNet, DenseNet or combine them to detect COVID-19. By using these backbones many aspect can not be analysed like the spatial and contextual information in the images, while these information's can be useful for a better detection performance. For that in this paper, we used 3D representation of the data (video) as input of the 3DCNN-based deep learning model. The Bi-dimensional empirical mode decomposition (BEMD) technique to decompose the original image into IMFs, then built a video of these IMFs images. The formed video is used as input of 3DCNN model to classify and detect COVID-19 virus. 3DCNN model consists of a 3D VGG-16 backbone followed by a Context-aware attention (CAA) modules then fully connected layers for classification. Each CAA module takes the feature maps of different blocks of the backbone, which allows a learning from different feature maps. In the experiments we used 6484 X-Ray images, 1802 of them were COVID-19 positive cases, 1910 normal cases, and 2772 pneumonia cases. The experiment results showed that our proposed techniques achieved the desired results on the selected dataset. Also, the use of 3DCNN model with contextual information processing exploiting CAA networks helps to achieve better performance.


Author(s):  
M. Fahim Ferdous Khan ◽  
Ken Sakamura

Context-awareness is a quintessential feature of ubiquitous computing. Contextual information not only facilitates improved applications, but can also become significant security parameters – which in turn can potentially ensure service delivery not to anyone anytime anywhere, but to the right person at the right time and place. Specially, in determining access control to resources, contextual information can play an important role. Access control models, as studied in traditional computing security, however, have no notion of context-awareness; and the recent works in the nascent field of context-aware access control predominantly focus on spatio-temporal contexts, disregarding a host of other pertinent contexts. In this paper, with a view to exploring the relationship of access control and context-awareness in ubiquitous computing, the authors propose a comprehensive context-aware access control model for ubiquitous healthcare services. They explain the design, implementation and evaluation of the proposed model in detail. They chose healthcare as a representative application domain because healthcare systems pose an array of non-trivial context-sensitive access control requirements, many of which are directly or indirectly applicable to other context-aware ubiquitous computing applications.


Author(s):  
QI LIU ◽  
HAIPING MA ◽  
ENHONG CHEN ◽  
HUI XIONG

Mobile recommender systems target on recommending the right product or information to the right mobile users at anytime and anywhere. It is well known that the contextual information is often the key for the performances of mobile recommendations. Therefore, in this paper, we provide a focused survey of the recent development of context-aware mobile recommendations. After briefly reviewing the state-of-the-art of recommender systems, we first discuss the general notion of mobile context and how the contextual information is collected. Then, we introduce the existing approaches to exploit contextual information for modeling mobile recommendations. Furthermore, we summarize several existing recommendation tasks in the mobile scenarios, such as the recommendations in the tourism domain. Finally, we discuss some key issues that are still critical in the field of context-aware mobile recommendations, including the privacy problem, the energy efficiency issues, and the design of user interfaces.


2021 ◽  
Vol 8 (1) ◽  
Author(s):  
Venugopal Boppana ◽  
P. Sandhya

AbstractRecommendation systems are obtaining more attention in various application fields especially e-commerce, social networks and tourism etc. The top items are recommended based on the ability of recommender system which predict the future preference out of the available items. Because of the internet, the people in the current society has too many options that’s why the recommendation system is very essential. The recommendation is achieved by the particular users who predict the ratings for numerous items and recommend those items to other users. Majorly, content and collaborative filtering techniques are employed in typical recommendation systems to find user preferences and provide final recommendations. But, these systems commonly lacks to take growing user preferences in various contextual factors. Context aware recommendation systems consider various contextual parameters into account and attempt to catch user preferences appropriately. The majority of the work in the recommender system domain focuses on increasing the recommendation accuracy by employing several proposed approaches where the main motive remains to maximize the accuracy of recommendations while ignoring other design objectives, such as a user’s an item’s context. Therefore, in this paper an effective deep learning based context aware recommendation model is proposed which can be act as an efficient recommender system by showing minimum error during recommendation. Initially, the dataset is pre-processed using Natural Language Tool Kit (NLTK) in Python platform. After pre-processing, the TF–IDF and word embedding model is used for every pre-processed reviews to extract the features and contextual information. The extracted feature is considered as an input of density based clustering to group the negative, neutral and positive sentiments of user reviews. Finally, deep recurrent neural Network (DRNN) is employed to get the most preferable user from every cluster. The recurrent neural network model parameter values are initialized through the fitness computation of Bald Eagle Search (BES) algorithm. The proposed model is implemented using NYC Restaurant Rich Dataset using Python programming platform and performance is evaluated based on the metrics of accuracy, precision, recall and compared with existing models. The proposed recommendation model achieves 99.6% accuracy which is comparatively higher than other machine learning models.


2016 ◽  
Vol 1 (1) ◽  
pp. 50-53 ◽  
Author(s):  
Varun Sharma ◽  
Narpat Singh

In the recent research work, the handwritten signature is a suitable field to detection of valid signature from different environment such online signature and offline signature. In early research work, a lot of unauthorized person put the signature and theft the data in illegal manner from organization or industries. So we have to need identify, the right person on the basis of various parameters that can be detected. In this paper, we have proposed two methods namely LDA and Neural Network for the offline signature from the scan signature image. For efficient research, we have focused the comparative analysis in terms of FRR, SSIM, MSE, and PSNR. These parameters are compared with the early work and the recent work. Our proposed work is more effective and provides the suitable result through our method which leads to existing work. Our method will help to find legal signature of authorized use for security and avoid illegal work.


2020 ◽  
Vol 11 (5) ◽  
pp. 1-21
Author(s):  
Yuxiang Zhou ◽  
Lejian Liao ◽  
Yang Gao ◽  
Heyan Huang ◽  
Xiaochi Wei

2020 ◽  
Vol 4 (1) ◽  
pp. 87-107
Author(s):  
Ranjan Mondal ◽  
Moni Shankar Dey ◽  
Bhabatosh Chanda

AbstractMathematical morphology is a powerful tool for image processing tasks. The main difficulty in designing mathematical morphological algorithm is deciding the order of operators/filters and the corresponding structuring elements (SEs). In this work, we develop morphological network composed of alternate sequences of dilation and erosion layers, which depending on learned SEs, may form opening or closing layers. These layers in the right order along with linear combination (of their outputs) are useful in extracting image features and processing them. Structuring elements in the network are learned by back-propagation method guided by minimization of the loss function. Efficacy of the proposed network is established by applying it to two interesting image restoration problems, namely de-raining and de-hazing. Results are comparable to that of many state-of-the-art algorithms for most of the images. It is also worth mentioning that the number of network parameters to handle is much less than that of popular convolutional neural network for similar tasks. The source code can be found here https://github.com/ranjanZ/Mophological-Opening-Closing-Net


Electronics ◽  
2021 ◽  
Vol 10 (13) ◽  
pp. 1589
Author(s):  
Yongkeun Hwang ◽  
Yanghoon Kim ◽  
Kyomin Jung

Neural machine translation (NMT) is one of the text generation tasks which has achieved significant improvement with the rise of deep neural networks. However, language-specific problems such as handling the translation of honorifics received little attention. In this paper, we propose a context-aware NMT to promote translation improvements of Korean honorifics. By exploiting the information such as the relationship between speakers from the surrounding sentences, our proposed model effectively manages the use of honorific expressions. Specifically, we utilize a novel encoder architecture that can represent the contextual information of the given input sentences. Furthermore, a context-aware post-editing (CAPE) technique is adopted to refine a set of inconsistent sentence-level honorific translations. To demonstrate the efficacy of the proposed method, honorific-labeled test data is required. Thus, we also design a heuristic that labels Korean sentences to distinguish between honorific and non-honorific styles. Experimental results show that our proposed method outperforms sentence-level NMT baselines both in overall translation quality and honorific translations.


Author(s):  
Mario Casillo ◽  
Francesco Colace ◽  
Dajana Conte ◽  
Marco Lombardi ◽  
Domenico Santaniello ◽  
...  

AbstractIn the Big Data era, every sector has adapted to technological development to service the vast amount of information available. In this way, each field has benefited from technological improvements over the years. The cultural and artistic field was no exception, and several studies contributed to the aim of the interaction between human beings and artistic-cultural heritage. In this scenario, systems able to analyze the current situation and recommend the right services play a crucial role. In particular, in the Recommender Systems field, Context-Awareness helps to improve the recommendations provided. This article aims to present a general overview of the introduction of Context analysis techniques in Recommender Systems and discuss some challenging applications to the Cultural Heritage field.


Sign in / Sign up

Export Citation Format

Share Document