Search results

1 – 6 of 6
Article
Publication date: 16 August 2023

Anish Khobragade, Shashikant Ghumbre and Vinod Pachghare

MITRE and the National Security Agency cooperatively developed and maintained a D3FEND knowledge graph (KG). It provides concepts as an entity from the cybersecurity…

Abstract

Purpose

MITRE and the National Security Agency cooperatively developed and maintained a D3FEND knowledge graph (KG). It provides concepts as an entity from the cybersecurity countermeasure domain, such as dynamic, emulated and file analysis. Those entities are linked by applying relationships such as analyze, may_contains and encrypt. A fundamental challenge for collaborative designers is to encode knowledge and efficiently interrelate the cyber-domain facts generated daily. However, the designers manually update the graph contents with new or missing facts to enrich the knowledge. This paper aims to propose an automated approach to predict the missing facts using the link prediction task, leveraging embedding as representation learning.

Design/methodology/approach

D3FEND is available in the resource description framework (RDF) format. In the preprocessing step, the facts in RDF format converted to subject–predicate–object triplet format contain 5,967 entities and 98 relationship types. Progressive distance-based, bilinear and convolutional embedding models are applied to learn the embeddings of entities and relations. This study presents a link prediction task to infer missing facts using learned embeddings.

Findings

Experimental results show that the translational model performs well on high-rank results, whereas the bilinear model is superior in capturing the latent semantics of complex relationship types. However, the convolutional model outperforms 44% of the true facts and achieves a 3% improvement in results compared to other models.

Research limitations/implications

Despite the success of embedding models to enrich D3FEND using link prediction under the supervised learning setup, it has some limitations, such as not capturing diversity and hierarchies of relations. The average node degree of D3FEND KG is 16.85, with 12% of entities having a node degree less than 2, especially there are many entities or relations with few or no observed links. This results in sparsity and data imbalance, which affect the model performance even after increasing the embedding vector size. Moreover, KG embedding models consider existing entities and relations and may not incorporate external or contextual information such as textual descriptions, temporal dynamics or domain knowledge, which can enhance the link prediction performance.

Practical implications

Link prediction in the D3FEND KG can benefit cybersecurity countermeasure strategies in several ways, such as it can help to identify gaps or weaknesses in the existing defensive methods and suggest possible ways to improve or augment them; it can help to compare and contrast different defensive methods and understand their trade-offs and synergies; it can help to discover novel or emerging defensive methods by inferring new relations from existing data or external sources; and it can help to generate recommendations or guidance for selecting or deploying appropriate defensive methods based on the characteristics and objectives of the system or network.

Originality/value

The representation learning approach helps to reduce incompleteness using a link prediction that infers possible missing facts by using the existing entities and relations of D3FEND.

Details

International Journal of Web Information Systems, vol. 19 no. 3/4
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 19 December 2022

Yong Chen

This study aims to model tourist activities in a network and explore the properties of the network. Such network enables the author to explain and quantify how tourist activities…

Abstract

Purpose

This study aims to model tourist activities in a network and explore the properties of the network. Such network enables the author to explain and quantify how tourist activities are connected in determining tourist consumption as well as the organization of destination supply.

Design/methodology/approach

The author developed a network formation mechanism to create edges between nodes based on the joint probability of a pair of activities undertaken by tourists at a destination. By adjusting network sparsity, the author created an ensemble of four topologically similar networks for empirical testing. The author used tourist activity data of Hong Kong inbound tourists to test the network model.

Findings

The author found a robust hub–periphery topological structure of the tourist activity network. In addition, the network is featured by high clustering, short diameter and positive correlations between four node centralities, namely, degree, closeness, betweenness and eigenvector centralities. The author also generated the k-cores of the networks to further unravel the structure of hub nodes. The author found that the k-cores are dominated by tourist activities related to shopping or sightseeing, suggesting the high complementarity of these activities.

Research limitations/implications

This study provides a different lens through which tourist consumption can be understood from a macroscopic angle by examining network topology and from a microscopic angle by examining node centralities.

Originality/value

To the best of the author’s knowledge, this is the first study attempting to model tourist activity and consumption in a network and explore the properties of the network. Not only has this study provided a new real-world network for network research, but it has also suggested an innovative modeling approach for tourist behavior research.

Details

International Journal of Contemporary Hospitality Management, vol. 36 no. 2
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 18 January 2024

Huazhou He, Pinghua Xu, Jing Jia, Xiaowan Sun and Jingwen Cao

Fashion merchandising hold a paramount position within the realm of retail marketing. Currently, the purpose of this article is that the assessment of display effectiveness…

47

Abstract

Purpose

Fashion merchandising hold a paramount position within the realm of retail marketing. Currently, the purpose of this article is that the assessment of display effectiveness predominantly relies on the subjective judgment of merchandisers due to the absence of an effective evaluation method. Although eye-tracking devices have found extensive used in tracking the gaze trajectory of subject, they exhibit limitations in terms of stability when applied to the evaluation of various scenes. This underscores the need for a dependable, user-friendly and objective assessment method.

Design/methodology/approach

To develop a cost-effective and convenient evaluation method, the authors introduced an image processing framework for the assessment of variations in the impact of store furnishings. An optimized visual saliency methodology that leverages a multiscale pyramid model, incorporating color, brightness and orientation features, to construct a visual saliency heatmap. Additionally, the authors have established two pivotal evaluation indices aimed at quantifying attention coverage and dispersion. Specifically, bottom features are extract from 9 distinct scale images which are down sampled from merchandising photographs. Subsequently, these extracted features are amalgamated to form a heatmap, serving as the focal point of the evaluation process. The authors have proposed evaluation indices dedicated to measuring visual focus and dispersion, facilitating a precise quantification of attention distribution within the observed scenes.

Findings

In comparison to conventional saliency algorithm, the optimization method yields more intuitive feedback regarding scene contrast. Moreover, the optimized approach results in a more concentrated focus within the central region of the visual field, a pattern in alignment with physiological research findings. The results affirm that the two defined indicators prove highly effective in discerning variations in visual attention across diverse brand store displays.

Originality/value

The study introduces an intelligent and cost-effective objective evaluate method founded upon visual saliency. This pioneering approach not only effectively discerns the efficacy of merchandising efforts but also holds the potential for extension to the assessment of fashion advertisements, home design and website aesthetics.

Details

International Journal of Clothing Science and Technology, vol. 36 no. 1
Type: Research Article
ISSN: 0955-6222

Keywords

Article
Publication date: 1 December 2022

Rodolfo Baggio, Andrea Guizzardi and Marcello Mariani

By adopting network analytic techniques, this paper aims to examine interlocking directorates among firms operating in the hospitality services sector in seven major Italian…

Abstract

Purpose

By adopting network analytic techniques, this paper aims to examine interlocking directorates among firms operating in the hospitality services sector in seven major Italian tourism destinations.

Design/methodology/approach

The authors collected information for all the hotel corporations whose headquarters are located in the seven top Italian destinations: Florence, Milan, Naples, Rimini, Rome, Turin and Venice. Data come from the Analisi Informatizzata delle Aziende Italiane database by Bureau Van Dijk and were used to build a network where the nodes are board members (people) and corporations (hotels) and the links represent the membership of individuals in the boards. From this, with a one-mode projection, the authors obtain two networks: people and corporations. The overall networks’ structures are analysed by assessing their connectivity characteristics.

Findings

The findings indicate a relatively low number of interlocks that signals a high degree of fragmentation, showing that the interconnections (both within and between destinations) are scarce. This suggests that in absence of formalized cooperation arrangements, corporations might collaborate informally.

Research limitations/implications

This work extends previous research on complexity in business settings, focusing specifically on service companies whose output depends on multiple interactions and helps clarifying coopetition practices of hospitality service firms. Policymaking perspectives are discussed as well as managerial viewpoints.

Originality/value

Not many studies of the interlocking directorates in the hospitality domain exist. This paper uses network analysis for a better understanding of the cooperative practices and the formal social structures of the Italian hospitality industry and derives a series of implications important for both researchers and practitioners while also looking at potential future studies.

Details

International Journal of Contemporary Hospitality Management, vol. 36 no. 2
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 6 September 2022

Carlos A. Meisel, Jose D. Meisel, Helga Bermeo-Andrade, Laura Carranza and Helmut Zsifkovits

The aim of this study is to increase the understanding of collaborative relationships and assess according to the project size, the influence of the contributory factors in…

Abstract

Purpose

The aim of this study is to increase the understanding of collaborative relationships and assess according to the project size, the influence of the contributory factors in shaping collaboration network structure in projects developed in global supply chains (GSC).

Design/methodology/approach

The paper used a case study methodology applied to eight global projects developed by an Austrian company leader in global market intra-logistics solutions and warehouse automation. The cases were studied by two approaches in network analysis. First, visual and descriptive analysis to describe structural aspects of the network. Second, stochastic network analysis to evaluate the influence of contributory factors in the structure of the collaboration network.

Findings

The results evidence that independently of the project size and project manager influence, project team roles (PTR) who have a reciprocal communication among other PTR tend to have a higher collaboration intensity (CI). Additionally, the results highlight the influence of the project manager in shaping the collaboration network in standard projects (STP) and small projects (SMP). According to the project size, the results show that the PTR that form complete triangles or cluster or who communicate frequently among each other tend to have a high CI, being more evident these tendencies in large-scale projects than STP and SMP.

Originality/value

This research provides a framework to identify the key actors and contributory factors in shaping collaborative relationships in GSC. The findings could be used to support the decision-making process and formulation strategies for effective collaborative relationship management in GSC.

Details

Kybernetes, vol. 52 no. 9
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 28 December 2023

Na Xu, Yanxiang Liang, Chaoran Guo, Bo Meng, Xueqing Zhou, Yuting Hu and Bo Zhang

Safety management plays an important part in coal mine construction. Due to complex data, the implementation of the construction safety knowledge scattered in standards poses a…

Abstract

Purpose

Safety management plays an important part in coal mine construction. Due to complex data, the implementation of the construction safety knowledge scattered in standards poses a challenge. This paper aims to develop a knowledge extraction model to automatically and efficiently extract domain knowledge from unstructured texts.

Design/methodology/approach

Bidirectional encoder representations from transformers (BERT)-bidirectional long short-term memory (BiLSTM)-conditional random field (CRF) method based on a pre-training language model was applied to carry out knowledge entity recognition in the field of coal mine construction safety in this paper. Firstly, 80 safety standards for coal mine construction were collected, sorted out and marked as a descriptive corpus. Then, the BERT pre-training language model was used to obtain dynamic word vectors. Finally, the BiLSTM-CRF model concluded the entity’s optimal tag sequence.

Findings

Accordingly, 11,933 entities and 2,051 relationships in the standard specifications texts of this paper were identified and a language model suitable for coal mine construction safety management was proposed. The experiments showed that F1 values were all above 60% in nine types of entities such as security management. F1 value of this model was more than 60% for entity extraction. The model identified and extracted entities more accurately than conventional methods.

Originality/value

This work completed the domain knowledge query and built a Q&A platform via entities and relationships identified by the standard specifications suitable for coal mines. This paper proposed a systematic framework for texts in coal mine construction safety to improve efficiency and accuracy of domain-specific entity extraction. In addition, the pretraining language model was also introduced into the coal mine construction safety to realize dynamic entity recognition, which provides technical support and theoretical reference for the optimization of safety management platforms.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

1 – 6 of 6