Search results

1 – 10 of 720
To view the access options for this content please click here
Article
Publication date: 16 October 2018

Lin Feng, Yang Liu, Zan Li, Meng Zhang, Feilong Wang and Shenglan Liu

The purpose of this paper is to promote the efficiency of RGB-depth (RGB-D)-based object recognition in robot vision and find discriminative binary representations for…

Abstract

Purpose

The purpose of this paper is to promote the efficiency of RGB-depth (RGB-D)-based object recognition in robot vision and find discriminative binary representations for RGB-D based objects.

Design/methodology/approach

To promote the efficiency of RGB-D-based object recognition in robot vision, this paper applies hashing methods to RGB-D-based object recognition by utilizing the approximate nearest neighbors (ANN) to vote for the final result. To improve the object recognition accuracy in robot vision, an “Encoding+Selection” binary representation generation pattern is proposed. “Encoding+Selection” pattern can generate more discriminative binary representations for RGB-D-based objects. Moreover, label information is utilized to enhance the discrimination of each bit, which guarantees that the most discriminative bits can be selected.

Findings

The experiment results validate that the ANN-based voting recognition method is more efficient and effective compared to traditional recognition method in RGB-D-based object recognition for robot vision. Moreover, the effectiveness of the proposed bit selection method is also validated to be effective.

Originality/value

Hashing learning is applied to RGB-D-based object recognition, which significantly promotes the recognition efficiency for robot vision while maintaining high recognition accuracy. Besides, the “Encoding+Selection” pattern is utilized in the process of binary encoding, which effectively enhances the discrimination of binary representations for objects.

Details

Assembly Automation, vol. 39 no. 1
Type: Research Article
ISSN: 0144-5154

Keywords

To view the access options for this content please click here
Article
Publication date: 18 May 2020

Xiang Chen, Yaohui Pan and Bin Luo

One challenge for tourism recommendation systems (TRSs) is the long-tail phenomenon of ratings or popularity among tourist products. This paper aims to improve the…

Abstract

Purpose

One challenge for tourism recommendation systems (TRSs) is the long-tail phenomenon of ratings or popularity among tourist products. This paper aims to improve the diversity and efficiency of TRSs utilizing the power-law distribution of long-tail data.

Design/methodology/approach

Using Sina Weibo check-in data for example, this paper demonstrates that the long-tail phenomenon exists in user travel behaviors and fits the long-tail travel data with power-law distribution. To solve data sparsity in the long-tail part and increase recommendation diversity of TRSs, the paper proposes a collaborative filtering (CF) recommendation algorithm combining with power-law distribution. Furthermore, by combining power-law distribution with locality sensitive hashing (LSH), the paper optimizes user similarity calculation to improve the calculation efficiency of TRSs.

Findings

The comparison experiments show that the proposed algorithm greatly improves the recommendation diversity and calculation efficiency while maintaining high precision and recall of recommendation, providing basis for further dynamic recommendation.

Originality/value

TRSs provide a better solution to the problem of information overload in the tourism field. However, based on the historical travel data over the whole population, most current TRSs tend to recommend hot and similar spots to users, lacking in diversity and failing to provide personalized recommendations. Meanwhile, the large high-dimensional sparse data in online social networks (OSNs) brings huge computational cost when calculating user similarity with traditional CF algorithms. In this paper, by integrating the power-law distribution of travel data and tourism recommendation technology, the authors’ work solves the problem existing in traditional TRSs that recommendation results are overly narrow and lack in serendipity, and provides users with a wider range of choices and hence improves user experience in TRSs. Meanwhile, utilizing locality sensitive hash functions, the authors’ work hashes users from high-dimensional vectors to one-dimensional integers and maps similar users into the same buckets, which realizes fast nearest neighbors search in high-dimensional space and solves the extreme sparsity problem of high dimensional travel data. Furthermore, applying the hashing results to user similarity calculation, the paper greatly reduces computational complexity and improves calculation efficiency of TRSs, which reduces the system load and enables TRSs to provide effective and timely recommendations for users.

Details

Industrial Management & Data Systems, vol. 121 no. 6
Type: Research Article
ISSN: 0263-5577

Keywords

To view the access options for this content please click here
Article
Publication date: 4 January 2013

Heng Ma and Hung‐Yu Cheng

The purpose of this paper is to effectively deal with querying of classification with membership.

Abstract

Purpose

The purpose of this paper is to effectively deal with querying of classification with membership.

Design/methodology/approach

The authors propose a scheme comprising a layer of Bloom filter for membership checking and a second layer based on neural network for dealing with the classification requirement.

Findings

Not only could false positives be dramatically decreased, but also classification could be achieved with the proposed scheme.

Research limitations/implications

The experimental data were randomly generated instead of real‐world ones.

Practical implications

It is difficult to implement this scheme in a real‐world environment, such as the internet. Second, the neural network requires time to converge to a satisfactory level.

Social implications

Internet ethic might be compromised by hackers once they find a way around the filtering mechanism.

Originality/value

The neural network was moditified and utilized for the first time to be suitable for our purpose. Second, the two‐layer design shows effectiveness.

Details

Kybernetes, vol. 42 no. 1
Type: Research Article
ISSN: 0368-492X

Keywords

To view the access options for this content please click here
Article
Publication date: 15 June 2021

Runyu Chen

Micro-video platforms have gained attention in recent years and have also become an important new channel for merchants to advertise their products. Since little research…

Abstract

Purpose

Micro-video platforms have gained attention in recent years and have also become an important new channel for merchants to advertise their products. Since little research has studied micro-video advertising, this paper aims to fill the research gap by exploring the determinants of micro-video advertising clicks. We form a micro-video advertising click prediction model and demonstrate the effectiveness of the multimodal information extracted from the advertisement producers, commodities being sold and micro-video contents in the prediction task.

Design/methodology/approach

A multimodal analysis framework was conducted based on real-world micro-video advertisement datasets. To better capture the relations between different modalities, we adopt a cooperative learning model to predict the advertising clicks.

Findings

The experimental results show that the features extracted from different data sources can improve the prediction performance. Furthermore, the combination of different modal features (visual, acoustic, textual and numerical) is also worth studying. Compared to classical baseline models, the proposed cooperative learning model significantly outperforms the prediction results, which demonstrates that the relations between modalities are also important in advertising micro-video generation.

Originality/value

To the best of our knowledge, this is the first study analysing micro-video advertising effects. With the help of our advertising click prediction model, advertisement producers (merchants or their partners) can benefit from generating more effective micro-video advertisements. Furthermore, micro-video platforms can apply our prediction results to optimise their advertisement allocation algorithm and better manage network traffic. This research can be of great help for more effective development of the micro-video advertisement industry.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

To view the access options for this content please click here
Article
Publication date: 1 March 1999

JoAnn Greco

Sponsoring an employee for an MBA costs a company a great deal—in time as well as money. But now, employees can earn their degrees without leaving the office.

Abstract

Sponsoring an employee for an MBA costs a company a great deal—in time as well as money. But now, employees can earn their degrees without leaving the office.

Details

Journal of Business Strategy, vol. 20 no. 3
Type: Research Article
ISSN: 0275-6668

To view the access options for this content please click here
Article
Publication date: 18 September 2017

Helle Birkholm Antczak, Thomas Mackrill, Signe Steensbæk and Frank Ebsen

The purpose of this paper is to present a novel online video-based approach to supervision for statutory caseworkers. Caseworkers recorded a video of their meetings with…

Abstract

Purpose

The purpose of this paper is to present a novel online video-based approach to supervision for statutory caseworkers. Caseworkers recorded a video of their meetings with their clients and sent the video to their supervisor. The supervisor selected clips in the video. They held an online meeting where they reviewed the clips, and the supervisor gave feedback and they reflected together. The caseworker then used what they had learnt in their future practice. The caseworker then recorded a new meeting, and the supervision cycle restarted.

Design/methodology/approach

In total, 11 statutory caseworkers from three municipalities in the Copenhagen area participated in semi-structured qualitative interviews. The interviews focused on the professional learning and challenges caseworkers faced in relation to participating in the supervision process.

Findings

The caseworkers reported that they used the method to assess their own practice in a more realistic way as the use of video gave a more accurate image than merely recalling what had occurred. They reflected about and developed their relationship with clients, their conversational style and use of communication techniques, skills in relation to running meetings, and skills in relation to eliciting the young person’s perspective. The caseworkers were anxious when they received their first feedback from supervisors, but this diminished. The focus on supporting clients in their personal development challenged caseworkers who identified as having an administrative rather than interventional role. Some found the online meeting technology difficult to master.

Originality/value

This study presents and explores the use of a novel approach to statutory casework supervision.

Details

Journal of Children's Services, vol. 12 no. 2-3
Type: Research Article
ISSN: 1746-6660

Keywords

To view the access options for this content please click here
Book part
Publication date: 18 January 2021

Chara Bakalis and Julia Hornle

This chapter is about online hate speech propagated via platforms operated by social media companies (SMCs). It examines the options open to states in forcing SMCs to take…

Abstract

This chapter is about online hate speech propagated via platforms operated by social media companies (SMCs). It examines the options open to states in forcing SMCs to take responsibility for the hateful content that appears on their sites. It examines the technological and legal context for imposing legal obligations on SMCs, and analyses initiatives in Germany, the United Kingdom, the European Union and elsewhere. It argues that while SMCs can play a role in controlling online hate speech, there are limitations to what they can achieve.

Details

Studies in Law, Politics, and Society
Type: Book
ISBN: 978-1-80071-221-8

Keywords

To view the access options for this content please click here
Article
Publication date: 19 December 2019

Sixing Chen, Jun Kang, Suchi Liu and Yifan Sun

This paper aims to build on the latest advances in cognitive computing techniques to systematically illustrate how unstructured data from users can offer significant value…

Abstract

Purpose

This paper aims to build on the latest advances in cognitive computing techniques to systematically illustrate how unstructured data from users can offer significant value for co-innovation.

Design/methodology/approach

The paper adopts a general overview approach to understand how unstructured data from users can be analyzed with cognitive computing techniques for innovation. The paper links the computerized techniques with marketing innovation problems with an integrated framework using dynamic capabilities and complexity theory.

Findings

The paper identifies a suite of methodologies for facilitating company co-innovation via engaging with customers and external data with cognitive computing technologies. It helps to expand marketing researchers and practitioners’ understanding of using unstructured data.

Research limitations/implications

This paper provides a conceptual framework that divides co-innovation process into three stages, ideas generation, ideas integration and ideas evaluation, and maps cognitive computing methodologies and technologies to each stage. This paper makes the theoretical contributions by developing propositions from both customer and firm perspectives.

Practical implications

This paper can be used for companies to engage consumers and external data for co-innovation activities by strategically select appropriate cognitive computing techniques to analyze unstructured data for better insights.

Originality/value

Given the lack of systematic discussion regarding what is possible from using cognitive computing to analyze unstructured data for co-innovation. This paper makes first attempt to summarize how unstructured data can be analyzed with cognitive computing techniques. This paper also integrates complexity theory to the framework from a novel perspective.

Details

European Journal of Marketing, vol. 54 no. 3
Type: Research Article
ISSN: 0309-0566

Keywords

To view the access options for this content please click here
Article
Publication date: 1 October 2018

Richard G. Brody, Harold U. Chang and Erich S. Schoenberg

Most people are probably aware of malware, but they may not be aware of malware in what may be its most dangerous form, i.e. causing physical harm, even death, to…

Abstract

Purpose

Most people are probably aware of malware, but they may not be aware of malware in what may be its most dangerous form, i.e. causing physical harm, even death, to individuals. This paper aims to document how software can cause malicious harm to individuals by attacking modern systems that appear to be neglected and under-researched.

Design/methodology/approach

This paper will review some of the most significant areas of concern with respect to end of days malware, i.e. malware that has a dangerous intent. The areas included are automobiles, medical devices and air traffic control systems.

Findings

The potential harmful effects of malware are often not well known by consumers and businesses around the world. These issues are not limited to just financial harm. Lives can actually be in danger. Underestimating the importance of cybersecurity and understanding the dangers that are associated with advancing technology are global issues that will continue unless there is enough awareness to force businesses and governments to address these issues. It is critical that safeguards are established.

Originality/value

While many papers have been written about malware and the implications of having malicious software infect a computer or a network, little attention has been paid to “end of days” malware. With advancing technology, malware now has the ability to cause serious injury or death to individuals who have minimal or no knowledge of the potential consequences of, for example, driving in an automobile, wearing or having an internal medical device or flying on an airplane. It is up to businesses and governments to address these issues.

Details

International Journal of Accounting & Information Management, vol. 26 no. 4
Type: Research Article
ISSN: 1834-7649

Keywords

To view the access options for this content please click here
Article
Publication date: 9 April 2018

Haroon Idrees, Mubarak Shah and Ray Surette

The growth of police operated surveillance cameras has out-paced the ability of humans to monitor them effectively. Computer vision is a possible solution. An ongoing…

Abstract

Purpose

The growth of police operated surveillance cameras has out-paced the ability of humans to monitor them effectively. Computer vision is a possible solution. An ongoing research project on the application of computer vision within a municipal police department is described. The paper aims to discuss these issues.

Design/methodology/approach

Following the demystification of computer vision technology, its potential for police agencies is developed within a focus on computer vision as a solution for two common surveillance camera tasks (live monitoring of multiple surveillance cameras and summarizing archived video files). Three unaddressed research questions (can specialized computer vision applications for law enforcement be developed at this time, how will computer vision be utilized within existing public safety camera monitoring rooms, and what are the system-wide impacts of a computer vision capability on local criminal justice systems) are considered.

Findings

Despite computer vision becoming accessible to law enforcement agencies the impact of computer vision has not been discussed or adequately researched. There is little knowledge of computer vision or its potential in the field.

Originality/value

This paper introduces and discusses computer vision from a law enforcement perspective and will be valuable to police personnel tasked with monitoring large camera networks and considering computer vision as a system upgrade.

Details

Policing: An International Journal, vol. 41 no. 2
Type: Research Article
ISSN: 1363-951X

Keywords

1 – 10 of 720