Differential privacy in collaborative filtering recommender systems: a review [0.03%]
基于差分隐私的协同过滤推荐系统研究综述
Peter Müllner,Elisabeth Lex,Markus Schedl et al.
Peter Müllner et al.
State-of-the-art recommender systems produce high-quality recommendations to support users in finding relevant content. However, through the utilization of users' data for generating recommendations, recommender systems threaten users' priv...
Iustina Ivanova,Mike Wald
Iustina Ivanova
Outdoor sport climbing is popular in Northern Italy due to its vast amount of rock climbing places (such as crags). New climbing crags appear yearly, creating an information overload problem for tourists who plan their sport climbing vacati...
Fairness of recommender systems in the recruitment domain: an analysis from technical and legal perspectives [0.03%]
招聘领域中推荐系统的公平性:从技术和法律视角的分析
Deepak Kumar,Tessa Grosz,Navid Rekabsaz et al.
Deepak Kumar et al.
Recommender systems (RSs) have become an integral part of the hiring process, be it via job advertisement ranking systems (job recommenders) for the potential employee or candidate ranking systems (candidate recommenders) for the employer. ...
Rawan Elragal,Ahmed Elragal,Abdolrasoul Habibipour
Rawan Elragal
This research addresses the demanding need for research in healthcare analytics, by explaining how previous studies have used big data, AI, and machine learning to identify, address, or solve healthcare problems. Healthcare science methods ...
A solution and practice for combining multi-source heterogeneous data to construct enterprise knowledge graph [0.03%]
多源异构数据融合构建企业知识图谱的方法及应用实践
Chenwei Yan,Xinyue Fang,Xiaotong Huang et al.
Chenwei Yan et al.
The knowledge graph is one of the essential infrastructures of artificial intelligence. It is a challenge for knowledge engineering to construct a high-quality domain knowledge graph for multi-source heterogeneous data. We propose a complet...
How can data visualization support interdisciplinary research? LuxTIME: studying historical exposomics in Belval [0.03%]
数据可视化如何支持跨学科研究?LuxTIME:Belval地区历史 exposome 研究案例分析
Dagny Aurich,Aida Horaniet Ibañez
Dagny Aurich
The Luxembourg Time Machine (LuxTIME) is an interdisciplinary project that studies the historical exposome during the industrialization of the Minett region, located in the south of Luxembourg. Exposome research encompasses all external and...
Modeling and analyzing the action process of monoamine hormones in depression: a Petri nets-based intelligent approach [0.03%]
基于Petri网的智能方法建模和分析抑郁症单胺激素作用过程
Xuyue Wang,Wangyang Yu,Chao Zhang et al.
Xuyue Wang et al.
In contemporary society, the incidence of depression is increasing significantly around the world. At present, most of the treatment methods for depression are psychological counseling and drug therapy. However, this approach does not allow...
Benchmarking open source and paid services for speech to text: an analysis of quality and input variety [0.03%]
从质量和输入变化方面分析语音转文字的开源和付费服务优劣基准测试
Antonino Ferraro,Antonio Galli,Valerio La Gatta et al.
Antonino Ferraro et al.
Introduction: Speech to text (STT) technology has seen increased usage in recent years for automating transcription of spoken language. To choose the most suitable tool for a given task, it is essential to evaluate the pe...
An intelligent telemonitoring application for coronavirus patients: reCOVeryaID [0.03%]
一种智能远程监测应用程序:针对新冠肺炎患者的康复助手(reCOVeryaID)
Daniela DAuria,Raffaele Russo,Alfonso Fedele et al.
Daniela DAuria et al.
The COVID-19 emergency underscored the importance of resolving crucial issues of territorial health monitoring, such as overloaded phone lines, doctors exposed to infection, chronically ill patients unable to access hospitals, etc. In fact,...
Authentication, access, and monitoring system for critical areas with the use of artificial intelligence integrated into perimeter security in a data center [0.03%]
基于人工智能的数据中心外围安全防护区域认证、访问与监控系统
William Villegas-Ch,Joselin García-Ortiz
William Villegas-Ch
Perimeter security in data centers helps protect systems and the data they store by preventing unauthorized access and protecting critical resources from potential threats. According to the report of the information security company SonicWa...