HW
H. Wang
56 records found
1
Understanding Users’ Contextual Factors and Personal Values for Watching YouTube Videos:
A Crowdsourcing Approach with Personal Reflection Integration
User feedback plays a significant role in helping recommendation systems to make personalized and accurate predictions. Despite the fact that many methods of collecting user feedback have been proposed, little research exists that addresses both the breadth and depth of data coll
...
This thesis investigates the potential of solving large-scale linear systems of equations (LSEs) in the Tensor Train (TT) format. First, we study when this approach can outperform traditional solvers like Conjugate Gradient (CG) and Gaussian Elimination (GE). In turn, we examine
...
Cluster analysis in high dimensional data is a difficult but desirable task. Many existing methods fail to cluster high dimensional data due to what is known as the curse of dimensionality. Therefore, sophisticated clustering methods are in wide development. Along these lines, sp
...
Examining the Efficacy of Persuasive eHealth Applications in Facilitating Smoking Cessation
An Analysis of Competency Based Activities
To assist smokers in potentially quitting their habit, this paper investigates digital eHealth applications. Based on a dataset provided by research into an eHealth application, it aims to determine if persuasive activities can convince users of the usefulness of competencies det
...
Smoking has been one of the great threats to health in recent years, being strongly correlated with multiple negative health consequences, including lung cancer. Recent research suggests that artificial intelligence chatbots can be effective in persuading healthy behavior change.
...
Use Reinforcement Learning to Choose Activities for Preparing to Quit Smoking
How Effective a Reinforcement Learning Model is for Choosing Activities that Optimizes the Likelihood that Users Return to the Next Session and the Effort Users Spend on Their Activities?
Unhealthy behaviors such as smoking is the major cause for premature deaths and changing behaviors by oneself can be difficult. That is where eHealth applications come into rescue. One of the recent research explored the possibility of using a Reinforcement Learning model to choo
...
Contract review is a critical yet time-consuming process in legal practice, with significant financial implications when errors occur. While Large Language Models (LLMs) have shown promise in legal document processing, they still face challenges with lengthy contracts and complex
...
Immersive technologies, such as head-mounted devices for Virtual Reality (VR), have experienced increased availability on the consumer market. This opens up numerous possibilities for scientific research and industrial applications. But, configuring and combining data from variou
...
This thesis aims to assess robustness of networks by evaluating the performance of node attack strategies, the applicability and accuracy of different approaches, and to increase robustness of networks through analysing protecting methods, including link addition and node protect
...
In real-world scenarios, users provide invaluable data; however, this data is inherently incoherent, incomplete, and duplicated, i.e., different data rows refer to the same real-world object. Merging duplications to a single entry broadens the knowledge of a given real-world obje
...
This thesis’ research concerns the time-dynamics of a complex geographical network of municipalities, i.e. the Dutch Municipality Network over the period 1830-2019. By analysing 190 years of socioeconomic statistical data and applying contemporary tooling from network science and
...
Multiple Instance Learning (MIL) is a type of semi-supervised machine learning used recently in medical and multi-media fields. In MIL, instead of a single feature vector, a set of feature vectors has to be classified. Standard MIL algorithms assume that only some of these vector
...
Suicide prevention is an important global topic, since suicide is being a worldwide serious health issue for decades. In the meantime, people start to pay more attention to mental health issues and Artificial Intelligence is developed and applied in many different fields. Recentl
...
Customer maturity analysis improvement for TOPdesk
Final report
TOPdesk is a service management software provider in a wide variety of domains and industries. TOPdesk also offers consultancy to their customers that aims to continuously assess and improve the customer’s experience and service efficiency. TOPdesk offers a Mini Health Check (M
...
Parkinson's disease (PD) diagnosis is based on clinical criteria, i.e. bradykinesia, rest tremor, rigidity, etc. Assessment of the severity of PD symptoms, however, is subject to inter-rater variability. In this paper, we propose a deep learning based automatic PD diagnosis metho
...
The M.O.R.S.E. system is a tool for creating and managing large escape events, mainly used for local escape events. The tool is designed for only a limited range of puzzle types and styling options because most of the puzzles require physical items in order to solve a puzzle and
...
ScenWise is an innovative company that specializes in data science revolving around traffic management. ScenWise strives to use the newest and best technologies and practices when it comes to web applications, data science and traffic management. The reason for this is that they
...
Due to increasing pressure on the system, the functioning of public transport networks (PTN) in metropolitan areas is crucial for future mobility. Within these networks, hierarchical levels can be distinguished where different levels have different functions. These hierarchical l
...
Forward-looking consistency in Attribute-Based Credentials
A privacy-preserving way to determine the revocation status of credentials after presentation
Authentication mechanisms play an important role in everyday digital interactions and allow users to prove their identity to others. Privacy-preserving Attribute-Based Credential Systems (PABCSs) allow users to authenticate by presenting their credential attributes, while multipl
...
Intrusion detection problem in Industrial Control Systems(ICS), such as water treat- ment plant and power grid, is an important real-world problem. Real-time anomaly detection have been proposed to minimize the risk of cyber attack. In this study, two different kind of intrusion
...