5,520 research outputs found
Leveraging Knowledge Graphs for Orphan Entity Allocation in Resume Processing
Significant challenges are posed in talent acquisition and recruitment by
processing and analyzing unstructured data, particularly resumes. This research
presents a novel approach for orphan entity allocation in resume processing
using knowledge graphs. Techniques of association mining, concept extraction,
external knowledge linking, named entity recognition, and knowledge graph
construction are integrated into our pipeline. By leveraging these techniques,
the aim is to automate and enhance the efficiency of the job screening process
by successfully bucketing orphan entities within resumes. This allows for more
effective matching between candidates and job positions, streamlining the
resume screening process, and enhancing the accuracy of candidate-job matching.
The approach's exceptional effectiveness and resilience are highlighted through
extensive experimentation and evaluation, ensuring that alternative measures
can be relied upon for seamless processing and orphan entity allocation in case
of any component failure. The capabilities of knowledge graphs in generating
valuable insights through intelligent information extraction and
representation, specifically in the domain of categorizing orphan entities, are
highlighted by the results of our research.Comment: In Proceedings of the 2023 IEEE International Conference on
Artificial Intelligence in Engineering and Technology (IICAIET
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Parameter dependencies for reusable performance specifications of software components
To avoid design-related performance problems, model-driven performance prediction methods analyse the response times, throughputs, and resource utilizations of software architectures before and during implementation. This thesis proposes new modeling languages and according model transformations, which allow a reusable description of usage profile dependencies to the performance of software components. Predictions based on this new methods can support performance-related design decisions
- …