Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (370)

Search Parameters:
Keywords = message prediction

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 1271 KiB  
Article
An Efficient Continuous-Variable Quantum Key Distribution with Parameter Optimization Using Elitist Elk Herd Random Immigrants Optimizer and Adaptive Depthwise Separable Convolutional Neural Network
by Vidhya Prakash Rajendran, Deepalakshmi Perumalsamy, Chinnasamy Ponnusamy and Ezhil Kalaimannan
Future Internet 2025, 17(7), 307; https://doi.org/10.3390/fi17070307 - 17 Jul 2025
Abstract
Quantum memory is essential for the prolonged storage and retrieval of quantum information. Nevertheless, no current studies have focused on the creation of effective quantum memory for continuous variables while accounting for the decoherence rate. This work presents an effective continuous-variable quantum key [...] Read more.
Quantum memory is essential for the prolonged storage and retrieval of quantum information. Nevertheless, no current studies have focused on the creation of effective quantum memory for continuous variables while accounting for the decoherence rate. This work presents an effective continuous-variable quantum key distribution method with parameter optimization utilizing the Elitist Elk Herd Random Immigrants Optimizer (2E-HRIO) technique. At the outset of transmission, the quantum device undergoes initialization and authentication via Compressed Hash-based Message Authentication Code with Encoded Post-Quantum Hash (CHMAC-EPQH). The settings are subsequently optimized from the authenticated device via 2E-HRIO, which mitigates the effects of decoherence by adaptively tuning system parameters. Subsequently, quantum bits are produced from the verified device, and pilot insertion is executed within the quantum bits. The pilot-inserted signal is thereafter subjected to pulse shaping using a Gaussian filter. The pulse-shaped signal undergoes modulation. Authenticated post-modulation, the prediction of link failure is conducted through an authenticated channel using Radial Density-Based Spatial Clustering of Applications with Noise. Subsequently, transmission occurs via a non-failure connection. The receiver performs channel equalization on the received signal with Recursive Regularized Least Mean Squares. Subsequently, a dataset for side-channel attack authentication is gathered and preprocessed, followed by feature extraction and classification using Adaptive Depthwise Separable Convolutional Neural Networks (ADS-CNNs), which enhances security against side-channel attacks. The quantum state is evaluated based on the signal received, and raw data are collected. Thereafter, a connection is established between the transmitter and receiver. Both the transmitter and receiver perform the scanning process. Thereafter, the calculation and correction of the error rate are performed based on the sifting results. Ultimately, privacy amplification and key authentication are performed using the repaired key via B-CHMAC-EPQH. The proposed system demonstrated improved resistance to decoherence and side-channel attacks, while achieving a reconciliation efficiency above 90% and increased key generation rate. Full article
Show Figures

Graphical abstract

16 pages, 1251 KiB  
Article
Enhanced Detection of Intrusion Detection System in Cloud Networks Using Time-Aware and Deep Learning Techniques
by Nima Terawi, Huthaifa I. Ashqar, Omar Darwish, Anas Alsobeh, Plamen Zahariev and Yahya Tashtoush
Computers 2025, 14(7), 282; https://doi.org/10.3390/computers14070282 - 17 Jul 2025
Abstract
This study introduces an enhanced Intrusion Detection System (IDS) framework for Denial-of-Service (DoS) attacks, utilizing network traffic inter-arrival time (IAT) analysis. By examining the timing between packets and other statistical features, we detected patterns of malicious activity, allowing early and effective DoS threat [...] Read more.
This study introduces an enhanced Intrusion Detection System (IDS) framework for Denial-of-Service (DoS) attacks, utilizing network traffic inter-arrival time (IAT) analysis. By examining the timing between packets and other statistical features, we detected patterns of malicious activity, allowing early and effective DoS threat mitigation. We generate real DoS traffic, including normal, Internet Control Message Protocol (ICMP), Smurf attack, and Transmission Control Protocol (TCP) classes, and develop nine predictive algorithms, combining traditional machine learning and advanced deep learning techniques with optimization methods, including the synthetic minority sampling technique (SMOTE) and grid search (GS). Our findings reveal that while traditional machine learning achieved moderate accuracy, it struggled with imbalanced datasets. In contrast, Deep Neural Network (DNN) models showed significant improvements with optimization, with DNN combined with GS (DNN-GS) reaching 89% accuracy. However, we also used Recurrent Neural Networks (RNNs) combined with SMOTE and GS (RNN-SMOTE-GS), which emerged as the best-performing with a precision of 97%, demonstrating the effectiveness of combining SMOTE and GS and highlighting the critical role of advanced optimization techniques in enhancing the detection capabilities of IDS models for the accurate classification of various types of network traffic and attacks. Full article
Show Figures

Figure 1

22 pages, 1013 KiB  
Article
Leveraging Artificial Intelligence in Social Media Analysis: Enhancing Public Communication Through Data Science
by Sawsan Taha and Rania Abdel-Qader Abdallah
Journal. Media 2025, 6(3), 102; https://doi.org/10.3390/journalmedia6030102 - 12 Jul 2025
Viewed by 339
Abstract
This study examines the role of AI tools in improving public communication via social media analysis. It reviews five of the top platforms—Google Cloud Natural Language, IBM Watson NLU, Hootsuite Insights, Talkwalker Analytics, and Sprout Social—to determine their accuracy in detecting sentiment, predicting [...] Read more.
This study examines the role of AI tools in improving public communication via social media analysis. It reviews five of the top platforms—Google Cloud Natural Language, IBM Watson NLU, Hootsuite Insights, Talkwalker Analytics, and Sprout Social—to determine their accuracy in detecting sentiment, predicting trends, optimally timing content, and enhancing messaging engagement. Adopting a structured model approach and Partial Least Squares Structural Equation Modeling (PLS-SEM) via SMART PLS, this research uses 500 influencer posts from five Arab countries. The results demonstrate the impactful relationships between AI tool functions and communication outcomes: the utilization of text analysis tools significantly improved public engagement (β = 0.62, p = 0.001), trend forecasting tools improved strategic planning decisions (β = 0.74, p < 0.001), and timing optimization tools enhanced message efficacy (β = 0.59, p = 0.004). Beyond the technical dimensions, the study addresses urgent ethical considerations by outlining a five-principle ethical governance model that encourages transparency, fairness, privacy, human oversee of technologies, and institutional accountability considering data bias, algorithmic opacity, and over-reliance on automated solutions. The research adds a multidimensional framework for propelling AI into digital public communication in culturally sensitive and linguistically diverse environments and provides a blueprint for improving AI integration. Full article
Show Figures

Figure 1

24 pages, 3062 KiB  
Article
Sustainable IoT-Enabled Parking Management: A Multiagent Simulation Framework for Smart Urban Mobility
by Ibrahim Mutambik
Sustainability 2025, 17(14), 6382; https://doi.org/10.3390/su17146382 - 11 Jul 2025
Viewed by 208
Abstract
The efficient management of urban parking systems has emerged as a pivotal issue in today’s smart cities, where increasing vehicle populations strain limited parking infrastructure and challenge sustainable urban mobility. Aligned with the United Nations 2030 Agenda for Sustainable Development and the strategic [...] Read more.
The efficient management of urban parking systems has emerged as a pivotal issue in today’s smart cities, where increasing vehicle populations strain limited parking infrastructure and challenge sustainable urban mobility. Aligned with the United Nations 2030 Agenda for Sustainable Development and the strategic goals of smart city planning, this study presents a sustainability-driven, multiagent simulation-based framework to model, analyze, and optimize smart parking dynamics in congested urban settings. The system architecture integrates ground-level IoT sensors installed in parking spaces, enabling real-time occupancy detection and communication with a centralized system using low-power wide-area communication protocols (LPWAN). This study introduces an intelligent parking guidance mechanism that dynamically directs drivers to the nearest available slots based on location, historical traffic flow, and predicted availability. To manage real-time data flow, the framework incorporates message queuing telemetry transport (MQTT) protocols and edge processing units for low-latency updates. A predictive algorithm, combining spatial data, usage patterns, and time-series forecasting, supports decision-making for future slot allocation and dynamic pricing policies. Field simulations, calibrated with sensor data in a representative high-density urban district, assess system performance under peak and off-peak conditions. A comparative evaluation against traditional first-come-first-served and static parking systems highlights significant gains: average parking search time is reduced by 42%, vehicular congestion near parking zones declines by 35%, and emissions from circling vehicles drop by 27%. The system also improves user satisfaction by enabling mobile app-based reservation and payment options. These findings contribute to broader sustainability goals by supporting efficient land use, reducing environmental impacts, and enhancing urban livability—key dimensions emphasized in sustainable smart city strategies. The proposed framework offers a scalable, interdisciplinary solution for urban planners and policymakers striving to design inclusive, resilient, and environmentally responsible urban mobility systems. Full article
Show Figures

Figure 1

39 pages, 1242 KiB  
Article
Location-Based Moderation in Digital Marketing and E-Commerce: Understanding Gen Z’s Online Buying Behavior for Emerging Tech Products
by Dimitrios Theocharis, Georgios Tsekouropoulos, Greta Hoxha and Ioanna Simeli
J. Theor. Appl. Electron. Commer. Res. 2025, 20(3), 161; https://doi.org/10.3390/jtaer20030161 - 1 Jul 2025
Viewed by 778
Abstract
In an increasingly digitalized marketplace, understanding Generation Z’s (Gen Z) online consumer behavior has become a critical priority, particularly in relation to newly launched technological products. Although online consumer behavior has been widely studied, a gap remains in understanding how the location of [...] Read more.
In an increasingly digitalized marketplace, understanding Generation Z’s (Gen Z) online consumer behavior has become a critical priority, particularly in relation to newly launched technological products. Although online consumer behavior has been widely studied, a gap remains in understanding how the location of the e-shop (domestic vs. international) moderates this behavior. Addressing this gap, the present study adopts a quantitative, cross-sectional design with data from 302 Gen Z participants, using a hybrid sampling method that combines convenience and systematic techniques. A structured questionnaire, grounded in 19 well-established behavioral theories, was employed to examine the influence of six key factors, behavioral and attitudinal traits, social and peer influences, marketing impact, online experience, brand perceptions, and Gen Z characteristics, across various stages of the consumer journey. Moderation analysis revealed that e-shop location significantly affects the strength of relationships between these factors and both purchase intention and post-purchase behavior. Notably, Gen Z’s values and marketing responsiveness were found to be more predictive in the context of international e-shops. These findings highlight the importance of marketing strategies that are both locally relevant and globally informed. For businesses, this research offers actionable insights into how digital engagement and brand messaging can be tailored to meet the unique expectations of Gen Z consumers across diverse e-commerce contexts, thereby enhancing consumer satisfaction, loyalty, and brand advocacy. Full article
Show Figures

Figure 1

33 pages, 513 KiB  
Review
Steatotic Liver Disease in Older Adults: Clinical Implications and Unmet Needs
by Daniel Clayton-Chubb, William W. Kemp, Ammar Majeed, Peter W. Lange, Jessica A. Fitzpatrick, Karl Vaz, John S. Lubel, Alexander D. Hodge, Joanne Ryan, John J. McNeil, Alice J. Owen, Robyn L. Woods and Stuart K. Roberts
Nutrients 2025, 17(13), 2189; https://doi.org/10.3390/nu17132189 - 30 Jun 2025
Viewed by 392
Abstract
Metabolic dysfunction-associated steatotic liver disease (MASLD) is the commonest cause of chronic liver disease worldwide. Its incidence has been increasing rapidly, alongside the growing epidemics of type 2 diabetes mellitus and overweight/obesity. Global population age has also been increasing in parallel, and predictions [...] Read more.
Metabolic dysfunction-associated steatotic liver disease (MASLD) is the commonest cause of chronic liver disease worldwide. Its incidence has been increasing rapidly, alongside the growing epidemics of type 2 diabetes mellitus and overweight/obesity. Global population age has also been increasing in parallel, and predictions indicate there will be more than 2 billion persons aged over 65 by the year 2050. The interplay between MASLD and other health conditions of older persons has been a focus of recent research. In this narrative review, we aim to describe its prevalence; clinical and sociodemographic associations; and outcomes for older persons, all of which are of significant importance when considering public health messaging as well as screening and counselling individual older adults. Full article
(This article belongs to the Special Issue Dietary Intake and Health Status in Older Adults—2nd Edition)
Show Figures

Graphical abstract

33 pages, 1179 KiB  
Article
Factor Graph-Based Online Bayesian Identification and Component Evaluation for Multivariate Autoregressive Exogenous Input Models
by Tim N. Nisslbeck and Wouter M. Kouw
Entropy 2025, 27(7), 679; https://doi.org/10.3390/e27070679 - 26 Jun 2025
Viewed by 247
Abstract
We present a Forney-style factor graph representation for the class of multivariate autoregressive models with exogenous inputs, and we propose an online Bayesian parameter-identification procedure based on message passing within this graph. We derive message-update rules for (1) a custom factor node that [...] Read more.
We present a Forney-style factor graph representation for the class of multivariate autoregressive models with exogenous inputs, and we propose an online Bayesian parameter-identification procedure based on message passing within this graph. We derive message-update rules for (1) a custom factor node that represents the multivariate autoregressive likelihood function and (2) the matrix normal Wishart distribution over the parameters. The flow of messages reveals how parameter uncertainty propagates into predictive uncertainty over the system outputs and how individual factor nodes and edges contribute to the overall model evidence. We evaluate the message-passing-based procedure on (i) a simulated autoregressive system, demonstrating convergence, and (ii) on a benchmark task, demonstrating strong predictive performance. Full article
(This article belongs to the Special Issue Advances in Probabilistic Machine Learning)
Show Figures

Figure 1

17 pages, 956 KiB  
Article
Comparative Analysis of Attention Mechanisms in Densely Connected Network for Network Traffic Prediction
by Myeongjun Oh, Sung Oh, Jongkyung Im, Myungho Kim, Joung-Sik Kim, Ji-Yeon Park, Na-Rae Yi and Sung-Ho Bae
Signals 2025, 6(2), 29; https://doi.org/10.3390/signals6020029 - 19 Jun 2025
Viewed by 384
Abstract
Recently, STDenseNet (SpatioTemporal Densely connected convolutional Network) showed remarkable performance in predicting network traffic by leveraging the inductive bias of convolution layers. However, it is known that such convolution layers can only barely capture long-term spatial and temporal dependencies. To solve this problem, [...] Read more.
Recently, STDenseNet (SpatioTemporal Densely connected convolutional Network) showed remarkable performance in predicting network traffic by leveraging the inductive bias of convolution layers. However, it is known that such convolution layers can only barely capture long-term spatial and temporal dependencies. To solve this problem, we propose Attention-DenseNet (ADNet), which effectively incorporates an attention module into STDenseNet to learn representations for long-term spatio-temporal patterns. Specifically, we explored the optimal positions and the types of attention modules in combination with STDenseNet. Our key findings are as follows: i) attention modules are very effective when positioned between the last dense module and the final feature fusion module, meaning that the attention module plays a key role in aggregating low-level local features with long-term dependency. Hence, the final feature fusion module can easily exploit both global and local information; ii) the best attention module is different depending on the spatio-temporal characteristics of the dataset. To verify the effectiveness of the proposed ADNet, we performed experiments on the Telecom Italia dataset, a well-known benchmark dataset for network traffic prediction. The experimental results show that, compared to STDenseNet, our ADNet improved RMSE performance by 3.72%, 2.84%, and 5.87% in call service (Call), short message service (SMS), and Internet access (Internet) sub-datasets, respectively. Full article
Show Figures

Figure 1

17 pages, 791 KiB  
Article
Add-GNN: A Dual-Representation Fusion Molecular Property Prediction Based on Graph Neural Networks with Additive Attention
by Ronghe Zhou, Yong Zhang, Kai He and Hao Liu
Symmetry 2025, 17(6), 873; https://doi.org/10.3390/sym17060873 - 4 Jun 2025
Viewed by 778
Abstract
Molecular property prediction, as one of the important tasks in cheminformatics, is attracting more and more attention. The structure of a molecule is closely related to its properties, and a symmetrical molecular structure may differ significantly from an asymmetrical structure in terms of [...] Read more.
Molecular property prediction, as one of the important tasks in cheminformatics, is attracting more and more attention. The structure of a molecule is closely related to its properties, and a symmetrical molecular structure may differ significantly from an asymmetrical structure in terms of properties, such as the melting point, boiling point, water solubility, and so on. However, a single molecular representation does not provide a better overall representation of the molecule. And, it is also a challenge to better use graph neural networks to aggregate the information of neighboring nodes in the molecular graph. So, in this paper, we constructed a novel graph neural network with additive attention (termed Add-GNN) for molecular property prediction, which fuses the molecular graph and molecular descriptors to jointly represent molecular features in order to make the molecular representations more comprehensive. Then, in the message-passing stage, we designed an additive attention mechanism that can effectively fuse the features of neighboring nodes and the features of edges to better capture the intrinsic information of molecules. In addition, we applied L2-norm to calculate the importance of each atom to the predicted results and visualized it, providing interpretability to the model. We validated the proposed model on public datasets and showed that the model outperforms graph-based baseline methods and some graph neural network variants, proving that our proposed method is feasible and competitive. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

21 pages, 2372 KiB  
Article
Will You Become the Next Troll? A Computational Mechanics Approach to the Contagion of Trolling Behavior
by Qiusi Sun and Martin Hilbert
Entropy 2025, 27(5), 542; https://doi.org/10.3390/e27050542 - 21 May 2025
Viewed by 427
Abstract
Trolling behavior is not simply a result of ‘bad actors’, an individual trait, or a linguistic phenomenon, but emerges from complex contagious social dynamics. This study uses formal concepts from information theory and complexity science to study it as such. The data comprised [...] Read more.
Trolling behavior is not simply a result of ‘bad actors’, an individual trait, or a linguistic phenomenon, but emerges from complex contagious social dynamics. This study uses formal concepts from information theory and complexity science to study it as such. The data comprised over 13 million Reddit comments, which were classified as troll or non-troll messages using the BERT model, fine-tuned with a human coding set. We derive the unique, minimally complex, and maximally predictive model from statistical mechanics, i.e., ε-machines and transducers, and can distinguish which aspects of trolling behaviors are both self-motivated and socially induced. While the vast majority of self-driven dynamics are like flipping a coin (86.3%), when social contagion is considered, most users (95.6%) show complex hidden multiple-state patterns. Within this complexity, trolling follows predictable transitions, with, for example, a 76% probability of remaining in a trolling state once it is reached. We find that replying to a trolling comment significantly increases the likelihood of switching to a trolling state or staying in it (72%). Besides being a showcase for the use of information-theoretic measures from dynamic systems theory to conceptualize human dynamics, our findings suggest that users and platform designers should go beyond calling out and removing trolls, but foster and design environments that discourage the dynamics leading to the emergence of trolling behavior. Full article
Show Figures

Figure 1

6 pages, 1163 KiB  
Proceeding Paper
Real-Time Detection and Process Status Integration System for High-Pressure Gas Leakage
by Nian-Ze Hu, Hao-Lun Huang, Chun-Min Tsai, Yen-Yu Wu, You-Xin Lin, Chih-Chen Lin and Po-Han Lu
Eng. Proc. 2025, 92(1), 72; https://doi.org/10.3390/engproc2025092072 - 19 May 2025
Viewed by 323
Abstract
This study aims to develop a real-time gas leak detection system for application in gas cylinder filling machines. To promptly recover gas during leakage incidents, the efficiency of the gas filling process was improved by reducing resource wastage. The system utilized a Raspberry [...] Read more.
This study aims to develop a real-time gas leak detection system for application in gas cylinder filling machines. To promptly recover gas during leakage incidents, the efficiency of the gas filling process was improved by reducing resource wastage. The system utilized a Raspberry Pi with a camera for image-based detection and employed the dark channel prior method to detect the presence of gas. The message queue system was used for the real-time data transmission of gas leak status, temperature, and humidity data. The system sent data to a central server via message queuing telemetry transport (MTQQ). Node-RED was used for data visualization and anomaly alerts. Machine learning methods such as support vector machines (SVMs) and decision trees were applied to analyze the correlation between gas leaks and other environmental parameters to predict leak incidents. This system effectively detected gas leakage and transmitted and analyzed the data, significantly improving the operational efficiency of the gas cylinder filling process. Full article
(This article belongs to the Proceedings of 2024 IEEE 6th Eurasia Conference on IoT, Communication and Engineering)
Show Figures

Figure 1

14 pages, 2429 KiB  
Article
End-to-End Architecture for Real-Time IoT Analytics and Predictive Maintenance Using Stream Processing and ML Pipelines
by Ouiam Khattach, Omar Moussaoui and Mohammed Hassine
Sensors 2025, 25(9), 2945; https://doi.org/10.3390/s25092945 - 7 May 2025
Cited by 1 | Viewed by 1914
Abstract
The rapid proliferation of Internet of Things (IoT) devices across industries has created a need for robust, scalable, and real-time data processing architectures capable of supporting intelligent analytics and predictive maintenance. This paper presents a novel comprehensive architecture that enables end-to-end processing of [...] Read more.
The rapid proliferation of Internet of Things (IoT) devices across industries has created a need for robust, scalable, and real-time data processing architectures capable of supporting intelligent analytics and predictive maintenance. This paper presents a novel comprehensive architecture that enables end-to-end processing of IoT data streams, from acquisition to actionable insights. The system integrates Kafka-based message brokering for the high-throughput ingestion of real-time sensor data, with Apache Spark facilitating batch and stream extraction, transformation, and loading (ETL) processes. A modular machine-learning pipeline handles automated data preprocessing, training, and evaluation across various models. The architecture incorporates continuous monitoring and optimization components to track system performance and model accuracy, feeding insights to users via a dedicated Application Programming Interface (API). The design ensures scalability, flexibility, and real-time responsiveness, making it well suited for industrial IoT applications requiring continuous monitoring and intelligent decision-making. Full article
Show Figures

Figure 1

28 pages, 8352 KiB  
Article
Bagging a Greener Future: Social Norms Appeals and Financial Incentives in Promoting Reusable Bags Among Grocery Shoppers
by Rain Wuyu Liu, Taylor Ann Foerster and Jie Zhuang
Sustainability 2025, 17(9), 4157; https://doi.org/10.3390/su17094157 - 4 May 2025
Viewed by 597
Abstract
This research examined the persuasive impact of social norms and financial incentive messaging for encouraging reusable bag use. In an online experiment with a nationally representative sample from the U.S. (n = 753), participants were randomly exposed to static or dynamic descriptive/injunctive [...] Read more.
This research examined the persuasive impact of social norms and financial incentive messaging for encouraging reusable bag use. In an online experiment with a nationally representative sample from the U.S. (n = 753), participants were randomly exposed to static or dynamic descriptive/injunctive norms, discounts/surcharges, combinations, or a control message. Intentions to bring reusable bags when grocery shopping, along with other key demographic and psychological variables, were assessed. ANCOVA results demonstrate the main effects of the messages. Planned contrasts revealed that injunctive norms elicited higher intentions than descriptive norms. Dynamic descriptive norms led to stronger intentions compared to static descriptive norms, with no difference shown between the two injunctive norm conditions. Notably, combining injunctive norms with either incentive boosted intentions beyond standalone messaging, supporting motivational complementarity. Norms overall outperformed incentives, but integrating social and economic appeals shows promise. The predicted superiority of experimental messages in promoting intentions, when compared to a generic pro-environmental appeal (control), was not supported. The findings advance an integrated behavior change approach highlighting normative information and incentives, shedding light on optimal messaging strategies amid pro-environmental interventions. Full article
17 pages, 1580 KiB  
Article
Hierarchical Graph Learning with Cross-Layer Information Propagation for Next Point of Interest Recommendation
by Qiuhan Han, Atsushi Yoshikawa and Masayuki Yamamura
Appl. Sci. 2025, 15(9), 4979; https://doi.org/10.3390/app15094979 - 30 Apr 2025
Viewed by 358
Abstract
With the vast quantity of GPS data that have been collected from location-based social networks, Point-of-Interest (POI) recommendation aims to predict users’ next locations by learning from their historical check-in trajectories. While Graph Neural Network (GNN)-based models have shown promising results in this [...] Read more.
With the vast quantity of GPS data that have been collected from location-based social networks, Point-of-Interest (POI) recommendation aims to predict users’ next locations by learning from their historical check-in trajectories. While Graph Neural Network (GNN)-based models have shown promising results in this field, they typically construct single-layer graphs that fail to capture the hierarchical nature of human mobility patterns. To address this limitation, we propose a novel Hierarchical Graph Learning (HGL) framework that models POI relationships at multiple scales. Specifically, we construct a three-level graph structure: a base-level graph capturing direct POI transitions, a region-level graph modeling area-based interactions through spatio-temporal clustering, and a global-level graph representing category-based patterns. To effectively utilize this hierarchical structure, we design a cross-layer information propagation mechanism that enables bidirectional message passing between different levels, allowing the model to capture both fine-grained POI interactions and coarse-grained mobility patterns. Compared to traditional models, our hierarchical structure improves cold-start robustness and achieves superior performance on real-world datasets. While the incorporation of multi-layer attention and clustering introduces moderate computational overhead, the cost remains acceptable for offline recommendation contexts. Full article
Show Figures

Figure 1

16 pages, 979 KiB  
Article
The Dark Side of Boys’ Compliments to Girls: Exploring Their Relationship with Sexism and Cyberviolence Towards Intimate Partners
by Yolanda Rodríguez-Castro, Rosana Martínez-Román and María Lameiras-Fernández
Behav. Sci. 2025, 15(5), 572; https://doi.org/10.3390/bs15050572 - 24 Apr 2025
Cited by 1 | Viewed by 532
Abstract
The objective of this study was to evaluate the frequency with which boys “compliment” girls, know their perceptions about whether girls like compliments, and discen whether they believe that society expects them to make such comments. The relationship of such compliments with the [...] Read more.
The objective of this study was to evaluate the frequency with which boys “compliment” girls, know their perceptions about whether girls like compliments, and discen whether they believe that society expects them to make such comments. The relationship of such compliments with the level of ambivalent sexism and cyberviolence towards the partner was also evaluated. A total of 498 adolescent boys participated in this study, with a mean age of 16.01 years (SD = 1.02), recruited with the Computer-Assisted Web Interviewing (CAWI) system. The main results obtained show that younger boys more frequently emit objectifying messages about women’s bodies than older boys. They believe these comments positively impact girls, thinking they are appreciated. These boys, especially younger boys, show higher levels of hostile and benevolent sexism and perform more cyberviolence towards their partners. Boys’ level of partner cybercontrol predicts the emission of comments about women’s bodies, especially in boys with a high level of hostile sexism. Therefore, to prevent sexual harassment, gender-based cyberviolence, and sexism, it is crucial for the educational system to promote comprehensive sex education. Full article
(This article belongs to the Special Issue Intimate Partner Violence Against Women)
Show Figures

Figure 1

Back to TopTop