Hasil untuk "Regulation of industry, trade, and commerce. Occupational law"

Menampilkan 20 dari ~1834 hasil · dari DOAJ, arXiv

JSON API
arXiv Open Access 2026
Superintelligence and Law

Noam Kolt

The prospect of artificial superintelligence -- AI agents that can generally outperform humans in cognitive tasks and economically valuable activities -- will transform the legal order as we know it. Operating autonomously or under only limited human oversight, AI agents will assume a growing range of roles in the legal system. First, in making consequential decisions and taking real-world actions, AI agents will become de facto subjects of law. Second, to cooperate and compete with other actors (human or non-human), AI agents will harness conventional legal instruments and institutions such as contracts and courts, becoming consumers of law. Third, to the extent AI agents perform the functions of writing, interpreting, and administering law, they will become producers and enforcers of law. These developments, whenever they ultimately occur, will call into question fundamental assumptions in legal theory and doctrine, especially to the extent they ground the legitimacy of legal institutions in their human origins. Attempts to align AI agents with extant human law will also face new challenges as AI agents will not only be a primary target of law, but a core user of law and contributor to law. To contend with the advent of superintelligence, lawmakers -- new and old -- will need to be clear-eyed, recognizing both the opportunity to shape legal institutions as society braces for superintelligence and the reality that, in the longer run, this may be a joint human-AI endeavor.

en cs.CY
arXiv Open Access 2026
Data-Dependent Goal Modeling for ML-Enabled Law Enforcement Systems

Dalal Alrajeh, Vesna Nowack, Patrick Benjamin et al.

Investigating serious crimes is inherently complex and resource-constrained. Law enforcement agencies (LEAs) grapple with overwhelming volumes of offender and incident data, making effective suspect identification difficult. Although machine learning (ML)-enabled systems have been explored to support LEAs, several have failed in practice. This highlights the need to align system behavior with stakeholder goals early in development, motivating the use of Goal-Oriented Requirements Engineering (GORE). This paper reports our experience applying the GORE framework KAOS to designing an ML-enabled system for identifying suspects in online child sexual abuse. We describe how KAOS supported early requirements elaboration, including goal refinement, object modeling, agent assignment, and operationalization. A key finding is the central role of data elicitation: data requirements constrain refinement choices and candidate agents while influencing how goals are linked, operationalized, and satisfied. Conversely, goal elaboration and agent assignment shape data quality expectations and collection needs. Our experience highlights the iterative, bidirectional dependencies between goals, data, and ML performance. We contribute a reference model for integrating GORE with data-driven system development, and identify gaps in KAOS, particularly the need for explicit support for data elicitation and quality management. These insights inform future extensions of KAOS and, more broadly, the application of formal GORE methods to ML-enabled systems for high-stakes societal contexts.

en cs.CY
DOAJ Open Access 2025
Influence of Supply Chain Ambidexterity on Supply Chain Sustainability: The Mediating Role of Green Product Innovation

Luay Jum’a, Ahmed Adnan Zaid, Mohammed Othman

<i>Background</i>: This study conceptualizes supply chain ambidexterity through two capabilities, supply chain adaptability and agility. Accordingly, it investigates the impact of supply chain adaptability and agility on green product innovation (GPI) and supply chain sustainability in Jordanian manufacturing firms. It also examines the mediating role of GPI in these relationships. The study is based on dynamic capabilities theory (DCT) as the theoretical foundation. <i>Methods</i>: A quantitative research approach was employed, with data collected from 346 supply chain managers using a structured questionnaire. Partial Least Squares Structural Equation Modeling (PLS-SEM) was used for analysis. <i>Results</i>: The findings reveal that supply chain adaptability does not directly influence sustainability but significantly enhances GPI, which positively impacts sustainability. Supply chain agility, however, directly and significantly improves both GPI and sustainability, highlighting its importance in achieving sustainable supply chain performance. Additionally, GPI mediates the relationship between supply chain ambidexterity and sustainability, reinforcing its role as a key enabler of eco-friendly supply chain management. These findings provide theoretical and managerial implications. <i>Conclusions</i>: The study extends DCT by confirming the role of GPI in linking supply chain ambidexterity to sustainability. Managers should prioritize agility, invest in sustainable products, and adopt green practices to enhance competitiveness.

Transportation and communication, Management. Industrial management
DOAJ Open Access 2025
Cookies and the ability to invade privacy in cyberspace

Farangis Mansoori

Today, protecting privacy in cyberspace is a major concern for the people of the world. The lack of a single organization that can manage the online space with its restrictive and strict rules has caused some websites to use small text files called cookies to collect data from users and use them for marketing in advertising networks and use third-party websites with the help of different technologies... Although it can be argued that this is a kind of marketing strategy and in most cases, it is not dangerous. However, this can lead to security concerns and privacy violations because most websites do not ask permission to use cookies and set them in the user's browser. The main question in this article is how and to what extent cookies can violate users' privacy. In response, we will say that although cookies play an essential role in enhancing the user experience and facilitating personalized interactions on the web in the broad digital technology landscape, they also come with risks that users should be aware of them. In general, there are two main risks; the first risk is a violation of users' privacy and the second risk is a security vulnerability. 1. Introduction In cyberspace, privacy is the most important concern. Everyone who is online likes to keep their privacy safe. One of the things that can violate this privacy is internet cookies, which are designed to exchange information between the user's browser and the website Cookies contain all kinds of information needed to navigate the desired website. For this reason, they are very important for e-commerce companies and advertising agencies. Almost in most web browsing, we are given a notification that "This website uses cookies to improve your experience. Do you agree with that? or a phrase like this. We usually click " yes" without thinking because we want to see the content. but should we accept cookies? Accepting cookies can create serious security risks; since cookies are stored on the hard disk as text files, any intruder can easily open these files and view the information. Additionally, all sites that collect information from cookies are not legitimate. Some of them can use cookies for hacking purposes. However, in this article, we are looking for an answer to the question of whether the use of cookies can violate our privacy. And how? 2. Methodology The present research has been done using the descriptive-analytical method and by studying various documents and sources. Data collection was through library research, legal research centers, and access to books, articles, theses, journals, and websites. 3. Results and Discussion Nowadays, cyberspace has made it easier than ever to violate privacy, which is closely related to the personality of people; In such a way that criminals attack human life in all parts of the world, regardless of geographical boundaries, away from the controlling eyes and gaze of others and free from the inspection and surveillance of others. With the advent of computer technology, it is possible to plan and violate privacy and steal private and confidential information of individuals more than in the past with very high accuracy and clarity. (Qanad and Alighli, 2020, 306) Cookies play an essential role in enhancing user experience and facilitating personalized interactions on the web. However, behind their harmless appearance, there is a domain full of possible dangers and harms that may endanger the user's privacy and security. Although cookies can be blocked as said earlier some websites become not as effective when we don’t accept them. Some of us simply use the websites and to get the full functionality accept the cookies unwillingly and are concerned about our privacy and tracking. (Jegatheesan, 2013, p. 2) Cookies are set by the websites we visit or even sometimes by the third-party websites that involve in marketing, ad serving. There are even chances that we get cookies from websites we have never heard of or never visited but those websites are associated with the websites we visit. These websites do various activities like advertising, help in marketing the brand or product, increase revenue or even track the users. These websites may set cookies that can track the movement of users from one website to another website and can consolidate the personal data and sometimes making it available for anyone with commercial interest. And this is where we have to worry about the invasion of privacy, because the information collection cookies are not nearly as obvious, and the websites don’t simply stop at tracking, they start showing adverts, campaigns are done around you to force you to buy or look at something for the fact that you had once of frequently interested in something. This eliminates the ability for us to look for new things, in simple ways we are restricted from being shown something new and we are always shown the same things, given preferences of something we did already. (Ibid, 2013, p. 3) Tracking cookies can actually be a threat to user privacy. Because tracking cookies collect data about people's behavior on the Internet, it is absolutely essential for website owners to allow their users control over which cookies they accept. According to the General Data Protection Regulation (GDPR), every web user must have the option to accept or reject cookies when browsing the Internet. And if any website does not provide this option to its users, it violates the general data protection regulations. Also, according to the general data protection regulations, users have rights in relation to their personal data, such as the right to access, modify, limit, withdraw consent, protest, portability, and erasure. In addition, they have the right to object to automatic decision-making profiling, and processing of their personal data for direct marketing. (Article 15-22) Another concern with cookies is security issues with cookies. When they are manipulated by malicious entities, they also pose a significant threat. Attackers can use various techniques such as session hijacking, cross-site scripting, cross-site request forgery, etc. to abuse cookies in malicious activities. (Layeeq, 2024, p. 3) The current uses of cookies tell us why users should be concerned about their privacy being violated. When a user enters the Internet and registers his name or fills out a form online, he actually makes a profile of his personal information available to various companies. Many companies also use cookies to collect personal information of users and make profiles. In fact, companies do not use personal information only to provide products or services, they also use this information in various political and social cases. Awsat et al., (2020, 1354) "The author of “Four Ethical Issues of the Information Age,” talks about how profiling violates privacy when he states: “You or I may have contributed information about us freely to each of the separate databases but that by itself does not amount to giving consent to someone to merge the data. (Mason, 1986, pp. 5 - 12) Websites and companies that conduct online marketing through cookies must have clear policies and provide clear options to individuals on how to store, use, or transfer personal information. This increases the informed choice of users regarding their consent for any activity, correct and free use of the Internet space. Providing clear opt-outs allows people to exercise control when using online web services. Some people may want to visit a website without any record of their online behavior being kept. So it's a good idea to provide a simple tool to opt out of ad targeting using behavioral data. It's a legal requirement under privacy and electronic communications laws to tell a person when information is going to be stored on their device, For example, in the form of a regular cookie, or a flash cookie, and give him the opportunity to refuse this. It is also a good idea to give users relevant advice on how to use their web browser settings or the choices provided on the website itself to allow the user to maintain their online anonymity. For example, by ensuring that their identifying information is deleted at the end of a session or any other similar solution. 4. Conclusion In the broad landscape of digital technology, cookies play an essential role in enhancing the user experience and facilitating personalized interactions on the web. However, behind their harmless appearance, there is a large volume of potential risks and harms such as tracking and profiling, challenges related to cookie management, and security risks that can endanger the privacy and security of users. As discussed so far, there are two main risks from cookies that affect all other risks; One risk is invasion of privacy and the second risk is security vulnerability. Cookies can track our online activities on different websites over time and create a profile of our interests and preferences. This information can be used by advertisers to target us with personalized ads, or the data can be sold to third parties without our consent. Personal data and its processing are not permitted without obtaining the express consent of the person, and if permission is obtained, it can be used only for the purpose of the person's consent. Regarding security vulnerabilities, it should be said that in some cases user data and communications may be used by governments for the benefit of national security or any other similar concern. But there are other ways that our data may be misused and stolen. Where cybercriminals and hackers can exploit cookies to access our account information or steal sensitive data through a process called cross-site scripting. Additionally, hackers execute or inject malicious scripts into a trusted program or file, such as a cookie, to do their nasty work. However, when viewing cookies, users always have a concern and a feeling of insecurity about violating their privacy and stealing their information. In general, it seems that there is a possibility of violating privacy and compromising personal data with cookies on a small scale.

Regulation of industry, trade, and commerce. Occupational law, Islamic law
DOAJ Open Access 2025
Autonomous Last-Mile Logistics in Emerging Markets: A Study on Consumer Acceptance

Emerson Philipe Sinesio, Marcele Elisa Fontana, Júlio César Ferro de Guimarães et al.

<i>Background:</i> Rapid urbanization has intensified the challenges of freight transport, particularly in last-mile (LM) delivery, leading to rising costs and environmental externalities. Autonomous vehicles (AVs) have emerged as a promising innovation to address these issues. While much of the existing literature emphasizes business and operational perspectives, this study focuses on the acceptance of AVs from the standpoint of e-consumers—individuals who make purchases via digital platforms—in an emerging market context. <i>Methods:</i> Grounded in an extended Unified Theory of Acceptance and Use of Technology 2 (UTAUT2), which is specifically suited to consumer-focused technology adoption research, this study incorporates five constructs tailored to AV adoption. Structural Equation Modeling (SEM) was applied to survey data collected from 304 e-consumers in Northeast Brazil. <i>Results:</i> The findings reveal that performance expectancy, hedonic motivation, and environmental awareness exert significant positive effects on acceptance and intention to use AVs for LM delivery. Social influence shows a weaker, yet still positive, impact. Importantly, price sensitivity exhibits a minimal effect, suggesting that while consumers are generally cost-conscious, perceived value may outweigh price concerns in early adoption stages. <i>Conclusions:</i> These results offer valuable insights for policymakers and logistics providers aiming to implement consumer-oriented, cost-effective AV solutions in LM delivery, particularly in emerging economies. The findings emphasize the need for strategies that highlight the practical, emotional, and environmental benefits of AVs to foster market acceptance.

Transportation and communication, Management. Industrial management
DOAJ Open Access 2025
An Integrated DEA–Porter Decision Support Framework for Enhancing Supply Chain Competitiveness in the Muslim Fashion Industry: Evidence from Indonesia

Jilly Ayuningtias, Marimin Marimin, Agus Buono et al.

<i>Background:</i> The competitiveness of Indonesia’s Muslim fashion industry requires evaluation through both internal efficiency and external strategic factors, yet existing approaches often assess these dimensions separately. <i>Methods:</i> This study develops a Weighted Efficiency Competitive Score (WECS) that integrates Data Envelopment Analysis (DEA) to measure operational efficiency and Porter’s Five Forces to capture market pressures. The weights of α and β were calibrated through sensitivity analysis under the constraint α + β = 1, with values ranging from α = 0.3 to 0.7 and β = 0.7 to 0.3, using data from 23 Muslim fashion businesses in Jakarta. <i>Results:</i> The analysis identified α = 0.6 and β = 0.4 as the most stable configuration, and only 30% of firms achieved both high efficiency and strong market positioning. Strategic leaders such as JT. Co and PM. Co demonstrated that digital transformation, disciplined cost structures, and strong supply chain partnerships foster sustainable competitiveness. <i>Conclusions:</i> The WECS framework offers a replicable method to quantitatively integrate micro and macro determinants of competitiveness, contributes to the literature by bridging efficiency and strategy evaluation, and provides practical guidance for managers and policymakers to enhance decision support systems in strengthening the Muslim fashion industry’s global positioning.

Transportation and communication, Management. Industrial management
DOAJ Open Access 2025
A Model for the Crash Occurrence in Unexpected Incidents

Pouliou Anna, Kehagia Fotini, Meselidis Christos

The objective of this paper is the investigation of the parameters that influence the crash occurrence in the case of an unexpected incident. It draws inspiration from the Safety System Approach, which is built on the position that serious injury and death in transport networks cannot be ethically acceptable. To this end, the research takes into consideration parameters regarding both the road environment and the human factor. A driving simulator experiment takes place with the participation of 56 drivers, and the employment of the appropriate equipment (driving simulator, physiological parameters sensors and software, camera, synchronization software). It investigates the effect of different road and environment parameters (road category and complexity of the environment, visibility conditions), parameters of the driver (age, gender, mental workload), physiological parameters of the driver (heart rate, skin conductance, skin temperature) and the reaction time of the driver to the unexpected incidents, as well as the way of reaction (brake, maneuver, both, none). Furthermore, parameters of the vehicle are taken into consideration (speed, acceleration, headway). Α mixed logistic regression model is being developed for examining the relationship between the under study explanatory variables and the crash occurrence in unexpected incidents.

Transportation and communication
DOAJ Open Access 2025
Feasibility of Taxation of Non-Fungible Digital Assets (NFT) in Iranian Jurisprudence and Law

Seyed Alireza Tabatabaei, Erfan Ekvan

Identification of property in Imami jurisprudence and, accordingly, in Iranian law, is conditional on having exchange value, legitimacy, possession and transferability. Unusual digital tokens that have created a huge transformation in the field of intellectual property rights and virtual objects are known from the perspective of common property; However, the mere customary identification of its property is not the reason for the validity of the property from a jurisprudential and legal point of view, and other conditions for property identification must be met. This research, with a descriptive and analytical method and using library and internet tools, deals with the feasibility of applying the taxation conditions in Iranian law and Imami jurisprudence to Non-Fungible Token. related to property, such as whether it is movable or immovable, the ability to seize it, etc. in relation to this issue in future research. The results of the research indicate the conformity of the four criteria for identification of ownership obtained from the summation of the opinions of Imamiyyah jurists and the custom of economists on digital tokens. Therefore, such tokens in virtual space have financial conditions and will be classified as assets, and civil and commercial legal effects will follow them.1. Introduction The world has entered a new era since the beginning of the 1980s. Understanding what it is and why it is and understanding the necessary planning to cope with it requires the use of new concepts and theories. Virtual space, as a product of new information and communication technology, has a decisive role in this. This real space, which is an extension of human society in the context of information and communication technology, is an infinite space that organizes all kinds of interactions through information and communication in a digital context. In this space, regardless of the limitation caused by physical geography, extensive communication between persons with each other, persons with objects and objects with each other is provided through computers and in a digital process. One of the latest phenomena of organizing economic and non-economic interactions in the virtual space is called blockchain, which has created a huge evolution in terms of security, speed and transparency of data. Blockchain technology has brought many derivatives to humanity, one of the most prominent of which is Non-Federal Digital Tokens (NFT). These tokens have various applications in the field of economy, trade, culture, politics and other social and interactive affairs of humans with each other, humans with objects and objects with each other. Although today, art, business, and music are at the forefront of using this tool, and the buying and selling of things such as works of art, digital books, and in fact anything that can be converted into this type of token has become common. The basic question regarding these tokens is that according to these economic functions, from the perspective of Imami jurisprudence and according to Iranian law, do these tokens have the conditions to be recognized as property so that it can be assumed that they can be owned and have legal effects on them? or that if buying and selling takes place, it is only for the common practice and basically these tokens do not have juridical value. The purpose of this research is to investigate the conformity of property identification criteria in Imamiyyah jurisprudence and Iranian law on non-homologous digital tokens. Considering that previous researches have generally dealt with finance in the cyber space or paid attention to cryptocurrencies in general, the present research has this innovation that it specifically deals with the finance of non-traditional digital tokens, which until the time of writing this article, in Persian sources, there is no research in this field. The context is not visible. 2. Methodology The method used for this research is descriptive-analytical. In this article, two categories of sources are used: the first category includes authentic books of Imami jurisprudence, laws related to property rights in Iran's legal system, and authentic articles that serve as a reference for obtaining the nature of property and the criteria required for token comparison. Non-homosexual digital tokens are considered in Imamiya and Iranian jurisprudence, and the second category includes valid educational courses, international authoritative articles and sites that are used to obtain the required information related to non-homosexual digital tokens. Non-Fungible Token in Iran, like in other countries, is a new phenomenon and does not have a diverse and extensive research history. in other words, this article is the first research in Iran's legal system that comments on the property of these virtual objects. It should be noted that some limited research related to the rights of Non-Fungible Token in Iran has been done in the form of a thesis in the field of intellectual and intellectual property rights, such as the role of Non-Fungible Token in supporting intellectual property rights at the University of Tehran. 3. Results and Discussion In order to identify any issue in terms of whether it is tax or not, it is necessary to determine the classification of the issue, because each classification of property requires its own criteria for taxation. In Iranian law, property is divided into the same category as tangible property and benefits. A benefit that is included in the category of property can be manifested in two forms, object or service. As a result, in general, regardless of whether the subject of property is object or benefit, property can be considered in this division according to its different nature, object or service. Any non-physical activity that is transferred from its provider to the applicant is called a service, the characteristics of services include intangibility, non-storability, uniqueness, customer participation in services, and inseparability. In contrast to services, Non-Fungible Token have the ability to be stored in digital wallets, they are also independent of their creator after production and are portable in the virtual space through transfer on the blockchain platform, as a result, digital tokens are not considered services in this division and they should be put it in the category of tangible property. The basis for examining the wealth criteria of tangible property can be pure Imamiyyah jurisprudence or special economic custom, which includes the opinions of economists. In Imamiyyah jurisprudence, there are three views on the property of the subjects, according to the first point of view, the mere presence of some kind of halal benefit is sufficient to consider the subject as property, but the criticism that can be made to this opinion is that there are some subjects that in the perspective of Iranian law And custom has value, but their benefit is not a generic; Like the photo of the father of the family, which has no benefit in generic standard, while it is very important for his family, and each member of the family may pay a lot of money to the owner to get this photo. The second view considers having a legitimate interest to be enough to be property, but this opinion is also incomplete; Because it is true that the condition of having a legitimate interest is comprehensive; But after examining more opinions, we will realize that the mere benefit and legitimacy does not make the title of property on an issue true. The third and final view in Imamiyyah jurisprudence also considers rational benefit as the criterion for property, which, like the previous views, faces the problem of being incomplete; Because there are many examples in Iran that may have a small rational benefit; However, from the perspective of Imami jurisprudence, they should not be considered property; Like pork, which is not worth eating due to impurity in Iranian law. The opinions of economists are also incomplete just like Imamiyyah jurisprudence and cannot provide comprehensive criteria and obstacles to identify tangible property. The first opinion is the theory of value and utility, which was presented by some thinkers in the 19th century. According to this theory, like the third opinion of the Imami jurists, any subject that has a rational benefit is considered property, while the mere possession of a rational benefit is not considered property and it is not under the ownership of individuals, for example, consider air, it is true that it has the rational benefit of life for humans, but it cannot be considered as property and considered as the property of limited individuals. The second opinion in the specific economic custom is the theory of value resulting from the cost of production and labor, which was presented by Adam Smith, so everything that is created based on human labor has value, but this opinion is also incomplete. Some examples of property, such as horses, are without value. The fact that a person does something on them, they are considered independently from the perspective of custom and property law. In general, according to the fact that each of the examined opinions is incomplete, the criteria of tangible property should be found in the examination of the relationship between people and property, with a little thought in this connection, four criteria of having an exchange value that causes demand, having juridical and legal legitimacy, ability to possess and transferability can be declared as the criteria of tangible property and concluded that the criteria of tangible property in Iranian law is a combination of Imamiyyah jurists and the special custom of economists. on the same basis, Iranian law has established rules in paragraph 3 of article 190 and articles 215, 240, 348, 422, 637, 754, 773 that imply compliance with these criteria for tangible property. in the end, to check the value of digital tokens, it is necessary to verify the existence of the mentioned criteria in this type of virtual object. Non-fungible tokens due to multiple and unique applications such as creating wealth through selling works of art and playing games and creating virtual property security through providing intellectual and intellectual property rights qualify for the first criterion, i.e. having an exchange value that creates demand. In relation to the second criterion, in Imami jurisprudence as the basis of Iranian law, there are principles that can be used to leave it in case of doubt, in relation to non-fungible tokens due to the lack of a source that indicates sanctity or non-sanctity. There is a doubt in legal and jurisprudential legitimacy that by using the principle of falsity and the principle of authenticity, it is possible to judge the legitimacy of non-fungible tokens, so non-sexual digital tokens have juridical and legal legitimacy as well. Captivability is also subject to the ability to be available and assigned, which non-fungible tokens are also eligible for this criterion because they have the ability to be stored in digital wallets. In order to verify transferability as the fourth criterion, it should be noted that one of the reasons that a person reproduces and offers a work in the form of non-fungible tokens is because it is possible to maintain the intellectual property rights related to his work by selling these works and earn income, the premise of making money in this way is the transfer of non-fungible tokens to the buyer of the work, which in practice is done through the payment of the blockchain network fee and transfer to the person's wallet, as a result, digital tokens are also transferable. 4. Conclusions and Future Research Finally, according to the comparisons made and the arguments expressed, it can be claimed that according to Imami jurisprudence and Iranian law, these tokens are considered property and are included in the property category. Considering the definition of property for non-fungible tokens can be the introduction of new and important research that is suggested by the author of the following topics: The issue of the legitimacy of non-fungible tokens has been examined in this article only using practical principles to solve the initial confusion and it is suggested that experts in Islamic sciences deal with this aspect in a more specialized manner. By discovering the value of these tokens, as mentioned in the conclusion, new legal issues are created that can be investigated in this direction. The topics that can be suggested for research are: 1- matching transactions based on non-representative digital assets with certain contracts, 2- the nature of creating non-representative digital assets‌ is a contract or an event. 3- Since the value of these tokens was determined in this research, it is suggested that the legislator, by introducing a new law or amending the previous laws, consider the laws related to the value of digital tokens as illegal and establish special rules related to it. 4. The identification of these tokens as property is the reason for the authenticity of the transactions whose subject is non-ideal digital tokens (if there are other conditions for the authenticity of the transactions). Create transactions of these tokens.

Regulation of industry, trade, and commerce. Occupational law, Islamic law
arXiv Open Access 2025
Alibaba International E-commerce Product Search Competition DcuRAGONs Team Technical Report

Thang-Long Nguyen-Ho, Minh-Khoi Pham, Hoang-Bao Le

This report details our methodology and results developed for the Multilingual E-commerce Search Competition. The problem aims to recognize relevance between user queries versus product items in a multilingual context and improve recommendation performance on e-commerce platforms. Utilizing Large Language Models (LLMs) and their capabilities in other tasks, our data-centric method achieved the highest score compared to other solutions during the competition. Final leaderboard is publised at https://alibaba-international-cikm2025.github.io. The source code for our project is published at https://github.com/nhtlongcs/e-commerce-product-search.

en cs.IR, cs.AI
arXiv Open Access 2025
RAG or Fine-tuning? A Comparative Study on LCMs-based Code Completion in Industry

Chaozheng Wang, Zezhou Yang, Shuzheng Gao et al.

Code completion, a crucial practice in industrial settings, helps developers improve programming efficiency by automatically suggesting code snippets during development. With the emergence of Large Code Models (LCMs), this field has witnessed significant advancements. Due to the natural differences between open-source and industrial codebases, such as coding patterns and unique internal dependencies, it is a common practice for developers to conduct domain adaptation when adopting LCMs in industry. There exist multiple adaptation approaches, among which retrieval-augmented generation (RAG) and fine-tuning are the two most popular paradigms. However, no prior research has explored the trade-off of the two approaches in industrial scenarios. To mitigate the gap, we comprehensively compare the two paradigms including Retrieval-Augmented Generation (RAG) and Fine-tuning (FT), for industrial code completion in this paper. In collaboration with Tencent's WXG department, we collect over 160,000 internal C++ files as our codebase. We then compare the two types of adaptation approaches from three dimensions that are concerned by industrial practitioners, including effectiveness, efficiency, and parameter sensitivity, using six LCMs. Our findings reveal that RAG, when implemented with appropriate embedding models that map code snippets into dense vector representations, can achieve higher accuracy than fine-tuning alone. Specifically, BM25 presents superior retrieval effectiveness and efficiency among studied RAG methods. Moreover, RAG and fine-tuning are orthogonal and their combination leads to further improvement. We also observe that RAG demonstrates better scalability than FT, showing more sustained performance gains with larger scales of codebase.

en cs.SE
arXiv Open Access 2025
Voltage Regulation in Distribution Systems with Data Center Loads

Yize Chen, Baosen Zhang

Recent boom in foundation models and AI computing have raised growing concerns on the power and energy trajectories of large-scale data centers. This paper focuses on the voltage issues caused by volatile and intensity of data center power demand, which also aligns with recent observations of more frequent voltage disturbances in power grids. To address these data center integration challenges, we propose a dynamic voltage control scheme by harnessing data center's load regulation capabilities. By taking local voltage measurements and adjusting power injections at each data center buses through the dynamic voltage and frequency scaling (DVFS) scheme, we are able to maintain safe voltage magnitude in a distributed fashion with higher data center computing load. Simulations using real large language model (LLM) inference load validate the effectiveness of our proposed mechanism. Both the LLM power data and proposed control scheme are open sourced.

en eess.SY
arXiv Open Access 2025
LLM-Enhanced Self-Evolving Reinforcement Learning for Multi-Step E-Commerce Payment Fraud Risk Detection

Bo Qu, Zhurong Wang, Daisuke Yagi et al.

This paper presents a novel approach to e-commerce payment fraud detection by integrating reinforcement learning (RL) with Large Language Models (LLMs). By framing transaction risk as a multi-step Markov Decision Process (MDP), RL optimizes risk detection across multiple payment stages. Crafting effective reward functions, essential for RL model success, typically requires significant human expertise due to the complexity and variability in design. LLMs, with their advanced reasoning and coding capabilities, are well-suited to refine these functions, offering improvements over traditional methods. Our approach leverages LLMs to iteratively enhance reward functions, achieving better fraud detection accuracy and demonstrating zero-shot capability. Experiments with real-world data confirm the effectiveness, robustness, and resilience of our LLM-enhanced RL framework through long-term evaluations, underscoring the potential of LLMs in advancing industrial RL applications.

arXiv Open Access 2025
The Promise and Pitfalls of WebAssembly: Perspectives from the Industry

Ningyu He, Shangtong Cao, Haoyu Wang et al.

As JavaScript has been criticized for performance and security issues in web applications, WebAssembly (Wasm) was proposed in 2017 and is regarded as the complementation for JavaScript. Due to its advantages like compact-size, native-like speed, and portability, Wasm binaries are gradually used as the compilation target for industrial projects in other high-level programming languages and are responsible for computation-intensive tasks in browsers, e.g., 3D graphic rendering and video decoding. Intuitively, characterizing in-the-wild adopted Wasm binaries from different perspectives, like their metadata, relation with source programming language, existence of security threats, and practical purpose, is the prerequisite before delving deeper into the Wasm ecosystem and beneficial to its roadmap selection. However, currently, there is no work that conducts a large-scale measurement study on in-the-wild adopted Wasm binaries. To fill this gap, we collect the largest-ever dataset to the best of our knowledge, and characterize the status quo of them from industry perspectives. According to the different roles of people engaging in the community, i.e., web developers, Wasm maintainers, and researchers, we reorganized our findings to suggestions and best practices for them accordingly. We believe this work can shed light on the future direction of the web and Wasm.

en cs.SE
arXiv Open Access 2025
Contrastive Learning Using Graph Embeddings for Domain Adaptation of Language Models in the Process Industry

Anastasia Zhukova, Jonas Lührs, Christian E. Lobmüller et al.

Recent trends in NLP utilize knowledge graphs (KGs) to enhance pretrained language models by incorporating additional knowledge from the graph structures to learn domain-specific terminology or relationships between documents that might otherwise be overlooked. This paper explores how SciNCL, a graph-aware neighborhood contrastive learning methodology originally designed for scientific publications, can be applied to the process industry domain, where text logs contain crucial information about daily operations and are often structured as sparse KGs. Our experiments demonstrate that language models fine-tuned with triplets derived from graph embeddings (GE) outperform a state-of-the-art mE5-large text encoder by 9.8-14.3% (5.45-7.96p) on the proprietary process industry text embedding benchmark (PITEB) while having 3 times fewer parameters.

en cs.CL, cs.IR
DOAJ Open Access 2024
The Application of GIS Tools in Emergency Rescue in Sustainable Goals Achieving

Bolanowska Joanna, Dębińska Ewa, Dmytryshyn Marta et al.

Proper location of medical facilities is critical to planning activities for the health security of residents at the regional level. Spatial accessibility of medical services translates into the level of social security of residents and one of the key of the sustainable development. Spatial analyses of the availability of medical services can, therefore, be used to assess the distribution of the locations of stationing Emergency Medical Teams (EMT). The conclusions made will be particularly important when adjusting the strategic documentation and operation of the system, so that the changes made will have the best possible impact on improving the safety of the population. The time it takes to reach those waiting for help plays a key role here. It is a key element in ensuring the effectiveness of emergency medical services. Constantly monitored and analyzed, it can give a complete picture of the optimality of the location of facilities. Its reasonable standards determined by provincial plans year after year should be rigorously observed. However, the key to achieving the shortest possible time to reach an incident is the location and determination of optimal routes for EMT.

Transportation and communication
DOAJ Open Access 2024
Risk Management in Railways Construction Investments: A Case Study of China-Pakistan Economic Corridor (CPEC) ML-1 Project

Ali Yousaf, Sabir Muhammad, Hassan Muhammad Salman

Railway projects are incredibly costly due to their complex nature. This study performs risk analysis and management of Pakistan railways ML-1 project expansion and upgradation that will be undertaken at US$6.8 billion under the China-Pakistan Economic Corridor (CPEC). The risks were identified based on an extensive literature review and their relevance to the CPEC. We employed fuzzy set theory (integrated with the risk severity index) to obtain the most severe risks. The novelty of this study is the technique employed to analyse and rank the risk, also there are no previous studies conducted that emphasized the construction risk of railway projects in Pakistan. The study is useful for all stakeholders of the project, as it can plan for them to tackle these risks and implement ML-1 successfully.

Transportation and communication
DOAJ Open Access 2024
Multi-Objective Technology-Based Approach to Home Healthcare Routing Problem Considering Sustainability Aspects

Ahmed Adnan Zaid, Ahmed R. Asaad, Mohammed Othman et al.

<i>Background</i>: This research aims to solve a home healthcare vehicle routing problem (HHCVRP) model that considers the social aspect of sustainability and will be implemented in smart cities. In addition to the dynamism and uncertainty caused by variations in the patient’s condition, the proposed model considers parameters and variables that enhance its practicability, such as assuming different levels of patient importance (priority). <i>Methods</i>: The model was solved using a metaheuristic algorithm approach via the Ant Colony Optimization algorithm and the Non-Dominated Sorting technique due to the ability of such a combination to work out with dynamic models with uncertainties and multi-objectives. <i>Results</i>: This study proposes a novel mathematical model by integrating body sensors on patients to keep updating their conditions and prioritizing critical conditions in service. The sensitivity analysis demonstrates that using a heart rate sensor improves service quality and patient satisfaction without affecting the energy consumed. In addition, quality costs are increased if the importance levels of patients increase. <i>Conclusions:</i> The suggested model can assist healthcare practitioners in tracking patients’ health conditions to improve the quality of service and manage workload effectively. A trade-off between patient satisfaction and service provider satisfaction should be maintained.

Transportation and communication, Management. Industrial management
DOAJ Open Access 2024
Modelling Consumers’ Preferences for Time-Slot Based Home Delivery of Goods Bought Online: An Empirical Study in Christchurch

Ashu Kedia, Dana Abudayyeh, Diana Kusumastuti et al.

<i>Background</i>: Due to the remarkable growth in online retail sales in New Zealand, a large number of parcels are needed to be delivered to consumers’ doorsteps. Home deliveries in major New Zealand cities (e.g., Christchurch) typically occur between 9 a.m. and 6 p.m. on weekdays, when many home delivery attempts fail. This leads to adverse effects, such as vehicular traffic in residential areas and greater air pollution per parcel delivered. However, home deliveries outside of typical business hours (i.e., before 9 a.m. and after 5 p.m.) might be worthwhile to help subside the above issues. Therefore, this study investigated consumers’ preferences for receiving home deliveries during various times, such as early morning, morning, afternoon, late afternoon, and evening. <i>Methods</i>: The data used in this study were obtained via an online survey of 355 residents of Christchurch city. Non-parametric tests, namely the Friedman test, Wilcoxon signed-rank test, and ordinal logistic regression, were carried out to examine consumer preferences for the above time slots. <i>Results</i>: The results showed that consumers preferred the late afternoon (3 p.m. to 6 p.m.) time slot the most for receiving home deliveries. <i>Conclusion</i>: It appeared that the off-peak delivery option is less likely to draw the desired consumer patronage and is thus less likely to assist in lowering the number of unsuccessful home deliveries, the transportation costs incurred by service providers, traffic congestion, and pollution in urban areas.

Transportation and communication, Management. Industrial management
arXiv Open Access 2024
Towards Transparent and Efficient Anomaly Detection in Industrial Processes through ExIFFI

Davide Frizzo, Francesco Borsatti, Alessio Arcudi et al.

Anomaly Detection (AD) is crucial in industrial settings to streamline operations by detecting underlying issues. Conventional methods merely label observations as normal or anomalous, lacking crucial insights. In Industry 5.0, interpretable outcomes become desirable to enable users to understand the rational under model decisions. This paper presents the first industrial application of ExIFFI, a recent approach for fast, efficient explanations for the Extended Isolation Forest (EIF) AD method. ExIFFI is tested on four industrial datasets, demonstrating superior explanation effectiveness, computational efficiency and improved raw anomaly detection performances. ExIFFI reaches over then 90\% of average precision on all the benchmarks considered in the study and overperforms state-of-the-art Explainable Artificial Intelligence (XAI) approaches in terms of the feature selection proxy task metric which was specifically introduced to quantitatively evaluate model explanations.

en cs.LG, cs.AI
arXiv Open Access 2024
Understanding the Skills Gap between Higher Education and Industry in the UK in Artificial Intelligence Sector

Khushi Jaiswal, Ievgeniia Kuzminykh, Sanjay Modgil

As Artificial Intelligence (AI) changes how businesses work, there is a growing need for people who can work in this sector. This paper investigates how well universities in United Kingdom offering courses in AI, prepare students for jobs in the real world. To gain insight into the differences between university curricula and industry demands we review the contents of taught courses and job advertisement portals. By using custom data scraping tools to gather information from job advertisements and university curricula, and frequency and Naive Bayes classifier analysis, this study will show exactly what skills industry is looking for. In this study we identified 12 skill categories that were used for mapping. The study showed that the university curriculum in the AI domain is well balanced in most technical skills, including Programming and Machine learning subjects, but have a gap in Data Science and Maths and Statistics skill categories.

Halaman 2 dari 92