pruning algorithms
Recently Published Documents


TOTAL DOCUMENTS

64
(FIVE YEARS 12)

H-INDEX

12
(FIVE YEARS 1)

2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Lizhi Xing ◽  
Yu Han

Abstract Purpose With the availability and utilization of Inter-Country Input-Output (ICIO) tables, it is possible to construct quantitative indices to assess its impact on the Global Value Chain (GVC). For the sake of visualization, ICIO networks with tremendous low- weight edges are too dense to show the substantial structure. These redundant edges, inevitably make the network data full of noise and eventually exert negative effects on Social Network Analysis (SNA). In this case, we need a method to filter such edges and obtain a sparser network with only the meaningful connections. Design/methodology/approach In this paper, we propose two parameterless pruning algorithms from the global and local perspectives respectively, then the performance of them is examined using the ICIO table from different databases. Findings The Searching Paths (SP) method extracts the strongest association paths from the global perspective, while Filtering Edges (FE) method captures the key links according to the local weight ratio. The results show that the FE method can basically include the SP method and become the best solution for the ICIO networks. Research limitations There are still two limitations in this research. One is that the computational complexity may increase rapidly while processing the large-scale networks, so the proposed method should be further improved. The other is that much more empirical networks should be introduced to testify the scientificity and practicability of our methodology. Practical implications The network pruning methods we proposed will promote the analysis of the ICIO network, in terms of community detection, link prediction, and spatial econometrics, etc. Also, they can be applied to many other complex networks with similar characteristics. Originality/value This paper improves the existing research from two aspects, namely, considering the heterogeneity of weights and avoiding the interference of parameters. Therefore, it provides a new idea for the research of network backbone extraction.


PLoS Biology ◽  
2021 ◽  
Vol 19 (8) ◽  
pp. e3001365
Author(s):  
Alexander K. Tice ◽  
David Žihala ◽  
Tomáš Pánek ◽  
Robert E. Jones ◽  
Eric D. Salomaki ◽  
...  

Phylogenomic analyses of hundreds of protein-coding genes aimed at resolving phylogenetic relationships is now a common practice. However, no software currently exists that includes tools for dataset construction and subsequent analysis with diverse validation strategies to assess robustness. Furthermore, there are no publicly available high-quality curated databases designed to assess deep (>100 million years) relationships in the tree of eukaryotes. To address these issues, we developed an easy-to-use software package, PhyloFisher (https://github.com/TheBrownLab/PhyloFisher), written in Python 3. PhyloFisher includes a manually curated database of 240 protein-coding genes from 304 eukaryotic taxa covering known eukaryotic diversity, a novel tool for ortholog selection, and utilities that will perform diverse analyses required by state-of-the-art phylogenomic investigations. Through phylogenetic reconstructions of the tree of eukaryotes and of the Saccharomycetaceae clade of budding yeasts, we demonstrate the utility of the PhyloFisher workflow and the provided starting database to address phylogenetic questions across a large range of evolutionary time points for diverse groups of organisms. We also demonstrate that undetected paralogy can remain in phylogenomic “single-copy orthogroup” datasets constructed using widely accepted methods such as all vs. all BLAST searches followed by Markov Cluster Algorithm (MCL) clustering and application of automated tree pruning algorithms. Finally, we show how the PhyloFisher workflow helps detect inadvertent paralog inclusions, allowing the user to make more informed decisions regarding orthology assignments, leading to a more accurate final dataset.


2021 ◽  
Vol 104 ◽  
pp. 107248
Author(s):  
Wei Song ◽  
Shiyu Zhang ◽  
Zijian Wen ◽  
Junhao Zhou

Author(s):  
Étienne André ◽  
Jaime Arias ◽  
Laure Petrucci ◽  
Jaco van de Pol

AbstractWe study semi-algorithms to synthesise the constraints under which a Parametric Timed Automaton satisfies some liveness requirement. The algorithms traverse a possibly infinite parametric zone graph, searching for accepting cycles. We provide new search and pruning algorithms, leading to successful termination for many examples. We demonstrate the success and efficiency of these algorithms on a benchmark. We also illustrate parameter synthesis for the classical Bounded Retransmission Protocol. Finally, we introduce a new notion of completeness in the limit, to investigate if an algorithm enumerates all solutions.


Symmetry ◽  
2020 ◽  
Vol 12 (9) ◽  
pp. 1426
Author(s):  
Shangping Zhong ◽  
Wude Weng ◽  
Kaizhi Chen ◽  
Jianhua Lai

The deep-learning steganography of current hotspots can conceal an image secret message in a cover image of the same size. While the steganography secret message is primarily removed via active steganalysis. The document image as the secret message in deep-learning steganography can deliver a considerable amount of effective information in a secret communication process. This study builds and implements deep-learning steganography removal models of document image secret messages based on the idea of adversarial perturbation removal: feed-forward denoising convolutional neural networks (DnCNN) and high-level representation guided denoiser (HGD). Further—considering the large computation cost and storage overheads of the above model—we use the document image-quality assessment (DIQA) as threshold, calculate the importance of filters using geometric median and prune redundant filters as extensively as possible through the overall iterative pruning and artificial bee colony (ABC) automatic pruning algorithms to reduce the size of the network structure of the existing vast and over-parameterized deep-learning steganography removal model, while maintaining the good removal effects of the model in the pruning process. Experiment results showed that the model generated by this method has better adaptability and scalability. Compared with the original deep-learning steganography removal model without pruning in this paper, the classic indicators params and flops are reduced by more than 75%.


2020 ◽  
Vol 23 (3) ◽  
pp. 1049-1058
Author(s):  
Paweł Zyblewski ◽  
Michał Woźniak
Keyword(s):  

Sensors ◽  
2019 ◽  
Vol 19 (18) ◽  
pp. 3886 ◽  
Author(s):  
Jie Ji ◽  
Guohua Wu ◽  
Jinguo Shuai ◽  
Zhen Zhang ◽  
Zhen Wang ◽  
...  

The privacy and security of the Internet of Things (IoT) are emerging as popular issues in the IoT. At present, there exist several pieces of research on network analysis on the IoT network, and malicious network analysis may threaten the privacy and security of the leader in the IoT networks. With this in mind, we focus on how to avoid malicious network analysis by modifying the topology of the IoT network and we choose closeness centrality as the network analysis tool. This paper makes three key contributions toward this problem: (1) An optimization problem of removing k edges to minimize (maximize) the closeness value (rank) of the leader; (2) A greedy (greedy and simulated annealing) algorithm to solve the closeness value (rank) case of the proposed optimization problem in polynomial time; and (3)UpdateCloseness (FastTopRank)—algorithm for computing closeness value (rank) efficiently. Experimental results prove the efficiency of our pruning algorithms and show that our heuristic algorithms can obtain accurate solutions compared with the optimal solution (the approximation ratio in the worst case is 0.85) and outperform the solutions obtained by other baseline algorithms (e.g., choose k edges with the highest degree sum).


Denoising in CT images using bilateral with sparse representation is presented in this paper. Artifacts occurs in images when an X-ray penetrates the thick objects like bones, implanted organs, surgical clips etc.,. Due to these artifacts in images , the quality of artifact pruning algorithms will be diminished. In order to preserve the image quality as well as edge details, a bilateral filter along with sparse representation is proposed to reduce the noises. The proposed technique is applied to CT humorous bone image and has achieved the better PSNR of 22dB approximately for 512 x512 image as compared to bicubic filter. The simulated real datasets are used to quantitatively evaluate the noise. Moreover the proposed denoising approach can outperform the latest approach in terms of fidelity


Sign in / Sign up

Export Citation Format

Share Document