linear threshold
Recently Published Documents


TOTAL DOCUMENTS

278
(FIVE YEARS 64)

H-INDEX

31
(FIVE YEARS 4)

2022 ◽  
Vol 16 (1) ◽  
pp. 1-24
Author(s):  
Marinos Poiitis ◽  
Athena Vakali ◽  
Nicolas Kourtellis

Aggression in online social networks has been studied mostly from the perspective of machine learning, which detects such behavior in a static context. However, the way aggression diffuses in the network has received little attention as it embeds modeling challenges. In fact, modeling how aggression propagates from one user to another is an important research topic, since it can enable effective aggression monitoring, especially in media platforms, which up to now apply simplistic user blocking techniques. In this article, we address aggression propagation modeling and minimization in Twitter, since it is a popular microblogging platform at which aggression had several onsets. We propose various methods building on two well-known diffusion models, Independent Cascade ( IC ) and Linear Threshold ( LT ), to study the aggression evolution in the social network. We experimentally investigate how well each method can model aggression propagation using real Twitter data, while varying parameters, such as seed users selection, graph edge weighting, users’ activation timing, and so on. It is found that the best performing strategies are the ones to select seed users with a degree-based approach, weigh user edges based on their social circles’ overlaps, and activate users according to their aggression levels. We further employ the best performing models to predict which ordinary real users could become aggressive (and vice versa) in the future, and achieve up to AUC = 0.89 in this prediction task. Finally, we investigate aggression minimization by launching competitive cascades to “inform” and “heal” aggressors. We show that IC and LT models can be used in aggression minimization, providing less intrusive alternatives to the blocking techniques currently employed by Twitter.


2021 ◽  
Vol 13 (4) ◽  
pp. 1-37
Author(s):  
Valentine Kabanets ◽  
Sajin Koroth ◽  
Zhenjian Lu ◽  
Dimitrios Myrisiotis ◽  
Igor C. Oliveira

The class FORMULA[s]∘G consists of Boolean functions computable by size- s De Morgan formulas whose leaves are any Boolean functions from a class G. We give lower bounds and (SAT, Learning, and pseudorandom generators ( PRG s )) algorithms for FORMULA[n 1.99 ]∘G, for classes G of functions with low communication complexity . Let R (k) G be the maximum k -party number-on-forehead randomized communication complexity of a function in G. Among other results, we show the following: • The Generalized Inner Product function GIP k n cannot be computed in FORMULA[s]° G on more than 1/2+ε fraction of inputs for s=o(n 2 /k⋅4 k ⋅R (k) (G)⋅log⁡(n/ε)⋅log⁡(1/ε)) 2 ). This significantly extends the lower bounds against bipartite formulas obtained by [62]. As a corollary, we get an average-case lower bound for GIP k n against FORMULA[n 1.99 ]∘PTF k −1 , i.e., sub-quadratic-size De Morgan formulas with degree-k-1) PTF ( polynomial threshold function ) gates at the bottom. Previously, it was open whether a super-linear lower bound holds for AND of PTFs. • There is a PRG of seed length n/2+O(s⋅R (2) (G)⋅log⁡(s/ε)⋅log⁡(1/ε)) that ε-fools FORMULA[s]∘G. For the special case of FORMULA[s]∘LTF, i.e., size- s formulas with LTF ( linear threshold function ) gates at the bottom, we get the better seed length O(n 1/2 ⋅s 1/4 ⋅log⁡(n)⋅log⁡(n/ε)). In particular, this provides the first non-trivial PRG (with seed length o(n)) for intersections of n halfspaces in the regime where ε≤1/n, complementing a recent result of [45]. • There exists a randomized 2 n-t #SAT algorithm for FORMULA[s]∘G, where t=Ω(n\√s⋅log 2 ⁡(s)⋅R (2) (G))/1/2. In particular, this implies a nontrivial #SAT algorithm for FORMULA[n 1.99 ]∘LTF. • The Minimum Circuit Size Problem is not in FORMULA[n 1.99 ]∘XOR; thereby making progress on hardness magnification, in connection with results from [14, 46]. On the algorithmic side, we show that the concept class FORMULA[n 1.99 ]∘XOR can be PAC-learned in time 2 O(n/log n) .


Author(s):  
Chengxiu Wang ◽  
Mengjie Luo ◽  
Xin Su ◽  
Xingying Lan ◽  
Zeneng Sun ◽  
...  

Particle clusters in CFB risers were identified from the instantaneous solids holdup signals by a new sliding-window based signal processing method. By shifting the sliding time window and calculating the mean and the standard deviation within it, a non-linear threshold curve for identifying the clusters was derived instead of the conventional constant threshold. The optimal sliding window size was determined as Wb = 1024 data points based on the bisection method on the entire piece of signals. Using the proposed method, a more realistic characterization of the clusters in both the HDCFB and LDCFB was obtained by considering the bulk fluctuation of the gas-solids flow. The clusters in the HDCFB have higher solids holdup and lower velocity than that in the LDCFB. The HDCFB is also found to have a greater number of loose clusters for better gas-solids contacting and exchanges in the center of the riser.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Yue Zhu ◽  
Muhammad Talha

Network interaction has evolved into a grouping paradigm as civilization has progressed and artificial intelligence technology has advanced. This network group model has quickly extended communication space, improved communication content, and tailored to the demands of netizens. The fast growth of the network community on campus can assist students in meeting a variety of communication needs and serve as a vital platform for their studies and daily lives. It is investigated how to extract opinion material from comment text. A strategy for extracting opinion attitude words and network opinion characteristic words from a single comment text is offered at a finer level. The development of a semiautonomous domain emotion dictionary generating technique improves the accuracy of opinion and attitude word extraction. This paper proposes a window-constrained Latent Dirichlet Allocation (LDA) topic model that improves the accuracy of extracting network opinion feature words and ensures that network opinion feature words and opinion attitude words are synchronized by using the location information of opinion attitude words. The two-stage opinion leader mining approach and the linear threshold model based on user roles are the subjects of model simulation tests in this study. It is demonstrated that the two-stage opinion leader mining method suggested in this study can greatly reduce the running time while properly finding opinion leaders with stronger leadership by comparing the results with existing models. It also shows that the linear threshold model based on user roles proposed in this paper can effectively limit the total number of active users who are activated multiple times during the information diffusion process by distinguishing the effects of different user roles on the information diffusion process.


2021 ◽  
Vol 5 (4) ◽  
pp. 1405-1410
Author(s):  
Federico Celi ◽  
Ahmed Allibhoy ◽  
Fabio Pasqualetti ◽  
Jorge Cortes

2021 ◽  
Vol 87 (5) ◽  
Author(s):  
Axel Hallenbert ◽  
Gabriel G. Plunk

The tertiary instability is believed to be important for governing magnetised plasma turbulence under conditions of strong zonal flow generation, near marginal stability. In this work, we investigate its role for a collisionless strongly driven fluid model, self-consistently derived as a limit of gyrokinetics. It is found that a region of absolute stability above the linear threshold exists, beyond which significant nonlinear transport rapidly develops. Characteristically, this range exhibits a complex pattern of transient zonal evolution before a stable profile can arise. Nevertheless, the Dimits transition itself is found to coincide with a tertiary instability threshold, so long as linear effects are included. Through a simple and readily extendable procedure, tracing its origin to St-Onge (J. Plasma Phys., vol. 83, issue 05, 2017, 905830504), the stabilising effect of the typical zonal profile can be approximated, and the accompanying reduced mode estimate is found to be in good agreement with nonlinear simulations.


Author(s):  
Dr. Anup Kumar Biswas

Instead of an existing logical Technology, by using an emerging technology we will be able to make an electronic circuit with high speed, low cost, high concentration density, light in weight, reduced gate numbers and low power consumption. This technology is based on the linear threshold logic condition and electron-tunneling event. At the time of implementing a circuit, a multi-inputs but one-output based logic-node will be brought in our consideration. In this work, we have designed a 1-bit accumulator and then implemented it. To develop an accumulator, some small components like 2-input AND, 3-input AND, 3-input OR, 8-input OR, 9-input OR gate and above all a JK Flip-flop (for 1-bit) are to be collected and connected them in logical order to obtain the proper circuit. After verifying all their characteristics with the results obtained from the simulator, we have built a 1-bit accumulator. All the small components are provided in due places. They are analyzed, detected their threshold logic equations, shown their threshold logic gates (TLGs), tabulated their truth tables, drawn their input-output waveforms, given their respective circuits with exact parameter values. In the accumulator, there are nine control variables S1 through S9 in view of performing the operations (i) Addition, (ii) clear, (iii) complement, (iv) AND, (v) OR, (vi) XOR, (vii) Right-shift, (viii) Left-shift and (ix) increment with positive triggering clock pulses. Whether our present work’s circuits are faster or slower with respect to the similar circuits of CMOS based- and Single electron transistor (SET) based circuits are compared and observed that our TLG based circuits are faster than the CMOS and SET based circuits. The power consumed for tunneling event for a circuit is measured and sensed that it would remain in the range of 10meV to 250meV which is low. All the circuits we have presented in this work are of ‘generic multiple input threshold logic gate’ which is elaborately discussed.


Author(s):  
Joaquín Sureda ◽  
Juan Magaña ◽  
Ignacio J Araya ◽  
Nelson D Padilla

Abstract We present a modification of the Press-Schechter (PS) formalism to derive general mass functions for primordial black holes (PBHs), considering their formation as being associated to the amplitude of linear energy density fluctuations. To accommodate a wide range of physical relations between the linear and non-linear conditions for collapse, we introduce an additional parameter to the PS mechanism, and that the collapse occurs at either a given cosmic time, or as fluctuations enter the horizon. We study the case where fluctuations obey Gaussian statistics and follow a primordial power spectrum of broken power-law form with a blue spectral index for small scales. We use the observed abundance of super-massive black holes (SMBH) to constrain the extended mass functions taking into account dynamical friction. We further constrain the modified PS by developing a method for converting existing constraints on the PBH mass fraction, derived assuming monochromatic mass distributions for PBHs, into constraints applicable for extended PBH mass functions. We find that when considering well established monochromatic constraints there are regions in parameter space where all the dark matter can be made of PBHs. Of special interest is the region for the characteristic mass of the distribution ∼102 M⊙, for a wide range of blue spectral indices in the scenario where PBHs form as they enter the horizon, where the linear threshold for collapse is of the order of the typical overdensities, as this is close to the black hole masses detected by LIGO which are difficult to explain by stellar collapse.


Entropy ◽  
2021 ◽  
Vol 23 (7) ◽  
pp. 796
Author(s):  
Alessia Antelmi ◽  
Gennaro Cordasco ◽  
Carmine Spagnuolo ◽  
Przemysław Szufel

This work deals with a generalization of the minimum Target Set Selection (TSS) problem, a key algorithmic question in information diffusion research due to its potential commercial value. Firstly proposed by Kempe et al., the TSS problem is based on a linear threshold diffusion model defined on an input graph with node thresholds, quantifying the hardness to influence each node. The goal is to find the smaller set of items that can influence the whole network according to the diffusion model defined. This study generalizes the TSS problem on networks characterized by many-to-many relationships modeled via hypergraphs. Specifically, we introduce a linear threshold diffusion process on such structures, which evolves as follows. Let H=(V,E) be a hypergraph. At the beginning of the process, the nodes in a given set S⊆V are influenced. Then, at each iteration, (i) the influenced hyperedges set is augmented by all edges having a sufficiently large number of influenced nodes; (ii) consequently, the set of influenced nodes is enlarged by all the nodes having a sufficiently large number of already influenced hyperedges. The process ends when no new nodes can be influenced. Exploiting this diffusion model, we define the minimum Target Set Selection problem on hypergraphs (TSSH). Being the problem NP-hard (as it generalizes the TSS problem), we introduce four heuristics and provide an extensive evaluation on real-world networks.


Sign in / Sign up

Export Citation Format

Share Document