algorithmic framework
Recently Published Documents


TOTAL DOCUMENTS

250
(FIVE YEARS 90)

H-INDEX

24
(FIVE YEARS 5)

2022 ◽  
Vol 24 (3) ◽  
pp. 1-23
Author(s):  
Deepanshi ◽  
Adwitiya Sinha

Social media allows people to share their ideologue through an efficient channel of communication. The social dialogues carry sentiment in expression regarding a particular social profile, trend, or topic. In our research, we have collected real-time user comments and feedbacks from Twitter portals of two food delivery services. This is followed by the extraction of the most prevalent contexts using natural language analytics. Further, our proposed algorithmic framework is used to generate a signed social network to analyze the product-centric behavioral sentiment. Analysis of sentiment with the fine-grained level about contexts gave a broader view to evaluate and perform contextual predictions. Customer behavior is analyzed, and the outcome is received in terms of positive and negative contexts. The results from our social behavioral model predicted the positive and negative contextual sentiments of customers, which can be further used to help in deciding future strategies and assuring service quality for better customer satisfaction.


2022 ◽  
Vol 24 (3) ◽  
pp. 0-0

Social media allows people to share their ideologue through an efficient channel of communication. The social dialogues carry sentiment in expression regarding a particular social profile, trend, or topic. In our research, we have collected real-time user comments and feedbacks from Twitter portals of two food delivery services. This is followed by the extraction of the most prevalent contexts using natural language analytics. Further, our proposed algorithmic framework is used to generate a signed social network to analyze the product-centric behavioral sentiment. Analysis of sentiment with the fine-grained level about contexts gave a broader view to evaluate and perform contextual predictions. Customer behavior is analyzed, and the outcome is received in terms of positive and negative contexts. The results from our social behavioral model predicted the positive and negative contextual sentiments of customers, which can be further used to help in deciding future strategies and assuring service quality for better customer satisfaction.


2022 ◽  
Author(s):  
Lijuan Zheng ◽  
Shaopeng Liu ◽  
Senping Tian ◽  
Jianhua Guo ◽  
Xinpeng Wang ◽  
...  

Abstract Anemia is one of the most widespread clinical symptoms all over the world, which could bring adverse effects on people's daily life and work. Considering the universality of anemia detection and the inconvenience of traditional blood testing methods, many deep learning detection methods based on image recognition have been developed in recent years, including the methods of anemia detection with individuals’ images of conjunctiva. However, existing methods using one single conjunctiva image could not reach comparable accuracy in anemia detection in many real-world application scenarios. To enhance intelligent anemia detection using conjunctiva images, we proposed a new algorithmic framework which could make full use of the data information contained in the image. To be concrete, we proposed to fully explore the global and local information in the image, and adopted a two-branch neural network architecture to unify the information of these two aspects. Compared with the existing methods, our method can fully explore the information contained in a single conjunctiva image and achieve more reliable anemia detection effect. Compared with other existing methods, the experimental results verified the effectiveness of the new algorithm.


2022 ◽  
Author(s):  
Lisa Hanny ◽  
Marc-Fabian Körner ◽  
Christina Leinauer ◽  
Anne Michaelis ◽  
Jens Strueker ◽  
...  

2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Qiujuan Yang

As the most basic element in English learning, vocabulary has always been the focus of teaching in college English classes, but the teaching effect is often unsatisfactory. In this paper, the genetic algorithm fitness function design part is integrated with the K-medoids algorithm to form K-GA-medoids, and secondly, it is combined with KNN to form an algorithmic framework for English vocabulary classification. In the classification process, clustering and classification steps are taken to realize the reduction of the training set samples and thus reduce the computational overhead. The experiments show that K-GA-medoids have significantly improved the clustering effect compared with traditional K-medoids, and the combination of K-GA-medoids and KNNs has effectively improved the efficiency of English vocabulary classification compared with the traditional KNN algorithm, while ensuring the classification accuracy. We found that students in college English course consider word memorization as a difficult learning task, and the traditional vocabulary teaching methods are not very effective, and the knowledge of etymology is often little known and rarely covered in classroom lectures. Therefore, the article explores new ideas and strategies for teaching vocabulary in college English from the perspective of etymology.


Author(s):  
Claudio Contardo ◽  
Jorge A. Sefair

We present a progressive approximation algorithm for the exact solution of several classes of interdiction games in which two noncooperative players (namely an attacker and a follower) interact sequentially. The follower must solve an optimization problem that has been previously perturbed by means of a series of attacking actions led by the attacker. These attacking actions aim at augmenting the cost of the decision variables of the follower’s optimization problem. The objective, from the attacker’s viewpoint, is that of choosing an attacking strategy that reduces as much as possible the quality of the optimal solution attainable by the follower. The progressive approximation mechanism consists of the iterative solution of an interdiction problem in which the attacker actions are restricted to a subset of the whole solution space and a pricing subproblem invoked with the objective of proving the optimality of the attacking strategy. This scheme is especially useful when the optimal solutions to the follower’s subproblem intersect with the decision space of the attacker only in a small number of decision variables. In such cases, the progressive approximation method can solve interdiction games otherwise intractable for classical methods. We illustrate the efficiency of our approach on the shortest path, 0-1 knapsack and facility location interdiction games. Summary of Contribution: In this article, we present a progressive approximation algorithm for the exact solution of several classes of interdiction games in which two noncooperative players (namely an attacker and a follower) interact sequentially. We exploit the discrete nature of this interdiction game to design an effective algorithmic framework that improves the performance of general-purpose solvers. Our algorithm combines elements from mathematical programming and computer science, including a metaheuristic algorithm, a binary search procedure, a cutting-planes algorithm, and supervalid inequalities. Although we illustrate our results on three specific problems (shortest path, 0-1 knapsack, and facility location), our algorithmic framework can be extended to a broader class of interdiction problems.


Symmetry ◽  
2021 ◽  
Vol 13 (10) ◽  
pp. 1912
Author(s):  
Md. Mokhlesur Rahman ◽  
Ravie Chandren Muniyandi ◽  
Shahnorbanun Sahran ◽  
Suziyani Mohamed

Interrupting, altering, or stealing autism-related sensitive data by cyber attackers is a lucrative business which is increasing in prevalence on a daily basis. Enhancing the security and privacy of autism data while adhering to the symmetric encryption concept is a critical challenge in the field of information security. To identify autism perfectly and for its data protection, the security and privacy of these data are pivotal concerns when transmitting information over the Internet. Consequently, researchers utilize software or hardware disk encryption, data backup, Data Encryption Standard (DES), TripleDES, Advanced Encryption Standard (AES), Rivest Cipher 4 (RC4), and others. Moreover, several studies employ k-anonymity and query to address security concerns, but these necessitate a significant amount of time and computational resources. Here, we proposed the sanitization approach for autism data security and privacy. During this sanitization process, sensitive data are concealed, which avoids the leakage of sensitive information. An optimal key was generated based on our improved meta-heuristic algorithmic framework called Enhanced Combined PSO-GWO (Particle Swarm Optimization-Grey Wolf Optimization) framework. Finally, we compared our simulation results with traditional algorithms, and it achieved increased output effectively. Therefore, this finding shows that data security and privacy in autism can be improved by enhancing an optimal key used in the data sanitization process to prevent unauthorized access to and misuse of data.


2021 ◽  
Author(s):  
Oliver Thomas ◽  
Miri Zilka ◽  
Adrian Weller ◽  
Novi Quadrianto

PLoS ONE ◽  
2021 ◽  
Vol 16 (9) ◽  
pp. e0257005
Author(s):  
Alpha Forna ◽  
Ilaria Dorigatti ◽  
Pierre Nouvellet ◽  
Christl A. Donnelly

Background Machine learning (ML) algorithms are now increasingly used in infectious disease epidemiology. Epidemiologists should understand how ML algorithms behave within the context of outbreak data where missingness of data is almost ubiquitous. Methods Using simulated data, we use a ML algorithmic framework to evaluate data imputation performance and the resulting case fatality ratio (CFR) estimates, focusing on the scale and type of data missingness (i.e., missing completely at random—MCAR, missing at random—MAR, or missing not at random—MNAR). Results Across ML methods, dataset sizes and proportions of training data used, the area under the receiver operating characteristic curve decreased by 7% (median, range: 1%–16%) when missingness was increased from 10% to 40%. Overall reduction in CFR bias for MAR across methods, proportion of missingness, outbreak size and proportion of training data was 0.5% (median, range: 0%–11%). Conclusion ML methods could reduce bias and increase the precision in CFR estimates at low levels of missingness. However, no method is robust to high percentages of missingness. Thus, a datacentric approach is recommended in outbreak settings—patient survival outcome data should be prioritised for collection and random-sample follow-ups should be implemented to ascertain missing outcomes.


Sign in / Sign up

Export Citation Format

Share Document