Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Series

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 26391

Full-Text Articles in Physical Sciences and Mathematics

Exploring Post-Covid-19 Health Effects And Features With Advanced Machine Learning Techniques, Muhammad N. Islam, Md S. Islam, Nahid H. Shourav, Iftiaqur Rahman, Faiz A. Faisal, Md M. Islam, Iqbal H. Sarker Dec 2024

Exploring Post-Covid-19 Health Effects And Features With Advanced Machine Learning Techniques, Muhammad N. Islam, Md S. Islam, Nahid H. Shourav, Iftiaqur Rahman, Faiz A. Faisal, Md M. Islam, Iqbal H. Sarker

Research outputs 2022 to 2026

COVID-19 is an infectious respiratory disease that has had a significant impact, resulting in a range of outcomes including recovery, continued health issues, and the loss of life. Among those who have recovered, many experience negative health effects, particularly influenced by demographic factors such as gender and age, as well as physiological and neurological factors like sleep patterns, emotional states, anxiety, and memory. This research aims to explore various health factors affecting different demographic profiles and establish significant correlations among physiological and neurological factors in the post-COVID-19 state. To achieve these objectives, we have identified the post-COVID-19 health factors and …


Jamming Precoding In Af Relay-Aided Plc Systems With Multiple Eavessdroppers, Zhengmin Kong, Jiaxing Cui, Li Ding, Tao Huang, Shihao Yan Dec 2024

Jamming Precoding In Af Relay-Aided Plc Systems With Multiple Eavessdroppers, Zhengmin Kong, Jiaxing Cui, Li Ding, Tao Huang, Shihao Yan

Research outputs 2022 to 2026

Enhancing information security has become increasingly significant in the digital age. This paper investigates the concept of physical layer security (PLS) within a relay-aided power line communication (PLC) system operating over a multiple-input multiple-output (MIMO) channel based on MK model. Specifically, we examine the transmission of confidential signals between a source and a distant destination while accounting for the presence of multiple eavesdroppers, both colluding and non-colluding. We propose a two-phase jamming scheme that leverages a full-duplex (FD) amplify-and-forward (AF) relay to address this challenge. Our primary objective is to maximize the secrecy rate, which necessitates the optimization of the …


Sustainable Energysense: A Predictive Machine Learning Framework For Optimizing Residential Electricity Consumption, Murad Al-Rajab, Samia Loucif Dec 2024

Sustainable Energysense: A Predictive Machine Learning Framework For Optimizing Residential Electricity Consumption, Murad Al-Rajab, Samia Loucif

All Works

In a world where electricity is often taken for granted, the surge in consumption poses significant challenges, including elevated CO2 emissions and rising prices. These issues not only impact consumers but also have broader implications for the global environment. This paper endeavors to propose a smart application dedicated to optimizing the electricity consumption of household appliances. It employs Augmented Reality (AR) technology along with YOLO to detect electrical appliances and provide detailed electricity consumption insights, such as displaying the appliance consumption rate and computing the total electricity consumption based on the number of hours the appliance was used. The application …


Asthma Prevalence Among United States Population Insights From Nhanes Data Analysis, Sarya Swed, Bisher Sawaf, Feras Al-Obeidat, Wael Hafez, Amine Rakab, Hidar Alibrahim, Mohamad Nour Nasif, Baraa Alghalyini, Abdul Rehman Zia Zaidi, Lamees Alshareef, Fadel Alqatati, Fathima Zamrath Zahir, Ashraf I. Ahmed, Mulham Alom, Anas Sultan, Abdullah Almahmoud, Agyad Bakkour, Ivan Cherrez-Ojeda Dec 2024

Asthma Prevalence Among United States Population Insights From Nhanes Data Analysis, Sarya Swed, Bisher Sawaf, Feras Al-Obeidat, Wael Hafez, Amine Rakab, Hidar Alibrahim, Mohamad Nour Nasif, Baraa Alghalyini, Abdul Rehman Zia Zaidi, Lamees Alshareef, Fadel Alqatati, Fathima Zamrath Zahir, Ashraf I. Ahmed, Mulham Alom, Anas Sultan, Abdullah Almahmoud, Agyad Bakkour, Ivan Cherrez-Ojeda

All Works

Asthma is a prevalent respiratory condition that poses a substantial burden on public health in the United States. Understanding its prevalence and associated risk factors is vital for informed policymaking and public health interventions. This study aims to examine asthma prevalence and identify major risk factors in the U.S. population. Our study utilized NHANES data between 1999 and 2020 to investigate asthma prevalence and associated risk factors within the U.S. population. We analyzed a dataset of 64,222 participants, excluding those under 20 years old. We performed binary regression analysis to examine the relationship of demographic and health related covariates with …


Hisoma: A Hierarchical Multi-Agent Model Integrating Self-Organizing Neural Networks With Multi-Agent Deep Reinforcement Learning, Minghong Geng, Shubham Pateria, Budhitama Subagdja, Ah-Hwee Tan Oct 2024

Hisoma: A Hierarchical Multi-Agent Model Integrating Self-Organizing Neural Networks With Multi-Agent Deep Reinforcement Learning, Minghong Geng, Shubham Pateria, Budhitama Subagdja, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Multi-agent deep reinforcement learning (MADRL) has shown remarkable advancements in the past decade. However, most current MADRL models focus on task-specific short-horizon problems involving a small number of agents, limiting their applicability to long-horizon planning in complex environments. Hierarchical multi-agent models offer a promising solution by organizing agents into different levels, effectively addressing tasks with varying planning horizons. However, these models often face constraints related to the number of agents or levels of hierarchies. This paper introduces HiSOMA, a novel hierarchical multi-agent model designed to handle long-horizon, multi-agent, multi-task decision-making problems. The top-level controller, FALCON, is modeled as a class …


Granular3d: Delving Into Multi-Granularity 3d Scene Graph Prediction, Kaixiang Huang, Jingru Yang, Jin Wang, Shengfeng He, Zhan Wang, Haiyan He, Qifeng Zhang, Guodong Lu Sep 2024

Granular3d: Delving Into Multi-Granularity 3d Scene Graph Prediction, Kaixiang Huang, Jingru Yang, Jin Wang, Shengfeng He, Zhan Wang, Haiyan He, Qifeng Zhang, Guodong Lu

Research Collection School Of Computing and Information Systems

This paper addresses the significant challenges in 3D Semantic Scene Graph (3DSSG) prediction, essential for understanding complex 3D environments. Traditional approaches, primarily using PointNet and Graph Convolutional Networks, struggle with effectively extracting multi-grained features from intricate 3D scenes, largely due to a focus on global scene processing and single-scale feature extraction. To overcome these limitations, we introduce Granular3D, a novel approach that shifts the focus towards multi-granularity analysis by predicting relation triplets from specific sub-scenes. One key is the Adaptive Instance Enveloping Method (AIEM), which establishes an approximate envelope structure around irregular instances, providing shape-adaptive local point cloud sampling, thereby …


Anopas: Practical Anonymous Transit Pass From Group Signatures With Time-Bound Keys, Rui Shi, Yang Yang, Yingjiu Li, Huamin Feng, Hwee Hwa Pang, Robert H. Deng Aug 2024

Anopas: Practical Anonymous Transit Pass From Group Signatures With Time-Bound Keys, Rui Shi, Yang Yang, Yingjiu Li, Huamin Feng, Hwee Hwa Pang, Robert H. Deng

Research Collection School Of Computing and Information Systems

An anonymous transit pass system allows passengers to access transport services within fixed time periods, with their privileges automatically deactivating upon time expiration. Although existing transit pass systems are deployable on powerful devices like PCs, their adaptation to more user-friendly devices, such as mobile phones with smart cards, is inefficient due to their reliance on heavy-weight operations like bilinear maps. In this paper, we introduce an innovative anonymous transit pass system, dubbed Anopas, optimized for deployment on mobile phones with smart cards, where the smart card is responsible for crucial lightweight operations and the mobile phone handles key-independent and time-consuming …


An Llm-Assisted Easy-To-Trigger Poisoning Attack On Code Completion Models: Injecting Disguised Vulnerabilities Against Strong Detection, Shenao Yan, Shen Wang, Yue Duan, Hanbin Hong, Kiho Lee, Doowon Kim, Yuan Hong Aug 2024

An Llm-Assisted Easy-To-Trigger Poisoning Attack On Code Completion Models: Injecting Disguised Vulnerabilities Against Strong Detection, Shenao Yan, Shen Wang, Yue Duan, Hanbin Hong, Kiho Lee, Doowon Kim, Yuan Hong

Research Collection School Of Computing and Information Systems

Large Language Models (LLMs) have transformed code completion tasks, providing context-based suggestions to boost developer productivity in software engineering. As users often fine-tune these models for specific applications, poisoning and backdoor attacks can covertly alter the model outputs. To address this critical security challenge, we introduce CODEBREAKER, a pioneering LLM-assisted backdoor attack framework on code completion models. Unlike recent attacks that embed malicious payloads in detectable or irrelevant sections of the code (e.g., comments), CODEBREAKER leverages LLMs (e.g., GPT-4) for sophisticated payload transformation (without affecting functionalities), ensuring that both the poisoned data for fine-tuning and generated code can evade strong …


Hierarchical Damage Correlations For Old Photo Restoration, Weiwei Cai, Xuemiao Xu, Jiajia Xu, Huaidong Zhang, Haoxin Yang, Kun Zhang, Shengfeng He Jul 2024

Hierarchical Damage Correlations For Old Photo Restoration, Weiwei Cai, Xuemiao Xu, Jiajia Xu, Huaidong Zhang, Haoxin Yang, Kun Zhang, Shengfeng He

Research Collection School Of Computing and Information Systems

Restoring old photographs can preserve cherished memories. Previous methods handled diverse damages within the same network structure, which proved impractical. In addition, these methods cannot exploit correlations among artifacts, especially in scratches versus patch-misses issues. Hence, a tailored network is particularly crucial. In light of this, we propose a unified framework consisting of two key components: ScratchNet and PatchNet. In detail, ScratchNet employs the parallel Multi-scale Partial Convolution Module to effectively repair scratches, learning from multi-scale local receptive fields. In contrast, the patch-misses necessitate the network to emphasize global information. To this end, we incorporate a transformer-based encoder and decoder …


Establishing Metrics To Encourage Broader Use Of Atomic Requirements – A Call For Exchange And Experimentation, William L. Honig Jul 2024

Establishing Metrics To Encourage Broader Use Of Atomic Requirements – A Call For Exchange And Experimentation, William L. Honig

Computer Science: Faculty Publications and Other Works

There are seemingly many advantages to being able to identify, document, test, and trace single or “atomic” requirements during system development and maintenance. Ongoing work with Agile development has focused on “user stories” that can capture individual features for implementation. However, it is still difficult to evaluate the quality of such requirements and teaching their creation is difficult.

Based on a working definition of atomic requirement, this paper proposes a set of metrics for their evaluation. Ten metrics designed to measure atomic requirements are presented here: five used on individual requirements statements and five applied to a requirements document or …


Contextualizing Interpersonal Data Sharing In Smart Homes, Weijia He, Nathan Reitinger, Atheer Almogbil, Yi-Shyuan Chiang, Timothy J. Pierson, David Kotz Jul 2024

Contextualizing Interpersonal Data Sharing In Smart Homes, Weijia He, Nathan Reitinger, Atheer Almogbil, Yi-Shyuan Chiang, Timothy J. Pierson, David Kotz

Dartmouth Scholarship

A key feature of smart home devices is monitoring the environment and recording data. These devices provide security via motion-detection video alerts, cost-savings via thermostat usage history, and peace of mind via functions like auto-locking doors or water leak detectors. At the same time, the sharing of this information in interpersonal relationships---though necessary---is currently accomplished on an all-or-nothing basis. This can easily lead to oversharing in a multi-user environment. Although prior work has studied people's perceptions of information sharing with vendors or ISPs, the sharing of household data among users who interact personally is less well understood. Interpersonal situations make …


Unveiling The Dynamics Of Crisis Events: Sentiment And Emotion Analysis Via Multi-Task Learning With Attention Mechanism And Subject-Based Intent Prediction, Phyo Yi Win Myint, Siaw Ling Lo, Yuhao Zhang Jul 2024

Unveiling The Dynamics Of Crisis Events: Sentiment And Emotion Analysis Via Multi-Task Learning With Attention Mechanism And Subject-Based Intent Prediction, Phyo Yi Win Myint, Siaw Ling Lo, Yuhao Zhang

Research Collection School Of Computing and Information Systems

In the age of rapid internet expansion, social media platforms like Twitter have become crucial for sharing information, expressing emotions, and revealing intentions during crisis situations. They offer crisis responders a means to assess public sentiment, attitudes, intentions, and emotional shifts by monitoring crisis-related tweets. To enhance sentiment and emotion classification, we adopt a transformer-based multi-task learning (MTL) approach with attention mechanism, enabling simultaneous handling of both tasks, and capitalizing on task interdependencies. Incorporating attention mechanism allows the model to concentrate on important words that strongly convey sentiment and emotion. We compare three baseline models, and our findings show that …


Assessment And Prediction Of Meteorological Drought Using Machine Learning Algorithms And Climate Data, Khalid En-Nagre, Mourad Aqnouy, Ayoub Ouarka, Syed Ali Asad Naqvi, Ismail Bouizrou, Jamal Eddine Stitou El Messari, Aqil Tariq, Walid Soufan, Wenzhao Li, Hesham El-Askary Jun 2024

Assessment And Prediction Of Meteorological Drought Using Machine Learning Algorithms And Climate Data, Khalid En-Nagre, Mourad Aqnouy, Ayoub Ouarka, Syed Ali Asad Naqvi, Ismail Bouizrou, Jamal Eddine Stitou El Messari, Aqil Tariq, Walid Soufan, Wenzhao Li, Hesham El-Askary

Mathematics, Physics, and Computer Science Faculty Articles and Research

Monitoring drought in semi-arid regions due to climate change is of paramount importance. This study, conducted in Morocco’s Upper Drâa Basin (UDB), analyzed data spanning from 1980 to 2019, focusing on the calculation of drought indices, specifically the Standardized Precipitation Index (SPI) and the Standardized Precipitation Evapotranspiration Index (SPEI) at multiple timescales (1, 3, 9, 12 months). Trends were assessed using statistical methods such as the Mann-Kendall test and the Sen’s Slope estimator. Four significant machine learning (ML) algorithms, including Random Forest, Voting Regressor, AdaBoost Regressor, and K-Nearest Neighbors Regressor, were evaluated to predict the SPEI values for both three …


Do You Say Please Or Thank You To Chatgpt? The Subtle Influence Of Prompt Engineering On Digital Civility, Essraa Nawar Jun 2024

Do You Say Please Or Thank You To Chatgpt? The Subtle Influence Of Prompt Engineering On Digital Civility, Essraa Nawar

Library Articles and Research

"

In the dynamic and rapidly evolving landscape of artificial intelligence, tools like ChatGPT have become integral to our daily digital interactions. These advanced AI systems assist us with a myriad of tasks, from generating text and answering complex questions to providing creative solutions. However, as we engage more frequently with these non-human entities, an intriguing question arises: Are we inadvertently becoming ruder in our digital communications, or are we consciously maintaining our ingrained habits of politeness?"


Mapping Mental Models Through An Improved Method For Identifying Causal Structures In Qualitative Data, Erin S. Kenzie, Wayne Wakeland, Antonie Jetter, Kristen Hassmiller Lich, Mellodie Seater, Melinda M. Davis Jun 2024

Mapping Mental Models Through An Improved Method For Identifying Causal Structures In Qualitative Data, Erin S. Kenzie, Wayne Wakeland, Antonie Jetter, Kristen Hassmiller Lich, Mellodie Seater, Melinda M. Davis

Systems Science Faculty Publications and Presentations

Qualitative data are commonly used in the development of system dynamicsmodels, but methods for systematically identifying causal structures in qualita-tive data have not been widely established. This article presents a modifiedprocess for identifying causal structures (e.g., feedback loops) that are commu-nicated implicitly or explicitly and utilizes software to make coding, tracking,and model rendering more efficient. This approach draws from existingmethods, system dynamics best practice, and qualitative data analysis tech-niques. Steps of this method are presented along with a description of causalstructures for an audience new to system dynamics. The method is applied to aset of interviews describing mental models of …


Data Visualization, Licensing, And Other Generative Ai Initiatives At Minnesota State University Mankato, Evan Rusch, Nat Gustafson-Sundell Jun 2024

Data Visualization, Licensing, And Other Generative Ai Initiatives At Minnesota State University Mankato, Evan Rusch, Nat Gustafson-Sundell

Library Services Publications

At Minnesota State University Mankato (MNSU), we’ve undertaken several experiments and initiatives focused on Generative Artificial Intelligence. At the start of the fall semester, we collaborated with university Information Technology Services to present a professional development session for returning faculty through the MNSU Center for Excellence in Teaching & Learning on “5 Tips for Teaching with AI.” We also presented to librarians across the regional consortium, Minitex, on “The Library & Generative AI.” This presentation included several demonstrations. It was offered as an introduction to Generative AI focused on topics most relevant to librarians, including information literacy, as well as …


Cellmarkerpipe: Cell Marker Identification And Evaluation Pipeline In Single Cell Transcriptomes, Yinglu Jia, Pengchong Ma, Qiuming Yao Jun 2024

Cellmarkerpipe: Cell Marker Identification And Evaluation Pipeline In Single Cell Transcriptomes, Yinglu Jia, Pengchong Ma, Qiuming Yao

School of Computing: Faculty Publications

Assessing marker genes from all cell clusters can be time-consuming and lack systematic strategy. Streamlining this process through a unified computational platform that automates identification and benchmarking will greatly enhance efficiency and ensure a fair evaluation. We therefore developed a novel computational platform, cellMarkerPipe (https:// github. com/ yao- labor atory/ cellM arker Pipe), for automated cell-type specific marker gene identification from scRNA-seq data, coupled with comprehensive evaluation schema. CellMarkerPipe adaptively wraps around a collection of commonly used and state-of-the-art tools, including Seurat, COSG, SC3, SCMarker, COMET, and scGeneFit. From rigorously testing across diverse samples, we ascertain SCMarker’s overall reliable performance …


For Discrete-Time Linear Dynamical Systems Under Interval Uncertainty, Predicting Two Moments Ahead Is Np-Hard, Luc Jaulin, Olga Kosheleva, Vladik Kreinovich Jun 2024

For Discrete-Time Linear Dynamical Systems Under Interval Uncertainty, Predicting Two Moments Ahead Is Np-Hard, Luc Jaulin, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

In the first approximation, when changes are small, most real-world systems are described by linear dynamical equations. If we know the initial state of the system, and we know its dynamics, then we can, in principle, predict the system's state many moments ahead. In practice, however, we usually know both the initial state and the coefficients of the system's dynamics with some uncertainty. Frequently, we encounter interval uncertainty, when for each parameter, we only know its range, but we have no information about the probability of different values from this range. In such situations, we want to know the range …


What To Do If An Inflexible Tolerance Problem Has No Solutions: Probabilistic Justification Of Piegat's Semi-Heuristic Idea, Olga Kosheleva, Vladik Kreinovich Jun 2024

What To Do If An Inflexible Tolerance Problem Has No Solutions: Probabilistic Justification Of Piegat's Semi-Heuristic Idea, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

In many practical situations, it is desirable to select the control parameters x1, ..., xn in such a way that the resulting quantities y1, ..., ym of the system lie within desired ranges. In such situations, we usually know the general formulas describing the dependence of yi on xj, but the coefficients of these formulas are usually only known with interval uncertainty. In such a situation, we want to find the tuples for which all yi's are in the desired intervals for all possible tuples of coefficients. But what if no such parameters are possible? Since we cannot guarantee the …


How To Make Ai More Reliable, Olga Kosheleva, Vladik Kreinovich Jun 2024

How To Make Ai More Reliable, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

One of the reasons why the results of the current AI methods (especially deep-learning-based methods) are not absolutely reliable is that, in contrast to more traditional data processing techniques which are based on solid mathematical and statistical foundations, modern AI techniques use a lot of semi-heuristic methods. These methods have been, in many cases, empirically successful, but the absence of solid justification makes us less certain that these methods will work in other cases as well. To make AI more reliable, it is therefore necessary to provide mathematical foundations for the current semi-heuristic techniques. In this paper, we show that …


Why Magenta Is Not A Real Color, And How It Is Related To Fuzzy Control And Quantum Computing, Victor L. Timchenko, Yuriy P. Kondratenko, Olga Kosheleva, Vladik Kreinovich Jun 2024

Why Magenta Is Not A Real Color, And How It Is Related To Fuzzy Control And Quantum Computing, Victor L. Timchenko, Yuriy P. Kondratenko, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

It is well known that every color can be represented as a combination of three basic colors: red, green, and blue. In particular, we can get several colors by combining two of the basic colors. Interestingly, while a combination of two neighboring colors leads to a color that corresponds to a certain frequency, the combination of two non-neighboring colors -- red and blue -- leads to magenta, a color that does not correspond to any frequency. In this paper, we provide a simple explanation for this phenomenon, and we also show that a similar phenomenon happens in two other areas …


How To Propagate Uncertainty Via Ai Algorithms, Olga Kosheleva, Vladik Kreinovich Jun 2024

How To Propagate Uncertainty Via Ai Algorithms, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

Any data processing starts with measurement results. Measurement results are never absolutely accurate. Because of this measurement uncertainty, the results of processing measurement results are, in general, somewhat different from what we would have obtained if we knew the exact values of the measured quantities. To make a decision based on the result of data processing, we need to know how accurate is this result, i.e., we need to propagate the measurement uncertainty through the data processing algorithm. There are many techniques for uncertainty propagation. Usually, they involve applying the same data processing algorithm several times to appropriately modified data. …


Why Empirical Membership Functions Are Well-Approximated By Piecewise Quadratic Functions: Theoretical Explanation For Empirical Formulas Of Novak's Fuzzy Natural Logic, Olga Kosheleva, Vladik Kreinovich Jun 2024

Why Empirical Membership Functions Are Well-Approximated By Piecewise Quadratic Functions: Theoretical Explanation For Empirical Formulas Of Novak's Fuzzy Natural Logic, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

Empirical analysis shows that membership functions describing expert opinions have a shape that is well described by a smooth combination of two quadratic segments. In this paper, we provide a theoretical explanation for this empirical phenomenon.


Why Is Grade Distribution Often Bimodal? Why Individualized Teaching Adds Two Sigmas To The Average Grade? And How Are These Facts Related?, Christian Servin, Olga Kosheleva, Vladik Kreinovich Jun 2024

Why Is Grade Distribution Often Bimodal? Why Individualized Teaching Adds Two Sigmas To The Average Grade? And How Are These Facts Related?, Christian Servin, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

To make education more effective, to better use emerging technologies in education, we need to better understand the education process, to gain insights on this process. How can we check whether a new idea is indeed a useful insight? A natural criterion is that the new idea should explain some previously-difficult-to-explain empirical phenomenon. Since one of the main advantages of emerging educational technologies -- such as AI -- is the possibility of individualized education, a natural phenomenon to explain is the fact -- discovered by Benjamin Bloom -- that individualization adds two sigmas to the average grade. In this paper, …


Architectural Elements Contributing To Interpretability Of Deep Neural Networks (Dnns), Emily Barnes, James Hutson Jun 2024

Architectural Elements Contributing To Interpretability Of Deep Neural Networks (Dnns), Emily Barnes, James Hutson

Faculty Scholarship

The interpretability of Deep Neural Networks (DNNs) has become a critical focus in artificial intelligence and machine learning, particularly as DNNs are increasingly used in high-stakes applications like healthcare, finance, and autonomous driving. Interpretability refers to the extent to which humans can understand the reasons behind a model's decisions, which is essential for trust, accountability, and transparency. However, the complexity and depth of DNN architectures often compromise interpretability as these models function as "black boxes." This article reviews key architectural elements of DNNs that affect their interpretability, aiming to guide the design of more transparent and trustworthy models. The primary …


Decentralized Optimization Over Slowly Time-Varying Graphs: Algorithms And Lower Bounds, Dmitry Metelev, Aleksandr Beznosikov, Alexander Rogozin, Alexander Gasnikov, Anton Proskurnikov Jun 2024

Decentralized Optimization Over Slowly Time-Varying Graphs: Algorithms And Lower Bounds, Dmitry Metelev, Aleksandr Beznosikov, Alexander Rogozin, Alexander Gasnikov, Anton Proskurnikov

Machine Learning Faculty Publications

We consider a decentralized convex unconstrained optimization problem, where the cost function can be decomposed into a sum of strongly convex and smooth functions, associated with individual agents, interacting over a static or time-varying network. Our main concern is the convergence rate of first-order optimization algorithms as a function of the network’s graph, more specifically, of the condition numbers of gossip matrices. We are interested in the case when the network is time-varying but the rate of changes is restricted. We study two cases: randomly changing network satisfying Markov property and a network changing in a deterministic manner. For the …


On Coresets For Fair Clustering In Metric And Euclidean Spaces And Their Applications, Sayan Bandyapadhyay, Fedor V. Fomin, Kirill Simonov Jun 2024

On Coresets For Fair Clustering In Metric And Euclidean Spaces And Their Applications, Sayan Bandyapadhyay, Fedor V. Fomin, Kirill Simonov

Computer Science Faculty Publications and Presentations

Fair clustering is a constrained clustering problem where we need to partition a set of colored points. The fraction of points of each color in every cluster should be more or less equal to the fraction of points of this color in the dataset. The problem was recently introduced by Chierichetti et al. (2017) [1]. We propose a new construction of coresets for fair clustering for Euclidean and general metrics based on random sampling. For the Euclidean space Rd, we provide the first coreset whose size does not depend exponentially on the dimension d. The question of whether such constructions …


A Sentiment Analysis Approach For Understanding Users’ Perception Of Metaverse Marketplace, Ahmed Al-Adaileh, Mousa Al-Kfairy, Mohammad Tubishat, Omar Alfandi Jun 2024

A Sentiment Analysis Approach For Understanding Users’ Perception Of Metaverse Marketplace, Ahmed Al-Adaileh, Mousa Al-Kfairy, Mohammad Tubishat, Omar Alfandi

All Works

This research explores the user perceptions of the Metaverse Marketplace, analyzing a substantial dataset of over 860,000 Twitter posts through sentiment analysis and topic modeling techniques. The study aims to uncover the driving factors behind user engagement and sentiment in this novel digital trading space. Key findings highlight a predominantly positive user sentiment, with significant enthusiasm for the marketplace's revenue generation and entertainment potential, particularly within the gaming sector. Users express appreciation for the innovative opportunities the Metaverse Marketplace offers for artists, designers, and traders in handling and trading digital assets. This positive outlook is tempered by notable concerns regarding …


To Protect Or To Hide: An Investigation On Corporate Redacted Disclosure Motives Under New Fast Act Regulation, Yan Ma, Qian Mao, Nan Hu Jun 2024

To Protect Or To Hide: An Investigation On Corporate Redacted Disclosure Motives Under New Fast Act Regulation, Yan Ma, Qian Mao, Nan Hu

Research Collection School Of Computing and Information Systems

China adopted amendments allowing companies to redact filings without prior approval in 2016. Leveraging this change as a quasi-nature experiment, we explore whether managers utilize redacted information to withhold bad information in the more lenient regulatory environment. Our investigation uncovers a significant shift in managerial behavior: Since 2016, managers incline to employ redactions to obscure negative news rather than safeguarding proprietary data. Furthermore, we find that the poorer firm performance and a higher cost of equity are associated with the redacted disclosures after 2016, suggesting that investors perceive an increase in firm-specific risk attributed to withholding bad news through redactions.


Network-Based Representations And Dynamic Discrete Choice Models For Multiple Discrete Choice Analysis, Huy Hung Tran, Tien Mai Jun 2024

Network-Based Representations And Dynamic Discrete Choice Models For Multiple Discrete Choice Analysis, Huy Hung Tran, Tien Mai

Research Collection School Of Computing and Information Systems

In many choice modeling applications, consumer demand is frequently characterized as multiple discrete, which means that consumer choose multiple items simultaneously. The analysis and prediction of consumer behavior in multiple discrete choice situations pose several challenges. In this paper, to address this, we propose a random utility maximization (RUM) based model that considers each subset of choice alternatives as a composite alternative, where individuals choose a subset according to the RUM framework. While this approach offers a natural and intuitive modeling approach for multiple-choice analysis, the large number of subsets of choices in the formulation makes its estimation and application …