Open Access. Powered by Scholars. Published by Universities.®

Theory and Algorithms Commons

Open Access. Powered by Scholars. Published by Universities.®

2,034 Full-Text Articles 3,299 Authors 754,230 Downloads 167 Institutions

All Articles in Theory and Algorithms

Faceted Search

2,034 full-text articles. Page 40 of 85.

Iterated Local Search Algorithm For The Capacitated Team Orienteering Problem, Aldy GUNAWAN, Kien Ming NG, Vincent F. YU, Gordy ADIPRASETYO, Hoong Chuin LAU 2018 Singapore Management University

Iterated Local Search Algorithm For The Capacitated Team Orienteering Problem, Aldy Gunawan, Kien Ming Ng, Vincent F. Yu, Gordy Adiprasetyo, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

This paper focuses on a recent variant of the Orienteering Problem (OP), namely the Capacitated Team Orienteering Problem (CTOP). In this problem, each node is associated with a demand that needs to be satisfied and a score that need to be collected. Given a set of homogeneous fleet of vehicles, the main objective is to find a path for each available vehicle in order to maximize the total score, without violating the capacity and time budget of each vehicle. We propose an Iterated Local Search algorithm that has been applied in solving various variants of the OP. We propose two …


Bayesian Analytical Approaches For Metabolomics : A Novel Method For Molecular Structure-Informed Metabolite Interaction Modeling, A Novel Diagnostic Model For Differentiating Myocardial Infarction Type, And Approaches For Compound Identification Given Mass Spectrometry Data., Patrick J. Trainor 2018 University of Louisville

Bayesian Analytical Approaches For Metabolomics : A Novel Method For Molecular Structure-Informed Metabolite Interaction Modeling, A Novel Diagnostic Model For Differentiating Myocardial Infarction Type, And Approaches For Compound Identification Given Mass Spectrometry Data., Patrick J. Trainor

Electronic Theses and Dissertations

Metabolomics, the study of small molecules in biological systems, has enjoyed great success in enabling researchers to examine disease-associated metabolic dysregulation and has been utilized for the discovery biomarkers of disease and phenotypic states. In spite of recent technological advances in the analytical platforms utilized in metabolomics and the proliferation of tools for the analysis of metabolomics data, significant challenges in metabolomics data analyses remain. In this dissertation, we present three of these challenges and Bayesian methodological solutions for each. In the first part we develop a new methodology to serve a basis for making higher order inferences in metabolomics, …


An Algorithmic Approach To Creating Effective Study Groups Using A Smart Phone App, Kelvin J. Rosado-Ayala 2018 Georgia Southern University

An Algorithmic Approach To Creating Effective Study Groups Using A Smart Phone App, Kelvin J. Rosado-Ayala

Honors College Theses

For many students entering college, meeting new people and studying are a common struggle. Study groups are generally recommended, especially if the groups are comprised of members with complementary personality traits. But the challenge still remains, how do freshmen or transfer students find and form these heterogeneous study groups. In order to help alleviate this issue, an Android application was developed to automatically create study groups for students. Using basic information provided by students upon registration, the algorithm is able to automatically find matching group members. The application was designed using an agile life cycle model over the course of …


Data Center Application Security: Lateral Movement Detection Of Malware Using Behavioral Models, Harinder Pal Singh Bhasin, Elizabeth Ramsdell, Albert Alva, Rajiv Sreedhar, Medha Bhadkamkar 2018 Southen Methodist University, Dallas, Texas

Data Center Application Security: Lateral Movement Detection Of Malware Using Behavioral Models, Harinder Pal Singh Bhasin, Elizabeth Ramsdell, Albert Alva, Rajiv Sreedhar, Medha Bhadkamkar

SMU Data Science Review

Data center security traditionally is implemented at the external network access points, i.e., the perimeter of the data center network, and focuses on preventing malicious software from entering the data center. However, these defenses do not cover all possible entry points for malicious software, and they are not 100% effective at preventing infiltration through the connection points. Therefore, security is required within the data center to detect malicious software activity including its lateral movement within the data center. In this paper, we present a machine learning-based network traffic analysis approach to detect the lateral movement of malicious software within the …


Supervised Machine Learning Bot Detection Techniques To Identify Social Twitter Bots, Phillip George Efthimion, Scott Payne, Nicholas Proferes 2018 Southern Methodist University

Supervised Machine Learning Bot Detection Techniques To Identify Social Twitter Bots, Phillip George Efthimion, Scott Payne, Nicholas Proferes

SMU Data Science Review

In this paper, we present novel bot detection algorithms to identify Twitter bot accounts and to determine their prevalence in current online discourse. On social media, bots are ubiquitous. Bot accounts are problematic because they can manipulate information, spread misinformation, and promote unverified information, which can adversely affect public opinion on various topics, such as product sales and political campaigns. Detecting bot activity is complex because many bots are actively trying to avoid detection. We present a novel, complex machine learning algorithm utilizing a range of features including: length of user names, reposting rate, temporal patterns, sentiment expression, followers-to-friends ratio, …


Machine Learning To Predict College Course Success, Anthony R.Y. Dalton, Justin Beer, Sriharshasai Kommanapalli, James S. Lanich Ph.D. 2018 Southern Methodist University

Machine Learning To Predict College Course Success, Anthony R.Y. Dalton, Justin Beer, Sriharshasai Kommanapalli, James S. Lanich Ph.D.

SMU Data Science Review

In this paper, we present an analysis of the predictive ability of machine learning on the success of students in college courses in a California Community College. The California Legislature passed assembly bill 705 in order to place students in non-remedial coursework, based on high school transcripts, to increase college completion. We utilize machine learning methods on de-identified student high school transcript data to create predictive algorithms on whether or not the student will be successful in college-level English and Mathematics coursework. To satisfy the bill’s requirements, we first use exploratory data analysis on applicable transcript variables. Then we use …


Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally 2018 Wuhan University, China

Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally

Information Science Faculty Publications

One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …


The Price Of Usability: Designing Operationalizable Strategies For Security Games, Sara Marie McCARTHY, Corine M. LAAN, Kai WANG, Phebe VAYANOS, Arunesh SINHA, Milind TAMBE 2018 University of Southern California

The Price Of Usability: Designing Operationalizable Strategies For Security Games, Sara Marie Mccarthy, Corine M. Laan, Kai Wang, Phebe Vayanos, Arunesh Sinha, Milind Tambe

Research Collection School Of Computing and Information Systems

We consider the problem of allocating scarce security resources among heterogeneous targets to thwart a possible attack. It is well known that deterministic solutions to this problem being highly predictable are severely suboptimal. To mitigate this predictability, the game-theoretic security game model was proposed which randomizes over pure (deterministic) strategies, causing confusion in the adversary. Unfortunately, such mixed strategies typically involve randomizing over a large number of strategies, requiring security personnel to be familiar with numerous protocols, making them hard to operationalize. Motivated by these practical considerations, we propose an easy to use approach for computing strategies that are easy …


The Silencing Power Of Algorithms: How The Facebook News Feed Algorithm Manipulates Users' Perceptions Of Opinion Climates, Callie Jessica Morgan 2018 Portland State University

The Silencing Power Of Algorithms: How The Facebook News Feed Algorithm Manipulates Users' Perceptions Of Opinion Climates, Callie Jessica Morgan

University Honors Theses

This extended literature review investigates how the architecture and features of the Facebook Newsfeed algorithm, EdgeRank, can inhibit and facilitate the expression of political opinions. This paper will investigate how Elisabeth Noelle-Neumann's theory on public opinion, Spiral of Silence, can be used to assess the Facebook news feed as a political opinion source that actively shapes users' perceptions of minority and majority opinion climates. The feedback loops created by the algorithm's criteria influences users' decisions to self-censor or express their political opinions with interpersonal connections and unfamiliar connections on the site.


Efficient Representative Subset Selection Over Sliding Windows, Yanhao WANG, Yuchen LI, Kian-Lee TAN 2018 National University of Singapore

Efficient Representative Subset Selection Over Sliding Windows, Yanhao Wang, Yuchen Li, Kian-Lee Tan

Research Collection School Of Computing and Information Systems

Representative subset selection (RSS) is an important tool for users to draw insights from massive datasets. Existing literature models RSS as submodular maximization to capture the "diminishing returns" property of representativeness, but often only has a single constraint, which limits its applications to many real-world problems. To capture the recency issue and support various constraints, we formulate dynamic RSS as maximizing submodular functions subject to general d -knapsack constraints (SMDK) over sliding windows. We propose a KnapWindow framework (KW) for SMDK. KW utilizes KnapStream (KS) for SMDK in append-only streams as a subroutine. It maintains a sequence of checkpoints and …


A Bayesian Latent Variable Model Of User Preferences With Item Context, Aghiles SALAH, Hady W. LAUW 2018 Singapore Management University

A Bayesian Latent Variable Model Of User Preferences With Item Context, Aghiles Salah, Hady W. Lauw

Research Collection School Of Computing and Information Systems

Personalized recommendation has proven to be very promising in modeling the preference of users over items. However, most existing work in this context focuses primarily on modeling user-item interactions, which tend to be very sparse. We propose to further leverage the item-item relationships that may reflect various aspects of items that guide users’ choices. Intuitively, items that occur within the same “context” (e.g., browsed in the same session, purchased in the same basket) are likely related in some latent aspect. Therefore, accounting for the item’s context would complement the sparse user-item interactions by extending a user’s preference to other items …


Online Active Learning With Expert Advice, Shuji HAO, Peiying HU, Peilin ZHAO, Steven C. H. HOI, Chunyan MIAO 2018 Institute of High Performance of Computing

Online Active Learning With Expert Advice, Shuji Hao, Peiying Hu, Peilin Zhao, Steven C. H. Hoi, Chunyan Miao

Research Collection School Of Computing and Information Systems

In literature, learning with expert advice methods usually assume that a learner always obtain the true label of every incoming training instance at the end of each trial. However, in many real-world applications, acquiring the true labels of all instances can be both costly and time consuming, especially for large-scale problems. For example, in the social media, data stream usually comes in a high speed and volume, and it is nearly impossible and highly costly to label all of the instances. In this article, we address this problem with active learning with expert advice, where the ground truth of an …


Time Advancement And Bounds Intersection Checking For Faster Broad-Phase Collision Detection Of Paired Object Trajectories, Proceso L. Fernandez Jr, Mary Aveline Germar 2018 Ateneo de Manila University

Time Advancement And Bounds Intersection Checking For Faster Broad-Phase Collision Detection Of Paired Object Trajectories, Proceso L. Fernandez Jr, Mary Aveline Germar

Department of Information Systems & Computer Science Faculty Publications

For self-driving mechanisms, the motion planning requires a reasonably fast algorithm for collision detection along the trajectories. We present three algorithms for the detection of collision among objects with predefined trajectories. The first algorithm uses the intersection of the path’s bounding box. The second algorithm sequentially checks for intersection between each pair of corresponding axis-aligned bounding boxes (AABB) from the trajectories of the two paths. Lastly, the latter algorithm is modified using iterative time advancement to an estimated earliest possible collision time. Simulation experiments on a variety of pair trajectories demonstrate a significant speedup of the proposed algorithms over the …


Distributed K-Nearest Neighbor Queries In Metric Spaces, Xin DING, Yuanliang ZHANG, Lu CHEN, Yunjun GAO, Baihua ZHENG 2018 Zhejiang University

Distributed K-Nearest Neighbor Queries In Metric Spaces, Xin Ding, Yuanliang Zhang, Lu Chen, Yunjun Gao, Baihua Zheng

Research Collection School Of Computing and Information Systems

Metric k nearest neighbor (MkNN) queries have applications in many areas such as multimedia retrieval, computational biology, and location-based services. With the growing volumes of data, a distributed method is required. In this paper, we propose an Asynchronous Metric Distributed System (AMDS), which uniformly partitions the data with the pivot-mapping technique to ensure the load balancing, and employs publish/subscribe communication model to asynchronously process large scale of queries. The employment of asynchronous processing model also improves robustness and efficiency of AMDS. In addition, we develop an efficient estimation based MkNN method using AMDS to improve the query efficiency. Extensive experiments …


A Survey Of Matrix Completion Methods For Recommendation Systems, Andy Ramlatchan, Mengyun Yang, Quan Liu, Min Li, Jianxin Wang, Yaohang Li 2018 Old Dominion University

A Survey Of Matrix Completion Methods For Recommendation Systems, Andy Ramlatchan, Mengyun Yang, Quan Liu, Min Li, Jianxin Wang, Yaohang Li

Computer Science Faculty Publications

In recent years, the recommendation systems have become increasingly popular and have been used in a broad variety of applications. Here, we investigate the matrix completion techniques for the recommendation systems that are based on collaborative filtering. The collaborative filtering problem can be viewed as predicting the favorability of a user with respect to new items of commodities. When a rating matrix is constructed with users as rows, items as columns, and entries as ratings, the collaborative filtering problem can then be modeled as a matrix completion problem by filling out the unknown elements in the rating matrix. This article …


Smt-Based Answer Set Solver Cmodels-Diff (System Description), Da Shen, Yuliya Lierler 2018 University of Nebraska at Omaha

Smt-Based Answer Set Solver Cmodels-Diff (System Description), Da Shen, Yuliya Lierler

Yuliya Lierler

Many answer set solvers utilize Satisfiability solvers for search. SMT solvers extend Satisfiability solvers. This paper presents the CMODELS-DIFF system that uses SMT solvers to find answer sets of a logic program. Its theoretical foundation is based on Niemala's characterization of answer sets of a logic program via so called level rankings. The comparative experimental analysis demonstrates that CMODELS-DIFF is a viable answer set solver.


Development Of A Slab-Based Monte Carlo Proton Dose Algorithm With A Robust Material-Dependent Nuclear Halo Model, John Wesley Chapman Jr 2018 Louisiana State University and Agricultural and Mechanical College

Development Of A Slab-Based Monte Carlo Proton Dose Algorithm With A Robust Material-Dependent Nuclear Halo Model, John Wesley Chapman Jr

LSU Doctoral Dissertations

Pencil beam algorithms (PBAs) are often utilized for dose calculation in proton therapy treatment planning because they are fast and accurate under most conditions. However, as discussed in Chapman et al (2017), the accuracy of a PBA can be limited under certain conditions because of two major assumptions: (1) the central-axis semi-infinite slab approximation; and, (2) the lack of material dependence in the nuclear halo model. To address these limitations, we transported individual protons using a class II condensed history Monte Carlo and added a novel energy loss method that scaled the nuclear halo equation in water to arbitrary geometry. …


Efficient Phase Retrieval For Off-Axis Point Spread Functions, Salome Esteban Carrasco 2018 Air Force Institute of Technology

Efficient Phase Retrieval For Off-Axis Point Spread Functions, Salome Esteban Carrasco

Theses and Dissertations

A novel pairing of phase retrieval tools allows for efficient estimation of pupil phase in optical systems from images of point spread functions (PSFs). The phase retrieval algorithm uses correlation of modeled phase in the focal plane to decouple aberrations that are difficult to identify in complex PSFs. The use of a phase kernel that departs from the Fresnel approximation for off-axis PSFs is a more accurate representation of wavefront phase in finite conjugate imaging. The combination of the approximation and phase correlation algorithm can be more efficient and accurate than generic algorithms.


Effects Of Dynamic Goals On Agent Performance, Nathan R. Ball 2018 Air Force Institute of Technology

Effects Of Dynamic Goals On Agent Performance, Nathan R. Ball

Theses and Dissertations

Autonomous systems are increasingly being used for complex tasks in dynamic environments. Robust automation needs to be able to establish its current goal and determine when the goal has changed. In human-machine teams autonomous goal detection is an important component of maintaining shared situational awareness between both parties. This research investigates how different categories of goals affect autonomous change detection in a dynamic environment. In order to accomplish this goal, a set of autonomous agents were developed to perform within an environment with multiple possible goals. The agents perform the environmental task while monitoring for goal changes. The experiment tests …


Finding Spanning Trees In Strongly Connected Graphs With Per-Vertex Degree Constraints, Samuel Benjamin Chase 2018 California Polytechnic State University, San Luis Obispo

Finding Spanning Trees In Strongly Connected Graphs With Per-Vertex Degree Constraints, Samuel Benjamin Chase

Computer Science and Software Engineering

In this project, I sought to develop and prove new algorithms to create spanning trees on general graphs with per-vertex degree constraints. This means that each vertex in the graph would have some additional value, a degree constraint d. For a spanning tree to be correct, every vertex vi in the spanning tree must have a degree exactly equal to a degree constraint di. This poses an additional constraint on what would otherwise be a trivial spanning tree problem. In this paper, two proofs related to my studies will be discussed and analyzed, leading to my algorithm …


Digital Commons powered by bepress