# Theory and Algorithms Commons™

1,735 Full-Text Articles 2,625 Authors 675,539 Downloads 144 Institutions

## All Articles in Theory and Algorithms

1,735 full-text articles. Page 1 of 71.

An Efficient Annealing-Assisted Differential Evolution For Multi-Parameter Adaptive Latent Factor Analysis, 2022 Chongqing University of Post and Telecommunications

#### An Efficient Annealing-Assisted Differential Evolution For Multi-Parameter Adaptive Latent Factor Analysis, Qing Li, Guansong Pang, Mingsheng Shang

##### Research Collection School Of Computing and Information Systems

A high-dimensional and incomplete (HDI) matrix is a typical representation of big data. However, advanced HDI data analysis models tend to have many extra parameters. Manual tuning of these parameters, generally adopting the empirical knowledge, unavoidably leads to additional overhead. Although variable adaptive mechanisms have been proposed, they cannot balance the exploration and exploitation with early convergence. Moreover, learning such multi-parameters brings high computational time, thereby suffering gross accuracy especially when solving a bilinear problem like conducting the commonly used latent factor analysis (LFA) on an HDI matrix. Herein, an efficient annealing-assisted differential evolution for multi-parameter adaptive latent factor analysis ...

2022 The Graduate Center, City University of New York

#### An Analysis Of The Friendship Paradox And Derived Sampling Methods, Yitzchak Novick

##### Dissertations, Theses, and Capstone Projects

The friendship paradox (FP) is the famous sampling-bias phenomenon that leads to the seemingly paradoxical truth that, on average, people’s friends have more friends than they do. Among the many far-reaching research findings the FP inspired is a sampling method that samples neighbors of vertices in a graph in order to acquire random vertices that are of higher expected degree than average.

Our research examines the friendship paradox on a local level. We seek to quantify the impact of the FP on an individual vertex by defining the vertex’s “friendship index”, a measure of the extent to which ...

2022 Western University

#### Simulating Salience: Developing A Model Of Choice In The Visual Coordination Game, Adib Sedig

##### Undergraduate Student Research Internships Conference

This project is primarily inspired by three papers: Colin Camerer and Xiaomin Li’s (2019 working paper)—Using Visual Salience in Empirical Game Theory, Ryan Oprea’s (2020)—What Makes a Rule Complex?, and Caplin et. al.’s (2011)—Search and Satisficing. Over the summer, I worked towards constructing a model of choice for the visual coordination game that can model player behavior more accurately than traditional game theoretic predictions. It attempts to do so by incorporating a degree of bias towards salience into a cellular automaton search algorithm and utilizing it alongside a sequential search mechanism of satisficing. This ...

Submodularity And Local Search Approaches For Maximum Capture Problems Under Generalized Extreme Value Models, 2022 Phenikaa University

#### Submodularity And Local Search Approaches For Maximum Capture Problems Under Generalized Extreme Value Models, Tien Thanh Dam, Thuy Anh Ta, Tien Mai

##### Research Collection School Of Computing and Information Systems

We study the maximum capture problem in facility location under random utility models, i.e., the problem of seeking to locate new facilities in a competitive market such that the captured user demand is maximized, assuming that each customer chooses among all available facilities according to a random utility maximization model. We employ the generalized extreme value (GEV) family of discrete choice models and show that the objective function in this context is monotonic and submodular. This finding implies that a simple greedy heuristic can always guarantee a (1−1/e) approximation solution. We further develop a new algorithm combining ...

2-Dimensional String Problems: Data Structures And Quantum Algorithms, 2022 Louisiana State University

#### 2-Dimensional String Problems: Data Structures And Quantum Algorithms, Dhrumilkumar Patel

##### LSU Master's Theses

The field of stringology studies algorithms and data structures used for processing strings efficiently. The goal of this thesis is to investigate 2-dimensional (2D) variants of some fundamental string problems, including \textit{Exact Pattern Matching} and \textit{Longest Common Substring}.

In the 2D pattern matching problem, we are given a matrix $\M[1\dd n,1\dd n]$ that consists of $N = n \times n$ symbols drawn from an alphabet $\Sigma$ of size $\sigma$. The query consists of a $m \times m$ square matrix $\PP[1\dd m, 1\dd m]$ drawn from the same alphabet, and the task is ...

A Nature-Inspired Approach For Scenario-Based Validation Of Autonomous Systems, 2022 Embry-Riddle Aeronautical University

#### A Nature-Inspired Approach For Scenario-Based Validation Of Autonomous Systems, Quentin Goss, Mustafa Akbas

##### Beyond: Undergraduate Research Journal

Scenario-based approaches are cost and time effective solutions to autonomous cyber-physical system testing to identify bugs before costly methods such as physical testing in a controlled or uncontrolled environment. Every bug in an autonomous cyber-physical system is a potential safety risk. This paper presents a scenario-based method for finding bugs and estimating boundaries of the bug profile. The method utilizes a nature-inspired approach adapting low discrepancy sampling with local search. Extensive simulations demonstrate the performance of the approach with various adaptations.

On The Total Set Chromatic Number Of Graphs, 2022 Ateneo de Manila University

#### On The Total Set Chromatic Number Of Graphs, Mark Anthony C. Tolentino, Gerone Russel J. Eugenio, Mari-Jo P. Ruiz

##### Theory and Applications of Graphs

Given a vertex coloring c of a graph, the neighborhood color set of a vertex is defined to be the set of all of its neighbors’ colors. The coloring c is called a set coloring if any two adjacent vertices have different neighborhood color sets. The set chromatic number χs(G) of a graph G is the minimum number of colors required in a set coloring of G. In this work, we investigate a total analog of set colorings; that is, we study set colorings of the total graph of graphs. Given a graph G = (V, E), its total ...

2022 University of Minnesota - Morris

#### Intuitr: A Theorem Prover For Intuitionistic Propositional Logic, Erik Rauer

##### Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

A constructive proof proves the existence of a mathematical object by giving the steps necessary to construct said object. Proofs of this type can be interpreted as an algorithm for creating such an object. Intuitionistic Propositional Logic (IPL) is a propositional logic system wherein all valid proofs are constructive. intuitR is a theorem prover for IPL, that is, it determines whether a given formula is valid in IPL or not. In this paper, we describe how intuitR determines the validity of a formula and review its performance. When compared on a benchmark set of problems, intuitR was determined to solve ...

2022 University of Minnesota - Morris

#### Filling Gaps On The Pareto Front In Multi- And Many-Objective Optimization, Richard Lussier

##### Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Pareto fronts offer insight into the best found solutions of a given problem. Several algorithms have been developed to help maintain a well-distributed Pareto front and therefore offer a wide variety of solutions. However, in real-world problems, the Pareto front isn’t necessarily a continuous surface and may contain holes and/or discontinuous lines. These irregular areas on the Pareto front are considered gaps. These gaps can either be natural or artificial. In their research, Pellicer, Escudero, Alzueta, and Deb suggest a three-step procedure to find, validate, and fill these gaps. First, they developed an algorithm to generate gap points ...

Review Of Some Existing Qml Frameworks And Novel Hybrid Classical-Quantum Neural Networks Realising Binary Classification For The Noisy Datasets, 2022 Singapore Management University

#### Review Of Some Existing Qml Frameworks And Novel Hybrid Classical-Quantum Neural Networks Realising Binary Classification For The Noisy Datasets, N. Schetakis, D. Aghamalyan, Paul Robert Griffin, M. Boguslavsky

##### Research Collection School Of Computing and Information Systems

One of the most promising areas of research to obtain practical advantage is Quantum Machine Learning which was born as a result of cross-fertilisation of ideas between Quantum Computing and Classical Machine Learning. In this paper, we apply Quantum Machine Learning (QML) frameworks to improve binary classification models for noisy datasets which are prevalent in financial datasets. The metric we use for assessing the performance of our quantum classifiers is the area under the receiver operating characteristic curve AUC-ROC. By combining such approaches as hybrid-neural networks, parametric circuits, and data re-uploading we create QML inspired architectures and utilise them for ...

2022 Dartmouth College

#### Space-Efficient Algorithms And Verification Schemes For Graph Streams, Prantar Ghosh

##### Dartmouth College Ph.D Dissertations

Structured data-sets are often easy to represent using graphs. The prevalence of massive data-sets in the modern world gives rise to big graphs such as web graphs, social networks, biological networks, and citation graphs. Most of these graphs keep growing continuously and pose two major challenges in their processing: (a) it is infeasible to store them entirely in the memory of a regular server, and (b) even if stored entirely, it is incredibly inefficient to reread the whole graph every time a new query appears. Thus, a natural approach for efficiently processing and analyzing such graphs is reading them as ...

Deep Learning For Anomaly Detection, 2022 Singapore Management University

#### Deep Learning For Anomaly Detection, Guansong Pang, Charu Aggarwal, Chunhua Shen, Nicu Sebe

##### Research Collection School Of Computing and Information Systems

A nomaly detection aims at identifying data points which are rare or significantly different from the majority of data points. Many techniques are explored to build highly efficient and effective anomaly detection systems, but they are confronted with many difficulties when dealing with complex data, such as failing to capture intricate feature interactions or extract good feature representations. Deep-learning techniques have shown very promising performance in tackling different types of complex data in a broad range of tasks/problems, including anomaly detection. To address this new trend, we organized this Special Issue on Deep Learning for Anomaly Detection to cover ...

Consensus Formation On Heterogeneous Networks, 2022 Singapore Management University

#### Consensus Formation On Heterogeneous Networks, Edoardo Fadda, Junda He, Claudia J. Tessone, Paolo Barucca

##### Research Collection School Of Computing and Information Systems

Reaching consensus-a macroscopic state where the system constituents display the same microscopic state-is a necessity in multiple complex socio-technical and techno-economic systems: their correct functioning ultimately depends on it. In many distributed systems-of which blockchain-based applications are a paradigmatic example-the process of consensus formation is crucial not only for the emergence of a leading majority but for the very functioning of the system. We build a minimalistic network model of consensus formation on blockchain systems for quantifying how central nodes-with respect to their average distance to others-can leverage on their position to obtain competitive advantage in the consensus process. We ...

Coded Distributed Function Computation, 2022 The Graduate Center, City University of New York

#### Coded Distributed Function Computation, Pedro J. Soto

##### Dissertations, Theses, and Capstone Projects

A ubiquitous problem in computer science research is the optimization of computation on large data sets. Such computations are usually too large to be performed on one machine and therefore the task needs to be distributed amongst a network of machines. However, a common problem within distributed computing is the mitigation of delays caused by faulty machines. This can be performed by the use of coding theory to optimize the amount of redundancy needed to handle such faults. This problem differs from classical coding theory since it is concerned with the dynamic coded computation on data rather than just statically ...

Missing Value Estimation Using Clustering And Deep Learning Within Multiple Imputation Framework, 2022 Tennessee State University

#### Missing Value Estimation Using Clustering And Deep Learning Within Multiple Imputation Framework, Manar D. Samad, Sakib Abrar, Norou Diawara

##### Computer Science Faculty Research

Missing values in tabular data restrict the use and performance of machine learning, requiring the imputation of missing values. Arguably the most popular imputation algorithm is multiple imputation by chained equations (MICE), which estimates missing values from linear conditioning on observed values. This paper proposes methods to improve both the imputation accuracy of MICE and the classification accuracy of imputed data by replacing MICE’s linear regressors with ensemble learning and deep neural networks (DNN). The imputation accuracy is further improved by characterizing individual samples with cluster labels (CISCL) obtained from the training data. Our extensive analyses of six tabular ...

A Novel Method For Sensitivity Analysis Of Time-Averaged Chaotic System Solutions, 2022 Mississippi State University

#### A Novel Method For Sensitivity Analysis Of Time-Averaged Chaotic System Solutions, Christian A. Spencer-Coker

##### Theses and Dissertations

The direct and adjoint methods are to linearize the time-averaged solution of bounded dynamical systems about one or more design parameters. Hence, such methods are one way to obtain the gradient necessary in locally optimizing a dynamical system’s time-averaged behavior over those design parameters. However, when analyzing nonlinear systems whose solutions exhibit chaos, standard direct and adjoint sensitivity methods yield meaningless results due to time-local instability of the system. The present work proposes a new method of solving the direct and adjoint linear systems in time, then tests that method’s ability to solve instances of the Lorenz system ...

2022 University of Connecticut

#### A Machine Learning And Deep Learning Framework For Binary, Ternary, And Multiclass Emotion Classification Of Covid-19 Vaccine-Related Tweets, Aditya Dubey

##### Honors Scholar Theses

My research mines public emotion toward the Covid-19 vaccine based on Twitter data collected over the past 6-12 months. This project is centered around building and developing machine learning and deep learning models to perform natural language processing of short-form text, which in our case tweets. These tweets are all vaccine-related tweets and the goal of the classification task is for our models to accurately classify a tweet into one of four emotion groups: Apprehension/Anticipation, Sadness/Anger/Frustration, Joy/Humor/Sarcasm, and Gratitude/Relief. Given this data and the goal of the paper, we aim to answer the following ...

Growing Reservoir Networks Using The Genetic Algorithm Deep Hyperneat, 2022 Portland State University

#### Growing Reservoir Networks Using The Genetic Algorithm Deep Hyperneat, Nancy L. Mackenzie

##### Student Research Symposium

Typical Artificial Neural Networks (ANNs) have static architectures. The number of nodes and their organization must be chosen and tuned for each task. Choosing these values, or hyperparameters, is a bit of a guessing game, and optimizing must be repeated for each task. If the model is larger than necessary, this leads to more training time and computational cost. The goal of this project is to evolve networks that grow according to the task at hand. By gradually increasing the size and complexity of the network to the extent that the task requires, we will build networks that are more ...

2022 University of South Alabama

#### Adversarial Machine Learning For The Protection Of Legitimate Software, Colby Parker

##### Theses and Dissertations

Obfuscation is the transforming a given program into one that is syntactically different but semantically equivalent. This new obfuscated program now has its code and/or data changed so that they are hidden and difficult for attackers to understand. Obfuscation is an important security tool and used to defend against reverse engineering. When applied to a program, different transformations can be observed to exhibit differing degrees of complexity and changes to the program. Recent work has shown, by studying these side effects, one can associate patterns with different transformations. By taking this into account and attempting to profile these unique ...

2022 Murray State University

#### Data And Algorithmic Modeling Approaches To Count Data, Andraya Hack

##### Honors College Theses

Various techniques are used to create predictions based on count data. This type of data takes the form of a non-negative integers such as the number of claims an insurance policy holder may make. These predictions can allow people to prepare for likely outcomes. Thus, it is important to know how accurate the predictions are. Traditional statistical approaches for predicting count data include Poisson regression as well as negative binomial regression. Both methods also have a zero-inflated version that can be used when the data has an overabundance of zeros. Another procedure is to use computer algorithms, also known as ...