Integrated generalized zero-shot learning for fine-grained classification
- Authors: Shermin, Tasfia , Teng, Shyh , Sohel, Ferdous , Murshed, Manzur , Lu, Guojun
- Date: 2022
- Type: Text , Journal article
- Relation: Pattern Recognition Vol. 122, no. (2022), p.
- Full Text:
- Reviewed:
- Description: Embedding learning (EL) and feature synthesizing (FS) are two of the popular categories of fine-grained GZSL methods. EL or FS using global features cannot discriminate fine details in the absence of local features. On the other hand, EL or FS methods exploiting local features either neglect direct attribute guidance or global information. Consequently, neither method performs well. In this paper, we propose to explore global and direct attribute-supervised local visual features for both EL and FS categories in an integrated manner for fine-grained GZSL. The proposed integrated network has an EL sub-network and a FS sub-network. Consequently, the proposed integrated network can be tested in two ways. We propose a novel two-step dense attention mechanism to discover attribute-guided local visual features. We introduce new mutual learning between the sub-networks to exploit mutually beneficial information for optimization. Moreover, we propose to compute source-target class similarity based on mutual information and transfer-learn the target classes to reduce bias towards the source domain during testing. We demonstrate that our proposed method outperforms contemporary methods on benchmark datasets. © 2021 Elsevier Ltd
An evaluation methodology for interactive reinforcement learning with simulated users
- Authors: Bignold, Adam , Cruz, Francisco , Dazeley, Richard , Vamplew, Peter , Foale, Cameron
- Date: 2021
- Type: Text , Journal article
- Relation: Biomimetics Vol. 6, no. 1 (2021), p. 1-15
- Full Text:
- Reviewed:
- Description: Interactive reinforcement learning methods utilise an external information source to evaluate decisions and accelerate learning. Previous work has shown that human advice could significantly improve learning agents’ performance. When evaluating reinforcement learning algorithms, it is common to repeat experiments as parameters are altered or to gain a sufficient sample size. In this regard, to require human interaction every time an experiment is restarted is undesirable, particularly when the expense in doing so can be considerable. Additionally, reusing the same people for the experiment introduces bias, as they will learn the behaviour of the agent and the dynamics of the environment. This paper presents a methodology for evaluating interactive reinforcement learning agents by employing simulated users. Simulated users allow human knowledge, bias, and interaction to be simulated. The use of simulated users allows the development and testing of reinforcement learning agents, and can provide indicative results of agent performance under defined human constraints. While simulated users are no replacement for actual humans, they do offer an affordable and fast alternative for evaluative assisted agents. We introduce a method for performing a preliminary evaluation utilising simulated users to show how performance changes depending on the type of user assisting the agent. Moreover, we describe how human interaction may be simulated, and present an experiment illustrating the applicability of simulating users in evaluating agent performance when assisted by different types of trainers. Experimental results show that the use of this methodology allows for greater insight into the performance of interactive reinforcement learning agents when advised by different users. The use of simulated users with varying characteristics allows for evaluation of the impact of those characteristics on the behaviour of the learning agent. © 2021 by the authors. Licensee MDPI, Basel, Switzerland.
Educational big data : predictions, applications and challenges
- Authors: Bai, Xiaomei , Zhang, Fuli , Li, Jinzhou , Guo, Teng , Xia, Feng
- Date: 2021
- Type: Text , Journal article , Review
- Relation: Big Data Research Vol. 26, no. (2021), p.
- Full Text:
- Reviewed:
- Description: Educational big data is becoming a strategic educational asset, exceptionally significant in advancing educational reform. The term educational big data stems from the rapidly growing educational data development, including students' inherent attributes, learning behavior, and psychological state. Educational big data has many applications that can be used for educational administration, teaching innovation, and research management. The representative examples of such applications are student academic performance prediction, employment recommendation, and financial support for low-income students. Different empirical studies have shown that it is possible to predict student performance in the courses during the next term. Predictive research for the higher education stage has become an attractive area of study since it allowed us to predict student behavior. In this survey, we will review predictive research, its applications, and its challenges. We first introduce the significance and background of educational big data. Second, we review the students' academic performance prediction research, such as factors influencing students' academic performance, predicting models, evaluating indices. Third, we introduce the applications of educational big data such as prediction, recommendation, and evaluation. Finally, we investigate challenging research issues in this area. This discussion aims to provide a comprehensive overview of educational big data. © 2021 Elsevier Inc. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Feng Xia” is provided in this record**
Enabling situational awareness of business processes
- Authors: Zhao, Xiaohui , Yongchareon, Sira , Cho, Nam-Wook
- Date: 2021
- Type: Text , Journal article
- Relation: Business Process Management Journal Vol. 27, no. 3 (2021), p. 779-795
- Full Text:
- Reviewed:
- Description: Purpose: The purpose of this research is to explore the ways of integrating situational awareness into business process management for the purpose of realising hyper automated business processes. Such business processes will help improve their customer experiences, enhance the reliability of service delivery and lower the operational cost for a more competitive and sustainable business. Design/methodology/approach: Ontology has been deployed to establish the context modelling method, and the event handling mechanisms are developed on the basis of event calculus. An approach on performance of the proposed approach has been evaluation by checking the cost savings from the simulation of a large number of business processes. Findings: In this research, the authors have formalised the context presentation for a business process with a focus on rules and entities to support context perception; proposed a system architecture to illustrate the structure and constitution of a supporting system for intelligent and situation aware business process management; developed real-time event elicitation and interpretation mechanisms to operationalise the perception of contextual dynamics and real-time responses; and evaluated the applicability of the proposed approaches and the performance improvement to business processes. Originality/value: This paper presents a framework covering process context modelling, system architecture and real-time event handling mechanisms to support situational awareness of business processes. The reported research is based on our previous work on radio frequency identification-enabled applications and context-aware business process management with substantial extension to process context modelling and process simulation. © 2021, Emerald Publishing Limited.
How to optimize an academic team when the outlier member is leaving?
- Authors: Yu, Shuo , Liu, Jiaying , Wei, Haoran , Xia, Feng , Tong, Hanghang
- Date: 2021
- Type: Text , Journal article
- Relation: IEEE Intelligent Systems Vol. 36, no. 3 (May-Jun 2021), p. 23-30
- Full Text:
- Reviewed:
- Description: An academic team is a highly cohesive collaboration group of scholars, which has been recognized as an effective way to improve scientific output in terms of both quality and quantity. However, the high staff turnover brings about a series of problems that may have negative influences on team performance. To address this challenge, we first detect the tendency of the member who may potentially leave. Here, the outlierness is defined with respect to familiarity, which is quantified by using collaboration intensity. It is assumed that if a team member has a higher familiarity with scholars outside the team, then this member might probably leave the team. To minimize the influence caused by the leaving of such an outlier member, we propose an optimization solution to find a proper candidate who can replace the outlier member. Based on random walk with graph kernel, our solution involves familiarity matching, skill matching, as well as structure matching. The proposed approach proves to be effective and outperforms existing methods when applied to computer science academic teams.
Intelligent energy prediction techniques for fog computing networks
- Authors: Farooq, Umar , Shabir, Muhammad , Javed, Muhammad , Imran, Muhammad
- Date: 2021
- Type: Text , Journal article
- Relation: Applied Soft Computing Vol. 111, no. (2021), p.
- Full Text:
- Reviewed:
- Description: Energy Efficiency is a key concern for future fog-enabled Internet of Things (IoT). Since Fog Nodes (FNs) are energy-constrained devices, task offloading techniques must consider the energy consumption of the FNs to maximize the performance of IoT applications. In this context, accurate energy prediction can enable the development of intelligent energy-aware task offloading techniques. In this paper, we present two energy prediction techniques, the first one is based on the Recursive Least Square (RLS) filter and the second one uses the Artificial Neural Network (ANN). Both techniques use inputs such as the number of tasks and size of the tasks to predict the energy consumption at different fog nodes. Simulation results show that both techniques have a root mean square error of less than 3%. However, the ANN-based technique shows up to 20% less root mean square error as compared to the RLS-based technique. © 2021 Elsevier B.V.
Matching algorithms : fundamentals, applications and challenges
- Authors: Ren, Jing , Xia, Feng , Chen, Xiangtai , Liu, Jiaying , Sultanova, Nargiz
- Date: 2021
- Type: Text , Journal article , Review
- Relation: IEEE Transactions on Emerging Topics in Computational Intelligence Vol. 5, no. 3 (2021), p. 332-350
- Full Text:
- Reviewed:
- Description: Matching plays a vital role in the rational allocation of resources in many areas, ranging from market operation to people's daily lives. In economics, the term matching theory is coined for pairing two agents in a specific market to reach a stable or optimal state. In computer science, all branches of matching problems have emerged, such as the question-answer matching in information retrieval, user-item matching in a recommender system, and entity-relation matching in the knowledge graph. A preference list is the core element during a matching process, which can either be obtained directly from the agents or generated indirectly by prediction. Based on the preference list access, matching problems are divided into two categories, i.e., explicit matching and implicit matching. In this paper, we first introduce the matching theory's basic models and algorithms in explicit matching. The existing methods for coping with various matching problems in implicit matching are reviewed, such as retrieval matching, user-item matching, entity-relation matching, and image matching. Furthermore, we look into representative applications in these areas, including marriage and labor markets in explicit matching and several similarity-based matching problems in implicit matching. Finally, this survey paper concludes with a discussion of open issues and promising future directions in the field of matching. © 2017 IEEE. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Jing Ren, Xia Feng, Nargiz Sultanova" is provided in this record**
Scholar2vec : vector representation of scholars for lifetime collaborator prediction
- Authors: Wang, Wei , Xia, Feng , Wu, Jian , Gong, Zhiguo , Tong, Hanghang , Davison, Brian
- Date: 2021
- Type: Text , Journal article
- Relation: ACM Transactions on Knowledge Discovery from Data Vol. 15, no. 3 (2021), p.
- Full Text:
- Reviewed:
- Description: While scientific collaboration is critical for a scholar, some collaborators can be more significant than others, e.g., lifetime collaborators. It has been shown that lifetime collaborators are more influential on a scholar's academic performance. However, little research has been done on investigating predicting such special relationships in academic networks. To this end, we propose Scholar2vec, a novel neural network embedding for representing scholar profiles. First, our approach creates scholars' research interest vector from textual information, such as demographics, research, and influence. After bridging research interests with a collaboration network, vector representations of scholars can be gained with graph learning. Meanwhile, since scholars are occupied with various attributes, we propose to incorporate four types of scholar attributes for learning scholar vectors. Finally, the early-stage similarity sequence based on Scholar2vec is used to predict lifetime collaborators with machine learning methods. Extensive experiments on two real-world datasets show that Scholar2vec outperforms state-of-the-art methods in lifetime collaborator prediction. Our work presents a new way to measure the similarity between two scholars by vector representation, which tackles the knowledge between network embedding and academic relationship mining. © 2021 Association for Computing Machinery.
The role of individual differences in cyber dating abuse perpetration
- Authors: March, Evita , Grieve, Rachel , Clancy, Elizabeth , Klettke, Bianca , Van Dick, Rolf , Hernandez Bark, Alina
- Date: 2021
- Type: Text , Journal article
- Relation: Cyberpsychology, Behavior, and Social Networking Vol. 24, no. 7 (2021), p. 457-463
- Full Text:
- Reviewed:
- Description: There is a growing research interest in cyber dating abuse (CDA). CDA includes abusive online behavior toward a current or former intimate partner, such as aggression, control, harassment, and humiliation. Despite the potential overlap and reciprocal relationship of CDA and intimate partner violence, there remains considerable paucity in research exploring predictors of this abusive online behavior. In the current study, we adopt the General Aggression Model framework and explore the role of gender, hegemonic masculinity, vulnerable narcissism, and sexual aggression myths to predict perpetration of CDA. Participants (N = 415, 51 percent women; Mage = 32.68 years) were recruited via social media advertisements and completed an anonymous, confidential online questionnaire. The questionnaire comprised the Conformity to Masculine Roles Norms Inventory, the Hypersensitive Narcissism Scale, the Acceptance of Modern Myths About Sexual Aggression Scale, and a modified Cyber Aggression in Relationships Scale. A hierarchical regression analysis indicated that hegemonic masculinity, vulnerable narcissism, and sexual aggression myths were all significant positive predictors of perpetrating CDA. As gender was a significant predictor until the inclusion of these variables, a multiple mediation analysis was performed, indicating that both hegemonic masculinity and sexual aggression myths fully mediated the relationship between gender and perpetrating CDA. These results add to the growing body of research exploring how CDA emerges as a behavior and highlight possible implications for management and intervention. © Copyright 2021, Mary Ann Liebert, Inc., publishers 2021.
The spectrum of big data analytics
- Authors: Sun, Zhaohao , Huo, Yanxia
- Date: 2021
- Type: Text , Journal article
- Relation: Journal of Computer Information Systems Vol. 61, no. 2 (2021), p. 154-162
- Full Text:
- Reviewed:
- Description: Big data analytics is playing a pivotal role in big data, artificial intelligence, management, governance, and society with the dramatic development of big data, analytics, artificial intelligence. However, what is the spectrum of big data analytics and how to develop the spectrum are still a fundamental issue in the academic community. This article addresses these issues by presenting a big data derived small data approach. It then uses the proposed approach to analyze the top 150 profiles of Google Scholar, including big data analytics as one research field and proposes a spectrum of big data analytics. The spectrum of big data analytics mainly includes data mining, machine learning, data science and systems, artificial intelligence, distributed computing and systems, and cloud computing, taking into account degree of importance. The proposed approach and findings will generalize to other researchers and practitioners of big data analytics, machine learning, artificial intelligence, and data science. © 2019 International Association for Computer Information Systems.
Tracing the Pace of COVID-19 research : topic modeling and evolution
- Authors: Liu, Jiaying , Nie, Hansong , Li, Shihao , Ren, Jing , Xia, Feng
- Date: 2021
- Type: Text , Journal article
- Relation: Big Data Research Vol. 25, no. (2021), p.
- Full Text:
- Reviewed:
- Description: COVID-19 has been spreading rapidly around the world. With the growing attention on the deadly pandemic, discussions and research on COVID-19 are rapidly increasing to exchange latest findings with the hope to accelerate the pace of finding a cure. As a branch of information technology, artificial intelligence (AI) has greatly expedited the development of human society. In this paper, we investigate and visualize the on-going advancements of early scientific research on COVID-19 from the perspective of AI. By adopting the Latent Dirichlet Allocation (LDA) model, this paper allocates the research articles into 50 key research topics pertinent to COVID-19 according to their abstracts. We present an overview of early studies of the COVID-19 crisis at different scales including referencing/citation behavior, topic variation and their inner interactions. We also identify innovative papers that are regarded as the cornerstones in the development of COVID-19 research. The results unveil the focus of scientific research, thereby giving deep insights into how the academic society contributes to combating the COVID-19 pandemic. © 2021 Elsevier Inc. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Jing Ren and Feng Xia" is provided in this record**
- Description: COVID-19 has been spreading rapidly around the world. With the growing attention on the deadly pandemic, discussions and research on COVID-19 are rapidly increasing to exchange latest findings with the hope to accelerate the pace of finding a cure. As a branch of information technology, artificial intelligence (AI) has greatly expedited the development of human society. In this paper, we investigate and visualize the on-going advancements of early scientific research on COVID-19 from the perspective of AI. By adopting the Latent Dirichlet Allocation (LDA) model, this paper allocates the research articles into 50 key research topics pertinent to COVID-19 according to their abstracts. We present an overview of early studies of the COVID-19 crisis at different scales including referencing/citation behavior, topic variation and their inner interactions. We also identify innovative papers that are regarded as the cornerstones in the development of COVID-19 research. The results unveil the focus of scientific research, thereby giving deep insights into how the academic society contributes to combating the COVID-19 pandemic. © 2021 Elsevier Inc.
A survey on context awareness in big data analytics for business applications
- Authors: Dinh, Loan , Karmakar, Gour , Kamruzzaman, Joarder
- Date: 2020
- Type: Text , Journal article
- Relation: Knowledge and Information Systems Vol. 62, no. 9 (2020), p. 3387-3415
- Full Text:
- Reviewed:
- Description: The concept of context awareness has been in existence since the 1990s. Though initially applied exclusively in computer science, over time it has increasingly been adopted by many different application domains such as business, health and military. Contexts change continuously because of objective reasons, such as economic situation, political matter and social issues. The adoption of big data analytics by businesses is facilitating such change at an even faster rate in much complicated ways. The potential benefits of embedding contextual information into an application are already evidenced by the improved outcomes of the existing context-aware methods in those applications. Since big data is growing very rapidly, context awareness in big data analytics has become more important and timely because of its proven efficiency in big data understanding and preparation, contributing to extracting the more and accurate value of big data. Many surveys have been published on context-based methods such as context modelling and reasoning, workflow adaptations, computational intelligence techniques and mobile ubiquitous systems. However, to our knowledge, no survey of context-aware methods on big data analytics for business applications supported by enterprise level software has been published to date. To bridge this research gap, in this paper first, we present a definition of context, its modelling and evaluation techniques, and highlight the importance of contextual information for big data analytics. Second, the works in three key business application areas that are context-aware and/or exploit big data analytics have been thoroughly reviewed. Finally, the paper concludes by highlighting a number of contemporary research challenges, including issues concerning modelling, managing and applying business contexts to big data analytics. © 2020, Springer-Verlag London Ltd., part of Springer Nature.
Community-diversified influence maximization in social networks
- Authors: Li, Jianxin , Cai, Taotao , Deng, Ke , Wang, Xinjue , Sellis, Timos , Xia, Feng
- Date: 2020
- Type: Text , Journal article
- Relation: Information Systems Vol. 92, no. (2020), p.
- Full Text:
- Reviewed:
- Description: To meet the requirement of social influence analytics in various applications, the problem of influence maximization has been studied in recent years. The aim is to find a limited number of nodes (i.e., users) which can activate (i.e. influence) the maximum number of nodes in social networks. However, the community diversity of influenced users is largely ignored even though it has unique value in practice. For example, the higher community diversity reduces the risk of marketing campaigns as you should not put all your eggs in one basket; the diversity can also prolong the effect of a marketing campaign in the future promotion. Motivated by this observation, this paper investigates Community-diversified Influence Maximization (CDIM) problem to efficiently find k nodes such that, if a message is initiated and spread by the k nodes, the number as well as the community diversity of the activated nodes will be maximized at the end of propagation process. This work proposes a metric to measure the community-diversified influence and addresses a series of computational challenges. Two algorithms and an innovative CPSP-Tree index have been developed. This study also investigates the situation that community definition is not specified. The effectiveness and efficiency of the proposed solutions have been verified through extensive experimental studies on five real-world social network datasets. © 2020 Elsevier Ltd
Data-driven computational social science : A survey
- Authors: Zhang, Jun , Wang, Wei , Xia, Feng , Lin, Yu-Ru , Tong, Hanghang
- Date: 2020
- Type: Text , Journal article
- Relation: Big Data Research Vol. 21, no. (2020), p. 1-22
- Full Text:
- Reviewed:
- Description: Social science concerns issues on individuals, relationships, and the whole society. The complexity of research topics in social science makes it the amalgamation of multiple disciplines, such as economics, political science, and sociology, etc. For centuries, scientists have conducted many studies to understand the mechanisms of the society. However, due to the limitations of traditional research methods, there exist many critical social issues to be explored. To solve those issues, computational social science emerges due to the rapid advancements of computation technologies and the profound studies on social science. With the aids of the advanced research techniques, various kinds of data from diverse areas can be acquired nowadays, and they can help us look into social problems with a new eye. As a result, utilizing various data to reveal issues derived from computational social science area has attracted more and more attentions. In this paper, to the best of our knowledge, we present a survey on datadriven computational social science for the first time which primarily focuses on reviewing application domains involving human dynamics. The state-of-the-art research on human dynamics is reviewed from three aspects: individuals, relationships, and collectives. Specifically, the research methodologies used to address research challenges in aforementioned application domains are summarized. In addition, some important open challenges with respect to both emerging research topics and research methods are discussed.
Diarrhoeal disease surveillance in Papua New Guinea : findings and challenges
- Authors: Abdad, Mohammad , Soli, Kevin , Pham, Bang , Bande, Grace , Maure, Tobias , Jonduo, Marinjo , Kisa, Debbie , Rai, Glennis , Phuanukoonnon, Suparat , Siba, Peter , Horwood, Paul , Greenhill, Andrew
- Date: 2020
- Type: Text , Journal article
- Relation: Western Pacific Surveillance and Response Vol. 11, no. 1 (Jan-Mar 2020), p. 6
- Full Text:
- Reviewed:
- Description: Diarrhoeal diseases are among the leading causes of morbidity and mortality in the Western Pacific Region. However, data on the major causes of infectious diarrhoea are limited in many countries within the Region, including Papua New Guinea. In 2013-2014, we conducted surveillance for acute diarrhoeal illness in four provinces in Papua New Guinea. One rural health clinic from each province participated in the surveillance activity. Samples were sent to central laboratories and batch analysed for bacterial and viral gastrointestinal pathogens that are commonly associated with diarrhoea. Across the four sites, the most commonly detected pathogens were Shigella spp., Campylobacter spp. and rotavirus. In this paper, we report the results of the surveillance activity and the challenges that we faced. The lessons learnt may be applicable to other parts of the Region with a similar socioeconomic status.
Differences in personality and the sharing of managerial tacit knowledge: an empirical analysis of public sector managers in Malaysia
- Authors: Abdul Manaf, Halimah , Harvey, William , Armstrong, Steven , Lawton, Alan
- Date: 2020
- Type: Text , Journal article
- Relation: Journal of Knowledge Management Vol. 24, no. 5 (2020), p. 1177-1199
- Full Text:
- Reviewed:
- Description: Purpose: This study aims to identify differences in knowledge-sharing mechanisms and personality among expert, typical and novice managers within the Malaysian public sector. Strengthening knowledge sharing function is essential for enabling public institutions around the world to be more productive. Design/methodology/approach: This quantitative study involves 308 employees from management and professional groups within 98 local authorities in the Malaysian local government. Stratified random sampling techniques were used and the sampling frame comprised 1,000 staff using postal surveys. Data analyses were carried out using analysis of variance and correlations to test the research hypotheses. Findings: The findings reveal that expert managers are more proactive in sharing their knowledge, particularly those with the personality traits of conscientiousness and openness. These two personality traits were also related to expert behaviours such as thoroughness, responsibility and persistence, which led to work competency and managerial success. Originality/value: This study provides theoretical insights into how managerial tacit knowledge differs and can accumulate, depending on the personality traits of middle managers. The paper shows the different mechanisms of knowledge sharing, tacit knowledge and personality among expert, typical and novice managers. Practically, this study is important for guiding senior managers in their attempts to identify the most appropriate personalities of their middle managers. This study found that the expert group was higher in conscientiousness, openness and overall personality traits compared with the typical and novice groups. The paper also highlights the value of sharing managerial tacit knowledge effectively. © 2020, Emerald Publishing Limited.
High esteem and hurting others online : trait sadism moderates the relationship between self-esteem and internet trolling
- Authors: March, Evita , Steele, Genevieve
- Date: 2020
- Type: Text , Journal article
- Relation: Cyberpsychology, behavior and social networking Vol. 23, no. 7 (2020), p. 441-446
- Full Text:
- Reviewed:
- Description: Internet trolling is commonly defined as disruptive online behavior, intended to provoke and distress others for amusement. Previous research has shown that gender (specifically, male), trait psychopathy, and trait sadism significantly predict engaging in trolling. In this study, we sought to replicate and extend previous research by exploring the role of self-esteem in predicting trolling, and possible interactions between self-esteem and personality. Participants (n = 400, 67.5 percent women, average age = 24.97 years [SD = 8.84]) completed an online questionnaire, including measures of psychopathy, sadism, self-esteem, and trolling behaviors. Results corroborated previous research showing gender (male) to be a significant predictor of trolling, and trait psychopathy and sadism to be significant positive predictors. Although self-esteem had no additional value on top of trait psychopathy and sadism in explaining trolling, there was a significant interaction between self-esteem and trait sadism. A moderation analysis indicated a positive relationship between self-esteem and trolling, but only when trait sadism was high. These results portray the troll as a callous individual may enjoy causing psychological harm, particularly if their self-esteem is high. These results contribute to building the psychological profile of trolls and provide future directions for research exploring trolling behaviors.
Random walks : a review of algorithms and applications
- Authors: Xia, Feng , Liu, Jiaying , Nie, Hansong , Fu, Yonghao , Wan, Liangtian , Kong, Xiangjie
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE Transactions on Emerging Topics in Computational Intelligence Vol. 4, no. 2 (2020), p. 95-107
- Full Text:
- Reviewed:
- Description: A random walk is known as a random process which describes a path including a succession of random steps in the mathematical space. It has increasingly been popular in various disciplines such as mathematics and computer science. Furthermore, in quantum mechanics, quantum walks can be regarded as quantum analogues of classical random walks. Classical random walks and quantum walks can be used to calculate the proximity between nodes and extract the topology in the network. Various random walk related models can be applied in different fields, which is of great significance to downstream tasks such as link prediction, recommendation, computer vision, semi-supervised learning, and network embedding. In this article, we aim to provide a comprehensive review of classical random walks and quantum walks. We first review the knowledge of classical random walks and quantum walks, including basic concepts and some typical algorithms. We also compare the algorithms based on quantum walks and classical random walks from the perspective of time complexity. Then we introduce their applications in the field of computer science. Finally we discuss the open issues from the perspectives of efficiency, main-memory volume, and computing time of existing algorithms. This study aims to contribute to this growing area of research by exploring random walks and quantum walks together. © 2017 IEEE.
Rapid health data repository allocation using predictive machine learning
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2020
- Type: Text , Journal article
- Relation: Health Informatics Journal Vol. 26, no. 4 (2020), p. 3009-3036
- Full Text:
- Reviewed:
- Description: Health-related data is stored in a number of repositories that are managed and controlled by different entities. For instance, Electronic Health Records are usually administered by governments. Electronic Medical Records are typically controlled by health care providers, whereas Personal Health Records are managed directly by patients. Recently, Blockchain-based health record systems largely regulated by technology have emerged as another type of repository. Repositories for storing health data differ from one another based on cost, level of security and quality of performance. Not only has the type of repositories increased in recent years, but the quantum of health data to be stored has increased. For instance, the advent of wearable sensors that capture physiological signs has resulted in an exponential growth in digital health data. The increase in the types of repository and amount of data has driven a need for intelligent processes to select appropriate repositories as data is collected. However, the storage allocation decision is complex and nuanced. The challenges are exacerbated when health data are continuously streamed, as is the case with wearable sensors. Although patients are not always solely responsible for determining which repository should be used, they typically have some input into this decision. Patients can be expected to have idiosyncratic preferences regarding storage decisions depending on their unique contexts. In this paper, we propose a predictive model for the storage of health data that can meet patient needs and make storage decisions rapidly, in real-time, even with data streaming from wearable sensors. The model is built with a machine learning classifier that learns the mapping between characteristics of health data and features of storage repositories from a training set generated synthetically from correlations evident from small samples of experts. Results from the evaluation demonstrate the viability of the machine learning technique used. © The Author(s) 2020.
Social media markers to identify fathers at risk of postpartum depression : a machine learning approach
- Authors: Shatte, Adrian , Hutchinson, Delyse , Fuller-Tyszkiewicz, Matthew , Teague, Samantha
- Date: 2020
- Type: Text , Journal article
- Relation: Cyberpsychology, Behavior, and Social Networking Vol. 23, no. 9 (2020), p. 611-618
- Full Text:
- Reviewed:
- Description: Postpartum depression (PPD) is a significant mental health issue in mothers and fathers alike; yet at-risk fathers often come to the attention of health care professionals late due to low awareness of symptoms and reluctance to seek help. This study aimed to examine whether passive social media markers are effective for identifying fathers at risk of PPD. We collected 67,796 Reddit posts from 365 fathers, spanning a 6-month period around the birth of their child. A list of "at-risk"words was developed in collaboration with a perinatal mental health expert. PPD was assessed by evaluating the change in fathers' use of words indicating depressive symptomatology after childbirth. Predictive models were developed as a series of support vector machine classifiers using behavior, emotion, linguistic style, and discussion topics as features. The performance of these classifiers indicates that fathers at risk of PPD can be predicted from their prepartum data alone. Overall, the best performing model used discussion topic features only with a recall score of 0.82. These findings could assist in the development of support and intervention tools for fathers during the prepartum period, with specific applicability to personalized and preventative support tools for at-risk fathers. © Copyright 2020, Mary Ann Liebert, Inc., publishers 2020.