The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Building ancestral recombination graphs (ARGs) with the minimum number of recombination events is an essential problem in genomic population studies. Exhaustive search methods have been proposed to solve the problem with few sequences and markers. Recently, we introduced ARG4WG algorithm [1] to build plausible ARGs for whole genomes of thousand samples. However, the ARG4WG algorithm was not designed...
With the rapid development of hospital information technologies, more and more hospitals build electronic medical record (EMR) systems, which provides a comprehensive source for medical data mining and analysis. Most current EMR systems adopt a mixed structure. On the other hand, most data mining algorithms are designed for highly structured data. In this paper, we study the problem of interesting...
Software change histories are results of incremental updates made by developers. As a side-effect of the software development process, version history is a surprisingly useful source of information for understanding, maintaining and reusing software. However, traditional commit-based sequential organization of version histories lacks semantic structure and thus are insufficient for many development...
In the year 2009, a new virtual currency called Bitcoin was introduced to the world. Bitcoin generation and transactions are based on hashes and asymmetric encryption algorithms. Bitcoin is the first attempt at creating a decentralized virtual currency with no central bank or financial entity controlling it and is very attractive to different demographies of users. A lot of misunderstanding and doubt...
We consider the design of computationally efficient online learning algorithms in an adversarial setting in which the learner has access to an offline optimization oracle. We present an algorithm called Generalized Followthe- Perturbed-Leader and provide conditions under which it is oracle-efficient while achieving vanishing regret. Our results make significant progress on an open problem raised by...
Online social networks offer a rich data source for analyzing diffusion processes including rumor and viral spreading in communities. While many models exist, a unified model which enables analytical computation of complex, nonlinear phenomena while considering multiple factors was only recently proposed. We design an optimized implementation of the unified model of influence for vertex centric graph...
Uthman Ibn Affan is one of the Companion of the Prophet (Muhammad SAW) that have many services for Islam in his lifetime. Even though the society is less known about the Uthman Ibn Affan history. This is because too little information facility about the history. Especially, now the tendency of society is more like something that satisfying and interactive, for example is game. So in this paper, we...
Geometric constraint solving is a hot topic in the constraint design research field. Particle swarm optimization (PSO) is a method to solve the optimization problem from the biological population's behavior characteristics. PSO is easy to diverge and fall into the local optimum. There are various kinds of improvements. In addition to improving some performance, the corresponding cost is paid. In this...
Low-level design parameters such as router micro-architecture (RMA), flow controls (resource allocation), routing techniques and traffic patterns have a major significance on cost and performance of Network on Chip (NOC) design. This work proposes an efficient virtual channel (VC) buffer management structure and a dynamic VC allocation mechanism for the router to minimize latency, and area (buffer...
The purpose of using Predictive Modeling for presumptive diagnosis of Type 2 Diabetes Mellitus based on symptomatic analysis is the optimization of the diagnosis phase of the disease through the process of evaluating symptomatic characteristics and daily habits, allowing the forecasting of T2DM without the need of medical exams through predictive analysis. The tool used was SAP Predictive Analytics...
Automatic discovery of newsworthy themes from sequenced data can relieve journalists from manually poring over a large amount of data in order to find interesting news. In this paper, we propose a novel $k$<alternatives><inline-graphic xlink:href="fan-ieq1-2685587.gif"/> </alternatives>-Sketch query that aims to find $k$<alternatives><inline-graphic xlink:href="fan-ieq2-2685587.gif"/></alternatives> ...
Spatial range queries are used on a daily basis in real-life applications, such as Google Maps and Yelp. Many of those applications may need to rank the spatial objects, enclosed by the spatial range, before presenting the result to the end-user. Existing systems rank spatial objects according to different rules, such as average user rating, distance to the user's location, etc… The popularity of...
Hiring is one of the important challenges in the context of online labor marketplace. Unlike traditional hiring, where workers are hired either as a full time employee or as a contractor, hiring from online marketplaces are done for individual jobs of short duration. As these marketplaces are open for anyone, hiring becomes challenging due to the large number of freelancers applying for a posted job...
In collaborative editing environments, operations issued by a group of users may be duplicate and undesired. A selective undo mechanism allows collaborative users to undo any of mis-issued operations at any time and has become an indispensable facility for collaborative editing. However, supporting selective undo is a technical challenge. The traditional selective undo approach explicitly modifies...
A momentous social event prediction attempt is presented in this work. Addition-subtraction frequency (ASF) algorithm with three inputs is investigated and employed to predict a possible date of the event. The important date data which this paper uses are the dates of United States' president death in office (USPDIO) in the past. In order to find a consistent prediction result, three forms of USPDIO...
We propose a technique based on symbolic execution for analyzing the algorithmic complexity of programs. The technique uses an efficient guided analysis to compute bounds on the worst-case complexity (for increasing input sizes) and to generate test values that trigger the worst-case behaviors. The resulting bounds are fitted to a function to obtain a prediction of the worst-case program behavior...
Past research has proposed association rule mining as a means to uncover the evolutionary coupling from a system’s change history. These couplings have various applications, such as improving system decomposition and recommending related changes during development. The strength of the coupling can be characterized using a variety of interestingness measures. Existing recommendation engines typically...
We consider a restless multi-armed bandit (RMAB) in which each arm can be in one of two states, say 0 or 1. Playing the arm brings it to state 0 with probability one and not playing it induces state transitions with arm-dependent probabilities. Playing an arm generates a unit reward with a probability that depends on the state of the arm. The belief about the state of the arm can be calculated using...
This paper is an enhanced application based on history of records. It has been developed for privacy aware cross cloud service composition for processing big data applications. It can be effectively promotes cross cloud service composition in the situation where a cloud refuses to disclose all details of its service transaction records for business privacy issues in cross-cloud scenario. Our composition...
This paper is an output of data science study on a real life problem. The paper starts with the problem definition and a brief introduction to the mobile advertisement for addressing the machine learning problems. Later on, some machine learning solutions are provided for each of the problems, furthermore the success of classical solution methods in the literature is also compared for the real life...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.