Filters








13,398 Hits in 5.4 sec

Overlapping issues and solutions in data visualization techniques

Nur Diana Izzati Husin, Nur Atiqah Sia Abdullah
2019 Indonesian Journal of Electrical Engineering and Computer Science  
This paper suggests the color-based approach, relocation, and reduction of data sets to solve the overlapping issues.</span>  ...  With these massive and complex data, it is getting harder for the data analyst to interpret or read the data in order to gain new knowledge or information.  ...  ACKNOWLEDGEMENTS The authors gratefully acknowledge Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA in supporting this paper.  ... 
doi:10.11591/ijeecs.v16.i3.pp1600-1608 fatcat:rex6kll2p5bknbckkydn6t24cq

SPRINT-SELF: Social-Based Routing and Selfish Node Detection in Opportunistic Networks

Radu Ioan Ciobanu, Ciprian Dobre, Valentin Cristea, Florin Pop, Fatos Xhafa
2015 Mobile Information Systems  
We show that our algorithm outperforms existing solutions such as BUBBLE Rap and Epidemic in terms of delivery cost and hit rate, as well as the rate of congestion introduced in the network, by testing  ...  We propose using the social network information of a node when performing routing, since a node is more likely to encounter members of its own social community than other nodes.  ...  Acknowledgments This work was partially supported by the project "ERRIC, Empowering Romanian Research on Intelligent Information  ... 
doi:10.1155/2015/596204 fatcat:cl3mxlg2a5abznjqexe7xzxajm

Attack Pattern Discovery in Forensic Investigation of Network Attacks

Ying Zhu
2011 IEEE Journal on Selected Areas in Communications  
We mine the logs of recent network traffic data to find these contexts of attacks -we call them attack patterns.  ...  mechanism, the degrees of belief that the bubbles are attack instances are propagated to the next iteration in order to refine the search for bubbles related to the ones already found.  ...  They have also made efforts to analyze the honeypot data to mine for useful information.  ... 
doi:10.1109/jsac.2011.110802 fatcat:qx65jamx4jdfbgzlqxpcy7oyla

An EMD-Based Algorithm for Emboli Detection in Echo Doppler Audio Signals

Paola Pierleoni, Lorenzo Palma, Alberto Belli, Massimo Pieri, Lorenzo Maurizi, Marco Pellegrini, Alessandro Marroni
2019 Electronics  
The proposed algorithm has been tested according to an experimental protocol approved by the Divers Alert Network.  ...  The results obtained by the proposed emboli detection algorithm (83% sensitivity and 76% specificity) make the system particularly suitable for real-time evaluation of the decompression sickness risk level  ...  The term "adaptive" refers to the fact that SURE threshold is data-driven. A block diagram representing the algorithm for automatic detection of gas bubbles is shown in Figure 2 .  ... 
doi:10.3390/electronics8080824 fatcat:rxjobvzwivdqtg75zulmsfcj6a

Analysis of Corrosion Process Development on Metals by Means of Computer Vision

Marat Enikeev, Irek , Gubaydullin, Marina Maleeva
2017 Engineering Journal  
A step-by-step algorithm is given for processing of the data from a chemical corrosion experiment on a metal surface: image preprocessing, image binarization and identification of object contours, and  ...  Furthermore, the mechanism of fractal analysis for corrosion cracking specimens was studied and fractal dimension was selected as characteristics of corrosion damage.  ...  Identification of bubbles was successful, except for boundary regions for the bubbles that did not completely fit in the image. This resulted from a fault in the circle drawing algorithm.  ... 
doi:10.4186/ej.2017.21.4.183 fatcat:7npt6rfynrcmraosam57pmxw2m

Bursting the Filter Bubble: Fairness-Aware Network Link Prediction

Farzan Masrour, Tyler Wilson, Heng Yan, Pang-Ning Tan, Abdol Esfahanian
2020 PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE  
methods for i.i.d data.  ...  However, due to the homophily principle, current algorithms are susceptible to promoting links that may lead to increase segregation of the network—an effect known as filter bubble.  ...  We refer to this post processing algorithm as (PEO). Sampling process and training A big challenge for link prediction algorithms is the sparsity of real world network data.  ... 
doi:10.1609/aaai.v34i01.5429 fatcat:zm5apbexozgnhcso53yu3kckhm

Travel Bubbles in Air Transportation: Myth or Reality?

Xiaoqian Sun, Sebastian Wandelt, Anming Zhang
2022 Aerospace (Basel)  
This study aims to answer the question of whether travel bubbles are indeed observable in flight data for the year 2020.  ...  To the best of our knowledge, this study is the first to try to address the identification of COVID-19 travel bubbles in real data.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/aerospace9010038 fatcat:4rawgtpuafh5bh7tnyy25mglqy

Knowledge Discovery for Classification of Three-Phase Vertical Flow Patterns of Heavy Oil from Pressure Drop and Flow Rate Data

Adriane B. S. Serapião, Antonio C. Bannwart
2013 Journal of Petroleum Engineering  
We investigate the use of data mining algorithms with rule and tree methods for classifying real data generated by a laboratory scale apparatus.  ...  This paper focuses on the use of artificial intelligence (AI) techniques to identify flow patterns acquired and recorded from experimental data of vertical upward three-phase pipe flow of heavy oil, air  ...  We intend to encourage researchers of the Petroleum Engineering area to use data mining to analyze real data in different domains as well.  ... 
doi:10.1155/2013/746315 fatcat:rblralnbmfbk7ijrnzgvphjdam

News Recommendation and Filter Bubble

Jianan Yao, Alexander G. Hauptmann
2018 International Conference on Information and Knowledge Management  
In this ongoing work report we exploit the power of the crowd and formulate the reviewer selection problem, which aim to find reliable reviews for a possible rumor.  ...  We conduct experiments on a Twitter dataset about rumors, which validates the effectiveness and efficiency of our algorithm.  ...  To visualize the 100-D data we apply Principal Component Analysis (PCA) for dimensionality reduction.  ... 
dblp:conf/cikm/YaoH18 fatcat:ystx27rdjvdstp2n4vueg4u5a4

Reaching the bubble may not be enough: news media role in online political polarization

Jordan K. Kobellarz, Miloš Broćić, Alexandre R. Graeml, Daniel Silver, Thiago H. Silva
2022 EPJ Data Science  
for the proposed study.  ...  After that, we analyzed how users engage with news content shared by bubble reachers, its source, and its topics, considering its political orientation.  ...  Acknowledgements The authors would like to thank Michelle Reddy for the ongoing discussions on the thematic of this study.  ... 
doi:10.1140/epjds/s13688-022-00357-3 fatcat:ex4f5w6rdza5dax7cd7rgq27o4

Ionospheric plasma bubble zonal drift derived from TEC measurements

R.P. Silva, J.R. Souza, J.H.A. Sobral, C.M. Denardini, G.L. Borba, M.A.F. Santos
2019 Radio Science  
In this sense, a methodology of pattern recognition was developed and implemented here using the Long-Term Ionospheric Anomaly Monitoring in order to infer the plasma bubbles zonal drift velocities, using  ...  two receiving stations of global navigation satellite systems data from the Brazilian Continuous Monitoring Network, located near to each other, in Salvador (BA) during geomagnetically quiet periods.  ...  Thus, the top left panel refers to the set of all velocities obtained in this study for the months of September, the top right Figure 5 . 5 Equatorial plasma bubble zonal drift velocities calculated  ... 
doi:10.1029/2018rs006727 fatcat:zllowu6bubhg5htvrhp3qkesga

Gas–Liquid Two-Phase Flow Pattern Identification of a Centrifugal Pump Based on SMOTE and Artificial Neural Network

Denghui He, Ruilin Li, Zhenduo Zhang, Shuaihui Sun, Pengcheng Guo
2021 Micromachines  
The identification rate of the model increased from 89.91% to 94.88% when the original data was oversampled by the SMOTE algorithm.  ...  It is demonstrated that the SMOTE algorithm is an effective method to improve the accuracy of the artificial neural network model.  ...  Acknowledgments: The authors would like to thank Fang Wang for her kindly help in the design of the test pump. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/mi13010002 pmid:35056168 pmcid:PMC8778694 fatcat:mcd4ehyox5cyjh3pkubkfeq5cm

Opportunistic message routing using multi-layer social networks

Annalisa Socievole, Eiko Yoneki, Floriano De Rango, Jon Crowcroft
2013 Proceedings of the 2nd ACM workshop on High performance mobile opportunistic systems - HP-MOSys '13  
To select an e↵ective forwarding node, ML-SOR measures the forwarding capability of a node when compared to an encountered node in terms of node centrality, tie strength and link prediction.  ...  In opportunistic networks, the nodes usually exploit a contact opportunity to perform hop-by-hop routing, since an end-to-end path between the source node and destination node may not exist.  ...  Performance metrics We analyze the following commonly used metrics to evaluate these algorithms: delivery ratio (the ratio of the number of delivered packets to the number of all packets), overhead cost  ... 
doi:10.1145/2507908.2507923 dblp:conf/mswim/SocievoleYRC13 fatcat:ven5m74d55akrj6di7vk4anvxi

Opportunistic Forwarding with Partial Centrality [article]

Peiyan Yuan and Huadong Ma and Xiang-Yang Li and Shaojie Tang and Xufei Mao
2017 arXiv   pre-print
In opportunistic networks, the use of social metrics (e.g., degree, closeness and betweenness centrality) of human mobility network, has recently been shown to be an effective solution to improve the performance  ...  of opportunistic forwarding algorithms.  ...  DATA-SETS AND EXPERIMENTAL RESULTS We first analyze the overlapped community structures underlying the data-sets we used, and then compare the performance of OFPC with two state-of-the-art works: Bubble  ... 
arXiv:1208.0186v2 fatcat:jpnuudkh3febdce4r5dbiqn6ma

PRO: A Profile-Based Routing Protocol for Pocket Switched Networks

Murat Ali Bayir, Murat Demirbas
2010 2010 IEEE Global Telecommunications Conference GLOBECOM 2010  
We validate the performance of PRO with the "Reality Mining" dataset containing 350K hours of celltower connectivity and Bluetooth connection data, and compare its performance with that of previous approaches  ...  Differing from previous routing protocols, PRO treats node encounters as periodic patterns and uses them to predict the times of future encounters.  ...  Experiments for analyzing quota spending strategies Fig. 4 .Fig. 5 . 45 Experiments Analyzing forward quota in terms of success • In the first combination (2-Nobs), we require PRO to use the entire forwarding  ... 
doi:10.1109/glocom.2010.5684013 dblp:conf/globecom/BayirD10 fatcat:fptmsf3rvzbftnmjj367ii3wja
« Previous Showing results 1 — 15 out of 13,398 results