Filters








372,959 Hits in 4.5 sec

Rule-Based Modelling and Model Perturbation [chapter]

Vincent Danos, Jérôme Feret, Walter Fontana, Russ Harmer, Jean Krivine
2009 Lecture Notes in Computer Science  
We present here a syntactic extension of Kappa, an established rule-based modelling platform, that enables the expression of a structured space of agents and rules that simultaneously allows us to comfortably  ...  This also enables a mode of model construction where, starting from our current consensus model, we attempt to reproduce in numero the mutational and more generally perturbational analyses that were used  ...  However, in recent years, a new modelling approach has arisen that helps tame this combinatorial explosion, namely agent-or rule-based modelling [5] .  ... 
doi:10.1007/978-3-642-04186-0_6 fatcat:wyma4mv4nrfvvgcpv5gsgy2jne

Learning Post-Hoc Causal Explanations for Recommendation [article]

Shuyuan Xu, Yunqi Li, Shuchang Liu, Zuohui Fu, Xu Chen, Yongfeng Zhang
2021 arXiv   pre-print
Our approach firstly achieves counterfactual examples with the aid of a perturbation model, and then extracts personalized causal relationships for the recommendation model through a causal rule mining  ...  Meanwhile, We evaluate the discovered causal explanations in terms of quality and fidelity, which show that compared with conventional association rules, causal rules can provide personalized and more  ...  Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect those of the sponsors.  ... 
arXiv:2006.16977v2 fatcat:2ngtmfbgzvat7cgvsitm5r25hu

Model Robustness with Text Classification: Semantic-preserving adversarial attacks [article]

Rahul Singh, Tarun Joshi, Vijayan N. Nair, Agus Sudjianto
2020 arXiv   pre-print
The attacks cause significant number of flips in white-box setting and same rule based can be used in black-box setting.  ...  We propose algorithms to create adversarial attacks to assess model robustness in text classification problems.  ...  The rule-based approach presented also shows a sequence of steps to maintain the quality of perturbations, which can be easily be adapted to any perturbation scheme and used to maintain the semantics of  ... 
arXiv:2008.05536v2 fatcat:em6sgq22xjfwxc6sh6zajz4vva

Universal Rules for Fooling Deep Neural Networks based Text Classification [article]

Di Li, Danilo Vasconcellos Vargas, Sakurai Kouichi
2019 arXiv   pre-print
In other words, the universal rules are sample and method agnostic.  ...  Hopefully, the results from this work will impact the development of yet more sample and model agnostic attacks as well as their defenses, culminating in perhaps a new age for artificial intelligence.  ...  The aim of the method is to find universal rules efficiently based on the combination of useful and accurate small perturbations rules.  ... 
arXiv:1901.07132v2 fatcat:nsdxdivblvcftasb5rd2lsx65a

Measurably Stronger Explanation Reliability via Model Canonization [article]

Franz Motzkus, Leander Weber, Sebastian Lapuschkin
2022 arXiv   pre-print
In this work, we quantitatively verify the beneficial effects of network canonization to rule-based attributions on VGG-16 and ResNet18 models with BatchNorm layers and thus extend the current best practices  ...  This procedure leverages the implementation-dependency of rule-based attributions and restructures a model into a functionally identical equivalent of alternative design to which established attribution  ...  rule-based approaches.  ... 
arXiv:2202.06621v1 fatcat:cfy7eicxjjg2rhgwrzodoavkvi

Controlling Neural Networks with Rule Representations [article]

Sungyong Seo, Sercan O. Arik, Jinsung Yoon, Xiang Zhang, Kihyuk Sohn, Tomas Pfister
2021 arXiv   pre-print
DeepCTRL is agnostic to data type and model architecture. It can be applied to any kind of rule defined for inputs and outputs.  ...  Deep Neural Networks with Controllable Rule Representations (DeepCTRL) incorporates a rule encoder into the model coupled with a rule-based objective, enabling a shared representation for decision making  ...  We propose a novel perturbation-based rule encoding method to integrate arbitrary rules into meaningful representations. Overall, DEEPCTRL is model architecture, data type and rule type agnostic.  ... 
arXiv:2106.07804v2 fatcat:huhu7hrjdndjtaq4z3o7uakype

Modelling and Design of Five Parameter Single Diode Photovoltaic Model with Artificial Intelligent MPPT Power System

2019 International journal of recent technology and engineering  
Further, in this paper added with improved Perturb and Observe (P&O) based FLC control approach utilized to extract the highest energy from solar panel.  ...  The percentage relative error and highest power is computed and compared with previous models in the survey for dissimilar photovoltaic modules.  ...  The fuzzy rules impersonate the conduct of improved perturb and observe technique. The fuzzification of the perturbation and observation technique with the rules is revealed in Fig.3 .  ... 
doi:10.35940/ijrte.b1014.0882s819 fatcat:e74mvrp3mbg2ni4yqhxktepebi

Building Models for Biopathway Dynamics Using Intrinsic Dimensionality Analysis [article]

Emilia M. Wysocka, Valery Dzutsati, Tirthankar Bandyopadhyay, Laura Condon, Sahil Garg
2018 arXiv   pre-print
Particularly, the dataset relates to the yeast pheromone pathway and is studied in-silico with a stochastic model. The model reconstructs signal propagation stimulated by a mating pheromone.  ...  In the paper, we elaborate on the reason of multidimensional analysis problem in the context of molecular signaling, and next, we introduce the model of choice, simulation details and obtained time series  ...  Rule-based modelling The subject of signalling pathways and networks has already been addressed by many modelling formalisms.  ... 
arXiv:1804.11005v3 fatcat:qj5b4xfk3rgtxmaw6qal6xqovm

Securing Informative Fuzzy Association Rules using Bayesian Network

Muhammad Fahad, Khalid Iqbal, Somaiya Khatoon, Khalid Mahmood
2019 International Journal of Advanced Computer Science and Applications  
In our model, sensitive fuzzy association rules are secured by identifying sensitive fuzzy item to perturb fuzzified dataset.  ...  The resulting transformed FARs are analyzed to conclude/calculate the accuracy level of our model in context of newly generated fuzzy association rules, hidden rules and lost rules.  ...  A Bayesian network-based model has been used as well in privacy preservation [23] .  ... 
doi:10.14569/ijacsa.2019.0101068 fatcat:dfe6wecbnjcglgrxl7r2lomiei

Experimental goal regression: A method for learning problem-solving heuristics

Bruce W. Porter, Dennis F. Kibler
1986 Machine Learning  
The ideas are formalized in an algorithm for learning and problem solving and demonstrated with examples from the domains of simultaneous linear equations and symbolic integration.  ...  This research examines the process of learning problem solving with minimal requirements for a priori knowledge and teacher involvement.  ...  In particular, PET uses relational models in two ways: to detect and recover from over-generalization of heuristic rules and to guide the selection of perturbation operators.  ... 
doi:10.1007/bf00116893 fatcat:u5niprweh5dvrllyus6qghic5i

Third Party Privacy Preserving Protocol for Perturbation Based Classification of Vertically Fragmented Data Bases [article]

B.Hanmanthu, B.Raghu Ram, P.Niranjan
2013 arXiv   pre-print
In case of trusted third party models the conventional asymmetric cryptographic based techniques will be used and in case of multi party based protocols data perturbed to make sure no other party to understand  ...  In order to enhance security features by combining strengths of both models in this paper, we propose to use data perturbed techniques in third party privacy preserving protocol to conduct the classification  ...  This proposed privacy preserving association rules based classification model on vertically portioned databases shown accuracy of 77.2% on test data bases of UCI PIMA dataset and 81.7 on test data base  ... 
arXiv:1304.6575v1 fatcat:wlxxpa4zmffyhajfp24cjcpxgq

Algorithmic Information Dynamics of Cellular Automata [article]

Hector Zenil, Alyssa Adams
2022 arXiv   pre-print
two different contexts (1) perturbation analysis and (2) dynamic-state colliding CA.  ...  We demonstrate the sensitivity of the Block Decomposition Method on 1D and 2D CA, including Conway's Game of Life, against measures of statistical nature such as compression (LZW) and Shannon Entropy in  ...  Figures 4 show the resulting change in BDM over various ECA rules and perturbation locations.  ... 
arXiv:2112.13177v2 fatcat:vw43d7rfnrcoja5rzzzqh5abga

Robustifying Learnability

Robert Tetlow, Board of Governors of the Federal Reserve System, P. Von zur Muehlen
2005 Finance and Economics Discussion Series  
The issue is then whether a central bank can design policy to account for perturbations and still assure the learnability of the model.  ...  Some contributions to the literature, including Bullard and Mitra (2001) and Evans and Honkapohja (2002) , have made significant headway in establishing certain features of monetary policy rules that facilitate  ...  Figure 5 : Contours of radii for the NKB model, forecast-based rule, selected φ r Figure 6 : Contours of radii for the NKB model, forecast-based rule, selected φ r bations, captured in W 1 , and our selection  ... 
doi:10.17016/feds.2005.58 fatcat:dndzg7w4xrgkll3sluf7xoahva

CAN MARKOV CHAIN MODELS MIMIC BIOLOGICAL REGULATION?

SEUNGCHAN KIM, HUAI LI, EDWARD R. DOUGHERTY, NANWEI CAO, YIDONG CHEN, MICHAEL BITTNER, EDWARD B. SUH
2002 Journal of biological systems  
This study tests this possibility by: (i) constructing a finite state homogeneous Markov chain model using a small set of interesting genes; (ii) estimating the model parameters based on the observed experimental  ...  Studies of the ability to predict a gene's state based on the states of other genes suggest that it may be possible to abstract sufficient information to build models of the system that retain steady-state  ...  Shmulevich for his insightful suggestions on the areas of probabilistic Boolean network and Markov chain simulation.  ... 
doi:10.1142/s0218339002000676 fatcat:y7hdpgqfubap7cysm3pegg2am4

Robustness of STDP-induced memory to perturbations of presynaptic activity: a simulation study

Youwei Zheng, Lars Schwabe
2011 BMC Neuroscience  
We simulate a conductance-based one-compartment spiking model neuron with ("additive" and "multiplicative") STDP learning rules for the excitatory (but not the inhibitory) synapses.  ...  If a neuron does not remain silent, both magnitude and duration of the perturbation determine the scale of memory destruction, which was generally more severe for the multiplicative rule.  ...  We simulate a conductance-based one-compartment spiking model neuron with ("additive" and "multiplicative") STDP learning rules for the excitatory (but not the inhibitory) synapses.  ... 
doi:10.1186/1471-2202-12-s1-p290 pmcid:PMC3240401 fatcat:evejzx7p5zelppgvgmrmnhqv6y
« Previous Showing results 1 — 15 out of 372,959 results