Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








387 Hits in 5.2 sec

Evolutionary Divide-and-Conquer Algorithm for Virus Spreading Control Over Networks

Tian-Fang Zhao, Wei-Neng Chen, Sam Kwong, Tian-Long Gu, Hua-Qiang Yuan, Jie Zhang, Jun Zhang
2020 IEEE Transactions on Cybernetics  
To meet the challenges of increasing network scales and improve the solving efficiency, an evolutionary divide-and-conquer algorithm is proposed, namely, a coevolutionary algorithm with network-community-based  ...  The control of virus spreading over complex networks with a limited budget has attracted much attention but remains challenging.  ...  General Framework From a systematic perspective, NCD-CEA is an evolutionary divide-and-conquer control policy for virus control.  ... 
doi:10.1109/tcyb.2020.2975530 pmid:32175884 fatcat:77lvf2ffavh3fawagnpklb3lnm

Table of contents

2021 IEEE Transactions on Cybernetics  
Hu, and G. G. Yen 3738 Evolutionary Divide-and-Conquer Algorithm for Virus Spreading Control Over Networks . .  ...  Pizzi 3653 Genetic-Algorithm-Assisted Sliding-Mode Control for Networked State-Saturated Systems Over Hidden Markov Fading Channels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ... 
doi:10.1109/tcyb.2021.3088710 fatcat:2bynj6f2rffo7hh2j6a6mkjnti

Evolutionary Computation in Social Propagation over Complex Networks: A Survey

Tian-Fang Zhao, Wei-Neng Chen, Xin-Xin Ma, Xiao-Kun Wu
2021 International Journal of Automation and Computing  
AbstractSocial propagation denotes the spread phenomena directly correlated to the human world and society, which includes but is not limited to the diffusion of human epidemics, human-made malicious viruses  ...  Simulation and optimization are two major themes in social propagation, where network-based simulation helps to analyze and understand the social contagion, and problem-oriented optimization is devoted  ...  With the quick development of computer networks, a wide variety of viruses have been produced, spread, and updated, including but not limited to macro viruses, script viruses, network worms, Trojan viruses  ... 
doi:10.1007/s11633-021-1302-3 fatcat:ga73oavapnfuxpnnb5azji4kze

An Event-Centric Prediction System for COVID-19

Xiaoyi Fu, Xu Jiang, Yunfei Qi, Meng Xu, Yuhang Song, Jie Zhang, Xindong Wu
2020 2020 IEEE International Conference on Knowledge Graph (ICKG)  
In this paper, a system for predicting the spread of COVID-19 based on detecting and tracking events evolution in social media is proposed.  ...  One of them was to predict the trend of the epidemic to provide a basis for the decision making of both the public and private sectors.  ...  Li Z et al [42] proposed a scaled graph neural network (SGNN), which is feasible to large-scale graphs and borrow the idea of divide and conquer in the training process that instead of computing the  ... 
doi:10.1109/icbk50248.2020.00037 fatcat:4dmvdrgvdzeuvezmuaw4h2ygu4

Evolutionary Multi-Armed Bandits with Genetic Thompson Sampling [article]

Baihan Lin
2022 arXiv   pre-print
Empirical results in multi-armed bandit simulation environments and a practical epidemic control problem suggest that by incorporating the genetic algorithm into the bandit algorithm, our method significantly  ...  As two popular schools of machine learning, online learning and evolutionary computations have become two important driving forces behind real-world decision making engines for applications in biomedicine  ...  If you close all the traffic, you may stop the spread of the virus, but the economy might crash and people might lose jobs.  ... 
arXiv:2205.10113v1 fatcat:qgft5wbebnhkho463xwv3msl4y

2021 Index IEEE Transactions on Cybernetics Vol. 51

2021 IEEE Transactions on Cybernetics  
Departments and other items may also be covered if they have been judged to have archival value. The Author Index contains the primary entry for each item, listed under the first author's name.  ...  The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination.  ...  ., +, TCYB Aug. 2021 4312-4326 Computer viruses Evolutionary Divide-and-Conquer Algorithm for Virus Spreading Control Over Networks.  ... 
doi:10.1109/tcyb.2021.3139447 fatcat:myjx3olwvfcfpgnwvbuujwzyoi

Revisiting Evolutionary Fuzzy Systems: Taxonomy, applications, new trends and challenges

Alberto Fernández, Victoria López, María José del Jesus, Francisco Herrera
2015 Knowledge-Based Systems  
Evolutionary Fuzzy Systems are a successful hybridization between fuzzy systems and Evolutionary Algorithms.  ...  new approaches for the evolutionary components.  ...  We must we aware that this problem becomes accentuated for those classification algorithms which are based on a divide-and-conquer approach [156] , leading to data fragmentation.  ... 
doi:10.1016/j.knosys.2015.01.013 fatcat:oghazlp2gbhibbenxsf6gm6fzq

A Review on Bio-inspired Optimization Method for Supervised Feature Selection

Montha Petwan, Ku Ruhana Ku-Mahamud
2022 International Journal of Advanced Computer Science and Applications  
The taxonomy of bio-inspired algorithms is presented, along with its performances and limitations, followed by the techniques used in supervised feature selection in term of data perspectives and applications  ...  In addition, a discussion of some open issues is presented for further research.  ...  ACKNOWLEDGMENT The authors would like to thank the Ministry of Higher Education Malaysia for funding this study under the Transdisciplinary Research Grant Scheme, TRGS/1/2018/UUM/02/3/3 (S/O code 14163  ... 
doi:10.14569/ijacsa.2022.0130516 fatcat:hjgishtf6ngk7iyainejme462a

A NEURAL NETWORK CLASSIFIER FOR PAYLOADBASED ONLINE WORMS DETECTION

2021 Webology  
The detection rate of Internet worms for which no data was utilised in the model building process was 97.90%, demonstrating the effectiveness of our method.  ...  Worms disseminate themselves throughout the Internet and represent a significant risk to data integrity. Signature-based anti-worm methods are ineffective against zero-day exploits.  ...  the use of the efficient Divide-and-conquer-scanning worm.  ... 
doi:10.29121/web/v18i5/59 fatcat:p6puzzuzg5frrn6osm5wfykis4

Computational Challenges from the Tree of Life

Bernard M. E. Moret
2005 Workshop on Algorithm Engineering and Experimentation  
Computational phylogenetics has been a rich area for algorithm design over the last 15 years.  ...  Thus, while data collection and cataloguing is one of the major tasks, algorithm design and engineering is a crucial enabling component of the project.  ...  Arizona), and by the IBM Corporation under a contract from the Defense Advanced Research Projects Agency (the PERCS project).  ... 
dblp:conf/alenex/Moret05 fatcat:6uonniub3zdvbprayp3tnf3wqq

Hybrid harmony search algorithm for social network contact tracing of COVID-19

Ala'a Al-Shaikh, Basel A. Mahafzah, Mohammad Alshraideh
2021 Soft Computing - A Fusion of Foundations, Methodologies and Applications  
The HHS-CT algorithm is compared to other existing algorithms of finding SCCs in directed graphs, where it showed its superiority over these algorithms.  ...  By the end of 2020, effective vaccines that could prevent the fast spread of the disease started to loom on the horizon.  ...  Acknowledgements The authors would like to express their deep gratitude to the anonymous referees for their valuable comments and suggestions, which improved this research work.  ... 
doi:10.1007/s00500-021-05948-2 pmid:34220301 pmcid:PMC8237257 fatcat:rbfgw7mdkrdnno5ykktnmlu4ee

Performance Analysis of Classification Algorithms on Medical Diagnoses-a Survey

S. Vanaja, K. Rameshkumar
2015 Journal of Computer Science  
This research paper also discusses the new features of C5.0 classification algorithm over C4.5 and performance of classification algorithm on high dimensional datasets.  ...  The classification algorithms with maximum accuracies on various kinds of medical datasets are taken for performance analysis.  ...  Ethics This article is original and contains unpublished material. The corresponding author confirms that all of the other authors have read and approved the manuscript and no ethical issues involved.  ... 
doi:10.3844/jcssp.2015.30.52 fatcat:r4pqqvy4pfhm5fwuh7zm2mjfme

A systematic bioinformatics approach for large-scale identification and characterization of host-pathogen shared sequences

Stephen Among James, Hui San Ong, Ranjeev Hari, Asif M. Khan
2021 BMC Genomics  
The interaction between pathogens and humans over the evolutionary history has resulted in sharing of sequences, with important biological and evolutionary implications.  ...  Humans are host to numerous pathogenic diseases, such as that by viruses, many of which are responsible for high mortality and morbidity.  ...  Muhammad Farhan Sjaugi and Mr. Poh Yang Ming for their suggestions and help with the development of the inhouse computational tools used.  ... 
doi:10.1186/s12864-021-07657-4 pmid:34583643 fatcat:cs6huyrlgrdipakmbdaurupb7e

Cro-Magnons Conquered Europe, but Left Neanderthals Alone

2004 PLoS Biology  
Though species come and go over evolutionary time, mass extinctions are relatively rare.  ...  Expression of ActA allows the microbes to hijack the machinery in the host cell that controls the growth of actin networks.  ...  its corresponding energetic contributions; and changing the decoy but controlling for its energetic consequence (by supplemental feeding).  ... 
doi:10.1371/journal.pbio.0020449 fatcat:zdfgiexsr5hotgjtxxds4ece7m

Protein-protein interactions: analysis and prediction [chapter]

D. Frishman, M. Albrecht, H. Blankenburg, P. Bork, E. D. Harrington, H. Hermjakob, L. Juhl Jensen, D. A. Juan, T. Lengauer, P. Pagel, V. Schachter, A. Valencia
2008 Modern Genome Annotation  
(Noirot and Noirot-Gros 2004) , for many viruses such as herpes viruses, the Epstein-Chapter 6.2: Protein-protein interactions: analysis and prediction Barr virus, the SARS coronavirus, HIV-1, the hepatitis  ...  From here the user has full control over parameters such as the number of proteins shown in the network (nodes) and the minimal reliability required for an interaction (edge) to be displayed.  ... 
doi:10.1007/978-3-211-75123-7_17 fatcat:6as6bv5ezjgvxdmdzbhavyon6m
« Previous Showing results 1 — 15 out of 387 results