A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Evolutionary Divide-and-Conquer Algorithm for Virus Spreading Control Over Networks
2020
IEEE Transactions on Cybernetics
To meet the challenges of increasing network scales and improve the solving efficiency, an evolutionary divide-and-conquer algorithm is proposed, namely, a coevolutionary algorithm with network-community-based ...
The control of virus spreading over complex networks with a limited budget has attracted much attention but remains challenging. ...
General Framework From a systematic perspective, NCD-CEA is an evolutionary divide-and-conquer control policy for virus control. ...
doi:10.1109/tcyb.2020.2975530
pmid:32175884
fatcat:77lvf2ffavh3fawagnpklb3lnm
Table of contents
2021
IEEE Transactions on Cybernetics
Hu, and G. G. Yen 3738 Evolutionary Divide-and-Conquer Algorithm for Virus Spreading Control Over Networks . . ...
Pizzi 3653 Genetic-Algorithm-Assisted Sliding-Mode Control for Networked State-Saturated Systems Over Hidden Markov Fading Channels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
doi:10.1109/tcyb.2021.3088710
fatcat:2bynj6f2rffo7hh2j6a6mkjnti
Evolutionary Computation in Social Propagation over Complex Networks: A Survey
2021
International Journal of Automation and Computing
AbstractSocial propagation denotes the spread phenomena directly correlated to the human world and society, which includes but is not limited to the diffusion of human epidemics, human-made malicious viruses ...
Simulation and optimization are two major themes in social propagation, where network-based simulation helps to analyze and understand the social contagion, and problem-oriented optimization is devoted ...
With the quick development of computer networks, a wide variety of viruses have been produced, spread, and updated, including but not limited to macro viruses, script viruses, network worms, Trojan viruses ...
doi:10.1007/s11633-021-1302-3
fatcat:ga73oavapnfuxpnnb5azji4kze
An Event-Centric Prediction System for COVID-19
2020
2020 IEEE International Conference on Knowledge Graph (ICKG)
In this paper, a system for predicting the spread of COVID-19 based on detecting and tracking events evolution in social media is proposed. ...
One of them was to predict the trend of the epidemic to provide a basis for the decision making of both the public and private sectors. ...
Li Z et al [42] proposed a scaled graph neural network (SGNN), which is feasible to large-scale graphs and borrow the idea of divide and conquer in the training process that instead of computing the ...
doi:10.1109/icbk50248.2020.00037
fatcat:4dmvdrgvdzeuvezmuaw4h2ygu4
Evolutionary Multi-Armed Bandits with Genetic Thompson Sampling
[article]
2022
arXiv
pre-print
Empirical results in multi-armed bandit simulation environments and a practical epidemic control problem suggest that by incorporating the genetic algorithm into the bandit algorithm, our method significantly ...
As two popular schools of machine learning, online learning and evolutionary computations have become two important driving forces behind real-world decision making engines for applications in biomedicine ...
If you close all the traffic, you may stop the spread of the virus, but the economy might crash and people might lose jobs. ...
arXiv:2205.10113v1
fatcat:qgft5wbebnhkho463xwv3msl4y
2021 Index IEEE Transactions on Cybernetics Vol. 51
2021
IEEE Transactions on Cybernetics
Departments and other items may also be covered if they have been judged to have archival value. The Author Index contains the primary entry for each item, listed under the first author's name. ...
The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination. ...
., +, TCYB Aug. 2021 4312-4326 Computer viruses Evolutionary Divide-and-Conquer Algorithm for Virus Spreading Control Over Networks. ...
doi:10.1109/tcyb.2021.3139447
fatcat:myjx3olwvfcfpgnwvbuujwzyoi
Revisiting Evolutionary Fuzzy Systems: Taxonomy, applications, new trends and challenges
2015
Knowledge-Based Systems
Evolutionary Fuzzy Systems are a successful hybridization between fuzzy systems and Evolutionary Algorithms. ...
new approaches for the evolutionary components. ...
We must we aware that this problem becomes accentuated for those classification algorithms which are based on a divide-and-conquer approach [156] , leading to data fragmentation. ...
doi:10.1016/j.knosys.2015.01.013
fatcat:oghazlp2gbhibbenxsf6gm6fzq
A Review on Bio-inspired Optimization Method for Supervised Feature Selection
2022
International Journal of Advanced Computer Science and Applications
The taxonomy of bio-inspired algorithms is presented, along with its performances and limitations, followed by the techniques used in supervised feature selection in term of data perspectives and applications ...
In addition, a discussion of some open issues is presented for further research. ...
ACKNOWLEDGMENT The authors would like to thank the Ministry of Higher Education Malaysia for funding this study under the Transdisciplinary Research Grant Scheme, TRGS/1/2018/UUM/02/3/3 (S/O code 14163 ...
doi:10.14569/ijacsa.2022.0130516
fatcat:hjgishtf6ngk7iyainejme462a
A NEURAL NETWORK CLASSIFIER FOR PAYLOADBASED ONLINE WORMS DETECTION
2021
Webology
The detection rate of Internet worms for which no data was utilised in the model building process was 97.90%, demonstrating the effectiveness of our method. ...
Worms disseminate themselves throughout the Internet and represent a significant risk to data integrity. Signature-based anti-worm methods are ineffective against zero-day exploits. ...
the use of the efficient Divide-and-conquer-scanning worm. ...
doi:10.29121/web/v18i5/59
fatcat:p6puzzuzg5frrn6osm5wfykis4
Computational Challenges from the Tree of Life
2005
Workshop on Algorithm Engineering and Experimentation
Computational phylogenetics has been a rich area for algorithm design over the last 15 years. ...
Thus, while data collection and cataloguing is one of the major tasks, algorithm design and engineering is a crucial enabling component of the project. ...
Arizona), and by the IBM Corporation under a contract from the Defense Advanced Research Projects Agency (the PERCS project). ...
dblp:conf/alenex/Moret05
fatcat:6uonniub3zdvbprayp3tnf3wqq
Hybrid harmony search algorithm for social network contact tracing of COVID-19
2021
Soft Computing - A Fusion of Foundations, Methodologies and Applications
The HHS-CT algorithm is compared to other existing algorithms of finding SCCs in directed graphs, where it showed its superiority over these algorithms. ...
By the end of 2020, effective vaccines that could prevent the fast spread of the disease started to loom on the horizon. ...
Acknowledgements The authors would like to express their deep gratitude to the anonymous referees for their valuable comments and suggestions, which improved this research work. ...
doi:10.1007/s00500-021-05948-2
pmid:34220301
pmcid:PMC8237257
fatcat:rbfgw7mdkrdnno5ykktnmlu4ee
Performance Analysis of Classification Algorithms on Medical Diagnoses-a Survey
2015
Journal of Computer Science
This research paper also discusses the new features of C5.0 classification algorithm over C4.5 and performance of classification algorithm on high dimensional datasets. ...
The classification algorithms with maximum accuracies on various kinds of medical datasets are taken for performance analysis. ...
Ethics This article is original and contains unpublished material. The corresponding author confirms that all of the other authors have read and approved the manuscript and no ethical issues involved. ...
doi:10.3844/jcssp.2015.30.52
fatcat:r4pqqvy4pfhm5fwuh7zm2mjfme
A systematic bioinformatics approach for large-scale identification and characterization of host-pathogen shared sequences
2021
BMC Genomics
The interaction between pathogens and humans over the evolutionary history has resulted in sharing of sequences, with important biological and evolutionary implications. ...
Humans are host to numerous pathogenic diseases, such as that by viruses, many of which are responsible for high mortality and morbidity. ...
Muhammad Farhan Sjaugi and Mr. Poh Yang Ming for their suggestions and help with the development of the inhouse computational tools used. ...
doi:10.1186/s12864-021-07657-4
pmid:34583643
fatcat:cs6huyrlgrdipakmbdaurupb7e
Cro-Magnons Conquered Europe, but Left Neanderthals Alone
2004
PLoS Biology
Though species come and go over evolutionary time, mass extinctions are relatively rare. ...
Expression of ActA allows the microbes to hijack the machinery in the host cell that controls the growth of actin networks. ...
its corresponding energetic contributions; and changing the decoy but controlling for its energetic consequence (by supplemental feeding). ...
doi:10.1371/journal.pbio.0020449
fatcat:zdfgiexsr5hotgjtxxds4ece7m
Protein-protein interactions: analysis and prediction
[chapter]
2008
Modern Genome Annotation
(Noirot and Noirot-Gros 2004) , for many viruses such as herpes viruses, the Epstein-Chapter 6.2: Protein-protein interactions: analysis and prediction Barr virus, the SARS coronavirus, HIV-1, the hepatitis ...
From here the user has full control over parameters such as the number of proteins shown in the network (nodes) and the minimal reliability required for an interaction (edge) to be displayed. ...
doi:10.1007/978-3-211-75123-7_17
fatcat:6as6bv5ezjgvxdmdzbhavyon6m
« Previous
Showing results 1 — 15 out of 387 results